This local pentest lab leverages docker compose to spin up multiple victim services and an attacker service running Kali Linux. If you run this lab for the first time it will take some time to download all the different docker images. Executed commands: - ./lab.sh --help - ./lab.sh --check-dependencies - ./lab.sh --up --all-services - ./lab.sh --info - ./lab.sh --overview all - ssh root@kali -o "UserKnownHostsFile /dev/null" - ./lab.sh --down Usage: The lab should work out of the box if all needed dependencies are installed. At startup, the lab will run a dependency check. Start the lab: - git clone https://github.com/oliverwiegers/pentest_lab - cd pentest_lab - ./lab.sh -u By default, the lab will start all victim services and one red team service. Other services can be started and added. More information on this down on this below. For further usage information, consider reading the help message shown by ./lab.sh -h | --help. Dependencies: - bash - find - sed - yq (The Python version. Not yq-go.) - docker - docker-compose The lab has a built-in dependency check which runs.
Common questions about Pentest Lab including features, pricing, alternatives, and user reviews.
Pentest Lab is Local pentest lab using docker compose to spin up victim and attacker services. It is a Security Operations solution designed to help security teams with Red Team.
Pentest Lab is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/oliverwiegers/pentest_lab/ for download and installation instructions.
Popular alternatives to Pentest Lab include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Pentest Lab is for security teams and organizations that need Red Team. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Catalog of simulated attack scenarios for cyber defense training and validation
Hands-on cybersecurity training platform with gamified labs and challenges
Enterprise cyber resilience platform with hands-on labs mapped to MITRE & NIST.
Platform for validating security team readiness via threat emulation & purple-team ranges.