Pentest Lab Logo

Pentest Lab

0
Free
Visit Website

This local pentest lab leverages docker compose to spin up multiple victim services and an attacker service running Kali Linux. If you run this lab for the first time it will take some time to download all the different docker images. Executed commands: - ./lab.sh --help - ./lab.sh --check-dependencies - ./lab.sh --up --all-services - ./lab.sh --info - ./lab.sh --overview all - ssh root@kali -o "UserKnownHostsFile /dev/null" - ./lab.sh --down Usage: The lab should work out of the box if all needed dependencies are installed. At startup, the lab will run a dependency check. Start the lab: - git clone https://github.com/oliverwiegers/pentest_lab - cd pentest_lab - ./lab.sh -u By default, the lab will start all victim services and one red team service. Other services can be started and added. More information on this down on this below. For further usage information, consider reading the help message shown by ./lab.sh -h | --help. Dependencies: - bash - find - sed - yq (The Python version. Not yq-go.) - docker - docker-compose The lab has a built-in dependency check which runs.

FEATURES

ALTERNATIVES

Comprehensive host-survey tool for security checks in C#.

Cutting-edge open-source security tools for adversary simulation and threat hunting.

Emulate offensive attack techniques in the cloud with a self-contained Go binary.

A Python utility to takeover domains vulnerable to AWS NS Takeover

Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

Python utility for testing the existence of domain names under different TLDs to find malicious subdomains.

Collection of Return-Oriented Programming challenges for practicing exploitation skills.

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved