Skip to content

Latest commit

 

History

History
147 lines (74 loc) · 4.7 KB

training-envs.md

File metadata and controls

147 lines (74 loc) · 4.7 KB

Training Environments

Course Material

DefenseAgainstTheDarkArts

how2heap

  • A repository for learning various heap exploitation techniques.

Modern Binary Exploitation

  • Course materials for Modern Binary Exploitation by RPISEC.

Reverse Engineering Malware 101

  • A fantastic 101 on malware by the one and only Malware Unicorn.

Labs

Pentest-env

  • A really ingenious and easy way to deploy multiple VM's and quickly spin up/down different testing labs.

Penetration Testing Practice Lab - VULNERABLE APPS / SYSTEMS

  • A holy cow source for tons of vuln vms and a fantastic network map for those that want to deploy it all.

SecGen

  • Dynamically create vulnerable virtual machines with random security issues.

Miscellaneous

Damn Insecure and Vulnerable App: DIVA Android

  • Vulnerable Android web app and training material.

Damn Small Vulnerable Web

  • A deliberately vulnerable web application written in under 100 lines of code, created for educational purposes. It supports majority of (most popular) web application vulnerabilities together with appropriate attacks.

Exploit-Challenges

  • A collection of vulnerable Arm binaries.

Hacksplaining

  • Site that walks one through different web testing techniques.

Metasploit Vulnerability Emulator


Virtual Machines

Miscellaneous VMs

Buscador Investigative Operating System

  • Linux VM pre-configured for online investigators. Developed by David Westcott and Michael Bazzel.

Flare VM

  • An article and powershell script describing how to set up a windows based Malware analysis VM.

Pwnbox

  • A Docker container with tools for binary reverse engineering and exploitation. It's primarily geared towards Capture The Flag competitions.

Qemu Images To Play With

  • Ready-to-play Qemu images for under-rated architectures (ARM, MIPS, PowerPC, SPARC, AARCH64) to play with, with all the tools builtin to understand memory corruption on non x86 environments.

SOF-ELK

  • Security Operations and Forensics Elasticsearch, Logstash, Kibana.

Resource Sites

Kioptrix

Set up your own malware analysis lab with VirtualBox, INetSim and Burp

Shellter Labs

  • A huge resource of CTF's that have taken place in the past. Organized nicely and easy to play.

VulnHub

Vulnerable VMs

Brainpan: 1

/dev/random: scream

Exploit Exercises

FristiLeaks: 1.3

HackLAB: Vulnix

IMF

Kioptrix: Level 1 (#1)

Kioptrix: Level 1.1 (#2)

Kioptrix: Level 1.2 (#3)

Kioptrix: Level 1.3 (#4)

Kioptrix: 2014

Mr-Robot: 1

PwnLab: init

pWnOS: 2.0

Stapler: 1

SickOs: 1.2

SkyTower: 1

VulnOS: 2

Standard VMS

Microsoft VMs

  • IE8 through MS Edge.

Web Sites

flAWS Challenge

OverTheWire