Categories: Kali Linux

CyberRange : The Open-Source AWS Cyber Range

This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering & security intelligence tooling in a private research lab using the AWS Cloud.

This project contains vulnerable systems and a toolkit of the most powerful open-source / community edition tools known to Penetration testers. It simply provides a researcher with a disposable offensive / defensive AWS-based environment in less than 5 minutes.

Also Read – HashCobra : Hash Cracking Tool

Get Started

To gain access you must send me your AWS account number so I can share the 30+ Amazon Machine Images (AMIs).

Use my secure FormAssembly form -> CyberRange Sign-Up Form

Then – Read the Getting Started Guide

Range History

Release Notes:

view the changelog

v2 – released on Sept 6, 2019 v2 is simply a collection of the best-in-class tools, most emerging toolsets, and bootstrap frameworks to create an integrated solution capable of enormous growth.

features include: makefile, inspec tests, detection lab integration, commandoVM v2, kali 2019.4 w/ the following opensource github tools: CyberRange, DetectionLab, IntruderPayloads, aws-credential-compromise-detection, aws-nuke, blast-radius, cloudgoat, cloudmapper, packer-windows, pacu, security-monkey-terraform, security_monkey, sites-using-cloudflare, net-creds, Reconnoitre, shell_generator.sh, msploitego, awesome-nodejs-pentest, cloudgoat, hammer, joomscan, learning-tools, LetsMapYourNetwork, php-webshells, PowerHub, PowerSploit, snmpwn, vulhub, ScoutSuite, prowler, pacbot, terraform-aws-secure-baseline, gitleaks, my-arsenal-of-aws-security-tools

Range Technology

CyberRange combines best practices with emerging technologies.

  • Amazon Web Services
  • Kali
  • Nessus
  • Commando-VM – a windows-based penetration testing VM
  • Terraform
  • OpenSourced Vulnerable VM’s See Asset Inventory
  • using a CI/CD tool to verify builds CircleCI
  • Docker / docker-compose
  • Metasplotiable 2/3 & other open-source vuln vms on VulnHub
  • DetectionLab
  • Inspec – to test the state of your environment, application, system, processes, configurations, etc.
  • Plus Many more things to setup, configure, and experiment with.

Domains of Knowledge

This open-source research lab provides a bootstrap learning platform for Technologists studying any one of the “Big-3” technology skills.

  • Cyber Security
  • Cloud Computing
  • DevOps

This project supports 7 gigantically broad domains of technical knowledge.

  • Offensive Security
  • SecDevOps
  • Architecture & Engineering
  • Vulnerability, Change, & Configuration Management
  • Quality Assurance
  • Auditing – Processing, Systems, Applications
  • Development – Infrastructure / Web Applications

Mission Statement

The ultimate expectation is to emulate the quality, format, and presentation of the Syracuse University Cyber SEED Labs while creating strategic hubs of Cyber Security Center-of-Excellence Partnerships where the gap between enterprise experience & academic learning is addressed by focusing training paths on people, products, and process.

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago