This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering & security intelligence tooling in a private research lab using the AWS Cloud.
This project contains vulnerable systems and a toolkit of the most powerful open-source / community edition tools known to Penetration testers. It simply provides a researcher with a disposable offensive / defensive AWS-based environment in less than 5 minutes.
Also Read – HashCobra : Hash Cracking Tool
Get Started
To gain access you must send me your AWS account number so I can share the 30+ Amazon Machine Images (AMIs).
Use my secure FormAssembly form -> CyberRange Sign-Up Form
Then – Read the Getting Started Guide
Range History
Release Notes:
v2 – released on Sept 6, 2019 v2 is simply a collection of the best-in-class tools, most emerging toolsets, and bootstrap frameworks to create an integrated solution capable of enormous growth.
features include: makefile, inspec tests, detection lab integration, commandoVM v2, kali 2019.4 w/ the following opensource github tools: CyberRange, DetectionLab, IntruderPayloads, aws-credential-compromise-detection, aws-nuke, blast-radius, cloudgoat, cloudmapper, packer-windows, pacu, security-monkey-terraform, security_monkey, sites-using-cloudflare, net-creds, Reconnoitre, shell_generator.sh, msploitego, awesome-nodejs-pentest, cloudgoat, hammer, joomscan, learning-tools, LetsMapYourNetwork, php-webshells, PowerHub, PowerSploit, snmpwn, vulhub, ScoutSuite, prowler, pacbot, terraform-aws-secure-baseline, gitleaks, my-arsenal-of-aws-security-tools
Range Technology
CyberRange combines best practices with emerging technologies.
Domains of Knowledge
This open-source research lab provides a bootstrap learning platform for Technologists studying any one of the “Big-3” technology skills.
This project supports 7 gigantically broad domains of technical knowledge.
Mission Statement
The ultimate expectation is to emulate the quality, format, and presentation of the Syracuse University Cyber SEED Labs while creating strategic hubs of Cyber Security Center-of-Excellence Partnerships where the gap between enterprise experience & academic learning is addressed by focusing training paths on people, products, and process.
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…