This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering & security intelligence tooling in a private research lab using the AWS Cloud.
This project contains vulnerable systems and a toolkit of the most powerful open-source / community edition tools known to Penetration testers. It simply provides a researcher with a disposable offensive / defensive AWS-based environment in less than 5 minutes.
Also Read – HashCobra : Hash Cracking Tool
Get Started
To gain access you must send me your AWS account number so I can share the 30+ Amazon Machine Images (AMIs).
Use my secure FormAssembly form -> CyberRange Sign-Up Form
Then – Read the Getting Started Guide
Range History
Release Notes:
v2 – released on Sept 6, 2019 v2 is simply a collection of the best-in-class tools, most emerging toolsets, and bootstrap frameworks to create an integrated solution capable of enormous growth.
features include: makefile, inspec tests, detection lab integration, commandoVM v2, kali 2019.4 w/ the following opensource github tools: CyberRange, DetectionLab, IntruderPayloads, aws-credential-compromise-detection, aws-nuke, blast-radius, cloudgoat, cloudmapper, packer-windows, pacu, security-monkey-terraform, security_monkey, sites-using-cloudflare, net-creds, Reconnoitre, shell_generator.sh, msploitego, awesome-nodejs-pentest, cloudgoat, hammer, joomscan, learning-tools, LetsMapYourNetwork, php-webshells, PowerHub, PowerSploit, snmpwn, vulhub, ScoutSuite, prowler, pacbot, terraform-aws-secure-baseline, gitleaks, my-arsenal-of-aws-security-tools
Range Technology
CyberRange combines best practices with emerging technologies.
Domains of Knowledge
This open-source research lab provides a bootstrap learning platform for Technologists studying any one of the “Big-3” technology skills.
This project supports 7 gigantically broad domains of technical knowledge.
Mission Statement
The ultimate expectation is to emulate the quality, format, and presentation of the Syracuse University Cyber SEED Labs while creating strategic hubs of Cyber Security Center-of-Excellence Partnerships where the gap between enterprise experience & academic learning is addressed by focusing training paths on people, products, and process.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…