This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering & security intelligence tooling in a private research lab using the AWS Cloud.
This project contains vulnerable systems and a toolkit of the most powerful open-source / community edition tools known to Penetration testers. It simply provides a researcher with a disposable offensive / defensive AWS-based environment in less than 5 minutes.
Also Read – HashCobra : Hash Cracking Tool
Get Started
To gain access you must send me your AWS account number so I can share the 30+ Amazon Machine Images (AMIs).
Use my secure FormAssembly form -> CyberRange Sign-Up Form
Then – Read the Getting Started Guide
Range History
Release Notes:
v2 – released on Sept 6, 2019 v2 is simply a collection of the best-in-class tools, most emerging toolsets, and bootstrap frameworks to create an integrated solution capable of enormous growth.
features include: makefile, inspec tests, detection lab integration, commandoVM v2, kali 2019.4 w/ the following opensource github tools: CyberRange, DetectionLab, IntruderPayloads, aws-credential-compromise-detection, aws-nuke, blast-radius, cloudgoat, cloudmapper, packer-windows, pacu, security-monkey-terraform, security_monkey, sites-using-cloudflare, net-creds, Reconnoitre, shell_generator.sh, msploitego, awesome-nodejs-pentest, cloudgoat, hammer, joomscan, learning-tools, LetsMapYourNetwork, php-webshells, PowerHub, PowerSploit, snmpwn, vulhub, ScoutSuite, prowler, pacbot, terraform-aws-secure-baseline, gitleaks, my-arsenal-of-aws-security-tools
Range Technology
CyberRange combines best practices with emerging technologies.
Domains of Knowledge
This open-source research lab provides a bootstrap learning platform for Technologists studying any one of the “Big-3” technology skills.
This project supports 7 gigantically broad domains of technical knowledge.
Mission Statement
The ultimate expectation is to emulate the quality, format, and presentation of the Syracuse University Cyber SEED Labs while creating strategic hubs of Cyber Security Center-of-Excellence Partnerships where the gap between enterprise experience & academic learning is addressed by focusing training paths on people, products, and process.
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…