From ba806672acbd22884daa5018c545e6d8affe6bd1 Mon Sep 17 00:00:00 2001 From: oliverwiegers Date: Thu, 29 Apr 2021 22:02:58 +0200 Subject: [PATCH] Add Lab Section to Intentionally Vulnerable Systems - Add section containing training labs with intentionally vulnerable systems. - Add oliverwiegers/pentest_lab to obove section. --- README.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/README.md b/README.md index 06ec253..c734c35 100644 --- a/README.md +++ b/README.md @@ -33,6 +33,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea * [Industrial Control and SCADA Systems](#industrial-control-and-scada-systems) * [Intentionally Vulnerable Systems](#intentionally-vulnerable-systems) * [Intentionally Vulnerable Systems as Docker Containers](#intentionally-vulnerable-systems-as-docker-containers) + * [Intentionally Vulnerable Systems as Lab](#intentionally-vulnerable-systems-as-lab) * [Lock Picking](#lock-picking) * [macOS Utilities](#macos-utilities) * [Multi-paradigm Frameworks](#multi-paradigm-frameworks) @@ -307,6 +308,10 @@ See also [awesome-vulnerable](https://github.com/kaiiyer/awesome-vulnerable). * [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/) - `docker pull hmlio/vaas-cve-2014-6271`. * [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/) - `docker pull wpscanteam/vulnerablewordpress`. +### Intentionally Vulnerable Systems as Lab + +* [oliverwiegers/pentest_lab](https://github.com/oliverwiegers/pentest_lab) - Local pentest lab leveraging Docker Compose. + ## Lock Picking See [awesome-lockpicking](https://github.com/fabacab/awesome-lockpicking).