mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2025-02-18 22:24:20 -05:00
Update README.md
This commit is contained in:
parent
dff3c0d026
commit
23ab0af029
@ -44,6 +44,6 @@ The following are the vulnerable applications included in [WebSploit](https://we
|
|||||||
- hackme-rtov
|
- hackme-rtov
|
||||||
|
|
||||||
## Cloud-Based Cyber Ranges
|
## Cloud-Based Cyber Ranges
|
||||||
- [JuliaRT](https://github.com/iknowjason/juliart): Cyber Range environment created by [Jason Ostrom](https://twitter.com/securitypuck) using Active Directory and automated templates for building your own Pentest/Red Team/Cyber Range in the Azure cloud!
|
- [PurpleCloud](https://github.com/iknowjason/PurpleCloud): Cyber Range environment created by [Jason Ostrom](https://twitter.com/securitypuck) using Active Directory and automated templates for building your own Pentest/Red Team/Cyber Range in the Azure cloud!
|
||||||
- [CyberRange by SECDEVOPS@CUSE](https://github.com/secdevops-cuse/CyberRange): AWS-based Cyber Range.
|
- [CyberRange by SECDEVOPS@CUSE](https://github.com/secdevops-cuse/CyberRange): AWS-based Cyber Range.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user