Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2, evasion, etc).
83
stars
9
forks
source link
I'd like to contribute a vulnerable machine. But what? #4
Open
minispooner opened 1 year ago
Here's a list of common software I see at companies. You can almost always find a vulnerable version to deploy to make it fun ;)
Friends, plz feel free to add