recentpopularlog in

whip_lash : vm   13

redhuntlabs/RedHunt-OS: Virtual Machine for Adversary Emulation and Threat Hunting
Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs

RedHunt OS aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker's arsenal as well as defender's toolkit to actively identify the threats in your environment.
dfir  security  threathunting  vm 
16 days ago by whip_lash
GitHub - network-automation/linklight: Training Course for Ansible Network Automation
The Ansible Networking Linklight project is intended for effectively demonstrating Ansible's capabilities through instructor-led workshops or self-paced exercises.
ansible  tutorial  vm  linklight  networengineering  devops 
april 2019 by whip_lash
Puppet Learning VM - Try Puppet in a downloadable virtual machine with quests
The Puppet Learning VM is an interactive tutorial and learning environment to get you started with Puppet or level up the skills you already have. Explore the technology in depth with a series of detailed multi-step quests. Working through the Puppet Enterprise console GUI and Linux command-line, you'll learn the building block concepts of Puppet such as resources, manifests, classes and modules, then move on to more advanced topics including defined resource types and application or...
automation  learning  puppet  vm  devops 
april 2019 by whip_lash
Buscador OSINT VM
Buscador is a Linux Virtual Machine that is pre-configured for online investigators. It was developed by David Westcott and Michael Bazzell, and distributions are maintained on this page. The current build is 5GB and includes the following resources
osint  vm 
april 2019 by whip_lash
Write your Own Virtual Machine
The final code is about 250 lines of C. All you need to know is how to read basic C or C++ and how to do binary arithmetic.
c  emulator  programming  vm 
december 2018 by whip_lash
How to create a network wildcard VM using CERT Tapioca for exploit testing - Tools - VulWiki
Let's say you have an exploit, and you're not sure what it does.  Many exploits do something on the network.  It would be nice to be able to observe these network operations, without actually being connected to the internet. Running an unknown exploit on an internet-connected machine is a bad idea. As it turns out, we can simulate an internet-connected machine by turning our CERT Tapioca VM into something that responds to everything (both DNS-addressed, and IP-addressed).
exploit  malware  analysis  vm 
august 2018 by whip_lash
vuLnDAP - DigiNinja
The app has three sections, a vulnerable stock control system, a feature to allow raw LDAP queries (useful for debugging and testing) and a page of resources. The scenario is that the stock control system is built on the same LDAP database used by the company for network user management, the goal is to dump a copy of the users with an additional goal of acquiring a set of useful SSH keys.
vulnerability  ldap  vm 
august 2018 by whip_lash
Download Windows XP for Free and Legally, Straight From Microsoft
Don’t give up though because I’m going to show you how to take that Windows XP Mode download, extract a file or three, and load it up in a virtual machine.
windows  xp  vm 
april 2018 by whip_lash

Copy this bookmark:





to read