laciKE / attacks-demo

Demonstrations and simulations of cyber attacks, scenarios and vulnerabilities

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Attacks-Demo

Demonstrations and simulations of cyber attacks, scenarios and vulnerabilities.

Disclaimer

All content here is provided for educational purposes only. The author does not take any responsibility for misusing any commands, files, docker images and any part of this repository.

Please be aware that this repository can contain vulnerable applications and proof-of-concepts for exploiting these vulnerabilities. In some cases, Dockerfiles provided here can download/build/use tools and frameworks used by the security professionals as well as by the attackers for conducting cyber attacks. For example, Metasploit framework or various exploits and helper scripts. These tools can be flagged by antivirus/antimalware software even when they are executed in Docker/Podman. Please, do not execute any content here directly on your hosts, always use the safe environment. E.g. virtual machines, Docker/Podman containers or virtual machines with the Docker/Podman containers :-)

Remember, it is always a good idea to review the similar content before its execution.

Docker images

See https://hub.docker.com/r/lacike3/attacks-demo.

About

Demonstrations and simulations of cyber attacks, scenarios and vulnerabilities

License:GNU General Public License v3.0


Languages

Language:Dockerfile 71.1%Language:Java 16.3%Language:Shell 12.5%