There are 2 repositories under vulnerable-machines topic.
Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the white paper Certified Pre-Owned.
Repository of vulnerable machines created by me (balkan).
A Vulnerable Web Application which consists of Vulnerable Machines, having simulated real-time vulnerabilities. Made with clean UI/UX for better user experience.