There are 2 repositories under vulnerable-machines topic.
Self-deployed Straight-forward hacking lab machine which designed for new comer who want to learn Penetration Testing field that running inside Docker for easy setup.
Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the white paper Certified Pre-Owned.
A Vulnerable Web Application which consists of Vulnerable Machines, having simulated real-time vulnerabilities. Made with clean UI/UX for better user experience.