{"id":22748163,"url":"https://github.com/githubfoam/cyberrange-sandbox","last_synced_at":"2025-10-14T18:13:07.593Z","repository":{"id":38450488,"uuid":"260954235","full_name":"githubfoam/cyberrange-sandbox","owner":"githubfoam","description":"multi-os multi-arch pipeline","archived":false,"fork":false,"pushed_at":"2022-03-01T06:41:46.000Z","size":174,"stargazers_count":5,"open_issues_count":2,"forks_count":1,"subscribers_count":0,"default_branch":"master","last_synced_at":"2025-04-14T11:47:52.458Z","etag":null,"topics":["cyber-range","githubactions","kali-linux","multi-arch","multi-os","parrotsec","pipeline","zap"],"latest_commit_sha":null,"homepage":"","language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/githubfoam.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-05-03T15:09:07.000Z","updated_at":"2023-10-20T18:28:43.000Z","dependencies_parsed_at":"2022-08-10T00:51:00.947Z","dependency_job_id":null,"html_url":"https://github.com/githubfoam/cyberrange-sandbox","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/githubfoam/cyberrange-sandbox","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fcyberrange-sandbox","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fcyberrange-sandbox/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fcyberrange-sandbox/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fcyberrange-sandbox/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/githubfoam","download_url":"https://codeload.github.com/githubfoam/cyberrange-sandbox/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/githubfoam%2Fcyberrange-sandbox/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279020321,"owners_count":26086864,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-14T02:00:06.444Z","response_time":60,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cyber-range","githubactions","kali-linux","multi-arch","multi-os","parrotsec","pipeline","zap"],"created_at":"2024-12-11T03:20:20.183Z","updated_at":"2025-10-14T18:13:07.574Z","avatar_url":"https://github.com/githubfoam.png","language":"Shell","funding_links":[],"categories":[],"sub_categories":[],"readme":"# cyberrange-sandbox\n\n~~~~\ngit clone https://github.com/githubfoam/cyberrange-kali-githubactions.git \u0026\u0026 cd cyber*\nsudo docker-compose --file dockerfiles/kalilinux/docker-compose-kali.yml up -d\nsudo docker-compose --file dockerfiles/kalilinux/docker-compose-kali.yml ps\nsudo docker-compose --file dockerfiles/kalilinux/docker-compose-kali.yml stop\nsudo docker-compose --file dockerfiles/kalilinux/docker-compose-kali.yml down -v\n\nsudo docker-compose --file dockerfiles/kalilinux/kali-top10.yml up -d\nsudo docker-compose --file dockerfiles/kalilinux/kali-top10.yml ps\nsudo docker-compose --file dockerfiles/kalilinux/kali-top10.yml stop\nsudo docker-compose --file dockerfiles/kalilinux/kali-top10.yml down -v\n\nsudo docker exec --tty --interactive kali /bin/bash\nsudo docker exec --tty --interactive parrotsec-core /bin/bash\n\n$ sudo docker network ls                                                                                                                                                                                     1 ⚙\nNETWORK ID     NAME                   DRIVER    SCOPE\n1323dfeda3cc   bridge                 bridge    local\ne2813428d7f9   host                   host      local\n02d8030c4160   kalilinux_cyberrange   bridge    local\nba6d86b28557   none                   null      localidge    local\nba6d86b28557   none                   null      local\n\n$ sudo docker network inspect kalilinux_cyberrange\nsudo docker exec -it kali-top10 bash\n\nsudo docker exec -it kali-top10 nmap 192.168.35.10\nsudo docker exec kali-top10 nmap 192.168.35.10\n~~~~\n~~~~\nbrowse dvwa http://VAGRANT_HOST_IP\nthe default credentials (admin/password)\nLogin failed\nYou have logged in as 'admin'\n~~~~\n\n\n[![kali cyberrange CI workflow](https://github.com/githubfoam/cyberrange-sandbox/actions/workflows/kali-wf.yml/badge.svg?branch=master)](https://github.com/githubfoam/cyberrange-sandbox/actions/workflows/kali-wf.yml)  \n\n~~~~\n      Name                     Command                       State                            Ports                  \n---------------------------------------------------------------------------------------------------------------------\nbodgeit             catalina.sh run                  Up                      8080/tcp                                \ncloudgoat           /bin/bash                        Up                                                              \ndvwa                /main.sh                         Up                      0.0.0.0:80-\u003e80/tcp,:::80-\u003e80/tcp        \nkali                /bin/bash                        Up                                                              \nmetasploitable      /bin/sh                          Up                                                              \nowasp-juice-shop    docker-entrypoint.sh npm start   Up                      0.0.0.0:3000-\u003e3000/tcp,:::3000-\u003e3000/tcp\nparrotsec-core      /bin/sh -c bash $@               Up                                                              \npostgresql          docker-entrypoint.sh postgres    Up                      0.0.0.0:5432-\u003e5432/tcp,:::5432-\u003e5432/tcp\nwebgoat             /bin/sh -c /bin/bash /home ...   Up                      8080/tcp, 9090/tcp                      \nzap2docker-stable   bash                             Up (health: starting)                                           \nzap2docker-weekly   bash                             Up (health: starting)    \n\n\n########################### METAPACKAGE INFO ###########################\n\nWARNING: apt does not have a stable CLI interface. Use with caution in scripts.\n\nkali-tools-forensics\n  Depends: afflib-tools\n  Depends: apktool\n  Depends: autopsy\n  Depends: binwalk\n  Depends: bulk-extractor\n  Depends: bytecode-viewer\n  Depends: cabextract\n  Depends: chkrootkit\n  Depends: creddump7\n  Depends: dc3dd\n  Depends: dcfldd\n  Depends: ddrescue\n  Depends: dumpzilla\n  Depends: edb-debugger\n  Depends: ewf-tools\n  Depends: exifprobe\n  Depends: exiv2\n  Depends: ext3grep\n  Depends: ext4magic\n  Depends: extundelete\n  Depends: fcrackzip\n  Depends: firmware-mod-kit\n  Depends: foremost\n  Depends: forensic-artifacts\n  Depends: forensics-colorize\n  Depends: galleta\n  Depends: gdb\n    gdb-minimal\n  Depends: gpart\n  Depends: gparted\n  Depends: grokevt\n  Depends: guymager\n  Depends: hashdeep\n  Depends: inetsim\n  Depends: jadx\n  Depends: javasnoop\n  Depends: libhivex-bin\n  Depends: \u003clime-forensics\u003e\n    lime-forensics-dkms\n  Depends: lvm2\n  Depends: lynis\n  Depends: mac-robber\n  Depends: magicrescue\n  Depends: \u003cmd5deep\u003e\n    hashdeep\n  Depends: mdbtools\n  Depends: memdump\n  Depends: metacam\n  Depends: missidentify\n  Depends: myrescue\n  Depends: nasm\n  Depends: nasty\n  Depends: ollydbg\n  Depends: p7zip-full\n  Depends: parted\n  Depends: pasco\n  Depends: pdfid\n  Depends: pdf-parser\n  Depends: pev\n  Depends: plaso\n  Depends: polenum\n  Depends: pst-utils\n  Depends: python3-capstone\n  Depends: python3-dfdatetime\n  Depends: python3-dfvfs\n  Depends: python3-dfwinreg\n  Depends: python3-distorm3\n  Depends: radare2\n  Depends: radare2-cutter\n  Depends: recoverdm\n  Depends: recoverjpeg\n  Depends: reglookup\n  Depends: regripper\n  Depends: rephrase\n  Depends: rifiuti\n  Depends: rifiuti2\n  Depends: rkhunter\n  Depends: rsakeyfind\n  Depends: safecopy\n  Depends: samdump2\n  Depends: scalpel\n  Depends: scrounge-ntfs\n  Depends: sleuthkit\n  Depends: smali\n  Depends: sqlitebrowser\n  Depends: ssdeep\n  Depends: tcpdump\n  Depends: tcpflow\n    tcpflow-nox\n  Depends: tcpick\n  Depends: tcpreplay\n  Depends: truecrack\n  Depends: undbx\n  Depends: unhide\n |Depends: unrar\n  Depends: unar\n  Depends: upx-ucl\n  Depends: vinetto\n  Depends: wce\n  Depends: winregfs\n  Depends: wireshark\n  Depends: xmount\n  Depends: xplico\n  Depends: yara\n  Conflicts: \u003cpdfbook\u003e\n~~~~\n\n[![top 10 kali cyberrange CI workflow](https://github.com/githubfoam/cyberrange-sandbox/actions/workflows/kali-top10-wf.yml/badge.svg?branch=master)](https://github.com/githubfoam/cyberrange-sandbox/actions/workflows/kali-top10-wf.yml)\n~~~~\n\n########################### METAPACKAGE INFO ###########################\n\nWARNING: apt does not have a stable CLI interface. Use with caution in scripts.\n\nkali-tools-top10\n  Depends: aircrack-ng\n  Depends: burpsuite\n  Depends: crackmapexec\n  Depends: hydra\n  Depends: john\n  Depends: metasploit-framework\n  Depends: nmap\n  Depends: responder\n  Depends: sqlmap\n  Depends: wireshark\n~~~~\n[![parrotsec cyberrange CI workflow](https://github.com/githubfoam/cyberrange-sandbox/actions/workflows/parrotsec-wf.yml/badge.svg?branch=master)](https://github.com/githubfoam/cyberrange-sandbox/actions/workflows/parrotsec-wf.yml)  \n~~~~\n        Name                      Command                       State                            Ports                  \n------------------------------------------------------------------------------------------------------------------------\nbodgeit                catalina.sh run                  Up                      8080/tcp                                \ncloudgoat              /bin/bash                        Up                                                              \ndvwa                   /main.sh                         Up                      0.0.0.0:80-\u003e80/tcp,:::80-\u003e80/tcp        \nkali                   /bin/bash                        Up                                                              \nmetasploitable         /bin/sh                          Up                                                              \nowasp-juice-shop       docker-entrypoint.sh npm start   Up                      0.0.0.0:3000-\u003e3000/tcp,:::3000-\u003e3000/tcp\nparrotsec-beef         /bin/sh -c /init.sh $@           Up                                                              \nparrotsec-bettercap    /bin/sh -c bettercap $@          Up                                                              \nparrotsec-core         /bin/sh -c bash $@ /bin/bash     Up                                                              \nparrotsec-metasploit   /bin/sh -c /msfconsole-sta ...   Up                                                              \nparrotsec-nmap         /bin/sh -c nmap $@               Exit 255                                                        \nparrotsec-security     /bin/sh -c bash $@               Up                                                              \nparrotsec-set          /bin/sh -c setoolkit $@          Up                                                              \nparrotsec-sqlmap       /bin/sh -c sqlmap $@             Exit 2                                                          \npostgresql             docker-entrypoint.sh postgres    Up                      0.0.0.0:5432-\u003e5432/tcp,:::5432-\u003e5432/tcp\nwebgoat                /bin/sh -c /bin/bash /home ...   Up                      8080/tcp, 9090/tcp                      \nzap2docker-stable      bash                             Up (health: starting)                                           \nzap2docker-weekly      bash                             Up (health: starting)                                                                   \n\n\n########################### METAPACKAGE INFO ###########################\n\nWARNING: apt does not have a stable CLI interface. Use with caution in scripts.\n\nkali-tools-forensics\n  Depends: afflib-tools\n  Depends: apktool\n  Depends: autopsy\n  Depends: binwalk\n  Depends: bulk-extractor\n  Depends: bytecode-viewer\n  Depends: cabextract\n  Depends: chkrootkit\n  Depends: creddump7\n  Depends: dc3dd\n  Depends: dcfldd\n  Depends: ddrescue\n  Depends: dumpzilla\n  Depends: edb-debugger\n  Depends: ewf-tools\n  Depends: exifprobe\n  Depends: exiv2\n  Depends: ext3grep\n  Depends: ext4magic\n  Depends: extundelete\n  Depends: fcrackzip\n  Depends: firmware-mod-kit\n  Depends: foremost\n  Depends: forensic-artifacts\n  Depends: forensics-colorize\n  Depends: galleta\n  Depends: gdb\n    gdb-minimal\n  Depends: gpart\n  Depends: gparted\n  Depends: grokevt\n  Depends: guymager\n  Depends: hashdeep\n  Depends: inetsim\n  Depends: jadx\n  Depends: javasnoop\n  Depends: libhivex-bin\n  Depends: \u003clime-forensics\u003e\n    lime-forensics-dkms\n  Depends: lvm2\n  Depends: lynis\n  Depends: mac-robber\n  Depends: magicrescue\n  Depends: \u003cmd5deep\u003e\n    hashdeep\n  Depends: mdbtools\n  Depends: memdump\n  Depends: metacam\n  Depends: missidentify\n  Depends: myrescue\n  Depends: nasm\n  Depends: nasty\n  Depends: ollydbg\n  Depends: p7zip-full\n  Depends: parted\n  Depends: pasco\n  Depends: pdfid\n  Depends: pdf-parser\n  Depends: pev\n  Depends: plaso\n  Depends: polenum\n  Depends: pst-utils\n  Depends: python3-capstone\n  Depends: python3-dfdatetime\n  Depends: python3-dfvfs\n  Depends: python3-dfwinreg\n  Depends: python3-distorm3\n  Depends: radare2\n  Depends: radare2-cutter\n  Depends: recoverdm\n  Depends: recoverjpeg\n  Depends: reglookup\n  Depends: regripper\n  Depends: rephrase\n  Depends: rifiuti\n  Depends: rifiuti2\n  Depends: rkhunter\n  Depends: rsakeyfind\n  Depends: safecopy\n  Depends: samdump2\n  Depends: scalpel\n  Depends: scrounge-ntfs\n  Depends: sleuthkit\n  Depends: smali\n  Depends: sqlitebrowser\n  Depends: ssdeep\n  Depends: tcpdump\n  Depends: tcpflow\n    tcpflow-nox\n  Depends: tcpick\n  Depends: tcpreplay\n  Depends: truecrack\n  Depends: undbx\n  Depends: unhide\n |Depends: unrar\n  Depends: unar\n  Depends: upx-ucl\n  Depends: vinetto\n  Depends: wce\n  Depends: winregfs\n  Depends: wireshark\n  Depends: xmount\n  Depends: xplico\n  Depends: yara\n  Conflicts: \u003cpdfbook\u003e\n~~~~\n\n[![parrotsec vulnerability  cyberrange CI workflow](https://github.com/githubfoam/cyberrange-sandbox/actions/workflows/parrotsec-vuln-wf.yml/badge.svg?branch=master)](https://github.com/githubfoam/cyberrange-sandbox/actions/workflows/parrotsec-vuln-wf.yml)\n\nvulnerable web-application \n~~~~\n\nhttps://github.com/OWASP/OWASP-VWAD\n\nDamn Vulnerable Web Application (PHP/MySQL)\nhttps://github.com/ethicalhack3r/DVWA\nhttp://www.dvwa.co.uk/\n\nMetasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. \nhttps://github.com/rapid7/metasploitable3\n\nMutillidae (PHP)\nOWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiast. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. It is pre-installed on SamuraiWTF and OWASP BWA.\nhttps://github.com/webpwnized/mutillidae\n\nNodeGoat (Node)\nThe OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.\nhttps://github.com/OWASP/NodeGoat\n\nWebGoat (Web App)\nWebGoat.Net (.NET)\nWebGoatPHP (PHP)\nhttps://owasp.org/www-project-webgoat/\nWebGoat is a deliberately insecure application \nhttps://github.com/WebGoat/WebGoat\nhttps://github.com/jerryhoff/WebGoat.NET\n\nOWASP Juice Shop (NodeJS/Angular)\nOWASP Juice Shop: Probably the most modern and sophisticated insecure web application.\nhttps://github.com/bkimminich/juice-shop\n\nRailsGoat (Rails)\nA vulnerable version of Rails that follows the OWASP Top 10.\nhttps://github.com/OWASP/railsgoat\n\n~~~~\nvulnerable VMs\n~~~~\nWindows virtual machines for Malware Analysis and Software Reverse Engineering\nhttps://github.com/f0wl/MalwareLab_VM-Setup\n\nThis project is not a vulnerable application. It is a framework designed for quickly configuring training virtual machines with tools and vulnerable application targets. For example, an instructor could use SamuraiWTF to easily set up a classroom virtual machine image containing OWASP ZAP and OWASP Juice Shop, and then distribute it to each student.\nhttps://github.com/SamuraiWTF/samuraiwtf\n\nLinux toolkit for reverse-engineering and analyzing malicious software\nhttps://remnux.org/\n\nTsurugi Linux is a DFIR open source project that is and will be totally free, independent, without involving any commercial brand\nhttps://tsurugi-linux.org/\n~~~~\nDocker\n~~~~\nThis repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMnux repository on Docker Hub\nhttps://github.com/REMnux/docker\n~~~~\n~~~~\nHackThisSite.org is a free, safe and legal training ground for hackers to test and expand their ethical hacking skills with challenges, CTFs,\nhttps://hackthissite.org/\n\nVirtual Machines\nhttps://www.vulnhub.com/\n\nMetasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness\nhttps://github.com/rapid7/metasploit-framework\n\nThis codelab shows how web application vulnerabilities can be exploited and how to defend against these attacks. The best way to learn things is by doing, so you'll get a chance to do some real penetration testing, actually exploiting a real application\nhttps://google-gruyere.appspot.com/\n\n~~~~\nAWS/GCP/Azure/Alibaba/IBM/OpenStack\n~~~~\nCollection of scripts and resources for DevSecOps and Automated Incident Response Security\nhttps://github.com/awslabs/aws-security-automation\n\nThe tool to help you discover resources in the cloud environment \nhttps://github.com/Cloud-Architects/cloudiscovery\n\nRead your tfstate or HCL to generate a graph specific for each provider, showing only the resources that are most important/relevant. \nhttps://github.com/cycloidio/inframap\n\ncloudquery transforms your cloud infrastructure into SQL or Graph database for easy monitoring, governance and security\nhttps://github.com/cloudquery/cloudquery\n\nA very vulnerable serverless application in AWS Lambda \nhttps://github.com/wickett/lambhack\n~~~~\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgithubfoam%2Fcyberrange-sandbox","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgithubfoam%2Fcyberrange-sandbox","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgithubfoam%2Fcyberrange-sandbox/lists"}