Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/michelbernardods/labs-pentest
Free Labs to Train Your Pentest / CTF Skills
https://github.com/michelbernardods/labs-pentest
challenger code ctf hack labs-pentest programming-challenges
Last synced: about 4 hours ago
JSON representation
Free Labs to Train Your Pentest / CTF Skills
- Host: GitHub
- URL: https://github.com/michelbernardods/labs-pentest
- Owner: michelbernardods
- Created: 2019-06-10T18:36:11.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2022-12-29T23:05:37.000Z (almost 2 years ago)
- Last Synced: 2024-04-01T11:30:48.553Z (7 months ago)
- Topics: challenger, code, ctf, hack, labs-pentest, programming-challenges
- Homepage: https://www.linkedin.com/in/michel-bernardo/
- Size: 28.3 KB
- Stars: 178
- Watchers: 11
- Forks: 44
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# labs-pentest
### NEW REPOSITORY: https://github.com/michelbernardods/programming-challenges
```
Free Labs to Train Your Pentest / CTF Skills
```======================================
-> ACADEMY HACKAFLAG -
https://academy.hackaflag.com.br-> ATTACK DEFENSE -
https://attackdefense.com-> ALERT TO WIN -
https://alf.nu/alert1-> BLUE TEAM LABS -
https://blueteamlabs.online-> CTF KOMODO SECURITY -
https://ctf.komodosec.com-> CTFTIME -
https://ctftime.org-> CMD CHALLENGE -
https://cmdchallenge.com-> CYBERDEFENDERS -
https://cyberdefenders.org-> CYBERSECLABS -
https://www.cyberseclabs.co.uk-> CRYPTOHACK -
https://cryptohack.org-> EXPLOTATION EDUCATION -
https://exploit.education-> ECHO CTF -
https://echoctf.red-> GOOGLE CTF -
https://capturetheflag.withgoogle.com-> HACKTHEBOX -
https://www.hackthebox.com-> HACKTHIS -
https://www.hackthis.co.uk-> HACKSPLAINING -
https://www.hacksplaining.com/exercises-> HACKER101 -
https://ctf.hacker101.com-> HACKER SECURITY -
https://capturetheflag.com.br-> HACKSEC -
https://hackersec.com/ctf/-> HACKING LAB -
https://www.hacking-lab.com/index.html-> HSTRIKE -
https://hstrike.com-> IMMERSIVE LABS -
https://immersivelabs.com-> KOMODOSEC -
http://ctf.komodosec.com-> LABS WIZARD SECURITY -
https://labs.wizard-security.net-> NEWBIE CONTEST -
https://www.newbiecontest.org-> OVER THE WIRE -
http://overthewire.org-> PRACTICAL PENTEST LABS -
https://practicalpentestlabs.com-> PENTEST LAB -
https://pentesterlab.com-> PENETRATION TESTING PRACTICE LABS -
http://www.amanhardikar.com/mindmaps/Practice.html-> PENTESTIT LAB -
https://lab.pentestit.ru-> PICO CTF -
https://picoctf.com-> PWNABLE -
https://pwnable.kr/play.php-> PWN COLLEGE -
https://pwn.college-> PORTS WIGGER -
https://portswigger.net/web-security-> ROOT ME -
https://www.root-me.org-> ROOT IN JAIL -
http://ctf.rootinjail.com-> SHELLTER -
https://shellterlabs.com/pt-> SANS CHALLENGER -
https://www.holidayhackchallenge.com-> SMASH THE STACK -
http://smashthestack.org/wargames.html-> TRY HACK ME -
https://tryhackme.com-> THE CRYPTOPALS CRYPTO CHALLENGES -
https://cryptopals.com-> VULNHUB -
https://www.vulnhub.com-> VULNHUB -
https://vulnmachines.com-> W3Challs -
https://w3challs.com-> W3CHALLS -
http://www.wechall.net-> ZENK SECURITY -
https://repo.zenk-security.com -======================================