Skip to content

Demonstrations and simulations of cyber attacks, scenarios and vulnerabilities

License

Notifications You must be signed in to change notification settings

laciKE/attacks-demo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

Attacks-Demo

Demonstrations and simulations of cyber attacks, scenarios and vulnerabilities.

Disclaimer

All content here is provided for educational purposes only. The author does not take any responsibility for misusing any commands, files, docker images and any part of this repository.

Please be aware that this repository can contain vulnerable applications and proof-of-concepts for exploiting these vulnerabilities. In some cases, Dockerfiles provided here can download/build/use tools and frameworks used by the security professionals as well as by the attackers for conducting cyber attacks. For example, Metasploit framework or various exploits and helper scripts. These tools can be flagged by antivirus/antimalware software even when they are executed in Docker/Podman. Please, do not execute any content here directly on your hosts, always use the safe environment. E.g. virtual machines, Docker/Podman containers or virtual machines with the Docker/Podman containers :-)

Remember, it is always a good idea to review the similar content before its execution.

Docker images

See https://hub.docker.com/r/lacike3/attacks-demo.

About

Demonstrations and simulations of cyber attacks, scenarios and vulnerabilities

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published