 pentest_lab
 pentest_lab 
 Penetration lab
 A local penetration testing lab using Docker Compose to simulate various attack scenarios and systems vulnerabilities.
Local penetration testing lab using docker-compose.
182 stars
 8 watching
 52 forks
 
Language: Shell 
last commit: over 2 years ago 
Linked from   2 awesome lists  
  bug-bountybugbountydockerdocker-composepenetration-testingpentest 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A collection of tools and scripts for penetration testing and vulnerability assessment of web applications. | 2 | 
|  | A virtual network environment for learning penetration testing with pre-configured systems and tools. | 841 | 
|  | A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 | 
|  | A Kubernetes-focused container assessment and context discovery tool for penetration testing. | 441 | 
|  | A tool designed to facilitate the collection of information on Windows systems during a penetration test | 0 | 
|  | A Docker image with pre-installed tools for creating and running penetration testing environments. | 732 | 
|  | A penetration testing tool for IoT devices, allowing users to simulate security attacks on target devices. | 211 | 
|  | A plugin for the oh-my-zsh shell that provides a set of aliases and functions for performing penetration testing tasks. | 64 | 
|  | A cheat sheet and resource collection for learning and practicing penetration testing and exploit development | 795 | 
|  | A comprehensive resource for penetration testing and vulnerability assessment | 669 | 
|  | A set of BurpSuite extensions for pentesting and testing | 10 | 
|  | A comprehensive guide to iOS penetration testing, covering tools, techniques, and best practices for identifying vulnerabilities and exploiting them in a controlled environment. | 316 | 
|  | A comprehensive checklist for identifying vulnerabilities in Android apps | 194 | 
|  | A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications | 1,327 |