hackthebox
seed-labs
Our great sponsors
hackthebox | seed-labs | |
---|---|---|
- | 9 | |
325 | 689 | |
- | 4.8% | |
0.0 | 9.2 | |
over 1 year ago | 24 days ago | |
Python | Python | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hackthebox
We haven't tracked posts mentioning hackthebox yet.
Tracking mentions began in Dec 2020.
seed-labs
-
Cybersecurity Course Suggestion
I would recommend the labs and content at https://seedsecuritylabs.org
- Cybersecurity courses at UB
-
Where to run commands for Docker
My professor has a lab for us and wants us to do THIS lab and I'm only getting. I need to set up multiple networks from the folder he gave us a ton of different files which I'm unsure what each one of them does. Where do I run commands for docker? is it in command line?
-
Spectre Attack Lab
SEEDS Main Page
-
MSCS Course Suggestions?
I'm not sure if computer security is the same as internet security. Professor Du taught it when I was there. It was really hard, but I learned a lot. I believe he has an open source version of the labs. open source website
- SEED Project
-
Ideas for labs for students (suggestions or help/advice)
I used these in college, not the most advanced but pretty simple to set up https://seedsecuritylabs.org/
-
What Do Virus Scripts/Files look like?
One of my courses borrowed from here, there's a lot of different ways to start an attack and it was fun to actually use some of them and gain access (the flaws have since been patched, but real exploits were found for a variety of systems).
-
Man in the Middle in C with netcat TCP packets
I'm implementing an ARP spoofing and man in the middle attack tool in C. For that I took the docker container config from Seed Labs. Here three containers are present: Host A (ip: 10.9.0.5, mac: 02:42:0a:09:00:05), Host B (ip: 10.9.0.6, mac: 02:42:0a:09:00:06), and Host M (ip: 10.9.0.105, mac: 02:42:0a:09:00:69). Host M is to be the attacker.
What are some alternatives?
hackerone-reports - Top disclosed reports from HackerOne
arp_poisoning - Arp Poisoning tool in C using raw sockets
SecGen - Create randomly insecure VMs
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
pentest-everything - This is my penetration testing cheatsheet
PythonProblems - The graded lab problems for the author's course CCPS 109 Computer Science I.
netlab - Making virtual networking labs suck less
ScrapMechanicSeedTool - A tool that allows you to modify the seed of scrap mechanic save files.
starred - creating your own Awesome List by GitHub stars!
svachal - Automate writeup for vulnerable machines.
AdversaryEmulation - MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository