seed-labs
hackthebox
seed-labs | hackthebox | |
---|---|---|
9 | - | |
694 | 325 | |
2.4% | - | |
9.2 | 0.0 | |
30 days ago | over 1 year ago | |
Python | Python | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
seed-labs
-
Cybersecurity Course Suggestion
I would recommend the labs and content at https://seedsecuritylabs.org
- Cybersecurity courses at UB
-
Where to run commands for Docker
My professor has a lab for us and wants us to do THIS lab and I'm only getting. I need to set up multiple networks from the folder he gave us a ton of different files which I'm unsure what each one of them does. Where do I run commands for docker? is it in command line?
-
Spectre Attack Lab
SEEDS Main Page
-
MSCS Course Suggestions?
I'm not sure if computer security is the same as internet security. Professor Du taught it when I was there. It was really hard, but I learned a lot. I believe he has an open source version of the labs. open source website
- SEED Project
-
Ideas for labs for students (suggestions or help/advice)
I used these in college, not the most advanced but pretty simple to set up https://seedsecuritylabs.org/
-
What Do Virus Scripts/Files look like?
One of my courses borrowed from here, there's a lot of different ways to start an attack and it was fun to actually use some of them and gain access (the flaws have since been patched, but real exploits were found for a variety of systems).
-
Man in the Middle in C with netcat TCP packets
I'm implementing an ARP spoofing and man in the middle attack tool in C. For that I took the docker container config from Seed Labs. Here three containers are present: Host A (ip: 10.9.0.5, mac: 02:42:0a:09:00:05), Host B (ip: 10.9.0.6, mac: 02:42:0a:09:00:06), and Host M (ip: 10.9.0.105, mac: 02:42:0a:09:00:69). Host M is to be the attacker.
hackthebox
We haven't tracked posts mentioning hackthebox yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
arp_poisoning - Arp Poisoning tool in C using raw sockets
hackerone-reports - Top disclosed reports from HackerOne
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
SecGen - Create randomly insecure VMs
PythonProblems - The graded lab problems for the author's course CCPS 109 Computer Science I.
pentest-everything - This is my penetration testing cheatsheet
ScrapMechanicSeedTool - A tool that allows you to modify the seed of scrap mechanic save files.
netlab - Making virtual networking labs suck less
starred - creating your own Awesome List by GitHub stars!
AdversaryEmulation - MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
svachal - Automate writeup for vulnerable machines.