Update README.md
This commit is contained in:
parent
b6276992ac
commit
580afc528d
@ -20,6 +20,7 @@ A list of free cloud native security learning labs. Includes CTF, self-hosted wo
|
||||
| [CI/CDon't](https://hackingthe.cloud/aws/capture_the_flag/cicdont/) | AWS | Self-hosted CTF walkthrough | [Nick Frichette](https://twitter.com/Frichette_n) | Host with terraform in your own AWS account, vulnerable CI/CD CTF infrastructure |
|
||||
| [AWSGoat](http://https://github.com/ine-labs/AWSGoat) | AWS | Self-hosted, attack and defense manuals | Multiple, ine-labs | Bring your own aws account, Build with terraform, two modules, provides attack and defense manuals |
|
||||
| [Sadcloud](https://github.com/nccgroup/sadcloud) | AWS | Self-hosted | Multiple, [NCC Group](https://www.nccgroup.com) | Terraform code; not guided like CloudGoat |
|
||||
| [DVCA](https://github.com/m6a-UdS/dvca) | AWS | Self-hosted demo lab | [Maxime Leblanc](https://medium.com/@mleblanc_82306) | Deploy a Damn Vulnerable Cloud Application in your own AWS account to practice privilege escalation |
|
||||
| [Broken Azure](https://www.brokenazure.cloud/) | Azure | Author-hosted, CTF challenge | [Secura](https://github.com/SecuraBV/brokenbydesign-azure) | Provides hints, optionally self-host in your own Azure account using terraform |
|
||||
| [PurpleCloud Azure AD Workshop](https://lab.purplecloud.network/) | Azure | Self-hosted, guided vulnerability workshop | [Jason Ostrom](https://twitter.com/securitypuck) | Guided vulnerability workshop requires PurpleCloud and terraform; username and password is ```sec588``` |
|
||||
| [Mandiant Azure Workshop](https://github.com/mandiant/Azure_Workshop) | Azure | Self-hosted, guided commands | Multiple | Vulnerable by design Azure lab with two scenarios; build with terraform |
|
||||
@ -65,6 +66,8 @@ A list of free cloud native security learning labs. Includes CTF, self-hosted wo
|
||||
|
||||
[Sadcloud](https://github.com/nccgroup/sadcloud): Create vulnerable AWS services without a guide showing vulnerabilities.
|
||||
|
||||
[DVCA](https://github.com/m6a-UdS/dvca): Deploy a Damn Vulnerable Cloud Application in your own AWS account to practice privilege escalation.
|
||||
|
||||
|
||||
## Azure
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user