Add Pwned Labs

This commit is contained in:
Ian Austin 2023-10-07 16:42:51 +01:00
parent 4e1d27c809
commit b951b04a73

View File

@ -8,6 +8,7 @@ A list of free cloud native security learning labs. Includes CTF, self-hosted wo
| Name | Technology | Category | Author | Notes | | Name | Technology | Category | Author | Notes |
| :------------- |:-------------:| :-----:| :-----: | :------: | | :------------- |:-------------:| :-----:| :-----: | :------: |
| [CloudFoxable](https://github.com/BishopFox/cloudfoxable) | AWS | Self-hosted CTF Challenge | [Seth Art](https://twitter.com/sethsec) | Create your own vulnerable by design AWS penetration testing playground | | [CloudFoxable](https://github.com/BishopFox/cloudfoxable) | AWS | Self-hosted CTF Challenge | [Seth Art](https://twitter.com/sethsec) | Create your own vulnerable by design AWS penetration testing playground |
| [Pwned Labs](https://pwnedlabs.io) | AWS | Author-hosted Guided Labs, CTF | [Ian Austin](https://www.linkedin.com/in/ian-austin-a42002156/) | Free hosted labs for learning cloud security |
| [The Big IAM Challenge](https://bigiamchallenge.com/) | AWS | Author-hosted CTF Challenge | [Wiz](https://www.wiz.io) | CTF challenge to identify and exploit IAM misconfigurations | | [The Big IAM Challenge](https://bigiamchallenge.com/) | AWS | Author-hosted CTF Challenge | [Wiz](https://www.wiz.io) | CTF challenge to identify and exploit IAM misconfigurations |
| [CloudSec Tidbits](https://github.com/doyensec/cloudsec-tidbits/) | AWS | Self-hosted Challenge | [Doyensec](https://doyensec.com/) | Three web app security flaws specific to AWS cloud, self-hosted with terraform | | [CloudSec Tidbits](https://github.com/doyensec/cloudsec-tidbits/) | AWS | Self-hosted Challenge | [Doyensec](https://doyensec.com/) | Three web app security flaws specific to AWS cloud, self-hosted with terraform |
| [Pentesting.Cloud](https://pentesting.cloud/) | AWS | Self-hosted, Author-hosted CTF labs | [Nicholas Gilbert](https://www.linkedin.com/in/nicksecurity/) | 17 free labs, requires registration, some labs are bring your own AWS account and use cloudformation to create | | [Pentesting.Cloud](https://pentesting.cloud/) | AWS | Self-hosted, Author-hosted CTF labs | [Nicholas Gilbert](https://www.linkedin.com/in/nicksecurity/) | 17 free labs, requires registration, some labs are bring your own AWS account and use cloudformation to create |
@ -84,7 +85,7 @@ A list of free cloud native security learning labs. Includes CTF, self-hosted wo
[BadZure](https://github.com/mvelazc0/BadZure): Powershell Graph SDK script that spins up your own Azure AD (Entra ID) lab with attack paths. Currently no walk through or guide. [BadZure](https://github.com/mvelazc0/BadZure): Powershell Graph SDK script that spins up your own Azure AD (Entra ID) lab with attack paths. Currently no walk through or guide.
[Broken Azure](https://www.brokenazure.cloud/): A vulnerable by design Azure infrastructure that you can attack. [Broken Azure](https://www.brokenazure.cloud/): A vulnerable by design Azure infrastructure that you can attack.
[PurpleCloud Azure AD Workshop](https://lab.purplecloud.network/): Guided vulnerability workshop simulating an enterprise Azure customer. It requires PurpleCloud and terraform; username and password is ```sec588``` [PurpleCloud Azure AD Workshop](https://lab.purplecloud.network/): Guided vulnerability workshop simulating an enterprise Azure customer. It requires PurpleCloud and terraform; username and password is ```sec588```
[Mandiant Azure Workshop](https://github.com/mandiant/Azure_Workshop): Vulnerable by design Azure lab with two scenarios that you build in your own Azure tenant. [Mandiant Azure Workshop](https://github.com/mandiant/Azure_Workshop): Vulnerable by design Azure lab with two scenarios that you build in your own Azure tenant.