Cyberry: 1
InstructionsThe boot2root is a Debian virtual machine and has been fully tested using VMWare Workstation 12. The network interface of the virtual machine will take it's IP settings from...
View ArticleUSV: 2017
Difficulty: Beginner/IntermediateAbout: This is the VM used in the online qualifications phase of the CTF-USF 2017 (Capture the Flag - Suceava University) contest which addresses to universities...
View ArticleGemini Inc: 1
Name: Gemini Inc v1Date release: 2018-01-09Author: 9emin1Series: Gemini IncDescription:I have decided to create vulnerable machines that replicate the vulnerabilities and difficulties I’ve personally...
View ArticleDamn Vulnerable ARM Router (DVAR): tinysploitARM
THE ARM IoT EXPLOIT LABORATORY - Damn Vulnerable ARM Router (DVAR)DVAR is an emulated Linux based ARM router running a vulnerable web server that you can sharpen your ARM stack overflow skills...
View ArticleW1R3S: 1.0.1
You have been hired to do a penetration test on the W1R3S.inc individual server and report all findings. They have asked you to gain root access and find the flag (located in /root...
View ArticleDerpNStink: 1
Difficulty:BeginnerDescription:Mr. Derp and Uncle Stinky are two system administrators who are starting their own company, DerpNStink. Instead of hiring qualified professionals to build up their IT...
View ArticleBlackMarket: 1
VM Name:BlackMarketVM Description:BlackMarket VM presented at Brisbane SecTalks BNE0x1B (28th Session) which is focused on students and other InfoSec Professional. This VM has total 6 flag and one r00t...
View ArticlePinky's Palace: v1
Box Info: Tested on VirtualBox using DHCP Host-only & Bridged Adapter types.File Type: OVABackground:Pinky is creating his very own website! He has began setting up services and some simple web...
View ArticleJIS-CTF: VulnUpload
VM Name: JIS-CTF : VulnUploadDifficulty: BeginnerDescription: There are five flags on this machine. Try to find them. It takes 1.5 hour on average to find all flags.VulnHub
View ArticleBob: 1.0.1
Difficulty: Beginner/IntermediateBob is my first CTF VM that I have ever made so be easy on me if it's not perfect. The Milburg Highschool Server has just been attacked, the IT staff have taken down...
View ArticlePinky's Palace: v2
Description: A realistic Boot2Root. Gain access to the system and read the /root/root.txtNote: Only works in VMwareNetwork: Bridged/DHCPQuestions: Tweeeeeeter @Pink_P4ntherFile: OVFDifficulty to get...
View ArticleBSides Vancouver: 2018 (Workshop)
Boot2root challenges aim to create a safe environment where you can perform real-world penetration testing on an (intentionally) vulnerable target.This workshop will provide you with a custom-made VM...
View ArticleTrollcave: 1.2
Trollcave is a vulnerable VM, in the tradition of Vulnhub and infosec wargames in general. You start with a virtual machine which you know nothing about – no usernames, no passwords, just what you can...
View ArticleJarbas: 1
If you want to keep your hacking studies, please try out this machine!Jarbas 1.0 – A tribute to a nostalgic Brazilian search engine in the end of 90’s.Objective: Get root shell!VulnHub
View ArticleAndroid4: 1
Name : Android4OS : Android v4.4Description : This is my Second booT2Root CTF VM..I hope you enjoy it. if you run into any issue you can find me on Twitter: @touhidshaikh22Flag : /data/root/ (in this...
View ArticleGemini Inc: 2
Name: Gemini Inc v2Date release: 2018-07-10Author: 9emin1Series: Gemini IncDescription: I have decided to create vulnerable machines that replicate the vulnerabilities and difficulties I’ve personally...
View ArticleMinU: 1
Name: MinUv1Date Release: 2018-07-10Author: 8bitsecDescription: This boot2root is an Ubuntu Based virtual machine and has been tested using VirtualBox. The network interface of the virtual machine will...
View ArticleGoldenEye: 1
I recently got done creating an OSCP type vulnerable machine that's themed after the great James Bond film (and even better n64 game) GoldenEye. The goal is to get root and capture the secret GoldenEye...
View Article