mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2025-02-16 13:58:26 +00:00
Update README.md
This commit is contained in:
parent
9db7997209
commit
c05acb17e0
1 changed files with 5 additions and 0 deletions
|
@ -40,3 +40,8 @@ The following are the vulnerable applications included in [WebSploit](https://we
|
|||
- OWASP Mutillidae 2
|
||||
- bWapp2
|
||||
- hackme-rtov
|
||||
|
||||
## Cloud-Based Cyber Ranges
|
||||
- [JuliaRT](https://github.com/iknowjason/juliart): Cyber Range environment created by [Jason Ostrom](https://twitter.com/securitypuck) using Active Directory and automated templates for building your own Pentest/Red Team/Cyber Range in the Azure cloud!
|
||||
- [CyberRange by SECDEVOPS@CUSE](https://github.com/secdevops-cuse/CyberRange): AWS-based Cyber Range.
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue