You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Vulnerable Docker containers designed to simulate vulnerable services for enthusiasts looking to sharpen their skills in identifying, exploiting, and enumerating vulnerabilities in a controlled environment.
Educational Azure vulnerability lab for penetration testing practice, red team training, and cybersecurity education. Vulnerable-by-design cloud infrastructure with Terraform automation.
Intentionally vulnerable web application built as a portfolio lab and integrated with a controlled Active Directory environment to demonstrate web exploitation, trust boundaries, and attack-chain risk in an isolated setting.