secdevops-cuse/CyberRange

Docker Container Host for Vulnerable assets

Closed this issue · 1 comments

https://websploit.org/websploit_kali.sh + a bunch more:

https://github.com/The-Art-of-Hacking/h4cker/tree/master/vulnerable_servers

docker run --name webgoat -d --restart unless-stopped -p 6661:8080 -t santosomar/webgoat
docker run --name juice-shop --restart unless-stopped -d -p 6662:3000 santosomar/juice-shop
docker run --name dvwa --restart unless-stopped -itd -p 6663:80 santosomar/dvwa
docker run --name mutillidae_2 --restart unless-stopped -d -p 6664:80 santosomar/mutillidae_2
docker run --name bwapp2 --restart unless-stopped -d -p 6665:80 santosomar/bwapp
docker run --name dvna --restart unless-stopped -d -p 6666:9090 santosomar/dvna
docker run --name hackazon -d --restart unless-stopped -p 6667:80 santosomar/hackazon
docker run --name hackme-rtov -d --restart unless-stopped -p 9000:80 santosomar/hackme-rtov

released in v2 - credit given to omar on the readme. closing