Update README.md

fixes #230
This commit is contained in:
Omar Santos 2024-11-20 12:25:47 -05:00 committed by GitHub
parent b10fc3fc73
commit 2b986220a9
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -40,6 +40,11 @@ There are several intentionally vulnerable applications and virtual machines tha
Go to the [Vulnerable Servers Section](https://github.com/The-Art-of-Hacking/art-of-hacking/tree/master/vulnerable_servers) of this GitHub repository to obtain a list of dozens of vulnerable applications and VMs that can be used to practice your skills.
# Ludus Environment in Proxmox
[Ludus](https://docs.ludus.cloud/) is built on Proxmox. It enables advanced automation while still allowing easy manual modifications or setup of virtual machines and networks.
Ludus is implemented as a server that runs Packer and Ansible to create templates and deploy complex cyber environments from a single configuration file. Ludus is accessed via the Ludus CLI (client) or the Proxmox web interface. Normal users should not need to access Ludus via SSH.
## Cloud-Based Cyber Ranges
- [Awesome Cloud Labs](https://github.com/iknowjason/Awesome-CloudSec-Labs): A list of free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
- [PurpleCloud](https://github.com/iknowjason/PurpleCloud): Cyber Range environment created by [Jason Ostrom](https://twitter.com/securitypuck) using Active Directory and automated templates for building your own Pentest/Red Team/Cyber Range in the Azure cloud!