This repository documents a reproducible lab for cybersecurity practice (Docker / Vagrant) intended for isolated, local use only.
- Build reproducible, local labs for practicing pentesting techniques.
- Demonstrate safe configurations (bind services to localhost, private networks).
- Share non-malicious helper scripts and topology diagrams.
- Inspect
docs/lab-topology.md. - Start lab (on your machine, not exposed to the internet):
docker compose up -d- Use the
attackercontainer (Kali-like) andmonitorfor analysis.
docker-compose.yml— ready example (bound to localhost)Vagrantfile— optional VM exampledocs/— topology and notesscripts/— safe helper scriptstemplates/— writeup templates
All setups are for educational use only in isolated environments.
Do not run these services on public production networks. Follow responsible disclosure and local laws.