SkillAgentSearch skills...

HomeLabResources

List of resources for buiding a home lab

Install / Use

/learn @reswob10/HomeLabResources
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

HomeLabResources

List of resources for buiding a home lab

Shout out to Omar Santos (@santosomar) who has 1000s of resources here

  • https://github.com/The-Art-of-Hacking/h4cker

Another great collection of tools and such

  • https://github.com/fabacab/awesome-cybersecurity-blueteam

Blogs and Videos that walk through setting up labs

Pay what you want book Building Virtual Machine SECOND EDITION! by Tony Robinson Learn everything there is to know about building and maintaining your own home or workplace virtual lab environment on the most popular hypervisors today! https://leanpub.com/avatar2

Great run through of building a lab influenced by Tony above. Lots of links and suggestions and lessons learned. https://www.netsecfocus.com/home/lab/2020/09/21/Tjnulls_guide_to_building_a_Home_Lab.html

How to Build a Home Lab Black Hills Information Security webcast

Blog from Black Hills instructions and information for building a lab environment

How to Build a Cloud Hacking Lab by @dafthack

SANS webcast: Building an Enterprise Grade Home Lab

SANS webcast: Extending Your Home Lab to include Cloud

SANS webcast: Building Your Own Super Duper Home Lab

SANS webcast: Building an Azure Pentest Lab for Red Teams

HAK5 video: Building a Home Lab Virtual Server Quick and Dirty - Hak5 1819

Videos by Tyrone E. Wilson

Building an Effective Cybersecurity Learning Environment

Hands-On Learning: How and Why You Should Build a Home Lab

Great instructions for building ELK and Wazuh home lab:
https://github.com/watsoninfosec/ELK-SIEM

Justin Henderson, the author of SANS SEC555, SEC530 and other courses is doing a series on building a home lab

A guide on building a DIY SIEM at home by James Smith @DFIRmadness https://dfirmadness.com/building-a-siem-at-home/

Here is the beginning of a series of blogs for building a Blue Team home lab

Another set of blogs for building a home lab. This one is from Red Siege and will be more offensive focused:

  • Part 1: https://redsiege.com/blog/2022/06/simpledomainp1/
  • Part 2: https://redsiege.com/blog/2022/06/simpledomainp2/
  • Part 3: https://redsiege.com/blog/2022/06/simpledomainp3/
  • Part 4: https://redsiege.com/blog/2022/06/creating-a-simple-windows-domain-for-offensive-testing-part-4/

From @secopsgeek, how to ElasticXDR 8.2.0 Gitbook Build Overview

Automated lab creation tools

GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack techniques.

Alternative to GOAD by @MJHallenbeck

  • https://github.com/Marshall-Hallenbeck/red_team_attack_lab

AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2019, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc.

Splunk Attack range

Purple Cloud - An Infrastructure as Code (IaC) deployment of a small Active Directory pentest lab in the cloud. The deployment simulates a semi-realistic corporate enterprise Active Directory with a DC and endpoints. Purple team goals include blue team detection capabilities and R&D for detection engineering new approaches.

Cyb3rWard0g has Microsoft-Sentinel2Go which contains scripts in github for multiple configurations to build an entire lab in Azure

MS Defender Evaluation lab which includes Red Canary's atomic red team.

Microsoft Simuland complete lab environment with lessons

  • https://simulandlabs.com/README.html

Automated build of Azure attack and detect lab by Roxana Kovaci (@RoxanaKovaci)

  • https://github.com/mandiant/Azure_Workshop

Websploit by @santosomar

How to's and Building Home Lab references

The UK National Cyber Security Center has a great project for small/home offices to help them get started with logging. This can be used for home labs as well. Not a full SIEM solution, but a start.

Offensive Security has a great blog with lots of details and links with a video here

Monitoring your Proxmox environment with Security Onion by @null@puddle.town (on Mastodon)

  • https://blog.puddle.town/proxmox-span/

Building ELK SIEM in in two videos, part 1 and part 2

Building ELK SIEM in blog format

Cyberrange options to deploy in Azure: https://levelup.gitconnected.com/building-azure-cyber-ranges-for-learning-and-fun-9df1debb2eae?gi=e662f36c25fb

Series of videos for building a home lab by @DayCyberwox:

Watch this talk with SANS Certified Instructor and course author Justin Henderson, as he shares what the steps are in building out a detection oriented blue team lab.

AWS Pen-Testing Laboratory - Pentesting Lab With A Kali Linux Instance Accessible Via Ssh And Wireguard VPN And With Vulnerable Instances In A Private Subnet

Here is a video from Black Hat Trainings in 2020

Video https://youtu.be/yDWug2zhjyA

From @HBRH_314, a video of Malware Analysis Fundamentals to create an analysis environment for safe inspection of malware utilizing Remnux and FLARE VM.

Video from @watsoninfosec on his home lab build

A (very short) introduction to kne from @supertylerc, a project from Google that lets you run virtual network topologies in Kubernetes.

This repo from Black Hills contains guidance on setting up event logging.

Building a SOC lab at home

  • https://app.letsdefend.io/training/lessons/building-a-soc-lab-at-home

Buidling an infosec home lab from scratch

  • https://youtube.com/playlist?list=PLyJqGMYm0vnP9sgEGRxmhUKFQVVz68Cbh This guy has a TON of videos that can help with your home lab
  • https://www.youtube.com/@ITSecurityLabs/videos

Blog series for building a home lab. First post here

  • https://facyber.me/posts/blue-team-lab-guide-part-1/

Tools and configurations to build your home lab

Creating a vulnerable Active Directory to test attack tools and detections https://github.com/WazeHell/vulnerable-AD Here is the video explaining it's use @steelcon 2022 by @myexploit2600 and @ZephrFish (mature language) https://youtu.be/8VvLJfAFGcA

Filtering DNS and HTTPS Traffic on pfSense https://docs.diladele.com/tutorials/filtering_https_traffic_squid_pfsense/index.html

BadBlood - BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects:
https://github.com/davidprowe/BadBlood

Powershell script to create AD Domain Controller and Workstation
https://browninfosecguy.com/Active-Directory-Lab-Setup-Tool

From Wazehell, Create a vulnerable active directory that's allowing you to test most of active directory attacks in local lab

From @ajpc500, a quick and dirty PowerShell script to install Sysmon (SwiftOnSecurity config), SilkService and Winlogbeat, and forward the logs on to HELK. Might be useful for those looking to quickly configure endpoint logs in a lab environment

Laurel turns Linux auditd logs into JSON format for easier ingestion into SIEM

Attacker Simulation / Emulation

Atomic Red Team

Stratus Red Team is "Atomic Red Team™" for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner. Uses AWS and Sumo Logic

Caldera from MITRE

MITRE has information about how to emulate different adversaries:

General information about their program: https://mitre-engenuity.org/cybersecurity/

Related Skills

View on GitHub
GitHub Stars309
CategoryDevelopment
Updated3d ago
Forks34

Security Score

80/100

Audited on Mar 25, 2026

No findings