Skip to content

CommonHuman-Lab/OctoRig

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OctoRig

OctoRig

Spin up realistic vulnerable environments for pentesting, security research, and offensive security training — with a single command.


OctoRig is a modular vulnerable lab platform that spins up realistic Docker-based targets for penetration testing practice, security research, red team training, and security tool validation — all with a single command.

Unlike traditional CTF-style machines, OctoRig labs are designed to feel closer to real-world applications and infrastructure. Each environment contains layered vulnerabilities, insecure business logic, hidden attack paths, weak operational security, and realistic application flows for deeper testing and exploration.

Features

  • One-command lab deployment
  • Fully isolated Docker environments
  • Realistic vulnerable applications
  • Multiple vulnerability classes per lab
  • Designed for DAST and offensive tooling
  • Beginner to advanced attack paths
  • Hidden easter eggs and chained exploits
  • Fast teardown and reset workflows
  • Ideal for workshops, demos, and practice environments

Quick Start

git clone https://github.com/CommonHuman-Lab/OctoRig.git
cd OctoRig
./octorig.sh

Or non-interactively:

./octorig.sh start 1     # Start a specific lab
./octorig.sh start all   # Start all labs
./octorig.sh status      # Show running labs
./octorig.sh stop all    # Tear everything down

Available Labs

ID Name Description Port(s)
1 Rewind Retro gaming and media storefront featuring SQL injection, XSS, IDOR, and insecure legacy functionality 8082
2 TradeFloor Vulnerable trading platform with XXE, CSRF, mass assignment, SQLi, IDOR, and stored XSS 8086
3 GoldenAce Online casino environment containing SQLi, JWT flaws, IDOR, stored XSS, CSRF, and business logic vulnerabilities 8087
4 HumanBank Vulnerable online banking application with authentication flaws, SQLi, XSS, insecure uploads, and business logic abuse 8083
5 MediHuman Healthcare patient portal exposing SQLi, IDOR, XSS, insecure file handling, and weak SSH/FTP configurations 8084, 2224, 2121
6 NetPulse 90s-inspired ISP management portal vulnerable to SSRF, SSTI, command injection, open redirects, SQLi, IDOR, and XSS 8085
7 BreachSQL Tiered SQL injection challenges (T1-T5) for SQLi practice 17476
8 StingXSS Tiered XSS challenges (T1-T8) for XSS injection practice 17477
9 VaultGate IDOR challenges for benchmarking 17478
10 VaultRip SSH credential-rich target for VaultRip passive and remote harvesting 2222
11 Juice Shop OWASP Juice Shop — OWASP Top 10 web vulnerabilities 3000
12 DVWA Damn Vulnerable Web App — PHP/MySQL classic 8080
13 Metasploitable2 Linux VM with intentionally vulnerable services 8081, 2222, 21, 445, …
14 WebGoat OWASP WebGoat — lesson-based Java security training 8888, 9191
15 HTB Style HackTheBox-style CTFd platform + vulnerable challenge 8001, 8090
16 VulnAD Vulnerable Active Directory — Samba4 AD with AD attack paths 88, 389, 4445

Requirements

  • Docker (daemon running)
  • Bash 4.0+
  • nc (netcat)
  • Internet access on first run (image pulls)

Philosophy

OctoRig focuses on realistic offensive security training rather than artificial puzzle-based challenges.

The goal is to provide reproducible vulnerable environments that resemble modern applications, internal tooling, and operational mistakes commonly encountered during real assessments.

Legal & Ethical Use

OctoRig is intended for use in isolated lab environments only.

  • Run on a dedicated machine or VM — never expose lab containers to a public network
  • All labs contain intentionally vulnerable software — treat accordingly

About

Spin up realistic vulnerable environments for pentesting, security research, and offensive security training — with a single command.

Topics

Resources

License

Stars

Watchers

Forks

Contributors