A 100% Free, Multi-Target Cyber Security Sandbox & Automated Hacking Lab
This laboratory functions completely inside an air-gapped hypervisor isolation layer. No modifications, alterations, or background software configurations ever execute on your physical host laptop [01-Hypervisors, 02-ISO-Archive]. Your Windows 11 host registry parameters and local account databases remain entirely untouched while host Core Isolation / Memory Integrity properties remain active [01-Hypervisors, 02-ISO-Archive].
Windows Server 2025 domain structure pre-loaded with exactly 2,491 fuzzed user profiles, tiered Organizational Units (OUs), and nested computer targets for intense password spraying and roasting practice [01-Hypervisors, 02-ISO-Archive].
Includes separate, host-isolated targets across our private network switch: DC-1 (vulnerable Drupal CMS), SickOs (proxy server misconfigurations), and Kioptrix Level 1 (legacy service auditing) [01-Hypervisors, 02-ISO-Archive].
Built completely utilizing Infrastructure-as-Code principles. Fully automated deployment templates stand up multiple complex networks, interfaces, and domains completely hands-free [01-Hypervisors, 02-ISO-Archive].
PS C:\> winget install HashiCorp.Vagrant --silent --accept-source-agreements --accept-package-agreements
PS C:\> git clone https://github.com/ReconTrapper/Hacking-Playground-.git
PS C:\> cd Hacking-Playground-
PS C:\> vagrant up
100% Isolated: All underlying virtual machines, penetration testing scripts, and network port sweeps operate inside an air-gapped internal switch layout (LabNet) [01-Hypervisors, 02-ISO-Archive]. It is physically impossible for traffic to bleed onto your local Wi-Fi, compromise your home router, or interact with your host filesystems [01-Hypervisors, 02-ISO-Archive].
Zero Residual Footprint: If anything breaks or you want to wipe the lab completely off your drive, simply run vagrant destroy -f inside this directory [01-Hypervisors, 02-ISO-Archive]. It will instantly purge the RAM, clear the allocations, and wipe the virtual hard drives completely—leaving your host laptop clean [01-Hypervisors, 02-ISO-Archive].
The winget command connects directly to Microsoft's official app store channels to download HashiCorp Vagrant and Oracle VirtualBox silently in the background, updating all global environment system variable paths automatically [Source: GitHub Documentation].
When you execute vagrant up, the virtualization engine builds an internal, host-only virtual network switch switch layer (LabNet / 10.0.2.0/24) [01-Hypervisors, 02-ISO-Archive]. This ensures all downstream exploits, network sweeps, and fuzzed target vectors remain completely air-gapped from your physical home Wi-Fi network [01-Hypervisors, 02-ISO-Archive].
Vagrant communicates with secure cloud image mirrors to download the official base image templates for Kali Linux and Windows Server Evaluation [01-Hypervisors, 02-ISO-Archive]. It automatically provisions separate virtual disk drives and maps hardware constraints (memory allocations, virtual CPUs) cleanly.
The script signs into the fresh Windows Server instance, launches native PowerShell automation, installs the Active Directory Domain Services (AD-DS) framework role, elevates the server to a root domain controller forest named trapped.local, and issues an automated system restart.
The script invokes the BadBlood engine completely inside the virtual boundaries of the server [01-Hypervisors, 02-ISO-Archive]. It generates multi-tiered Organizational Units and injects exactly 2,491 randomized user targets directly into the isolated directory file [01-Hypervisors, 02-ISO-Archive]. Concurrently, it misconfigures realistic security flaws like disabling pre-authentication for targeted AS-REP Roasting training [01-Hypervisors, 02-ISO-Archive].
Vagrant finishes by downloading and launching your preconfigured Linux-based target endpoints (DC-1 Drupal Server, SickOs, Kioptrix), linking them seamlessly to the exact same private subnet and leaving you with a weaponized, production-grade cyber sandbox range completely ready for training [01-Hypervisors, 02-ISO-Archive]!