Skip to content

catalog

Scenario Catalog

Ready-to-deploy training environments for Proxmox. Pick a scenario, run the wizard, and your lab is live in minutes.

Catalog structure

Scenarios

Complete end-to-end lab deployments. Each scenario provisions networks, VMs and services.

Bundles

Atomic, reusable Ansible actions you can compose into custom deployments via the CLI or UI.

Roles

Individual Ansible roles for specific products, CVEs and misconfigurations. Building blocks for new scenarios.

demo_lab

defensive wazuh

Wazuh-instrumented infrastructure with vulnerable hosts. Designed for detection-engineering, alert tuning and blue-team training. Includes misconfigured services and CVE reproductions out of the box.

Proxmox VMs Docker Wazuh
View on GitHub ↗

forensics_lab

forensics

Reproducible compromised environments for incident reconstruction and post-mortem analysis. Perfect for DFIR training and rebuilding compromised systems in an isolated context.

Proxmox VMs Snapshots
View on GitHub ↗

misp_lab

threat intel

Full MISP (Malware Information Sharing Platform) deployment for threat intelligence sharing, indicator correlation and collaborative analysis exercises.

MISP Docker
View on GitHub ↗

kunai_lab

monitoring

Linux kernel-level monitoring with Kunai for deep system telemetry and advanced threat detection. Ideal for understanding low-level attacker behaviour and building detection rules.

Kunai Linux
View on GitHub ↗

Clean, empty network bases to install your own workloads on. Production-grade multi-subnet foundations ready in minutes.

blank_scenario_2_subnets

Simple two-subnet base. Ideal for basic attacker/defender split.

GitHub ↗

blank_scenario_4_subnets

Four subnets for more complex segmentation scenarios and DMZ setups.

GitHub ↗

blank_scenario_6_subnets

Six subnets for enterprise-scale topologies and multi-zone environments.

GitHub ↗

Bundles are atomic, reusable Ansible actions that you can invoke directly from the CLI or compose into custom scenarios. Current bundles cover core Linux setup, Proxmox operations, user management, Docker, and monitoring agents.

Individual roles follow the <category>.<action>.<target> naming convention (e.g. software.install.wazuh, systems.checks.overview).

Browse catalog on GitHub ↗
# Catalog structure
range42-catalog/
├── 02_ansible_layer/
│   ├── admin/        # infrastructure roles
│   ├── trainee/      # student roles
│   └── _ctf/         # challenge roles
├── 03_container_layer/
│   ├── cve/
│   │   ├── web/      # web CVEs
│   │   ├── network/  # network CVEs
│   │   └── system/   # system CVEs
│   └── misconfiguration/
└── 04_gamification_layer/
    ├── hospital/     # hospital theme
    └── bank/         # bank theme

Missing a scenario or CVE?

Open an issue on the catalog repo to request a specific product, CVE or misconfiguration. All catalog contributions welcome — Ansible roles, Docker stacks, and scenario bundles.