"A complete virtual environment designed for red team vs. blue team simulation, network segmentation, and infrastructure hardening — built by Dylan Barrett under RogueLabs."
Unauthorized use of cybersecurity tools and methods is illegal and unethical.
You are fully responsible for ensuring your use complies with all applicable laws and regulations.
This project is licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license.
🔗 Full License Text
RogueLabs (Dylan Barrett)
🌐 Visit Portfolio
📁 Section | 🔎 Description |
---|---|
🧱 DC01 Setup | How to deploy, configure, and initialize the entire lab in Proxmox VE. |
🧪 Labs | Red vs. Blue scenarios, detection exercises, and offensive/defensive walkthroughs. |
Component | Description |
---|---|
Windows Server 2025 | Active Directory Domain Controller (rougelabs.local ) |
Windows Server 2022 | Exchange Server + IIS Web Server |
Windows 10 & Windows 11 | Client machines for red/blue team operations |
Ubuntu (LAMP Stack) | Web server in DMZ for vulnerable app testing (e.g., DVWA, WordPress) |
Ubuntu (Blue Team Box) | Tools like Wazuh, Snort, and Suricata for monitoring and alerting |
Kali Linux | Red team box with standard offensive tooling |
IIoT VLAN | Simulated Industrial IoT with isolated test devices |
Proxmox VE | Base hypervisor platform with snapshot support and virtual VLAN tagging |
VirtIO Drivers | Integrated for Windows guest installation performance |
Automated Install:
autounattend.xml
for Windows Server 2025/2022Network Segmentation:
ISO Customization:
oscdimg
automation for rebuilding mediaProxmox Snapshots: