--- layout: default title: Hacktivity Lab Sheets --- # Hacktivity Lab Sheets Welcome to the Hacktivity SecGen lab sheets repository. This site contains hands-on cybersecurity lab exercises designed for educational purposes. ## Available Labs {% if site.labs.size > 0 %}
{% comment %} Create a collection of all unique categories {% endcomment %} {% assign all_categories = '' | split: '' %} {% for lab in site.labs %} {% if lab.categories %} {% for category in lab.categories %} {% unless all_categories contains category %} {% assign all_categories = all_categories | push: category %} {% endunless %} {% endfor %} {% endif %} {% endfor %} {% comment %} Sort categories alphabetically {% endcomment %} {% assign sorted_categories = all_categories | sort %} {% comment %} Display labs grouped by category {% endcomment %} {% for category in sorted_categories %}

{{ category | replace: '_', ' ' | capitalize }}

{% for lab in site.labs %} {% if lab.categories contains category %}

{{ lab.title }}

{{ lab.description | default: lab.excerpt }}

{% if lab.author %}
{% if lab.author.first %}Authors:{% else %}Author:{% endif %} {% if lab.author.first %} {% assign author_count = lab.author.size %} {% for author in lab.author %} {% if forloop.last and author_count > 1 %}and {% endif %}{{ author }}{% unless forloop.last %}, {% endunless %} {% endfor %} {% else %} {{ lab.author }} {% endif %}
{% endif %} {% if lab.license %}
License: {{ lab.license }}
{% endif %} {% if lab.cybok %}
CyBOK Knowledge Areas: {% for cybok_item in lab.cybok %} {{ cybok_item.ka }}: {{ cybok_item.topic }} {% endfor %}
{% endif %} {% if lab.tags %}
{% for tag in lab.tags %} {{ tag }} {% endfor %}
{% endif %}
{% endif %} {% endfor %}
{% endfor %} {% comment %} Display labs without categories {% endcomment %} {% assign uncategorized_labs = site.labs | where: 'categories', nil %} {% if uncategorized_labs.size > 0 %}

General Labs

{% for lab in uncategorized_labs %}

{{ lab.title }}

{{ lab.description | default: lab.excerpt }}

{% if lab.author %}
{% if lab.author.first %}Authors:{% else %}Author:{% endif %} {% if lab.author.first %} {% assign author_count = lab.author.size %} {% for author in lab.author %} {% if forloop.last and author_count > 1 %}and {% endif %}{{ author }}{% unless forloop.last %}, {% endunless %} {% endfor %} {% else %} {{ lab.author }} {% endif %}
{% endif %} {% if lab.license %}
License: {{ lab.license }}
{% endif %} {% if lab.cybok %}
CyBOK Knowledge Areas: {% for cybok_item in lab.cybok %} {{ cybok_item.ka }}: {{ cybok_item.topic }} {% endfor %}
{% endif %} {% if lab.tags %}
{% for tag in lab.tags %} {{ tag }} {% endfor %}
{% endif %}
{% endfor %}
{% endif %}
{% else %}

No labs are currently available. Labs will be added as they are developed.

Check back soon for new cybersecurity lab exercises!

{% endif %} ## About These lab sheets are designed to provide practical, hands-on experience with various cybersecurity concepts and techniques. These labs are written to be completed on VMs configured with practical hacking/security challenges. ### Option 1: Hacktivity Cyber Security Labs (Recommended) **Visit [Hacktivity Cyber Security Labs](https://hacktivity.leeds.ac.uk)** for a fully configured, cloud-based lab environment - No setup required - labs are pre-configured and ready to use - Access to virtual machines and all required tools - Perfect for students and educators ### Option 2: Manual Setup with SecGen For advanced users who want to build their own lab environment: - Use **SecGen (Security Scenario Generator)** to create vulnerable VMs - Requires technical expertise in virtualization and security tools ### Contributing If you'd like to contribute new labs or improvements to existing ones, please see the repository's contribution guidelines.