diff --git a/scenarios/labs/introducing_attacks/1_intro_linux.xml b/scenarios/labs/introducing_attacks/1_intro_linux.xml
index 5f6eaeb50..256aba689 100644
--- a/scenarios/labs/introducing_attacks/1_intro_linux.xml
+++ b/scenarios/labs/introducing_attacks/1_intro_linux.xml
@@ -22,7 +22,7 @@ Suggested:
Chapter 1 "An Overview of Computer Security": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)
- https://docs.google.com/document/d/1vA_Ev_GPqPg3cGZblgVclWmTU-sUEEBqwYpFH09mQjg/edit?usp=sharing
+ https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/1-intro-linux/
ctf-lab
lab-sheet
easy
diff --git a/scenarios/labs/introducing_attacks/2_malware_msf_payloads.xml b/scenarios/labs/introducing_attacks/2_malware_msf_payloads.xml
index aed27c959..e66f2081b 100644
--- a/scenarios/labs/introducing_attacks/2_malware_msf_payloads.xml
+++ b/scenarios/labs/introducing_attacks/2_malware_msf_payloads.xml
@@ -25,7 +25,7 @@ Chapter 3 "Program Security": Pfleeger, C.P. and Pfleeger, S.L. (2007), Security
Chapter 19 "Malicious Logic": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)
- https://docs.google.com/document/d/1QsOLdqwBP6njIoKbeQRdattbLBLPFCB-eKHW0OxdE8U/edit?usp=sharing
+ https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/2-malware-msf-payloads/
lab-sheet
easy
diff --git a/scenarios/labs/introducing_attacks/3_vulnerabilities.xml b/scenarios/labs/introducing_attacks/3_vulnerabilities.xml
index b80ba4ca0..e162d15bd 100644
--- a/scenarios/labs/introducing_attacks/3_vulnerabilities.xml
+++ b/scenarios/labs/introducing_attacks/3_vulnerabilities.xml
@@ -18,7 +18,7 @@ Throughout this lab, you will gain a deeper understanding of software vulnerabil
# Reading
[Chapter 8: Using Metasploit. Harper, A. and Harris, S. and Ness, J. and Eagle, C. and Lenkey, G, and Williams, T. (2011), Gray hat hacking : the ethical hacker's handbook, McGraw-Hill. (ISBN: 978-0-07-174256-6) Available online via the library](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780071742566)
- https://docs.google.com/document/d/11I8xMUXrT5ArJIsAhwGDtQ4RkH4l9CR4C2wh9_wz8xM/edit?usp=sharing
+ https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/3-vulnerabilities/
ctf-lab
lab-sheet
diff --git a/scenarios/labs/introducing_attacks/5_scanning.xml b/scenarios/labs/introducing_attacks/5_scanning.xml
index 6eef9908d..9d89929e9 100644
--- a/scenarios/labs/introducing_attacks/5_scanning.xml
+++ b/scenarios/labs/introducing_attacks/5_scanning.xml
@@ -15,7 +15,7 @@ This lab provides an in-depth exploration of scanning techniques. You will learn
# Reading
[Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library](http://www.sciencedirect.com/science/book/9781597496551)
- https://docs.google.com/document/d/1KScKw7M4Bt_FE5F_2tI6tnK1NrKNAJkyh5F2TpOh9hA/edit?usp=sharing
+ https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/5-scanning/
ctf-lab
lab-sheet
diff --git a/scenarios/labs/introducing_attacks/6_exploitation.xml b/scenarios/labs/introducing_attacks/6_exploitation.xml
index 50b386d0c..92f79a9e8 100644
--- a/scenarios/labs/introducing_attacks/6_exploitation.xml
+++ b/scenarios/labs/introducing_attacks/6_exploitation.xml
@@ -15,7 +15,7 @@ In this lab, you will learn how to scan a network for vulnerable servers, use Me
# Reading
[Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library](http://www.sciencedirect.com/science/book/9781597496551)
- https://docs.google.com/document/d/1puLuKwqiFMTAZhMKKLhS_aK7kKwWnKw1e3StJBiFmFA/edit?usp=sharing
+ https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/6-exploitation/
ctf-lab
lab-sheet
diff --git a/scenarios/labs/introducing_attacks/7_post-exploitation.xml b/scenarios/labs/introducing_attacks/7_post-exploitation.xml
index a86811f33..b516f5ace 100644
--- a/scenarios/labs/introducing_attacks/7_post-exploitation.xml
+++ b/scenarios/labs/introducing_attacks/7_post-exploitation.xml
@@ -15,7 +15,7 @@ You will learn the skills used by an attacker or security tester, to take action
# Suggested reading
[An excellent resource is Metasploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits)
- https://docs.google.com/document/d/1bt0yKzKjExEih5cmXyl-D__loGwV0UJxQJEDIXxCGxw/edit?usp=sharing
+ https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/7-post-exploitation/
ctf-lab
lab-sheet
diff --git a/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml b/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml
index 5d59a1202..c543071cb 100644
--- a/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml
+++ b/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml
@@ -13,7 +13,7 @@ It is important for organisations to manage the security of their systems and fo
Throughout this lab, you will learn how to use Nmap and its Nmap scripting engine (NSE) to perform vulnerability scanning, discover potential weaknesses in a target system, and gain insights into the ethical hacking and penetration testing process. You will also explore Nessus, a commercial vulnerability scanner, and understand how it operates, what vulnerabilities it can identify, and how to interpret the results. Additionally, you will utilize Nikto, a web vulnerability scanner, to assess the security of web servers, identifying critical vulnerabilities. By completing tasks like initiating scans, analyzing results, and considering the limitations of automated tools, you will gain a practical understanding of vulnerability assessment and the role it plays in strengthening cybersecurity.
- https://docs.google.com/document/d/1rdNcOmYOjsRu97Gh3ds8HbTpORGxbMcd2Q7U4TATIbw/edit?usp=sharing
+ https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/8-vulnerability-analysis/
ctf-lab
lab-sheet