Welcome to slash-root

Free, hands-on cybersecurity and networking resources for learners and professionals. All guides are personally written and provided free for educational purposes.

0 Guides
0 Categories
0 Free

CTF Challenges

I have created 15 Capture The Flag (CTF) style vulnerable virtual machines for penetration testing practice. These VMs range from beginner to advanced difficulty.

⚠️ Warning: NEVER deploy these vulnerable systems in a production environment. They are intentionally insecure for educational purposes only.

Interested? Email me for instructions and download links!

Get In Touch

Have questions, suggestions, or want to request a guide?

Email: [email protected]