Skip to content

fmdlc/hackademy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hackademy

Hackademy is Ekoparty's hacking academy. This repository collects hands-on Linux material prepared for the Attacking Linux and Defending Linux modules, including intentionally unsafe code samples, capture-the-flag support files, low-level programming exercises, and kernel research material used in isolated training labs.

This repository is for controlled educational environments only. Some files are intentionally sensitive because they are used to explain offensive techniques, insecure patterns, post-exploitation concepts, and defensive analysis workflows in a classroom or lab setting. Do not run, compile, or expose these materials on production systems, personal devices you care about, or networks you do not own and administer.

Legal Notice

This repository is provided strictly for education, research, and authorized lab work. Any misuse, unauthorized testing, or deployment against systems you do not own or explicitly administer can lead to disciplinary action, civil liability, or criminal consequences under applicable law.

You are responsible for ensuring that every exercise is performed with clear permission, inside isolated environments, and in compliance with local law, institutional policy, and contractual obligations.

Scope

The current content is centered on practical Linux internals for the Attacking Linux and Defending Linux modules:

  • Assembly basics
  • Introductory syscall and libc comparison samples
  • Stack-based memory corruption examples
  • Shell and post-exploitation artifacts for analysis
  • CTF support files such as usernames, vhosts, and wordlists
  • Linux kernel rootkit research material
  • Userland backdoor and hooking artifacts for defensive study
  • Reference links for further study

Repository Layout

Path Purpose
modules/ Core teaching modules for Attacking Linux and Defending Linux.
labs/ Challenge-specific lab content and auxiliary exercise files.
research/ Sensitive research material retained for advanced classroom analysis.
resources/ Reusable supporting resources such as lab wordlists.
docs/ Cross-cutting reference material and instructor-facing documentation.

Intended Use

Use this repository when you need teaching material for:

  • Attacking Linux classes taught inside isolated VMs
  • Defending Linux analysis and detection discussions
  • Malware and post-exploitation artifact familiarization
  • Low-level Linux internals demonstrations
  • Reverse engineering and secure code review exercises
  • CTF preparation in controlled environments

Avoid using it as:

  • A production-ready toolkit
  • A drop-in offensive operations kit
  • A repository to run directly on public infrastructure

Safety Boundaries

  • Use disposable lab machines or snapshots.
  • Keep networks segmented and non-routable from production.
  • Assume every executable sample is unsafe by design.
  • Treat all shell, rootkit, and payload files as teaching artifacts.
  • Prefer static review over execution whenever possible.
  • Verify local laws, institutional policy, and authorization before any testing.

Suggested Lab Setup

The repository does not try to automate dangerous workflows. A safe baseline for class usage is:

  1. Create an isolated Linux VM dedicated to the course.
  2. Disable shared folders unless they are strictly required.
  3. Keep snapshots before each practical exercise.
  4. Mount the repository read-only when students only need inspection.
  5. Restore the VM after exercises involving shellcode, web shells, or kernel modules.

Working With Sensitive Content

Some bundled files contain:

  • Common usernames
  • Password lists
  • Recon wordlists
  • Web shell code
  • Local rootkit source

That is expected for the Ekoparty Hackademy context. The goal is to preserve realistic material while documenting it responsibly. If you expand the repository, keep new additions clearly labeled, scoped to a module, and accompanied by a short note explaining the educational purpose within Attacking Linux or Defending Linux.

Documentation Map

Notes On Provenance

Not every artifact in this repository was originally authored here. Some material is retained because it is useful for study, comparison, or classroom demonstrations. Keep upstream licenses, credits, and warnings intact when reorganizing or extending modules.

About

Materials for Attacking Linux module

Resources

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages