In my free time or also for potential new colleagues, I like to create CTFs and vulnerable LABs to play around with. The CTFs are usually jeopardy-style or boot2root or serve as playground for one or more vulnerabilities like log4j.
Further down you will find writeups/walktroughs and the lab itself. Obviously, I would recommend to not touch the writeups before you finished the lab itself ;)
Any questions? Contact me via Twitter
- MALW-Project (Reverse Engineering)