Skip to content

Instantly share code, notes, and snippets.

<systems>
<!-- an example remote storage system, with a remotely exploitable vulnerability that can then be escalated to root -->
<system id="storageserver" os="linux" basebox="debian-puppet-64" url="" >
<vulnerabilities>
<vulnerability privilege="" access="" type="misc" cve=""></vulnerability>
</vulnerabilities>
<!-- secure services will be provided, if matching insecure ones have not been selected -->
<services>
</services>-->
# -*- mode: ruby -*-
# vi: set ft=ruby :
# Vagrantfile API/syntax version. Don't touch unless you know what you're doing!
VAGRANTFILE_API_VERSION = "2"
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
<% systems.each do |systems| %>
config.vm.define "<%= systems.id %>" do |<%= systems.id %>|
<%= systems.id %>.vm.box = "<%= systems.basebox %>"

Keybase proof

I hereby claim:

  • I am Aviio on github.
  • I am aviio (https://keybase.io/aviio) on keybase.
  • I have a public key whose fingerprint is 7108 4ECC C864 814E BB67 6082 45AA 2552 C2DB 9682

To claim this, I am signing this object: