guest@insecure.dev:~$ whoami
<insecure.dev/>
// deliberately vulnerable · for learning, breaking, and teaching
purpose
Most security learning happens in environments where it is safe to break things. Those environments are rare, and the ones that exist are either behind paywalls or scoped to enterprise tooling that does not reflect what SMB practitioners actually encounter.
insecure.dev is reserved for a future project that publishes small, self-contained vulnerable environments paired with teaching material. Deploy one, attack it, learn what broke and why, rebuild from scratch.
planned_labs
- LAB-001 · misconfigured M365 tenantplanned
- LAB-002 · legacy AD with common sinsplanned
- LAB-003 · weak MSP remote access stackplanned
- LAB-004 · phishing kit analysis sandboxplanned
related_work
The research that feeds these labs (and that will eventually reference them) lives at postinstall.dev. Home lab reference designs for building your own practice environment live at homelabblueprints.com.