Hackademy is Ekoparty's hacking academy. This repository collects hands-on Linux material prepared for the Attacking Linux and Defending Linux modules, including intentionally unsafe code samples, capture-the-flag support files, low-level programming exercises, and kernel research material used in isolated training labs.
This repository is for controlled educational environments only. Some files are intentionally sensitive because they are used to explain offensive techniques, insecure patterns, post-exploitation concepts, and defensive analysis workflows in a classroom or lab setting. Do not run, compile, or expose these materials on production systems, personal devices you care about, or networks you do not own and administer.
This repository is provided strictly for education, research, and authorized lab work. Any misuse, unauthorized testing, or deployment against systems you do not own or explicitly administer can lead to disciplinary action, civil liability, or criminal consequences under applicable law.
You are responsible for ensuring that every exercise is performed with clear permission, inside isolated environments, and in compliance with local law, institutional policy, and contractual obligations.
The current content is centered on practical Linux internals for the Attacking Linux and Defending Linux modules:
- Assembly basics
- Introductory syscall and libc comparison samples
- Stack-based memory corruption examples
- Shell and post-exploitation artifacts for analysis
- CTF support files such as usernames, vhosts, and wordlists
- Linux kernel rootkit research material
- Userland backdoor and hooking artifacts for defensive study
- Reference links for further study
| Path | Purpose |
|---|---|
modules/ |
Core teaching modules for Attacking Linux and Defending Linux. |
labs/ |
Challenge-specific lab content and auxiliary exercise files. |
research/ |
Sensitive research material retained for advanced classroom analysis. |
resources/ |
Reusable supporting resources such as lab wordlists. |
docs/ |
Cross-cutting reference material and instructor-facing documentation. |
Use this repository when you need teaching material for:
- Attacking Linux classes taught inside isolated VMs
- Defending Linux analysis and detection discussions
- Malware and post-exploitation artifact familiarization
- Low-level Linux internals demonstrations
- Reverse engineering and secure code review exercises
- CTF preparation in controlled environments
Avoid using it as:
- A production-ready toolkit
- A drop-in offensive operations kit
- A repository to run directly on public infrastructure
- Use disposable lab machines or snapshots.
- Keep networks segmented and non-routable from production.
- Assume every executable sample is unsafe by design.
- Treat all shell, rootkit, and payload files as teaching artifacts.
- Prefer static review over execution whenever possible.
- Verify local laws, institutional policy, and authorization before any testing.
The repository does not try to automate dangerous workflows. A safe baseline for class usage is:
- Create an isolated Linux VM dedicated to the course.
- Disable shared folders unless they are strictly required.
- Keep snapshots before each practical exercise.
- Mount the repository read-only when students only need inspection.
- Restore the VM after exercises involving shellcode, web shells, or kernel modules.
Some bundled files contain:
- Common usernames
- Password lists
- Recon wordlists
- Web shell code
- Local rootkit source
That is expected for the Ekoparty Hackademy context. The goal is to preserve realistic material while documenting it responsibly. If you expand the repository, keep new additions clearly labeled, scoped to a module, and accompanied by a short note explaining the educational purpose within Attacking Linux or Defending Linux.
LEGAL_NOTICE.md: legal and authorization warning for learners and instructorsCONTRIBUTING.md: guidelines for adding new training contentSECURITY.md: safe handling expectations for instructors and contributorsdocs/reference-links.md: curated external references- Module guides inside
modules/,labs/, andresearch/
Not every artifact in this repository was originally authored here. Some material is retained because it is useful for study, comparison, or classroom demonstrations. Keep upstream licenses, credits, and warnings intact when reorganizing or extending modules.