ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
PWK V3 LIST: Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam.Please do not request edit access; File -> Make a copy
2
Curated by Tj Null
3
Blog: www.netsecfocus.comLatest Update: April 13th 2026
4
5
Hackthebox:Useful Writeups: 0xdf List: https://0xdf.gitlab.io/cheatsheets/offsec
6
Linux Boxes:Windows Boxes:Windows Active Directory Boxes:Post OSCP Section. Challenging yourself:ProLabs:
7
BusquedaEscapeActive Mentor [Linux]Dante
8
UpDownServmonForestAbsolute [Windows]RastaLabs
9
SauSupportSaunaOutdated [Windows]Post OSCP ProLabs:
10
HelpStreamIOMonteverde Atom [Windows]Zephyr
11
BrokerBlackfieldTimelapseAPT [Windows]Alchemy
12
Intentions IntelligenceReturnAero [Windows]
13
SoccerJeevesCascadeCerberus [Windows/Linux]
14
KeeperManagerFlightMultimaster [Windows]
15
MonitoredAccessBlackfieldCereal [Linux]
16
BoardLightAeroCicadaQuick [Linux]
17
NetworkedMailingEscapeAuthority [Windows]
18
CozyHostingAdministratorAdagio (HTB Enterprise Box)Clicker [Linux]
19
EditorialCertifiedTheFrizzRebound [Windows]
20
MagicHeistFluffyMailing [Windows]
21
PandoraTombwatcher (Assumed Breach Box)PuppyVintage [Windows]
22
BuilderVoleurEscapeTwo [Windows]
23
LinkVortexSigned [Assumed Breach]Tombwatcher[Windows Active Directory]
24
DogEighteen [Assumed Breach]Rustykey [Timeroasting attack]
25
MarkupDarkZero [Assumed Breach]
26
Editor
27
Usage
28
Titanic
29
Outbound [Assumed Breach Box]
30
Editor
31
Expressway [Old System]
32
Browsed
33
34
35
36
37
38
39
40
41
Proving Grounds Practice:
42
Linux Boxes:Windows Boxes:Windows Active Directory Boxes:Post OSCP Section. Challenging yourself:
43
TwiggyAlgernonAccessNagoya [Windows]
44
ExfiltratedAuthbyHeistOsaka [Windows]
45
PelicanCraftVaultProStore [Linux]
46
AstronautHutchNagoyaRPC1 [Linux]
47
BlackgateInternalNagoyaSymbolic [Windows]
48
BooleanJackoResourcedUpsploit [Linux]
49
ClueKevinHutchValidator [Linux]
50
CockpitResourcedGLPI [Linux]
51
CodoSquidMarshalled [Linux]
52
CraneDVR4Educated [Linux]
53
LevramHepetKyoto [Windows Buffer Overflow]
54
ExtplorerShenziNara [Windows Active Directory]
55
HubNickel
56
ImageSlort
57
lawMedJed
58
LavitaMonster
59
PCMice
60
Fired
61
Press
62
Scrutiny
63
RubyDome
64
Zipper
65
Flu
66
Workaholic
67
PyLoader
68
Plum
69
SPX
70
Jordak
71
BitForge
72
Vmdak
73
Ochima
74
Nibbles
75
CVE-2023-6019
76
Sea
77
Payday
78
Snookums
79
SpiderSociety
80
81
82
83
84
Proving Grounds Play:
85
Linux Boxes:Post OSCP Section. Challenging yourself:
86
Election 1
87
Stapler
88
Monitoring
89
InsanityHosting
90
Vegeta 1
91
SoSimple
92
Gaara
93
Amaterasu
94
Blogger
95
Potato
96
DC-9
97
Tre
98
Seppuku
99
Funbox
100
Katana