Skip to main content
Glama

get_range_skeleton

Retrieve pre-configured cyber range environments for security testing, including AD labs, red team exercises, and SOC training with customizable VMs and network rules.

Instructions

Get a complete range skeleton configuration.

Retrieves a fully-configured range skeleton with all VMs and network rules. Some skeletons support additional customization parameters.

Args: name: Skeleton name (e.g., "basic-ad", "enterprise-ad", "red-team") domain: Custom domain name (for AD labs, default: "yourcompany.local") workstations: Number of workstations (for basic-ad, default: 2) include_attacker: Include Kali attacker VM (default: True) include_siem: Include SIEM monitoring (default: True) siem_type: SIEM type: "wazuh", "splunk", "elastic" (default: "wazuh")

Returns: Complete range configuration with VMs and network rules

Available skeletons: - basic-ad: Customizable with domain, workstations, attacker, siem - enterprise-ad: Full enterprise with CA, file server, SQL, exchange - red-team: DMZ + internal AD for red team exercises - soc-training: Monitored endpoints for SOC training - web-pentest: DVWA, Juice Shop, WebGoat - malware-analysis: Isolated RE lab

Example: # Get a basic AD lab config = await get_range_skeleton("basic-ad")

# Get a customized AD lab config = await get_range_skeleton( "basic-ad", domain="corp.local", workstations=4, siem_type="splunk" )

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
nameYes
domainNo
workstationsNo
include_attackerNo
include_siemNo
siem_typeNowazuh

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tjnull/Ludus-FastMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server