get_vm_skeleton
Retrieve pre-configured VM templates for cyber range environments, including domain controllers, workstations, servers, attacker VMs, SIEM systems, and vulnerable applications, with optional customization options.
Instructions
Get a specific VM skeleton template configuration.
Retrieves a pre-configured VM skeleton that can be used directly in a range configuration or customized further.
Args: name: Skeleton name (e.g., "dc-2022", "kali", "wazuh") customizations: Optional dict of fields to override (e.g., {"hostname": "mydc", "ram_gb": 8})
Returns: Complete VM configuration dictionary ready for use
Available skeletons: - dc-2022, dc-2019, secondary-dc: Domain controllers - ws-win11, ws-win10: Windows workstations - file-server, sql-server, exchange, web-iis, ca: Windows servers - ubuntu, debian, rocky, docker: Linux servers - kali, parrot, commando: Attacker VMs - wazuh, splunk, elastic, security-onion: SIEM systems - dvwa, juice-shop, metasploitable, vulnhub: Vulnerable apps
Example: # Get a Kali attacker skeleton skeleton = await get_vm_skeleton("kali")
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | ||
| customizations | No |