Skip to main content
Glama

get_vm_skeleton

Retrieve pre-configured VM templates for cyber range environments, including domain controllers, workstations, servers, attacker VMs, SIEM systems, and vulnerable applications, with optional customization options.

Instructions

Get a specific VM skeleton template configuration.

Retrieves a pre-configured VM skeleton that can be used directly in a range configuration or customized further.

Args: name: Skeleton name (e.g., "dc-2022", "kali", "wazuh") customizations: Optional dict of fields to override (e.g., {"hostname": "mydc", "ram_gb": 8})

Returns: Complete VM configuration dictionary ready for use

Available skeletons: - dc-2022, dc-2019, secondary-dc: Domain controllers - ws-win11, ws-win10: Windows workstations - file-server, sql-server, exchange, web-iis, ca: Windows servers - ubuntu, debian, rocky, docker: Linux servers - kali, parrot, commando: Attacker VMs - wazuh, splunk, elastic, security-onion: SIEM systems - dvwa, juice-shop, metasploitable, vulnhub: Vulnerable apps

Example: # Get a Kali attacker skeleton skeleton = await get_vm_skeleton("kali")

# Get a DC with custom settings skeleton = await get_vm_skeleton("dc-2022", { "hostname": "mydc01", "domain": {"fqdn": "corp.local", "role": "primary_dc"}, "ram_gb": 8 })

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
nameYes
customizationsNo

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tjnull/Ludus-FastMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server