Skip to main content
Glama

get_vm_skeleton

Retrieve pre-configured VM templates for cyber range environments, including domain controllers, workstations, servers, attacker systems, SIEM tools, and vulnerable applications, with optional customization options.

Instructions

Get a specific VM skeleton template configuration.

Retrieves a pre-configured VM skeleton that can be used directly in a range configuration or customized further.

Args: name: Skeleton name (e.g., "dc-2022", "kali", "wazuh") customizations: Optional dict of fields to override (e.g., {"hostname": "mydc", "ram_gb": 8})

Returns: Complete VM configuration dictionary ready for use

Available skeletons: - dc-2022, dc-2019, secondary-dc: Domain controllers - ws-win11, ws-win10: Windows workstations - file-server, sql-server, exchange, web-iis, ca: Windows servers - ubuntu, debian, rocky, docker: Linux servers - kali, parrot, commando: Attacker VMs - wazuh, splunk, elastic, security-onion: SIEM systems - dvwa, juice-shop, metasploitable, vulnhub: Vulnerable apps

Example: # Get a Kali attacker skeleton skeleton = await get_vm_skeleton("kali")

# Get a DC with custom settings
skeleton = await get_vm_skeleton("dc-2022", {
    "hostname": "mydc01",
    "domain": {"fqdn": "corp.local", "role": "primary_dc"},
    "ram_gb": 8
})

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
nameYes
customizationsNo

Tool Definition Quality

Score is being calculated. Check back soon.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tjnull/Ludus-FastMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server