GoldenEye: 1


  • Name: GoldenEye: 1
  • Date release: 4 May 2018



Please remember that VulnHub is a free community resource so we are unable to check the machines that are provided to us. Before you download, please read our FAQs sections dealing with the dangers of running unknown VMs and our suggestions for "protecting yourself and your network. If you understand the risks, please download!


GoldenEye-v1.ova

(Size: 805 MB)


I recently got done creating an OSCP type vulnerable machine that's themed after the great James Bond film (and even better n64 game) GoldenEye. The goal is to get root and capture the secret GoldenEye codes - flag.txt.

I'd rate it as Intermediate, it has a good variety of techniques needed to get root - no exploit development/buffer overflows. After completing the OSCP I think this would be a great one to practice on, plus there's a hint of CTF flavor.

I've created and validated on VMware and VirtualBox. You won't need any extra tools other than what's on Kali by default. Will need to be setup as Host-Only, and on VMware you may need to click "retry" if prompted, upon initially starting it up because of formatting.


Beta - 2018-05-02 v1 - 2018-05-04


  • Filename: GoldenEye-v1.ova
  • File size: 805 MB
  • MD5: 76C4A898F4BF0D9071C6B7E0A49D7BA8
  • SHA1: B2A736B84A013B5FAB7F8C016C1D29D26F3A6D23


  • Format: Virtual Machine (Virtualbox - OVA)
  • Operating System: Linux


  • DHCP service: Enabled
  • IP address: Automatically assign