Create vulnerable VM’s for CTF Challenges