Hack. Learn. Repeat.
Real-world labs, CTF challenges, and a live leaderboard.
Labs (7)
Baby SQLi
A login form vulnerable to classic SQL injection. Bypass authentication and retrieve the flag from the database. Beginner-friendly introduction to SQLi.
0 solves
XSS Hunter
Find and exploit a reflected XSS vulnerability in a search endpoint. Chain it to steal a simulated admin cookie and submit the flag.
0 solves
LFI Basics
A PHP web app with an insecure file inclusion vulnerability. Use path traversal to read /etc/passwd and then find the hidden flag file on the server.
0 solves
JWT Forgery
The application uses a weak JWT implementation. Exploit the 'none' algorithm vulnerability to forge an admin token and access restricted endpoints.
0 solves
SSTI in the Wild
A Flask application renders user input directly in Jinja2 templates. Exploit server-side template injection to achieve remote code execution and read the flag.
0 solves
Linux Privilege Escalation
You have a low-privilege shell on a Linux box. Enumerate SUID binaries, cron jobs, and sudo misconfigurations to escalate to root and read /root/flag.txt.
0 solves
Stack Smash
A classic stack buffer overflow in a 32-bit binary with no stack canary. Craft a payload to overwrite the return address and redirect execution to win().
0 solves
Leaderboard
No solves yet. Be first.