Avatar do Perfil Pro

Malekith Online

✦ Legend ✦
Spain Entrou em junho 2025 Membro Pro

Ranking

#1

Melhor: #1

Total de Pontos

1710

Total Ganho

Labs Concluídos

118

120 User19 Root

Módulos

91

Validados

Primeiros Sangues

28

Primeiro a Concluir

Melhor Sequência

69

Dias

Habilidades Adquiridas

Habilidades técnicas praticadas através dos labs concluídos

CSSMedia QueriesWeb ForensicsSource AnalysisDevToolsUnicodeSteganographyPythonText AnalysisLinuxSSHFile EnumerationCron JobsPrivilege EscalationConfiguration AnalysisCommand LineFile System NavigationHidden FilesgrepfindDirectory FuzzingX-Forwarded-For SpoofingBruteforceffufCommand InjectionNewline InjectionWeb SecurityLinux EnumerationSUID ExploitationBuffer OverflowARM64 ROPStatic Binary AnalysisBinary ExploitationpwntoolsropperGDBWeb EnumerationAuthenticationRCEHTMLBrowser DevToolsClient-Side SecuritySource Code AnalysisLearning PathPassword CrackingLinux SecurityJohn the RipperhashcatCryptographyCVE ExploitationWindows SecurityNTLMHashcatHash AnalysisOffice SecurityHash ExtractionSQL InjectionRegex BypassInput ValidationWeb Application SecuritySQLiteUNION-Based SQLiGitVersion ControlReconnaissanceFile DiscoveryInformation GatheringPHPType JugglingAuthentication BypassHash CrackingPassword AnalysisSecurity ToolsDatabase SecurityPenetration TestingJavaScriptDeobfuscationCode AnalysisHTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisPacket AnalysisEmail ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital InvestigationSSRFURL ManipulationInternal Network AccessProtocol BypassSSTIFlask SecuritySSH Brute ForceDatabase EnumerationClassical CiphersImage AnalysisPolyalphabetic CiphersDirectory TraversalPath InjectionFile System SecurityPath ManipulationFile AccessYAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing SecurityWebDAV ExploitationFile UploadRemote File AccessHTTP MethodsWeb Server SecurityFile System EnumerationPrototype PollutionNode.js SecurityAPI SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web VulnerabilitiesRace ConditionsTiming AttacksConcurrent ExploitationIDORParameter ManipulationAuthorization BypassHTTP HeadersSecurity BypassClient-Side ManipulationDirectory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity AssessmentLocal File InclusionFilter BypassApache AuthenticationJWTCookie ManipulationDOM ManipulationGraphQLSchema IntrospectionInjectionDNS AnalysisData ExfiltrationFrequency AnalysisPattern RecognitionDocker Registry APIContainer SecurityAPI ManipulationRegistry ExploitationSUID BinariesNoSQL InjectionMongoDBDocument DatabasesCRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationLDAP InjectionDirectory ServicesEnterprise SecurityFilter EvasionJWT ManipulationSSH ExploitationLog InjectionServer-Side Template InjectionJinja2 ExploitationIP SpoofingAccess Control BypassWireless SecurityWEP CrackingRC4 AnalysisCryptographic AttacksLegacy Protocol ExploitationDigital ForensicsWindows RegistryPersistence AnalysisIncident ResponseMalware AnalysisWiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingNetwork SecurityHistorical CryptanalysisMD5 CrackingPassword AttacksGit ForensicsVersion Control SecurityRepository AnalysisSecret RecoveryPython PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksZIP Password CrackingfcrackzipBrute ForceArchive SecurityKeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool LimitationsJinja2Web Application TestingCode InjectionPDF SecurityDocument SecurityBrute Force AttacksShell CommandsSystem AdministrationHTTP Parameter ManipulationWPUser-Agent Log PoisoningApache SecurityLog AnalysisAdvanced ReconnaissanceAndroid Reverse EngineeringSCADA ExploitationIDOR ExploitationZip Slip VulnerabilityInternal Service DiscoveryBackup Service ExploitationSudo Vim ExploitationVisibility ControlsSecurity TestingOperator ExploitationWeb HackingLogic FlawsToken ManipulationBase64 EncodingMemory ForensicsBinary AnalysisTool UsageData RecoveryROT13 EncodingJenkinsCI/CDDevOpsPentestAutomationPath TraversalCGILogic FlawAudio AnalysisLSBForensicsBypass TechniquesWeb ShellsSocial EngineeringPost ExploitationLinux CapabilitiesReverse ShellSystem EnumerationNetwork ReconnaissanceServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsAWS EC2MYSQLILinux Privilege EscalationFile PermissionsCSRFCross-Site Request ForgerySession SecurityForm SecurityHTTP SecurityState ManagementXSSCross-Site ScriptingStored XSSSession HijackingClaims ManipulationTime-Based AttacksSignature CrackingBlind SQLiTime-based SQLiBoolean-based SQLiVulnerability AssessmentSudoApache TomcatWAR DeploymentDefault CredentialsXXEXML SecurityFile DisclosureExternal EntityAlgorithm ConfusionRS256HS256Token ForgeryToken AuthenticationWeb ExploitationService DiscoveryCommand Line ToolsAttack DetectionFlaskDebug ModeMemory AnalysisTransposition CipherRail FencePDF ForensicsFile AnalysisMetadataHidden DataForensic ToolsBlockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic AnalysisLFIFile InclusionNetwork AnalysisDNSCryptanalysisClassical CryptoData EncodingSession ManagementDatabase ForensicsCLI UsageBase64Hex EncodingRedisQR Code AnalysisWEBWeb InspectionHTML AnalysisHex EditorsData StructuresReverse EngineeringMD5Rainbow TablesWeb DevelopmentPacket CaptureWiresharkProtocol AnalysisWebCTF BasicsHexadecimalFile Upload BypassPHP SecurityWeb Shell ExploitationGITFTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem ExploitationIP SPOOFINGFTPTELNETNetworkingWeb Services

Módulos Concluídos

Módulos educacionais validados com sucesso

Nmap Mastery: Dominate Network Scanning

4 módulos
Installing Nmap
1 pts Concluído: ago. 07, 2025
Advanced Techniques
1 pts Concluído: ago. 07, 2025
Introduction to Nmap
1 pts Concluído: jun. 04, 2025
Essential Nmap Scanning
1 pts Concluído: ago. 07, 2025

HTTP Header Manipulation: IP Spoofing

3 módulos
Remediate
1 pts Concluído: ago. 07, 2025
Techniques for IP Spoofing in HTTP Headers
1 pts Concluído: ago. 07, 2025
Manipulating Headers
1 pts Concluído: jun. 04, 2025

Quebra de Senhas

10 módulos
Rainbow tables
1 pts Concluído: ago. 29, 2025
Quebra de wireless
1 pts Concluído: nov. 03, 2025
Quebra de PDF
1 pts Concluído: set. 01, 2025
Quebra de hashes Linux
1 pts Concluído: nov. 16, 2025
Quebra de Documentos Office
1 pts Concluído: nov. 01, 2025
Quebra de ZIP
1 pts Concluído: out. 26, 2025
Ataques de força bruta
1 pts Concluído: ago. 28, 2025
Fundamentos de senhas
1 pts Concluído: ago. 21, 2025
Ataques de dicionário
1 pts Concluído: ago. 22, 2025
Quebra de hashes Windows
1 pts Concluído: nov. 07, 2025

Escalação de Privilégios Linux

10 módulos
Básicos de privesc Linux
1 pts Concluído: jan. 11, 2026
Hijacking de PATH
1 pts Concluído: jan. 17, 2026
Enumeração manual
1 pts Concluído: jan. 12, 2026
Hardening Linux
1 pts Concluído: jan. 20, 2026
Abuso de cron jobs
1 pts Concluído: jan. 16, 2026
Escapes de containers
1 pts Concluído: jan. 19, 2026
Exploração SUID
1 pts Concluído: jan. 14, 2026
Enumeração automatizada
1 pts Concluído: jan. 13, 2026
Abuso de sudo
1 pts Concluído: jan. 15, 2026
Exploits de kernel
1 pts Concluído: jan. 18, 2026

Pentest de Rede

10 módulos
Reconhecimento ativo
1 pts Concluído: dez. 22, 2025
Pós-exploração
1 pts Concluído: dez. 29, 2025
Pivoteamento
1 pts Concluído: dez. 28, 2025
Exploração de serviços
1 pts Concluído: dez. 25, 2025
Relatórios de pentest
1 pts Concluído: dez. 30, 2025
Ataques de senha
1 pts Concluído: dez. 26, 2025
Ataques MITM
1 pts Concluído: dez. 27, 2025
Varredura de vulnerabilidades
1 pts Concluído: dez. 24, 2025
Fundamentos de rede
1 pts Concluído: dez. 22, 2025
Enumeração de serviços
1 pts Concluído: dez. 23, 2025

Cheat Sheets de Segurança

10 módulos
Cheat Sheet do Hydra
1 pts Concluído: jan. 02, 2026
Cheat Sheet do Nikto
1 pts Concluído: jan. 07, 2026
Cheat Sheet do John the Ripper
1 pts Concluído: jan. 08, 2026
Cheat Sheet do SQLMap
1 pts Concluído: jan. 05, 2026
Cheat Sheet do Wireshark
1 pts Concluído: jan. 10, 2026
Cheat Sheet do Burp Suite
1 pts Concluído: jan. 04, 2026
Cheat Sheet do Gobuster
1 pts Concluído: jan. 06, 2026
Cheat Sheet do Nmap
1 pts Concluído: jan. 01, 2026
Cheat Sheet do Hashcat
1 pts Concluído: jan. 09, 2026
Cheat Sheet do Metasploit
1 pts Concluído: jan. 03, 2026

HDNA Ethical Hacking Course

5 módulos
1. Legal & Compliance
1 pts Concluído: ago. 07, 2025
2. Network Protocols and Security
1 pts Concluído: ago. 07, 2025
4. Network Scanning
1 pts Concluído: ago. 07, 2025
3. Reconnaissance
1 pts Concluído: ago. 07, 2025
Course Summary
1 pts Concluído: jun. 04, 2025

Ataques Web

12 módulos
Ataques CSRF
1 pts Concluído: ago. 07, 2025
Injeção XXE
1 pts Concluído: ago. 12, 2025
SSRF
1 pts Concluído: ago. 07, 2025
Inclusão de Arquivos
1 pts Concluído: ago. 12, 2025
Intro Segurança Web
1 pts Concluído: ago. 06, 2025
SSTI
1 pts Concluído: ago. 14, 2025
Desserialização
1 pts Concluído: ago. 16, 2025
Ataques File Upload
1 pts Concluído: ago. 08, 2025
Ataques XSS
1 pts Concluído: ago. 07, 2025
Bypass de Auth
1 pts Concluído: ago. 07, 2025
Injeção SQL
1 pts Concluído: ago. 07, 2025
Injeção de Comandos
1 pts Concluído: ago. 13, 2025

Hacking de API

10 módulos
Bypass de rate limiting
1 pts Concluído: fev. 07, 2026
Ataques GraphQL
1 pts Concluído: fev. 08, 2026
Injeção em API
1 pts Concluído: fev. 05, 2026
Recon de API
1 pts Concluído: fev. 02, 2026
Fuzzing de API
1 pts Concluído: fev. 09, 2026
Básicos de segurança API
1 pts Concluído: fev. 01, 2026
BOLA e IDOR
1 pts Concluído: fev. 04, 2026
OWASP API Top 10
1 pts Concluído: fev. 10, 2026
Ataques de auth API
1 pts Concluído: fev. 03, 2026
Mass assignment
1 pts Concluído: fev. 06, 2026

Bug Bounty

10 módulos
Ganhos rápidos
1 pts Concluído: jan. 27, 2026
Configuração de caça
1 pts Concluído: jan. 24, 2026
Automação
1 pts Concluído: jan. 30, 2026
Básicos de bug bounty
1 pts Concluído: jan. 23, 2026
Metodologia de caça
1 pts Concluído: jan. 26, 2026
Evitando duplicatas
1 pts Concluído: jan. 29, 2026
Carreira bug bounty
1 pts Concluído: jan. 31, 2026
Fundamentos de recon
1 pts Concluído: jan. 25, 2026
Escrita de relatórios
1 pts Concluído: jan. 28, 2026
Seleção de programas
1 pts Concluído: jan. 23, 2026

Ataques JWT

4 módulos
Fundamentos JWT
1 pts Concluído: ago. 06, 2025
Adulteração JWT
1 pts Concluído: ago. 06, 2025
Quebra de JWT
1 pts Concluído: ago. 06, 2025
Confusão de Algoritmo
1 pts Concluído: ago. 06, 2025

Remote Code Execution (RCE)

3 módulos
Shellshock (CVE-2014-6271)
1 pts Concluído: ago. 07, 2025
RCE: Introduction
1 pts Concluído: jun. 04, 2025
RCE in PHP
1 pts Concluído: ago. 07, 2025

Labs & Desafios Concluídos

Desafios práticos de cibersegurança concluídos com sucesso

Fine Print
Desafio
5 pontos fev. 09, 2026 14m
CSSMedia QueriesWeb ForensicsSource AnalysisDevTools
Phantom Text
Desafio
5 pontos fev. 03, 2026 22m
UnicodeSteganographyWeb ForensicsPythonText Analysis
Scheduled Sabotage
Fácil
20 pontos jan. 24, 2026 14m
LinuxSSHFile EnumerationCron JobsPrivilege EscalationConfiguration Analysis
Linux Fundamentals Practice
Desafio
5 pontos jan. 03, 2026 4m
LinuxCommand LineFile System NavigationHidden Filesgrepfind
Hack the Box
Difícil
70 pontos dez. 16, 2025 13h 9m
Directory FuzzingX-Forwarded-For SpoofingBruteforceffufCommand InjectionNewline InjectionWeb SecurityLinux EnumerationSUID ExploitationBuffer OverflowARM64 ROPStatic Binary AnalysisBinary ExploitationpwntoolsropperGDB
Hidden CMS Breach
Médio
40 pontos dez. 01, 2025 45m
Web EnumerationWeb SecurityAuthenticationRCEPrivilege EscalationLinux
Secrets in Source 2
Muito Fácil
5 pontos nov. 17, 2025
Web SecurityHTMLBrowser DevToolsClient-Side SecuritySource Code AnalysisLearning Path
Shadow Cracker
Desafio
5 pontos nov. 12, 2025 1h 0m
Password CrackingLinux SecurityJohn the RipperhashcatCryptography
TechNova Infiltration
Médio
40 pontos nov. 10, 2025 1h 4m
Web EnumerationSSHPassword CrackingPrivilege EscalationLinux SecurityCVE Exploitation
Windows Password Cracker
Desafio
5 pontos nov. 05, 2025 8m
Password CrackingWindows SecurityNTLMHashcatJohn the RipperHash Analysis
Office Password Cracker
Desafio
5 pontos out. 29, 2025 1m
Password CrackingOffice SecurityHash ExtractionJohn the RipperHashcat
Regex Bypass to SQLi
Desafio
5 pontos out. 27, 2025 38m
SQL InjectionRegex BypassInput ValidationWeb Application SecuritySQLiteUNION-Based SQLi
Git Exposed
Desafio
5 pontos out. 22, 2025 6m
GitVersion ControlSource Code AnalysisReconnaissanceWeb Security
Backup Hunter
Desafio
5 pontos out. 17, 2025 49m
Web EnumerationFile DiscoveryReconnaissanceInformation Gathering
Type Juggling Bypass
Desafio
5 pontos out. 13, 2025 3m
Web SecurityPHPType JugglingAuthentication BypassHash Analysis
Crack SHA1 Hash
Desafio
5 pontos out. 09, 2025
CryptographyHash CrackingPassword AnalysisSecurity Tools
SQL Injection Test
Desafio
5 pontos out. 08, 2025 23m
SQL InjectionWeb SecurityDatabase SecurityAuthentication BypassInput ValidationPenetration Testing
Hack This Site
Desafio
5 pontos out. 07, 2025 11m
JavaScriptDeobfuscationClient-Side SecurityBrowser DevToolsCode AnalysisAuthentication Bypass
HTTP Smuggling
Desafio
5 pontos out. 06, 2025 1m
HTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisWeb SecurityPacket Analysis
Email Header Forensics
Desafio
5 pontos out. 03, 2025 6m
Email ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital Investigation
SSRF Validator
Desafio
5 pontos out. 02, 2025 27m
SSRFWeb SecurityURL ManipulationInternal Network AccessProtocol Bypass
FortiPy
Difícil
70 pontos out. 01, 2025 2h 4m
Web Application SecuritySSTIFlask SecuritySSH Brute ForceDatabase EnumerationHash CrackingPrivilege Escalation
Vigenere Stego Hunt
Desafio
5 pontos set. 30, 2025 3m
CryptographySteganographyClassical CiphersImage AnalysisPolyalphabetic Ciphers
Simple Directory Traversal
Desafio
5 pontos set. 29, 2025 6m
Directory TraversalPath InjectionFile System SecurityWeb SecurityInput ValidationPath ManipulationFile Access
YAML Bomb
Desafio
5 pontos set. 26, 2025 19m
YAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing Security
WebDAV Explorer
Desafio
5 pontos set. 25, 2025 2h 31m
WebDAV ExploitationFile UploadDirectory TraversalRemote File AccessHTTP MethodsWeb Server SecurityFile System Enumeration
Prototype Pollution Hunter
Desafio
5 pontos set. 24, 2025 11m
Prototype PollutionNode.js SecurityAPI SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web Vulnerabilities
Race Condition Hunter
Desafio
5 pontos set. 23, 2025 53m
Race ConditionsTiming AttacksConcurrent ExploitationWeb Application Security
IDOR Explorer
Desafio
5 pontos set. 22, 2025 7m
IDORParameter ManipulationWeb Application SecurityAuthorization Bypass
Header Hijacker
Desafio
5 pontos set. 19, 2025 12m
HTTP HeadersSecurity BypassWeb Application SecurityClient-Side Manipulation
Corporate Directory Hunt
Desafio
5 pontos set. 18, 2025 1h 24m
Directory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity Assessment
File Include Bypass
Desafio
5 pontos set. 17, 2025 17m
Local File InclusionFilter BypassApache AuthenticationPassword Cracking
Cookie Forge
Desafio
5 pontos set. 16, 2025 3h 4m
JWTCookie ManipulationAuthentication BypassPrivilege Escalation
Button Activator
Desafio
5 pontos set. 15, 2025 2m
JavaScriptBrowser DevToolsDOM ManipulationClient-Side Security
GraphQL Gateway
Desafio
5 pontos set. 12, 2025 4h 6m
GraphQLAPI SecuritySchema IntrospectionAuthorization BypassInjection
DNS Tunneling Detective
Desafio
5 pontos set. 11, 2025 2m
Network ForensicsDNS AnalysisData ExfiltrationTraffic Analysis
Caesar Shift Decoder
Desafio
5 pontos set. 10, 2025 3m
CryptographyClassical CiphersFrequency AnalysisPattern Recognition
Registry Hijacker
Desafio
5 pontos set. 09, 2025 1m
Docker Registry APIAuthentication BypassContainer SecurityAPI ManipulationRegistry Exploitation
SUID Privilege Hunter
Desafio
5 pontos set. 08, 2025 6m
SUID BinariesPrivilege EscalationCommand InjectionLinux SecurityBinary Exploitation
MongoDB Injector
Desafio
5 pontos set. 05, 2025 4h 2m
NoSQL InjectionMongoDBAuthentication BypassDocument DatabasesWeb Security
Redis Cache Poisoner
Desafio
5 pontos set. 04, 2025 46m
CRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationWeb Security
LDAP Injector
Desafio
5 pontos set. 03, 2025 7m
LDAP InjectionAuthentication BypassDirectory ServicesEnterprise SecurityWeb Security
RCE Playground
Médio
20 pontos set. 02, 2025 6h 25m
Command InjectionInput Validation BypassRemote Code ExecutionFilter EvasionWeb Security
Infiltrator
Fácil
20 pontos set. 01, 2025 21m
JWT ManipulationSSH ExploitationLog InjectionPrivilege EscalationWeb SecurityLinux Security
Template Injector
Desafio
5 pontos ago. 29, 2025 9m
Server-Side Template InjectionFlask SecurityJinja2 ExploitationRemote Code ExecutionWeb Security
IP Spoofing Admin
Desafio
5 pontos ago. 28, 2025 19m
Web SecurityHTTP HeadersIP SpoofingAccess Control BypassInformation Gathering
WEP Cracker
Desafio
5 pontos ago. 27, 2025 8m
Wireless SecurityWEP CrackingRC4 AnalysisPacket AnalysisCryptographic AttacksLegacy Protocol Exploitation
Registry Hunter
Desafio
5 pontos ago. 26, 2025 1h 0m
Digital ForensicsWindows RegistryPersistence AnalysisBase64 DecodingIncident ResponseMalware Analysis
WiFi Password Cracker
Desafio
5 pontos ago. 25, 2025 20m
WiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingNetwork SecurityPacket Analysis
Book Cipher Challenge
Desafio
5 pontos ago. 22, 2025 11m
CryptographyClassical CiphersPattern RecognitionHistorical Cryptanalysis
Admin Portal Breach
Desafio
5 pontos ago. 21, 2025 3m
Client-Side SecurityMD5 CrackingSource Code AnalysisWeb Application SecurityPassword AttacksAuthentication Bypass
Git Secrets Hunter
Desafio
5 pontos ago. 20, 2025 10m
Git ForensicsVersion Control SecurityRepository AnalysisPenetration TestingSecret RecoveryOSINT
Corporate Backup Deserializer
Desafio
5 pontos ago. 19, 2025 2h 11m
Python PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksEnterprise Security
ZIP Cracker
Desafio
5 pontos ago. 18, 2025 4h 1m
ZIP Password CrackingJohn the RipperfcrackzipDictionary AttacksBrute ForceArchive Security
KeePass Breaker
Desafio
5 pontos ago. 15, 2025 4h 0m
KeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool Limitations
Template Injection
Desafio
5 pontos ago. 14, 2025 4h 0m
Server-Side Template InjectionJinja2Flask SecurityWeb Application TestingCode InjectionPrivilege Escalation
PDF Password Cracker
Desafio
5 pontos ago. 13, 2025 4h 1m
PDF SecurityPassword CrackingDictionary AttacksDigital ForensicsDocument SecurityBrute Force Attacks
Shell Command Scanner
Desafio
5 pontos ago. 12, 2025 4h 0m
Command InjectionWeb SecurityShell CommandsSystem AdministrationHTTP Parameter ManipulationSecurity Assessment
WP Ultimate
Difícil
70 pontos ago. 11, 2025 4h 45m
WP
LFI Log Poison
Desafio
5 pontos ago. 11, 2025 1h 47m
Local File InclusionUser-Agent Log PoisoningRemote Code ExecutionDirectory TraversalWeb SecurityApache SecuritySystem AdministrationLog Analysis
Compromised 2
Difícil
70 pontos ago. 10, 2025 16h 46m
Advanced ReconnaissanceAndroid Reverse EngineeringSCADA ExploitationCVE ExploitationAuthentication BypassPrivilege Escalation
Broken Chain
Difícil
70 pontos ago. 10, 2025 24h 43m
IDOR ExploitationZip Slip VulnerabilityServer-Side Template InjectionInternal Service DiscoveryBackup Service ExploitationPrivilege EscalationSudo Vim Exploitation
NoSQL Injection
Desafio
5 pontos ago. 08, 2025 44m
NoSQL InjectionMongoDBVisibility ControlsAccess Control BypassSecurity TestingOperator Exploitation
API Breaker
Desafio
5 pontos ago. 07, 2025 2h 19m
API SecurityWeb HackingLogic FlawsPrivilege EscalationToken ManipulationBase64 EncodingAuthorization Bypass
Memory Forensics
Desafio
5 pontos ago. 07, 2025 2h 0m
Memory ForensicsBinary AnalysisDigital ForensicsPattern RecognitionIncident ResponseTool UsageData RecoveryROT13 Encoding
Snapchat Exposed
Desafio
5 pontos ago. 07, 2025 1h 0m
JenkinsCI/CDDevOpsWeb SecurityPentestAutomation
Path Traversal
Desafio
5 pontos ago. 07, 2025 1h 1m
Path TraversalCGIWeb SecurityFile AccessDirectory TraversalInput Validation
API Logic Flaw
Desafio
5 pontos ago. 07, 2025 1h 0m
API SecurityLogic FlawAuthentication BypassParameter ManipulationPHPWeb Security
Sonic Cipher
Desafio
5 pontos ago. 07, 2025 2h 0m
SteganographyAudio AnalysisLSBForensicsPython
File Upload Bypass
Desafio
5 pontos ago. 07, 2025 1h 11m
File UploadWeb SecurityBypass TechniquesPHPWeb ShellsInput ValidationSocial EngineeringPost Exploitation
Internal
Difícil
70 pontos ago. 06, 2025 2h 46m
Command InjectionLinux CapabilitiesPrivilege EscalationReverse ShellWeb Application SecuritySystem EnumerationNetwork Reconnaissance
URL Scanner
Desafio
5 pontos ago. 06, 2025 1h 0m
SSRFServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsNetwork SecurityWeb SecurityAWS EC2
Query Quake
Médio
40 pontos ago. 05, 2025 10h 19m
MYSQLIRCE
Alpwned
Médio
40 pontos ago. 05, 2025 10h 15m
SQL InjectionAuthentication BypassSSHLinux Privilege EscalationFile PermissionsWeb Application Security
CSRF Bank Transfer
Desafio
5 pontos ago. 05, 2025 12m
CSRFCross-Site Request ForgerySession SecurityWeb SecuritySocial EngineeringForm SecurityHTTP SecurityState Management
XSS Playground
Desafio
5 pontos ago. 04, 2025 48m
XSSCross-Site ScriptingStored XSSSession HijackingJavaScriptWeb SecurityClient-Side SecurityDOM Manipulation
JWT Claims Manipulation
Desafio
5 pontos jul. 31, 2025 1h 0m
JWTClaims ManipulationPrivilege EscalationAuthentication BypassTime-Based AttacksSignature Cracking
SQL Injection
Desafio
5 pontos jul. 30, 2025 1h 0m
SQL InjectionDatabase SecurityWeb SecurityBlind SQLiTime-based SQLiBoolean-based SQLiDatabase EnumerationVulnerability Assessment
Matsudo
Médio
40 pontos jul. 29, 2025 4h 0m
SSHBrute ForcePrivilege EscalationLinuxSudoNetwork ReconnaissancePenetration Testing
Compromised 1
Médio
40 pontos jul. 29, 2025 3h 37m
Apache TomcatWeb Application SecurityWAR DeploymentDefault CredentialsPrivilege EscalationLinuxSudoWeb Shells
XXE Exposed
Desafio
5 pontos jul. 29, 2025 49m
XXEXML SecurityFile DisclosureExternal EntityWeb SecurityVulnerability Assessment
JWT Algo Confusion
Desafio
5 pontos jul. 28, 2025 1h 0m
JWTAlgorithm ConfusionRS256HS256Token ForgeryWeb Security
JWT Bypass
Desafio
5 pontos jul. 25, 2025 1h 0m
JWTWeb SecurityToken AuthenticationCryptography
Beyond Echo
Médio
20 pontos jul. 24, 2025 4h 39m
PHPRCE
Auth Bypass
Desafio
5 pontos jul. 24, 2025 1h 0m
SQL InjectionAuthentication BypassWeb SecurityDatabase Security
Ping Pwn
Desafio
5 pontos jul. 23, 2025 1h 0m
Command InjectionWeb ExploitationService DiscoveryNetwork Security
Log Hunter
Desafio
5 pontos jul. 22, 2025 1h 0m
Log AnalysisWeb SecurityIncident ResponsePattern RecognitionFile DiscoveryCommand Line ToolsForensicsHTTP ProtocolAttack DetectionSecurity Assessment
Flask Error
Desafio
5 pontos jul. 17, 2025 1h 0m
FlaskDebug ModePythonWeb SecurityMemory Analysis
Rail Fence
Desafio
5 pontos jul. 16, 2025 1h 0m
CryptographyTransposition CipherRail FencePattern RecognitionPython
Pixel Puzzler
Desafio
5 pontos jul. 14, 2025 1h 0m
SteganographyImage AnalysisLSBForensicsPython
PDF Trap
Desafio
5 pontos jul. 11, 2025 2h 0m
PDF ForensicsFile AnalysisMetadataHidden DataForensic Tools
Blockchain Secrets
Desafio
5 pontos jul. 10, 2025 1h 0m
Blockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic Analysis
Corporate Breach 2
Desafio
5 pontos jul. 09, 2025 2h 0m
Web SecurityPHPLFIPath ManipulationFile Inclusion
Corporate Breach
Desafio
5 pontos jul. 08, 2025 1h 0m
Web SecurityPHPLFIPassword CrackingAuthentication BypassDirectory Traversal
DNS Exfil
Desafio
5 pontos jul. 07, 2025 1h 0m
Network AnalysisDNSPacket AnalysisData ExfiltrationBase64 Decoding
Crypto Cipher
Desafio
5 pontos jul. 04, 2025 4h 0m
CryptanalysisClassical CryptoPattern RecognitionData Encoding
Session Switch
Desafio
5 pontos jul. 03, 2025 1h 0m
Web SecuritySession ManagementAuthenticationPrivilege EscalationPHP
Red is Dead
Desafio
5 pontos jun. 30, 2025 1h 0m
Network ReconnaissanceService DiscoveryDatabase ForensicsData EncodingCLI UsageData RecoveryIncident ResponseBase64Hex EncodingRedis
QR Code Quest
Desafio
5 pontos jun. 25, 2025 1h 0m
QR Code AnalysisImage AnalysisData ExtractionSteganographyDigital Forensics
AlVault
Médio
40 pontos jun. 24, 2025 3h 30m
WEB
Base64 Detective
Desafio
5 pontos jun. 24, 2025 1h 10m
Base64Web InspectionBrowser DevToolsData EncodingHTML Analysis
Binary Secrets
Desafio
5 pontos jun. 23, 2025 51m
Binary AnalysisHex EditorsData StructuresReverse EngineeringFile Analysis
Get the Password
Desafio
5 pontos jun. 20, 2025 1h 0m
JavaScriptMD5Rainbow TablesWeb DevelopmentBrowser DevTools
Packet Pursuit
Desafio
5 pontos jun. 19, 2025 1h 0m
Network AnalysisPacket CaptureWiresharkProtocol Analysis
Stego Hunt
Desafio
5 pontos jun. 18, 2025 1h 0m
SteganographyImage AnalysisWebCTF Basics
Hex Hunt
Desafio
5 pontos jun. 17, 2025 1h 0m
JavaScriptWeb DevelopmentHexadecimalBrowser DevTools
FiPloit
Fácil
20 pontos jun. 05, 2025 3h 52m
Local File InclusionFile Upload BypassPHP SecurityDirectory TraversalWeb Shell ExploitationPrivilege EscalationLog Analysis
Traversed
Médio
40 pontos jun. 04, 2025 1h 0m
GIT
Cronpocalypse
Fácil
20 pontos jun. 03, 2025 2h 17m
SSH
Anonymous 2
Fácil
10 pontos jun. 03, 2025 26m
FTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem Exploitation
Spoof!
Fácil
10 pontos jun. 02, 2025 3m
IP SPOOFING
Anonymous
Fácil
10 pontos jun. 02, 2025 1m
FTP
Include me
Fácil
10 pontos jun. 02, 2025 2m
PHPLFI
Nmap Lab 102
Muito Fácil
10 pontos jun. 02, 2025 10m
TELNETLearning Path
Hack the Cookie
Muito Fácil
5 pontos jun. 02, 2025 4h 8m
WEBLearning Path
Onboarding Lab: Access and Flags
Muito Fácil
5 pontos jun. 02, 2025 2m
NetworkingReconnaissanceCommand LineWeb ServicesLearning Path
Secrets in Source
Muito Fácil
5 pontos jun. 02, 2025 6m
HTMLLearning Path
Hack the Login
Muito Fácil
5 pontos jun. 02, 2025 6m
WebAuthenticationClient-Side SecurityLearning Path

Progresso dos Cursos

Seus caminhos de aprendizado e módulos

Nmap Mastery: Dominate Network Scanning
4 / 4 módulos concluídos
100%
Escalação de Privilégios Linux
10 / 10 módulos concluídos
100%
HTTP Header Manipulation: IP Spoofing
3 / 3 módulos concluídos
100%
Ataques Web
12 / 12 módulos concluídos
100%
Cheat Sheets de Segurança
10 / 10 módulos concluídos
100%
HDNA Ethical Hacking Course
5 / 5 módulos concluídos
100%
Ataques JWT
4 / 4 módulos concluídos
100%
Pentest de Rede
10 / 10 módulos concluídos
100%
Hacking de API
10 / 10 módulos concluídos
100%
Remote Code Execution (RCE)
3 / 3 módulos concluídos
100%
Bug Bounty
10 / 10 módulos concluídos
100%
Quebra de Senhas
10 / 10 módulos concluídos
100%
Junte-se a 5.000+ hackers aprendendo cibersegurança com labs práticos. Criar Conta