Profile Avatar

3xpl0it3r Online

✦ Legend ✦
Jordan Joined February 2025 Pro Member

Live Ranking

#4

Best: #2

Total Points

900

Total Earned

Labs Completed

106

108 User • 15 Root

Modules

36

Validated

First Bloods

19

First to Complete

Best Streak

8

Days

Skills Acquired

Technical skills practiced through completed labs

GitVersion ControlSource Code AnalysisReconnaissanceWeb SecuritySSRFURL ManipulationInternal Network AccessProtocol BypassEmail ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital InvestigationCryptographySteganographyClassical CiphersImage AnalysisPolyalphabetic CiphersHTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisPacket AnalysisJavaScriptDeobfuscationClient-Side SecurityBrowser DevToolsCode AnalysisAuthentication BypassDirectory TraversalPath InjectionFile System SecurityInput ValidationPath ManipulationFile AccessWeb Application SecuritySSTIFlask SecuritySSH Brute ForceDatabase EnumerationHash CrackingPrivilege EscalationPHPType JugglingHash AnalysisPassword AnalysisSecurity ToolsSQL InjectionDatabase SecurityPenetration TestingWeb EnumerationFile DiscoveryInformation GatheringYAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing SecurityWebDAV ExploitationFile UploadRemote File AccessHTTP MethodsWeb Server SecurityFile System EnumerationRace ConditionsTiming AttacksConcurrent ExploitationPrototype PollutionNode.js SecurityAPI SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web VulnerabilitiesIDORParameter ManipulationAuthorization BypassHTTP HeadersSecurity BypassClient-Side ManipulationDirectory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity AssessmentLocal File InclusionFilter BypassApache AuthenticationPassword CrackingJWTCookie ManipulationCRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationDOM ManipulationGraphQLSchema IntrospectionInjectionDNS AnalysisData ExfiltrationIP SpoofingAccess Control BypassSUID BinariesCommand InjectionLinux SecurityBinary ExploitationFrequency AnalysisPattern RecognitionDocker Registry APIContainer SecurityAPI ManipulationRegistry ExploitationFilter EvasionNoSQL InjectionMongoDBDocument DatabasesLDAP InjectionDirectory ServicesEnterprise SecurityJWT ManipulationSSH ExploitationLog InjectionServer-Side Template InjectionJinja2 ExploitationWireless SecurityWEP CrackingRC4 AnalysisCryptographic AttacksLegacy Protocol ExploitationDigital ForensicsWindows RegistryPersistence AnalysisIncident ResponseMalware AnalysisWiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingNetwork SecurityPython PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksHistorical CryptanalysisMD5 CrackingPassword AttacksGit ForensicsVersion Control SecurityRepository AnalysisSecret RecoveryZIP Password CrackingJohn the RipperfcrackzipBrute ForceArchive SecurityKeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool LimitationsJinja2Web Application TestingCode InjectionPDF SecurityDocument SecurityBrute Force AttacksUser-Agent Log PoisoningApache SecuritySystem AdministrationLog AnalysisShell CommandsHTTP Parameter ManipulationVisibility ControlsSecurity TestingOperator ExploitationCSRFCross-Site Request ForgerySession SecuritySocial EngineeringForm SecurityHTTP SecurityState ManagementSSHLinux Privilege EscalationFile PermissionsBypass TechniquesWeb ShellsPost ExploitationServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsAWS EC2XSSCross-Site ScriptingStored XSSSession HijackingClaims ManipulationTime-Based AttacksSignature CrackingBlind SQLiTime-based SQLiBoolean-based SQLiVulnerability AssessmentXXEXML SecurityFile DisclosureExternal EntityAlgorithm ConfusionRS256HS256Token ForgeryToken AuthenticationWeb ExploitationService DiscoveryCommand Line ToolsForensicsAttack DetectionLogic FlawPath TraversalCGIFlaskDebug ModePythonMemory AnalysisTransposition CipherRail FenceAudio AnalysisLSBPDF ForensicsFile AnalysisMetadataHidden DataForensic ToolsBlockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic AnalysisLFIFile InclusionNetwork AnalysisDNSCryptanalysisClassical CryptoData EncodingSession ManagementAuthenticationJenkinsCI/CDDevOpsPentestAutomationNetwork ReconnaissanceDatabase ForensicsCLI UsageData RecoveryBase64Hex EncodingRedisMemory ForensicsBinary AnalysisTool UsageROT13 EncodingWeb HackingLogic FlawsToken ManipulationBase64 EncodingQR Code AnalysisWeb InspectionHTML AnalysisHex EditorsData StructuresReverse EngineeringMD5Rainbow TablesWeb DevelopmentWebCTF BasicsPacket CaptureWiresharkProtocol AnalysisHexadecimalFile Upload BypassPHP SecurityWeb Shell ExploitationWEBAdvanced ReconnaissanceAndroid Reverse EngineeringSCADA ExploitationCVE ExploitationIDOR ExploitationZip Slip VulnerabilityInternal Service DiscoveryBackup Service ExploitationSudo Vim ExploitationLinux CapabilitiesReverse ShellSystem EnumerationWPApache TomcatWAR DeploymentDefault CredentialsLinuxSudoMYSQLIRCEGITFTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem ExploitationFTPJSLearning PathNetworkingCommand LineWeb ServicesTELNETIP SPOOFINGHTML

Completed Modules

Educational modules successfully validated

Nmap Mastery: Dominate Network Scanning

4 modules
Installing Nmap
1 pts Completed: Apr 20, 2025
Advanced Techniques
1 pts Completed: Apr 24, 2025
Introduction to Nmap
1 pts Completed: Apr 20, 2025
Essential Nmap Scanning
1 pts Completed: Apr 24, 2025

HTTP Header Manipulation: IP Spoofing

3 modules
Remediate
1 pts Completed: Apr 11, 2025
Techniques for IP Spoofing in HTTP Headers
1 pts Completed: Apr 11, 2025
Manipulating Headers
1 pts Completed: Apr 04, 2025

Password Cracking: Advanced Techniques for Security Assessment

5 modules
Rainbow Tables and Precomputed Attacks
1 pts Completed: Sep 05, 2025
PDF Password Cracking and Document Security
1 pts Completed: Sep 05, 2025
Brute Force and Hybrid Attack Techniques
1 pts Completed: Sep 05, 2025
Password Security Fundamentals
1 pts Completed: Aug 22, 2025
Dictionary Attacks and Wordlist Optimization
1 pts Completed: Aug 22, 2025

HDNA Ethical Hacking Course

5 modules
1. Legal & Compliance
1 pts Completed: Apr 11, 2025
2. Network Protocols and Security
1 pts Completed: Apr 20, 2025
4. Network Scanning
1 pts Completed: Apr 20, 2025
3. Reconnaissance
1 pts Completed: Apr 20, 2025
Course Summary
1 pts Completed: Apr 04, 2025

Web Application Security: Exploitation and Defense

12 modules
Cross-Site Request Forgery
1 pts Completed: Aug 08, 2025
XML External Entity Injection
1 pts Completed: Aug 13, 2025
Server-Side Request Forgery
1 pts Completed: Aug 12, 2025
Local and Remote File Inclusion
1 pts Completed: Aug 12, 2025
Course Introduction
1 pts Completed: Aug 08, 2025
Server-Side Template Injection
1 pts Completed: Aug 15, 2025
Deserialization Attacks
1 pts Completed: Aug 16, 2025
File Upload Exploitation
1 pts Completed: Aug 12, 2025
Cross-Site Scripting
1 pts Completed: Aug 08, 2025
Authentication Bypass
1 pts Completed: Aug 12, 2025
SQL Injection
1 pts Completed: Aug 08, 2025
Command Injection
1 pts Completed: Aug 13, 2025

JWT Ethical Hacking: Token Takeover Tactics

4 modules
Introduction to JWT Tokens
1 pts Completed: Aug 08, 2025
Claims Manipulation and Time-Based Attacks
1 pts Completed: Aug 08, 2025
Secret Key Brute Forcing
1 pts Completed: Aug 08, 2025
Algorithm Confusion Exploits
1 pts Completed: Aug 08, 2025

Remote Code Execution (RCE)

3 modules
Shellshock (CVE-2014-6271)
1 pts Completed: Apr 04, 2025
RCE: Introduction
1 pts Completed: Apr 04, 2025
RCE in PHP
1 pts Completed: Apr 04, 2025

Completed Labs & Challenges

Hands-on cybersecurity challenges successfully completed

Git Exposed
Challenge
1 points Oct 29, 2025 1h 26m
GitVersion ControlSource Code AnalysisReconnaissanceWeb Security
SSRF Validator
Challenge
1 points Oct 20, 2025 1h 1m
SSRFWeb SecurityURL ManipulationInternal Network AccessProtocol Bypass
Email Header Forensics
Challenge
1 points Oct 18, 2025 2m
Email ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital Investigation
Vigenere Stego Hunt
Challenge
1 points Oct 18, 2025 38m
CryptographySteganographyClassical CiphersImage AnalysisPolyalphabetic Ciphers
HTTP Smuggling
Challenge
1 points Oct 18, 2025 2m
HTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisWeb SecurityPacket Analysis
Hack This Site
Challenge
1 points Oct 18, 2025 1m
JavaScriptDeobfuscationClient-Side SecurityBrowser DevToolsCode AnalysisAuthentication Bypass
Simple Directory Traversal
Challenge
1 points Oct 18, 2025 42m
Directory TraversalPath InjectionFile System SecurityWeb SecurityInput ValidationPath ManipulationFile Access
FortiPy
Hard
60 points Oct 18, 2025 4h 4m
Web Application SecuritySSTIFlask SecuritySSH Brute ForceDatabase EnumerationHash CrackingPrivilege Escalation
Type Juggling Bypass
Challenge
1 points Oct 17, 2025 4m
Web SecurityPHPType JugglingAuthentication BypassHash Analysis
Crack SHA1 Hash
Challenge
1 points Oct 17, 2025
CryptographyHash CrackingPassword AnalysisSecurity Tools
SQL Injection Test
Challenge
1 points Oct 17, 2025
SQL InjectionWeb SecurityDatabase SecurityAuthentication BypassInput ValidationPenetration Testing
Backup Hunter
Challenge
1 points Oct 17, 2025 2m
Web EnumerationFile DiscoveryReconnaissanceInformation Gathering
YAML Bomb
Challenge
1 points Sep 26, 2025 3h 24m
YAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing Security
WebDAV Explorer
Challenge
1 points Sep 25, 2025 1h 6m
WebDAV ExploitationFile UploadDirectory TraversalRemote File AccessHTTP MethodsWeb Server SecurityFile System Enumeration
Race Condition Hunter
Challenge
1 points Sep 25, 2025 40m
Race ConditionsTiming AttacksConcurrent ExploitationWeb Application Security
Prototype Pollution Hunter
Challenge
1 points Sep 24, 2025 56m
Prototype PollutionNode.js SecurityAPI SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web Vulnerabilities
IDOR Explorer
Challenge
1 points Sep 22, 2025 3m
IDORParameter ManipulationWeb Application SecurityAuthorization Bypass
Header Hijacker
Challenge
1 points Sep 19, 2025 5m
HTTP HeadersSecurity BypassWeb Application SecurityClient-Side Manipulation
Corporate Directory Hunt
Challenge
1 points Sep 18, 2025 4m
Directory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity Assessment
File Include Bypass
Challenge
1 points Sep 17, 2025 28m
Local File InclusionFilter BypassApache AuthenticationPassword Cracking
Cookie Forge
Challenge
1 points Sep 16, 2025 46m
JWTCookie ManipulationAuthentication BypassPrivilege Escalation
Redis Cache Poisoner
Challenge
1 points Sep 15, 2025 17h 12m
CRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationWeb Security
Button Activator
Challenge
1 points Sep 15, 2025 7m
JavaScriptBrowser DevToolsDOM ManipulationClient-Side Security
GraphQL Gateway
Challenge
1 points Sep 12, 2025 4h 11m
GraphQLAPI SecuritySchema IntrospectionAuthorization BypassInjection
DNS Tunneling Detective
Challenge
1 points Sep 11, 2025 4m
Network ForensicsDNS AnalysisData ExfiltrationTraffic Analysis
IP Spoofing Admin
Challenge
1 points Sep 10, 2025 25h 22m
Web SecurityHTTP HeadersIP SpoofingAccess Control BypassInformation Gathering
SUID Privilege Hunter
Challenge
1 points Sep 10, 2025 4h 1m
SUID BinariesPrivilege EscalationCommand InjectionLinux SecurityBinary Exploitation
Caesar Shift Decoder
Challenge
1 points Sep 10, 2025
CryptographyClassical CiphersFrequency AnalysisPattern Recognition
Registry Hijacker
Challenge
1 points Sep 09, 2025 5m
Docker Registry APIAuthentication BypassContainer SecurityAPI ManipulationRegistry Exploitation
RCE Playground
Medium
20 points Sep 08, 2025 25h 33m
Command InjectionInput Validation BypassRemote Code ExecutionFilter EvasionWeb Security
MongoDB Injector
Challenge
1 points Sep 05, 2025 4m
NoSQL InjectionMongoDBAuthentication BypassDocument DatabasesWeb Security
LDAP Injector
Challenge
1 points Sep 03, 2025 10m
LDAP InjectionAuthentication BypassDirectory ServicesEnterprise SecurityWeb Security
Infiltrator
Easy
20 points Sep 01, 2025 1h 44m
JWT ManipulationSSH ExploitationLog InjectionPrivilege EscalationWeb SecurityLinux Security
Template Injector
Challenge
1 points Aug 29, 2025 3m
Server-Side Template InjectionFlask SecurityJinja2 ExploitationRemote Code ExecutionWeb Security
WEP Cracker
Challenge
1 points Aug 27, 2025 4m
Wireless SecurityWEP CrackingRC4 AnalysisPacket AnalysisCryptographic AttacksLegacy Protocol Exploitation
Registry Hunter
Challenge
1 points Aug 26, 2025 4h 0m
Digital ForensicsWindows RegistryPersistence AnalysisBase64 DecodingIncident ResponseMalware Analysis
WiFi Password Cracker
Challenge
1 points Aug 26, 2025 1h 5m
WiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingNetwork SecurityPacket Analysis
Corporate Backup Deserializer
Challenge
1 points Aug 25, 2025 8h 15m
Python PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksEnterprise Security
Book Cipher Challenge
Challenge
1 points Aug 22, 2025 55m
CryptographyClassical CiphersPattern RecognitionHistorical Cryptanalysis
Admin Portal Breach
Challenge
1 points Aug 22, 2025 5m
Client-Side SecurityMD5 CrackingSource Code AnalysisWeb Application SecurityPassword AttacksAuthentication Bypass
Git Secrets Hunter
Challenge
1 points Aug 21, 2025 11m
Git ForensicsVersion Control SecurityRepository AnalysisPenetration TestingSecret RecoveryOSINT
ZIP Cracker
Challenge
1 points Aug 18, 2025 4h 0m
ZIP Password CrackingJohn the RipperfcrackzipDictionary AttacksBrute ForceArchive Security
KeePass Breaker
Challenge
1 points Aug 15, 2025 4h 0m
KeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool Limitations
Template Injection
Challenge
1 points Aug 14, 2025 4h 0m
Server-Side Template InjectionJinja2Flask SecurityWeb Application TestingCode InjectionPrivilege Escalation
PDF Password Cracker
Challenge
1 points Aug 13, 2025 8h 57m
PDF SecurityPassword CrackingDictionary AttacksDigital ForensicsDocument SecurityBrute Force Attacks
LFI Log Poison
Challenge
1 points Aug 12, 2025 8h 34m
Local File InclusionUser-Agent Log PoisoningRemote Code ExecutionDirectory TraversalWeb SecurityApache SecuritySystem AdministrationLog Analysis
Shell Command Scanner
Challenge
1 points Aug 12, 2025 4h 30m
Command InjectionWeb SecurityShell CommandsSystem AdministrationHTTP Parameter ManipulationSecurity Assessment
NoSQL Injection
Challenge
1 points Aug 08, 2025 12m
NoSQL InjectionMongoDBVisibility ControlsAccess Control BypassSecurity TestingOperator Exploitation
CSRF Bank Transfer
Challenge
1 points Aug 07, 2025 5h 8m
CSRFCross-Site Request ForgerySession SecurityWeb SecuritySocial EngineeringForm SecurityHTTP SecurityState Management
Alpwned
Medium
40 points Aug 07, 2025 84h 12m
SQL InjectionAuthentication BypassSSHLinux Privilege EscalationFile PermissionsWeb Application Security
File Upload Bypass
Challenge
1 points Aug 07, 2025 4h 21m
File UploadWeb SecurityBypass TechniquesPHPWeb ShellsInput ValidationSocial EngineeringPost Exploitation
URL Scanner
Challenge
1 points Aug 06, 2025 4h 0m
SSRFServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsNetwork SecurityWeb SecurityAWS EC2
XSS Playground
Challenge
1 points Aug 04, 2025 4h 0m
XSSCross-Site ScriptingStored XSSSession HijackingJavaScriptWeb SecurityClient-Side SecurityDOM Manipulation
JWT Claims Manipulation
Challenge
1 points Jul 31, 2025 4h 0m
JWTClaims ManipulationPrivilege EscalationAuthentication BypassTime-Based AttacksSignature Cracking
SQL Injection
Challenge
1 points Jul 30, 2025 31m
SQL InjectionDatabase SecurityWeb SecurityBlind SQLiTime-based SQLiBoolean-based SQLiDatabase EnumerationVulnerability Assessment
XXE Exposed
Challenge
1 points Jul 30, 2025 4h 3m
XXEXML SecurityFile DisclosureExternal EntityWeb SecurityVulnerability Assessment
JWT Algo Confusion
Challenge
1 points Jul 29, 2025 11m
JWTAlgorithm ConfusionRS256HS256Token ForgeryWeb Security
JWT Bypass
Challenge
1 points Jul 25, 2025 4h 3m
JWTWeb SecurityToken AuthenticationCryptography
Ping Pwn
Challenge
1 points Jul 24, 2025 4h 30m
Command InjectionWeb ExploitationService DiscoveryNetwork Security
Auth Bypass
Challenge
1 points Jul 24, 2025 18m
SQL InjectionAuthentication BypassWeb SecurityDatabase Security
Log Hunter
Challenge
1 points Jul 22, 2025 4h 0m
Log AnalysisWeb SecurityIncident ResponsePattern RecognitionFile DiscoveryCommand Line ToolsForensicsHTTP ProtocolAttack DetectionSecurity Assessment
API Logic Flaw
Challenge
1 points Jul 21, 2025 4h 0m
API SecurityLogic FlawAuthentication BypassParameter ManipulationPHPWeb Security
Path Traversal
Challenge
1 points Jul 18, 2025 4h 0m
Path TraversalCGIWeb SecurityFile AccessDirectory TraversalInput Validation
Flask Error
Challenge
1 points Jul 17, 2025 4h 0m
FlaskDebug ModePythonWeb SecurityMemory Analysis
Rail Fence
Challenge
1 points Jul 16, 2025 8h 0m
CryptographyTransposition CipherRail FencePattern RecognitionPython
Sonic Cipher
Challenge
1 points Jul 15, 2025 4h 0m
SteganographyAudio AnalysisLSBForensicsPython
Pixel Puzzler
Challenge
1 points Jul 14, 2025 4h 0m
SteganographyImage AnalysisLSBForensicsPython
PDF Trap
Challenge
1 points Jul 11, 2025 4h 0m
PDF ForensicsFile AnalysisMetadataHidden DataForensic Tools
Blockchain Secrets
Challenge
1 points Jul 10, 2025 4h 0m
Blockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic Analysis
Corporate Breach 2
Challenge
1 points Jul 09, 2025 4h 0m
Web SecurityPHPLFIPath ManipulationFile Inclusion
Corporate Breach
Challenge
1 points Jul 08, 2025 8h 0m
Web SecurityPHPLFIPassword CrackingAuthentication BypassDirectory Traversal
DNS Exfil
Challenge
1 points Jul 07, 2025 4h 0m
Network AnalysisDNSPacket AnalysisData ExfiltrationBase64 Decoding
Crypto Cipher
Challenge
1 points Jul 04, 2025 12h 45m
CryptanalysisClassical CryptoPattern RecognitionData Encoding
Session Switch
Challenge
1 points Jul 03, 2025 4h 0m
Web SecuritySession ManagementAuthenticationPrivilege EscalationPHP
Snapchat Exposed
Challenge
1 points Jul 02, 2025 1h 47m
JenkinsCI/CDDevOpsWeb SecurityPentestAutomation
Red is Dead
Challenge
1 points Jun 30, 2025 4h 0m
Network ReconnaissanceService DiscoveryDatabase ForensicsData EncodingCLI UsageData RecoveryIncident ResponseBase64Hex EncodingRedis
Memory Forensics
Challenge
1 points Jun 27, 2025 5h 24m
Memory ForensicsBinary AnalysisDigital ForensicsPattern RecognitionIncident ResponseTool UsageData RecoveryROT13 Encoding
API Breaker
Challenge
1 points Jun 25, 2025 4h 0m
API SecurityWeb HackingLogic FlawsPrivilege EscalationToken ManipulationBase64 EncodingAuthorization Bypass
QR Code Quest
Challenge
1 points Jun 25, 2025 4h 0m
QR Code AnalysisImage AnalysisData ExtractionSteganographyDigital Forensics
Base64 Detective
Challenge
1 points Jun 24, 2025 4h 30m
Base64Web InspectionBrowser DevToolsData EncodingHTML Analysis
Binary Secrets
Challenge
1 points Jun 23, 2025 4m
Binary AnalysisHex EditorsData StructuresReverse EngineeringFile Analysis
Get the Password
Challenge
1 points Jun 20, 2025 4h 0m
JavaScriptMD5Rainbow TablesWeb DevelopmentBrowser DevTools
Stego Hunt
Challenge
1 points Jun 19, 2025 4h 0m
SteganographyImage AnalysisWebCTF Basics
Packet Pursuit
Challenge
1 points Jun 19, 2025 4h 8m
Network AnalysisPacket CaptureWiresharkProtocol Analysis
Hex Hunt
Challenge
1 points Jun 17, 2025 5m
JavaScriptWeb DevelopmentHexadecimalBrowser DevTools
FiPloit
Easy
20 points Jun 01, 2025 4h 0m
Local File InclusionFile Upload BypassPHP SecurityDirectory TraversalWeb Shell ExploitationPrivilege EscalationLog Analysis
AlVault
Medium
40 points May 09, 2025 126h 6m
WEB
Compromised 2
Hard
60 points May 04, 2025 28h 35m
Advanced ReconnaissanceAndroid Reverse EngineeringSCADA ExploitationCVE ExploitationAuthentication BypassPrivilege Escalation
Broken Chain
Hard
60 points May 01, 2025 11h 54m
IDOR ExploitationZip Slip VulnerabilityServer-Side Template InjectionInternal Service DiscoveryBackup Service ExploitationPrivilege EscalationSudo Vim Exploitation
Internal
Hard
60 points Apr 24, 2025 33h 44m
Command InjectionLinux CapabilitiesPrivilege EscalationReverse ShellWeb Application SecuritySystem EnumerationNetwork Reconnaissance
WP Ultimate
Hard
60 points Apr 21, 2025 76h 16m
WP
Compromised 1
Medium
40 points Apr 13, 2025 16h 12m
Apache TomcatWeb Application SecurityWAR DeploymentDefault CredentialsPrivilege EscalationLinuxSudoWeb Shells
Query Quake
Medium
40 points Apr 10, 2025 40h 20m
MYSQLIRCE
Matsudo
Medium
40 points Apr 07, 2025 9h 50m
SSHBrute ForcePrivilege EscalationLinuxSudoNetwork ReconnaissancePenetration Testing
Traversed
Medium
40 points Apr 06, 2025 3h 14m
GIT
Beyond Echo
Medium
20 points Apr 05, 2025 41m
PHPRCE
Cronpocalypse
Easy
20 points Apr 05, 2025 19h 18m
SSH
Anonymous 2
Easy
10 points Apr 03, 2025 49m
FTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem Exploitation
Anonymous
Easy
10 points Apr 03, 2025 17m
FTP
Hack the Login
Very Easy
4 points Apr 02, 2025 3m
JSLearning Path
Learning Lab 101
Very Easy
4 points Apr 02, 2025 24m
NetworkingReconnaissanceCommand LineWeb ServicesLearning Path
Nmap Lab 102
Very Easy
8 points Apr 02, 2025 4m
TELNETLearning Path
Hack the Cookie
Very Easy
4 points Apr 02, 2025 4m
WEBLearning Path
Spoof!
Easy
10 points Feb 17, 2025 16m
IP SPOOFING
Include me
Easy
10 points Feb 17, 2025 10m
PHPLFI
Secrets in Source
Very Easy
4 points Feb 16, 2025 2m
HTMLLearning Path

Courses Progress

Your learning paths and modules

Nmap Mastery: Dominate Network Scanning
4 / 4 modules completed
100%
HTTP Header Manipulation: IP Spoofing
3 / 3 modules completed
100%
HDNA Ethical Hacking Course
5 / 5 modules completed
100%
JWT Ethical Hacking: Token Takeover Tactics
4 / 4 modules completed
100%
Remote Code Execution (RCE)
3 / 3 modules completed
100%