Avatar do Perfil

AzmiJO

✦ Legend ✦
Jordan Entrou em maio 2024

Ranking

#4

Melhor: #1

Total de Pontos

1466

Total Ganho

Labs Concluídos

113

115 User18 Root

Módulos

39

Validados

Primeiros Sangues

2

Primeiro a Concluir

Melhor Sequência

10

Dias

Habilidades Adquiridas

Habilidades técnicas praticadas através dos labs concluídos

LinuxCommand LineFile System NavigationHidden FilesgrepfindWeb EnumerationWeb SecurityAuthenticationRCEPrivilege EscalationDirectory FuzzingX-Forwarded-For SpoofingBruteforceffufCommand InjectionNewline InjectionLinux EnumerationSUID ExploitationBuffer OverflowARM64 ROPStatic Binary AnalysisBinary ExploitationpwntoolsropperGDBHTMLBrowser DevToolsClient-Side SecuritySource Code AnalysisLearning PathPassword CrackingLinux SecurityJohn the RipperhashcatCryptographySSHCVE ExploitationWindows SecurityNTLMHashcatHash AnalysisOffice SecurityHash ExtractionGitVersion ControlReconnaissanceFile DiscoveryInformation GatheringPHPType JugglingAuthentication BypassHash CrackingPassword AnalysisSecurity ToolsSQL InjectionDatabase SecurityInput ValidationPenetration TestingJavaScriptDeobfuscationCode AnalysisHTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisPacket AnalysisEmail ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital InvestigationSSRFURL ManipulationInternal Network AccessProtocol BypassSteganographyClassical CiphersImage AnalysisPolyalphabetic CiphersDirectory TraversalPath InjectionFile System SecurityPath ManipulationFile AccessWeb Application SecuritySSTIFlask SecuritySSH Brute ForceDatabase EnumerationYAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing SecurityWebDAV ExploitationFile UploadRemote File AccessHTTP MethodsWeb Server SecurityFile System EnumerationPrototype PollutionNode.js SecurityAPI SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web VulnerabilitiesIDORParameter ManipulationAuthorization BypassHTTP HeadersSecurity BypassClient-Side ManipulationDirectory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity AssessmentLocal File InclusionFilter BypassApache AuthenticationJWTCookie ManipulationPython PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksEnterprise SecurityCRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationCSRFCross-Site Request ForgerySession SecuritySocial EngineeringForm SecurityHTTP SecurityState ManagementFlaskDebug ModePythonMemory AnalysisNetwork AnalysisDNSData ExfiltrationSession ManagementAlgorithm ConfusionRS256HS256Token ForgeryUser-Agent Log PoisoningApache SecuritySystem AdministrationLog AnalysisXXEXML SecurityFile DisclosureExternal EntityVulnerability AssessmentWebCTF BasicsDOM ManipulationGraphQLSchema IntrospectionInjectionFilter EvasionDNS AnalysisIP SpoofingAccess Control BypassSUID BinariesFrequency AnalysisPattern RecognitionDocker Registry APIContainer SecurityAPI ManipulationRegistry ExploitationNoSQL InjectionMongoDBDocument DatabasesWeb ExploitationService DiscoveryNetwork SecurityIncident ResponseCommand Line ToolsForensicsAttack DetectionLDAP InjectionDirectory ServicesJWT ManipulationSSH ExploitationLog InjectionServer-Side Template InjectionJinja2 ExploitationWireless SecurityWEP CrackingRC4 AnalysisCryptographic AttacksLegacy Protocol ExploitationHistorical CryptanalysisWiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingDigital ForensicsWindows RegistryPersistence AnalysisMalware AnalysisMD5 CrackingPassword AttacksGit ForensicsVersion Control SecurityRepository AnalysisSecret RecoveryZIP Password CrackingfcrackzipBrute ForceArchive SecurityKeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool LimitationsJinja2Web Application TestingCode InjectionPDF SecurityDocument SecurityBrute Force AttacksShell CommandsHTTP Parameter ManipulationVisibility ControlsSecurity TestingOperator ExploitationBypass TechniquesWeb ShellsPost ExploitationLinux Privilege EscalationFile PermissionsServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsAWS EC2XSSCross-Site ScriptingStored XSSSession HijackingClaims ManipulationTime-Based AttacksSignature CrackingBlind SQLiTime-based SQLiBoolean-based SQLiToken AuthenticationLogic FlawPath TraversalCGITransposition CipherRail FenceAudio AnalysisLSBPDF ForensicsFile AnalysisMetadataHidden DataForensic ToolsBlockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic AnalysisLFIFile InclusionCryptanalysisClassical CryptoData EncodingJenkinsCI/CDDevOpsPentestAutomationNetwork ReconnaissanceDatabase ForensicsCLI UsageData RecoveryBase64Hex EncodingRedisMemory ForensicsBinary AnalysisTool UsageROT13 EncodingWeb HackingLogic FlawsToken ManipulationBase64 EncodingQR Code AnalysisWeb InspectionHTML AnalysisHex EditorsData StructuresReverse EngineeringMD5Rainbow TablesWeb DevelopmentPacket CaptureWiresharkProtocol AnalysisHexadecimalFile Upload BypassPHP SecurityWeb Shell ExploitationWEBIDOR ExploitationZip Slip VulnerabilityInternal Service DiscoveryBackup Service ExploitationSudo Vim ExploitationTELNETNetworkingWeb ServicesLinux CapabilitiesReverse ShellSystem EnumerationAdvanced ReconnaissanceAndroid Reverse EngineeringSCADA ExploitationApache TomcatWAR DeploymentDefault CredentialsSudoGITWPMYSQLIFTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem ExploitationIP SPOOFINGFTP

Módulos Concluídos

Módulos educacionais validados com sucesso

Nmap Mastery: Dominate Network Scanning

4 módulos
Installing Nmap
1 pts Concluído: set. 15, 2025
Advanced Techniques
1 pts Concluído: set. 15, 2025
Introduction to Nmap
1 pts Concluído: abr. 22, 2025
Essential Nmap Scanning
1 pts Concluído: set. 15, 2025

HTTP Header Manipulation: IP Spoofing

3 módulos
Remediate
1 pts Concluído: mai. 30, 2024
Techniques for IP Spoofing in HTTP Headers
1 pts Concluído: mai. 30, 2024
Manipulating Headers
1 pts Concluído: mai. 30, 2024

Password Cracking: Advanced Techniques for Security Assessment

8 módulos
Rainbow Tables and Precomputed Attacks
1 pts Concluído: ago. 30, 2025
Wireless Network Password Attacks
1 pts Concluído: nov. 14, 2025
PDF Password Cracking and Document Security
1 pts Concluído: set. 15, 2025
Linux Password Cracking (Shadow Files)
1 pts Concluído: nov. 14, 2025
Brute Force and Hybrid Attack Techniques
1 pts Concluído: ago. 30, 2025
Password Security Fundamentals
1 pts Concluído: ago. 21, 2025
Dictionary Attacks and Wordlist Optimization
1 pts Concluído: ago. 26, 2025
Windows System Password Recovery
1 pts Concluído: nov. 14, 2025

Network Penetration Testing: From Reconnaissance to Shell Access

1 módulos
Network Fundamentals for Pentesters
1 pts Concluído: dez. 23, 2025

HDNA Ethical Hacking Course

5 módulos
1. Legal & Compliance
1 pts Concluído: mai. 30, 2024
2. Network Protocols and Security
1 pts Concluído: mai. 30, 2024
4. Network Scanning
1 pts Concluído: mai. 30, 2024
3. Reconnaissance
1 pts Concluído: mai. 30, 2024
Course Summary
1 pts Concluído: mai. 30, 2024

Web Application Security: Exploitation and Defense

12 módulos
Cross-Site Request Forgery
1 pts Concluído: ago. 16, 2025
XML External Entity Injection
1 pts Concluído: ago. 16, 2025
Server-Side Request Forgery
1 pts Concluído: ago. 16, 2025
Local and Remote File Inclusion
1 pts Concluído: ago. 16, 2025
Course Introduction
1 pts Concluído: ago. 12, 2025
Server-Side Template Injection
1 pts Concluído: ago. 16, 2025
Deserialization Attacks
1 pts Concluído: ago. 16, 2025
File Upload Exploitation
1 pts Concluído: ago. 16, 2025
Cross-Site Scripting
1 pts Concluído: ago. 16, 2025
Authentication Bypass
1 pts Concluído: ago. 16, 2025
SQL Injection
1 pts Concluído: ago. 16, 2025
Command Injection
1 pts Concluído: ago. 16, 2025

JWT Ethical Hacking: Token Takeover Tactics

3 módulos
Introduction to JWT Tokens
1 pts Concluído: ago. 10, 2025
Claims Manipulation and Time-Based Attacks
1 pts Concluído: ago. 10, 2025
Secret Key Brute Forcing
1 pts Concluído: ago. 10, 2025

Remote Code Execution (RCE)

3 módulos
Shellshock (CVE-2014-6271)
1 pts Concluído: mai. 30, 2024
RCE: Introduction
1 pts Concluído: mai. 30, 2024
RCE in PHP
1 pts Concluído: mai. 30, 2024

Labs & Desafios Concluídos

Desafios práticos de cibersegurança concluídos com sucesso

Linux Fundamentals Practice
Extremo
5 pontos jan. 07, 2026 1m
LinuxCommand LineFile System NavigationHidden Filesgrepfind
Hidden CMS Breach
Médio
40 pontos dez. 17, 2025 53m
Web EnumerationWeb SecurityAuthenticationRCEPrivilege EscalationLinux
Hack the Box
Difícil
70 pontos dez. 17, 2025 36m
Directory FuzzingX-Forwarded-For SpoofingBruteforceffufCommand InjectionNewline InjectionWeb SecurityLinux EnumerationSUID ExploitationBuffer OverflowARM64 ROPStatic Binary AnalysisBinary ExploitationpwntoolsropperGDB
Secrets in Source 2
Muito Fácil
5 pontos nov. 17, 2025
Web SecurityHTMLBrowser DevToolsClient-Side SecuritySource Code AnalysisLearning Path
Shadow Cracker
Extremo
5 pontos nov. 12, 2025
Password CrackingLinux SecurityJohn the RipperhashcatCryptography
TechNova Infiltration
Médio
40 pontos nov. 10, 2025 1h 6m
Web EnumerationSSHPassword CrackingPrivilege EscalationLinux SecurityCVE Exploitation
Windows Password Cracker
Extremo
5 pontos nov. 05, 2025 3m
Password CrackingWindows SecurityNTLMHashcatJohn the RipperHash Analysis
Office Password Cracker
Extremo
5 pontos out. 29, 2025 7m
Password CrackingOffice SecurityHash ExtractionJohn the RipperHashcat
Git Exposed
Extremo
5 pontos out. 22, 2025 3m
GitVersion ControlSource Code AnalysisReconnaissanceWeb Security
Backup Hunter
Extremo
5 pontos out. 17, 2025 2m
Web EnumerationFile DiscoveryReconnaissanceInformation Gathering
Type Juggling Bypass
Extremo
5 pontos out. 15, 2025 1m
Web SecurityPHPType JugglingAuthentication BypassHash Analysis
Crack SHA1 Hash
Extremo
5 pontos out. 10, 2025
CryptographyHash CrackingPassword AnalysisSecurity Tools
SQL Injection Test
Extremo
5 pontos out. 08, 2025 1m
SQL InjectionWeb SecurityDatabase SecurityAuthentication BypassInput ValidationPenetration Testing
Hack This Site
Extremo
5 pontos out. 07, 2025
JavaScriptDeobfuscationClient-Side SecurityBrowser DevToolsCode AnalysisAuthentication Bypass
HTTP Smuggling
Extremo
5 pontos out. 06, 2025 1m
HTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisWeb SecurityPacket Analysis
Email Header Forensics
Extremo
5 pontos out. 04, 2025 2m
Email ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital Investigation
SSRF Validator
Extremo
5 pontos out. 04, 2025 4m
SSRFWeb SecurityURL ManipulationInternal Network AccessProtocol Bypass
Vigenere Stego Hunt
Extremo
5 pontos out. 01, 2025 4m
CryptographySteganographyClassical CiphersImage AnalysisPolyalphabetic Ciphers
Simple Directory Traversal
Extremo
5 pontos out. 01, 2025 2m
Directory TraversalPath InjectionFile System SecurityWeb SecurityInput ValidationPath ManipulationFile Access
FortiPy
Difícil
70 pontos out. 01, 2025 35m
Web Application SecuritySSTIFlask SecuritySSH Brute ForceDatabase EnumerationHash CrackingPrivilege Escalation
YAML Bomb
Extremo
5 pontos set. 26, 2025 1m
YAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing Security
WebDAV Explorer
Extremo
5 pontos set. 25, 2025 19m
WebDAV ExploitationFile UploadDirectory TraversalRemote File AccessHTTP MethodsWeb Server SecurityFile System Enumeration
Prototype Pollution Hunter
Extremo
5 pontos set. 24, 2025 3m
Prototype PollutionNode.js SecurityAPI SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web Vulnerabilities
IDOR Explorer
Extremo
5 pontos set. 22, 2025
IDORParameter ManipulationWeb Application SecurityAuthorization Bypass
Header Hijacker
Extremo
5 pontos set. 19, 2025
HTTP HeadersSecurity BypassWeb Application SecurityClient-Side Manipulation
Corporate Directory Hunt
Extremo
5 pontos set. 18, 2025
Directory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity Assessment
File Include Bypass
Extremo
5 pontos set. 17, 2025 6m
Local File InclusionFilter BypassApache AuthenticationPassword Cracking
Cookie Forge
Extremo
5 pontos set. 16, 2025 5m
JWTCookie ManipulationAuthentication BypassPrivilege Escalation
Corporate Backup Deserializer
Extremo
5 pontos set. 15, 2025 14m
Python PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksEnterprise Security
Redis Cache Poisoner
Extremo
5 pontos set. 15, 2025 14m
CRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationWeb Security
CSRF Bank Transfer
Extremo
5 pontos set. 15, 2025 5m
CSRFCross-Site Request ForgerySession SecurityWeb SecuritySocial EngineeringForm SecurityHTTP SecurityState Management
Flask Error
Extremo
5 pontos set. 15, 2025 1h 0m
FlaskDebug ModePythonWeb SecurityMemory Analysis
DNS Exfil
Extremo
5 pontos set. 15, 2025
Network AnalysisDNSPacket AnalysisData ExfiltrationBase64 Decoding
Session Switch
Extremo
5 pontos set. 15, 2025
Web SecuritySession ManagementAuthenticationPrivilege EscalationPHP
JWT Algo Confusion
Extremo
5 pontos set. 15, 2025 2m
JWTAlgorithm ConfusionRS256HS256Token ForgeryWeb Security
LFI Log Poison
Extremo
5 pontos set. 15, 2025 13m
Local File InclusionUser-Agent Log PoisoningRemote Code ExecutionDirectory TraversalWeb SecurityApache SecuritySystem AdministrationLog Analysis
XXE Exposed
Extremo
5 pontos set. 15, 2025 2m
XXEXML SecurityFile DisclosureExternal EntityWeb SecurityVulnerability Assessment
Stego Hunt
Extremo
5 pontos set. 15, 2025 1m
SteganographyImage AnalysisWebCTF Basics
Button Activator
Extremo
5 pontos set. 15, 2025
JavaScriptBrowser DevToolsDOM ManipulationClient-Side Security
GraphQL Gateway
Extremo
5 pontos set. 12, 2025
GraphQLAPI SecuritySchema IntrospectionAuthorization BypassInjection
RCE Playground
Médio
20 pontos set. 11, 2025 34m
Command InjectionInput Validation BypassRemote Code ExecutionFilter EvasionWeb Security
DNS Tunneling Detective
Extremo
5 pontos set. 11, 2025 5m
Network ForensicsDNS AnalysisData ExfiltrationTraffic Analysis
IP Spoofing Admin
Extremo
5 pontos set. 10, 2025 5m
Web SecurityHTTP HeadersIP SpoofingAccess Control BypassInformation Gathering
SUID Privilege Hunter
Extremo
5 pontos set. 10, 2025
SUID BinariesPrivilege EscalationCommand InjectionLinux SecurityBinary Exploitation
Caesar Shift Decoder
Extremo
5 pontos set. 10, 2025
CryptographyClassical CiphersFrequency AnalysisPattern Recognition
Registry Hijacker
Extremo
5 pontos set. 09, 2025 1m
Docker Registry APIAuthentication BypassContainer SecurityAPI ManipulationRegistry Exploitation
MongoDB Injector
Extremo
5 pontos set. 05, 2025 2m
NoSQL InjectionMongoDBAuthentication BypassDocument DatabasesWeb Security
Ping Pwn
Extremo
5 pontos set. 04, 2025 4m
Command InjectionWeb ExploitationService DiscoveryNetwork Security
Log Hunter
Extremo
5 pontos set. 04, 2025 4m
Log AnalysisWeb SecurityIncident ResponsePattern RecognitionFile DiscoveryCommand Line ToolsForensicsHTTP ProtocolAttack DetectionSecurity Assessment
LDAP Injector
Extremo
5 pontos set. 03, 2025
LDAP InjectionAuthentication BypassDirectory ServicesEnterprise SecurityWeb Security
Infiltrator
Fácil
20 pontos set. 01, 2025 10m
JWT ManipulationSSH ExploitationLog InjectionPrivilege EscalationWeb SecurityLinux Security
Template Injector
Extremo
5 pontos ago. 29, 2025 1m
Server-Side Template InjectionFlask SecurityJinja2 ExploitationRemote Code ExecutionWeb Security
WEP Cracker
Extremo
5 pontos ago. 27, 2025 3m
Wireless SecurityWEP CrackingRC4 AnalysisPacket AnalysisCryptographic AttacksLegacy Protocol Exploitation
Book Cipher Challenge
Extremo
5 pontos ago. 27, 2025 4m
CryptographyClassical CiphersPattern RecognitionHistorical Cryptanalysis
WiFi Password Cracker
Extremo
5 pontos ago. 26, 2025 2m
WiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingNetwork SecurityPacket Analysis
Registry Hunter
Extremo
5 pontos ago. 26, 2025 2m
Digital ForensicsWindows RegistryPersistence AnalysisBase64 DecodingIncident ResponseMalware Analysis
Admin Portal Breach
Extremo
5 pontos ago. 21, 2025
Client-Side SecurityMD5 CrackingSource Code AnalysisWeb Application SecurityPassword AttacksAuthentication Bypass
Git Secrets Hunter
Extremo
5 pontos ago. 20, 2025 7m
Git ForensicsVersion Control SecurityRepository AnalysisPenetration TestingSecret RecoveryOSINT
ZIP Cracker
Extremo
5 pontos ago. 18, 2025 1h 0m
ZIP Password CrackingJohn the RipperfcrackzipDictionary AttacksBrute ForceArchive Security
KeePass Breaker
Extremo
5 pontos ago. 15, 2025 1h 0m
KeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool Limitations
Template Injection
Extremo
5 pontos ago. 14, 2025 1h 0m
Server-Side Template InjectionJinja2Flask SecurityWeb Application TestingCode InjectionPrivilege Escalation
PDF Password Cracker
Extremo
5 pontos ago. 13, 2025 1h 2m
PDF SecurityPassword CrackingDictionary AttacksDigital ForensicsDocument SecurityBrute Force Attacks
Shell Command Scanner
Extremo
5 pontos ago. 12, 2025 1h 0m
Command InjectionWeb SecurityShell CommandsSystem AdministrationHTTP Parameter ManipulationSecurity Assessment
NoSQL Injection
Extremo
5 pontos ago. 08, 2025 1h 0m
NoSQL InjectionMongoDBVisibility ControlsAccess Control BypassSecurity TestingOperator Exploitation
File Upload Bypass
Extremo
5 pontos ago. 07, 2025 1h 0m
File UploadWeb SecurityBypass TechniquesPHPWeb ShellsInput ValidationSocial EngineeringPost Exploitation
Alpwned
Médio
40 pontos ago. 07, 2025 11m
SQL InjectionAuthentication BypassSSHLinux Privilege EscalationFile PermissionsWeb Application Security
URL Scanner
Extremo
5 pontos ago. 06, 2025 1h 0m
SSRFServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsNetwork SecurityWeb SecurityAWS EC2
XSS Playground
Extremo
5 pontos ago. 04, 2025 1h 5m
XSSCross-Site ScriptingStored XSSSession HijackingJavaScriptWeb SecurityClient-Side SecurityDOM Manipulation
JWT Claims Manipulation
Extremo
5 pontos jul. 31, 2025 1h 0m
JWTClaims ManipulationPrivilege EscalationAuthentication BypassTime-Based AttacksSignature Cracking
SQL Injection
Extremo
5 pontos jul. 30, 2025 6m
SQL InjectionDatabase SecurityWeb SecurityBlind SQLiTime-based SQLiBoolean-based SQLiDatabase EnumerationVulnerability Assessment
JWT Bypass
Extremo
5 pontos jul. 25, 2025 1h 0m
JWTWeb SecurityToken AuthenticationCryptography
Auth Bypass
Extremo
5 pontos jul. 24, 2025 1h 0m
SQL InjectionAuthentication BypassWeb SecurityDatabase Security
API Logic Flaw
Extremo
5 pontos jul. 21, 2025 1h 0m
API SecurityLogic FlawAuthentication BypassParameter ManipulationPHPWeb Security
Path Traversal
Extremo
5 pontos jul. 18, 2025 1h 0m
Path TraversalCGIWeb SecurityFile AccessDirectory TraversalInput Validation
Rail Fence
Extremo
5 pontos jul. 16, 2025 1h 3m
CryptographyTransposition CipherRail FencePattern RecognitionPython
Sonic Cipher
Extremo
5 pontos jul. 15, 2025 1h 0m
SteganographyAudio AnalysisLSBForensicsPython
Pixel Puzzler
Extremo
5 pontos jul. 14, 2025 6m
SteganographyImage AnalysisLSBForensicsPython
PDF Trap
Extremo
5 pontos jul. 11, 2025 1h 0m
PDF ForensicsFile AnalysisMetadataHidden DataForensic Tools
Blockchain Secrets
Extremo
5 pontos jul. 10, 2025 1h 0m
Blockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic Analysis
Corporate Breach 2
Extremo
5 pontos jul. 09, 2025 1h 0m
Web SecurityPHPLFIPath ManipulationFile Inclusion
Corporate Breach
Extremo
5 pontos jul. 08, 2025 1h 25m
Web SecurityPHPLFIPassword CrackingAuthentication BypassDirectory Traversal
Crypto Cipher
Extremo
5 pontos jul. 04, 2025 1h 0m
CryptanalysisClassical CryptoPattern RecognitionData Encoding
Snapchat Exposed
Extremo
5 pontos jul. 02, 2025 1h 0m
JenkinsCI/CDDevOpsWeb SecurityPentestAutomation
Red is Dead
Extremo
5 pontos jun. 30, 2025 1h 0m
Network ReconnaissanceService DiscoveryDatabase ForensicsData EncodingCLI UsageData RecoveryIncident ResponseBase64Hex EncodingRedis
Memory Forensics
Extremo
5 pontos jun. 27, 2025 2h 0m
Memory ForensicsBinary AnalysisDigital ForensicsPattern RecognitionIncident ResponseTool UsageData RecoveryROT13 Encoding
API Breaker
Extremo
5 pontos jun. 26, 2025 1h 0m
API SecurityWeb HackingLogic FlawsPrivilege EscalationToken ManipulationBase64 EncodingAuthorization Bypass
QR Code Quest
Extremo
5 pontos jun. 25, 2025 1m
QR Code AnalysisImage AnalysisData ExtractionSteganographyDigital Forensics
Base64 Detective
Extremo
5 pontos jun. 24, 2025 2h 0m
Base64Web InspectionBrowser DevToolsData EncodingHTML Analysis
Binary Secrets
Extremo
5 pontos jun. 23, 2025 1h 0m
Binary AnalysisHex EditorsData StructuresReverse EngineeringFile Analysis
Get the Password
Extremo
5 pontos jun. 20, 2025 1h 0m
JavaScriptMD5Rainbow TablesWeb DevelopmentBrowser DevTools
Packet Pursuit
Extremo
5 pontos jun. 19, 2025 1h 0m
Network AnalysisPacket CaptureWiresharkProtocol Analysis
Hex Hunt
Extremo
5 pontos jun. 17, 2025 1h 0m
JavaScriptWeb DevelopmentHexadecimalBrowser DevTools
FiPloit
Fácil
20 pontos jun. 01, 2025 2h 2m
Local File InclusionFile Upload BypassPHP SecurityDirectory TraversalWeb Shell ExploitationPrivilege EscalationLog Analysis
AlVault
Médio
40 pontos mai. 09, 2025 5h 11m
WEB
Broken Chain
Difícil
70 pontos abr. 02, 2025 4h 15m
IDOR ExploitationZip Slip VulnerabilityServer-Side Template InjectionInternal Service DiscoveryBackup Service ExploitationPrivilege EscalationSudo Vim Exploitation
Hack the Cookie
Muito Fácil
5 pontos abr. 01, 2025 3m
WEBLearning Path
Nmap Lab 102
Muito Fácil
10 pontos mar. 31, 2025 1h 0m
TELNETLearning Path
Hack the Login
Muito Fácil
5 pontos mar. 31, 2025
WebAuthenticationClient-Side SecurityLearning Path
Onboarding Lab: Access and Flags
Muito Fácil
5 pontos mar. 05, 2025 1h 1m
NetworkingReconnaissanceCommand LineWeb ServicesLearning Path
Cronpocalypse
Fácil
20 pontos mar. 01, 2025 54m
SSH
Internal
Difícil
70 pontos fev. 01, 2025 2h 35m
Command InjectionLinux CapabilitiesPrivilege EscalationReverse ShellWeb Application SecuritySystem EnumerationNetwork Reconnaissance
Compromised 2
Difícil
70 pontos jan. 01, 2025 6h 26m
Advanced ReconnaissanceAndroid Reverse EngineeringSCADA ExploitationCVE ExploitationAuthentication BypassPrivilege Escalation
Compromised 1
Médio
40 pontos nov. 19, 2024 2h 2m
Apache TomcatWeb Application SecurityWAR DeploymentDefault CredentialsPrivilege EscalationLinuxSudoWeb Shells
Traversed
Médio
40 pontos set. 26, 2024 59m
GIT
WP Ultimate
Difícil
70 pontos jun. 17, 2024 2h 37m
WP
Matsudo
Médio
40 pontos mai. 31, 2024 4h 36m
SSHBrute ForcePrivilege EscalationLinuxSudoNetwork ReconnaissancePenetration Testing
Query Quake
Médio
40 pontos mai. 31, 2024 8h 3m
MYSQLIRCE
Beyond Echo
Médio
20 pontos mai. 30, 2024 1h 35m
PHPRCE
Anonymous 2
Fácil
10 pontos mai. 30, 2024 30m
FTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem Exploitation
Spoof!
Fácil
10 pontos mai. 30, 2024 7m
IP SPOOFING
Anonymous
Fácil
10 pontos mai. 30, 2024 1m
FTP
Include me
Fácil
10 pontos mai. 30, 2024 7m
PHPLFI
Secrets in Source
Muito Fácil
5 pontos mai. 30, 2024 12m
HTMLLearning Path

Progresso dos Cursos

Seus caminhos de aprendizado e módulos

Nmap Mastery: Dominate Network Scanning
4 / 4 módulos concluídos
100%
HTTP Header Manipulation: IP Spoofing
3 / 3 módulos concluídos
100%
Web Application Security: Exploitation and Defense
12 / 12 módulos concluídos
100%
HDNA Ethical Hacking Course
5 / 5 módulos concluídos
100%
JWT Ethical Hacking: Token Takeover Tactics
3 / 4 módulos concluídos
75%
Remote Code Execution (RCE)
3 / 3 módulos concluídos
100%
Junte-se a 5.000+ hackers aprendendo cibersegurança com labs práticos. Criar Conta