Profile Avatar PRO

honkeyponkey

Grandmaster
United States Joined August 2024 Pro Member

Live Ranking

#8

Best: #8

Total Points

1170

Total Earned

Labs Completed

110

111 User • 14 Root

Modules

10

Validated

First Bloods

0

First to Complete

Best Streak

19

Days

Skills Acquired

Technical skills practiced through completed labs

JavaScriptWeb DevelopmentHexadecimalBrowser DevToolsSteganographyImage AnalysisWebCTF BasicsNetwork AnalysisPacket CaptureWiresharkProtocol AnalysisMD5Rainbow TablesBinary AnalysisHex EditorsData StructuresReverse EngineeringFile AnalysisQR Code AnalysisData ExtractionDigital ForensicsAPI SecurityWeb HackingLogic FlawsPrivilege EscalationToken ManipulationBase64 EncodingAuthorization BypassMemory ForensicsPattern RecognitionIncident ResponseTool UsageData RecoveryROT13 EncodingNetwork ReconnaissanceService DiscoveryDatabase ForensicsData EncodingCLI UsageBase64Hex EncodingRedisJenkinsCI/CDDevOpsWeb SecurityPentestAutomationSession ManagementAuthenticationPHPCryptanalysisClassical CryptoDNSPacket AnalysisData ExfiltrationBase64 DecodingLFIPassword CrackingAuthentication BypassDirectory TraversalPath ManipulationFile InclusionBlockchain AnalysisBitcoinOP_RETURNHex DecodingForensic AnalysisPDF ForensicsMetadataHidden DataForensic ToolsLSBForensicsPythonAudio AnalysisCryptographyTransposition CipherRail FenceFlaskDebug ModeMemory AnalysisPath TraversalCGIFile AccessInput ValidationLogic FlawParameter ManipulationLog AnalysisFile DiscoveryCommand Line ToolsHTTP ProtocolAttack DetectionSecurity AssessmentCommand InjectionWeb ExploitationNetwork SecuritySQL InjectionDatabase SecurityJWTToken AuthenticationAlgorithm ConfusionRS256HS256Token ForgeryXXEXML SecurityFile DisclosureExternal EntityVulnerability AssessmentClaims ManipulationTime-Based AttacksSignature CrackingXSSCross-Site ScriptingStored XSSSession HijackingClient-Side SecurityDOM ManipulationCSRFCross-Site Request ForgerySession SecuritySocial EngineeringForm SecurityHTTP SecurityState ManagementBlind SQLiTime-based SQLiBoolean-based SQLiDatabase EnumerationSSRFServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsAWS EC2File UploadBypass TechniquesWeb ShellsPost ExploitationNoSQL InjectionMongoDBVisibility ControlsAccess Control BypassSecurity TestingOperator ExploitationLocal File InclusionUser-Agent Log PoisoningRemote Code ExecutionApache SecuritySystem AdministrationPDF SecurityDictionary AttacksDocument SecurityBrute Force AttacksServer-Side Template InjectionJinja2Flask SecurityWeb Application TestingCode InjectionKeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool LimitationsPython PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksEnterprise SecurityGit ForensicsVersion Control SecurityRepository AnalysisPenetration TestingSecret RecoveryOSINTMD5 CrackingSource Code AnalysisWeb Application SecurityPassword AttacksClassical CiphersHistorical CryptanalysisJinja2 ExploitationWindows RegistryPersistence AnalysisMalware AnalysisLDAP InjectionDirectory ServicesCRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationMYSQLIRCEWeb InspectionHTML AnalysisDocument DatabasesSUID BinariesLinux SecurityBinary ExploitationWireless SecurityWEP CrackingRC4 AnalysisCryptographic AttacksLegacy Protocol ExploitationDocker Registry APIContainer SecurityAPI ManipulationRegistry ExploitationFrequency AnalysisNetwork ForensicsDNS AnalysisTraffic AnalysisGraphQLSchema IntrospectionInjectionShell CommandsHTTP Parameter ManipulationFilter BypassApache AuthenticationHTTP HeadersSecurity BypassClient-Side ManipulationDirectory EnumerationWeb ReconnaissanceAdministrative Panel DiscoveryIDORRace ConditionsTiming AttacksConcurrent ExploitationPrototype PollutionNode.js SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web VulnerabilitiesWebDAV ExploitationRemote File AccessHTTP MethodsWeb Server SecurityFile System EnumerationYAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationFile Processing SecurityPath InjectionFile System SecurityPolyalphabetic CiphersURL ManipulationInternal Network AccessProtocol BypassEmail ForensicsHeader AnalysisPhishing DetectionDigital InvestigationRequest SmugglingType JugglingHash AnalysisZIP Password CrackingJohn the RipperfcrackzipBrute ForceArchive SecurityIP SpoofingInformation GatheringCookie ManipulationWiFi SecurityWPA CrackingWireless Penetration TestingDeobfuscationCode AnalysisWeb EnumerationReconnaissanceGitVersion ControlRegex BypassSQLiteUNION-Based SQLiHash CrackingPassword AnalysisSecurity ToolsOffice SecurityHash ExtractionHashcatWindows SecurityNTLMLinux CapabilitiesReverse ShellSystem EnumerationLinuxCommand LineFile System NavigationHidden FilesgrepfindIDOR ExploitationZip Slip VulnerabilityInternal Service DiscoveryBackup Service ExploitationSudo Vim ExploitationSSTISSH Brute ForceDirectory FuzzingX-Forwarded-For SpoofingBruteforceffufNewline InjectionLinux EnumerationSUID ExploitationBuffer OverflowARM64 ROPStatic Binary AnalysispwntoolsropperGDBSSHCVE ExploitationLinux Privilege EscalationFile PermissionsApache TomcatWAR DeploymentDefault CredentialsSudoFile Upload BypassPHP SecurityWeb Shell ExploitationFTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem ExploitationIP SPOOFINGFTPGITJWT ManipulationSSH ExploitationLog InjectionhashcatTELNETLearning PathHTMLWEBNetworkingWeb Services

Completed Modules

Educational modules successfully validated

Password Cracking: Advanced Techniques for Security Assessment

10 modules
Rainbow Tables and Precomputed Attacks
1 pts Completed: Jan 17, 2026
Wireless Network Password Attacks
1 pts Completed: Jan 17, 2026
PDF Password Cracking and Document Security
1 pts Completed: Jan 17, 2026
Linux Password Cracking (Shadow Files)
1 pts Completed: Jan 17, 2026
Office Document Password Recovery
1 pts Completed: Jan 17, 2026
ZIP Archive Password Recovery
1 pts Completed: Jan 17, 2026
Brute Force and Hybrid Attack Techniques
1 pts Completed: Jan 17, 2026
Password Security Fundamentals
1 pts Completed: Jan 01, 2026
Dictionary Attacks and Wordlist Optimization
1 pts Completed: Jan 01, 2026
Windows System Password Recovery
1 pts Completed: Jan 17, 2026

Completed Labs & Challenges

Hands-on cybersecurity challenges successfully completed

Hex Hunt
Challenge
5 points Jan 17, 2026 2m
JavaScriptWeb DevelopmentHexadecimalBrowser DevTools
Stego Hunt
Challenge
5 points Jan 17, 2026 3m
SteganographyImage AnalysisWebCTF Basics
Packet Pursuit
Challenge
5 points Jan 17, 2026 11m
Network AnalysisPacket CaptureWiresharkProtocol Analysis
Get the Password
Challenge
5 points Jan 17, 2026 7m
JavaScriptMD5Rainbow TablesWeb DevelopmentBrowser DevTools
Binary Secrets
Challenge
5 points Jan 17, 2026 11m
Binary AnalysisHex EditorsData StructuresReverse EngineeringFile Analysis
QR Code Quest
Challenge
5 points Jan 17, 2026 5m
QR Code AnalysisImage AnalysisData ExtractionSteganographyDigital Forensics
API Breaker
Challenge
5 points Jan 17, 2026 5m
API SecurityWeb HackingLogic FlawsPrivilege EscalationToken ManipulationBase64 EncodingAuthorization Bypass
Memory Forensics
Challenge
5 points Jan 17, 2026 9m
Memory ForensicsBinary AnalysisDigital ForensicsPattern RecognitionIncident ResponseTool UsageData RecoveryROT13 Encoding
Red is Dead
Challenge
5 points Jan 17, 2026 9m
Network ReconnaissanceService DiscoveryDatabase ForensicsData EncodingCLI UsageData RecoveryIncident ResponseBase64Hex EncodingRedis
Snapchat Exposed
Challenge
5 points Jan 17, 2026 15m
JenkinsCI/CDDevOpsWeb SecurityPentestAutomation
Session Switch
Challenge
5 points Jan 17, 2026 5m
Web SecuritySession ManagementAuthenticationPrivilege EscalationPHP
Crypto Cipher
Challenge
5 points Jan 15, 2026 14m
CryptanalysisClassical CryptoPattern RecognitionData Encoding
DNS Exfil
Challenge
5 points Jan 15, 2026 6m
Network AnalysisDNSPacket AnalysisData ExfiltrationBase64 Decoding
Corporate Breach
Challenge
5 points Jan 15, 2026 6m
Web SecurityPHPLFIPassword CrackingAuthentication BypassDirectory Traversal
Corporate Breach 2
Challenge
5 points Jan 15, 2026 3m
Web SecurityPHPLFIPath ManipulationFile Inclusion
Blockchain Secrets
Challenge
5 points Jan 15, 2026 5m
Blockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic Analysis
PDF Trap
Challenge
5 points Jan 15, 2026 4m
PDF ForensicsFile AnalysisMetadataHidden DataForensic Tools
Pixel Puzzler
Challenge
5 points Jan 15, 2026 6m
SteganographyImage AnalysisLSBForensicsPython
Sonic Cipher
Challenge
5 points Jan 15, 2026 5m
SteganographyAudio AnalysisLSBForensicsPython
Rail Fence
Challenge
5 points Jan 15, 2026 16m
CryptographyTransposition CipherRail FencePattern RecognitionPython
Flask Error
Challenge
5 points Jan 15, 2026 3m
FlaskDebug ModePythonWeb SecurityMemory Analysis
Path Traversal
Challenge
5 points Jan 15, 2026 5m
Path TraversalCGIWeb SecurityFile AccessDirectory TraversalInput Validation
API Logic Flaw
Challenge
5 points Jan 15, 2026 9m
API SecurityLogic FlawAuthentication BypassParameter ManipulationPHPWeb Security
Log Hunter
Challenge
5 points Jan 15, 2026 13m
Log AnalysisWeb SecurityIncident ResponsePattern RecognitionFile DiscoveryCommand Line ToolsForensicsHTTP ProtocolAttack DetectionSecurity Assessment
Ping Pwn
Challenge
5 points Jan 15, 2026 19m
Command InjectionWeb ExploitationService DiscoveryNetwork Security
Auth Bypass
Challenge
5 points Jan 11, 2026 9m
SQL InjectionAuthentication BypassWeb SecurityDatabase Security
JWT Bypass
Challenge
5 points Jan 11, 2026 6m
JWTWeb SecurityToken AuthenticationCryptography
JWT Algo Confusion
Challenge
5 points Jan 11, 2026 23m
JWTAlgorithm ConfusionRS256HS256Token ForgeryWeb Security
XXE Exposed
Challenge
5 points Jan 11, 2026 6m
XXEXML SecurityFile DisclosureExternal EntityWeb SecurityVulnerability Assessment
JWT Claims Manipulation
Challenge
5 points Jan 10, 2026 22m
JWTClaims ManipulationPrivilege EscalationAuthentication BypassTime-Based AttacksSignature Cracking
XSS Playground
Challenge
5 points Jan 10, 2026 12m
XSSCross-Site ScriptingStored XSSSession HijackingJavaScriptWeb SecurityClient-Side SecurityDOM Manipulation
CSRF Bank Transfer
Challenge
5 points Jan 10, 2026 14m
CSRFCross-Site Request ForgerySession SecurityWeb SecuritySocial EngineeringForm SecurityHTTP SecurityState Management
SQL Injection
Challenge
5 points Jan 10, 2026 17m
SQL InjectionDatabase SecurityWeb SecurityBlind SQLiTime-based SQLiBoolean-based SQLiDatabase EnumerationVulnerability Assessment
URL Scanner
Challenge
5 points Jan 10, 2026 12m
SSRFServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsNetwork SecurityWeb SecurityAWS EC2
File Upload Bypass
Challenge
5 points Jan 10, 2026 44m
File UploadWeb SecurityBypass TechniquesPHPWeb ShellsInput ValidationSocial EngineeringPost Exploitation
NoSQL Injection
Challenge
5 points Jan 10, 2026 9m
NoSQL InjectionMongoDBVisibility ControlsAccess Control BypassSecurity TestingOperator Exploitation
LFI Log Poison
Challenge
5 points Jan 09, 2026 43m
Local File InclusionUser-Agent Log PoisoningRemote Code ExecutionDirectory TraversalWeb SecurityApache SecuritySystem AdministrationLog Analysis
PDF Password Cracker
Challenge
5 points Jan 08, 2026 6m
PDF SecurityPassword CrackingDictionary AttacksDigital ForensicsDocument SecurityBrute Force Attacks
Template Injection
Challenge
5 points Jan 08, 2026 5m
Server-Side Template InjectionJinja2Flask SecurityWeb Application TestingCode InjectionPrivilege Escalation
KeePass Breaker
Challenge
5 points Jan 08, 2026 15m
KeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool Limitations
Corporate Backup Deserializer
Challenge
5 points Jan 07, 2026 9m
Python PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksEnterprise Security
Git Secrets Hunter
Challenge
5 points Jan 07, 2026 16m
Git ForensicsVersion Control SecurityRepository AnalysisPenetration TestingSecret RecoveryOSINT
Admin Portal Breach
Challenge
5 points Jan 07, 2026 8m
Client-Side SecurityMD5 CrackingSource Code AnalysisWeb Application SecurityPassword AttacksAuthentication Bypass
Book Cipher Challenge
Challenge
5 points Jan 07, 2026 2m
CryptographyClassical CiphersPattern RecognitionHistorical Cryptanalysis
Template Injector
Challenge
5 points Jan 07, 2026 10m
Server-Side Template InjectionFlask SecurityJinja2 ExploitationRemote Code ExecutionWeb Security
Registry Hunter
Challenge
5 points Jan 07, 2026 4m
Digital ForensicsWindows RegistryPersistence AnalysisBase64 DecodingIncident ResponseMalware Analysis
LDAP Injector
Challenge
5 points Jan 07, 2026 6m
LDAP InjectionAuthentication BypassDirectory ServicesEnterprise SecurityWeb Security
Redis Cache Poisoner
Challenge
5 points Jan 07, 2026 43m
CRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationWeb Security
Query Quake
Medium
40 points Jan 07, 2026 1h 13m
MYSQLIRCE
Base64 Detective
Challenge
5 points Jan 06, 2026 11m
Base64Web InspectionBrowser DevToolsData EncodingHTML Analysis
MongoDB Injector
Challenge
5 points Jan 06, 2026 15m
NoSQL InjectionMongoDBAuthentication BypassDocument DatabasesWeb Security
SUID Privilege Hunter
Challenge
5 points Jan 06, 2026 19m
SUID BinariesPrivilege EscalationCommand InjectionLinux SecurityBinary Exploitation
WEP Cracker
Challenge
5 points Jan 06, 2026 30m
Wireless SecurityWEP CrackingRC4 AnalysisPacket AnalysisCryptographic AttacksLegacy Protocol Exploitation
Registry Hijacker
Challenge
5 points Jan 06, 2026 3m
Docker Registry APIAuthentication BypassContainer SecurityAPI ManipulationRegistry Exploitation
Caesar Shift Decoder
Challenge
5 points Jan 06, 2026 22m
CryptographyClassical CiphersFrequency AnalysisPattern Recognition
DNS Tunneling Detective
Challenge
5 points Jan 06, 2026 13m
Network ForensicsDNS AnalysisData ExfiltrationTraffic Analysis
GraphQL Gateway
Challenge
5 points Jan 06, 2026 6m
GraphQLAPI SecuritySchema IntrospectionAuthorization BypassInjection
Shell Command Scanner
Challenge
5 points Jan 06, 2026 15m
Command InjectionWeb SecurityShell CommandsSystem AdministrationHTTP Parameter ManipulationSecurity Assessment
File Include Bypass
Challenge
5 points Jan 06, 2026 31m
Local File InclusionFilter BypassApache AuthenticationPassword Cracking
Header Hijacker
Challenge
5 points Jan 05, 2026 13m
HTTP HeadersSecurity BypassWeb Application SecurityClient-Side Manipulation
Corporate Directory Hunt
Challenge
5 points Jan 05, 2026 5m
Directory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity Assessment
IDOR Explorer
Challenge
5 points Jan 05, 2026 4m
IDORParameter ManipulationWeb Application SecurityAuthorization Bypass
Race Condition Hunter
Challenge
5 points Jan 05, 2026 1h 15m
Race ConditionsTiming AttacksConcurrent ExploitationWeb Application Security
Prototype Pollution Hunter
Challenge
5 points Jan 05, 2026 12m
Prototype PollutionNode.js SecurityAPI SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web Vulnerabilities
WebDAV Explorer
Challenge
5 points Jan 05, 2026 33m
WebDAV ExploitationFile UploadDirectory TraversalRemote File AccessHTTP MethodsWeb Server SecurityFile System Enumeration
YAML Bomb
Challenge
5 points Jan 05, 2026 52m
YAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing Security
Simple Directory Traversal
Challenge
5 points Jan 05, 2026 14m
Directory TraversalPath InjectionFile System SecurityWeb SecurityInput ValidationPath ManipulationFile Access
Vigenere Stego Hunt
Challenge
5 points Jan 05, 2026 35m
CryptographySteganographyClassical CiphersImage AnalysisPolyalphabetic Ciphers
SSRF Validator
Challenge
5 points Jan 05, 2026 17m
SSRFWeb SecurityURL ManipulationInternal Network AccessProtocol Bypass
Email Header Forensics
Challenge
5 points Jan 05, 2026 5m
Email ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital Investigation
HTTP Smuggling
Challenge
5 points Jan 05, 2026 4m
HTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisWeb SecurityPacket Analysis
Type Juggling Bypass
Challenge
5 points Jan 05, 2026 2m
Web SecurityPHPType JugglingAuthentication BypassHash Analysis
ZIP Cracker
Challenge
5 points Jan 04, 2026 3m
ZIP Password CrackingJohn the RipperfcrackzipDictionary AttacksBrute ForceArchive Security
Button Activator
Challenge
5 points Jan 04, 2026 2m
JavaScriptBrowser DevToolsDOM ManipulationClient-Side Security
IP Spoofing Admin
Challenge
5 points Jan 04, 2026 9m
Web SecurityHTTP HeadersIP SpoofingAccess Control BypassInformation Gathering
Cookie Forge
Challenge
5 points Jan 04, 2026 20m
JWTCookie ManipulationAuthentication BypassPrivilege Escalation
WiFi Password Cracker
Challenge
5 points Jan 04, 2026 13m
WiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingNetwork SecurityPacket Analysis
Hack This Site
Challenge
5 points Jan 04, 2026 3m
JavaScriptDeobfuscationClient-Side SecurityBrowser DevToolsCode AnalysisAuthentication Bypass
SQL Injection Test
Challenge
5 points Jan 04, 2026 2m
SQL InjectionWeb SecurityDatabase SecurityAuthentication BypassInput ValidationPenetration Testing
Backup Hunter
Challenge
5 points Jan 04, 2026 33m
Web EnumerationFile DiscoveryReconnaissanceInformation Gathering
Git Exposed
Challenge
5 points Jan 04, 2026 28m
GitVersion ControlSource Code AnalysisReconnaissanceWeb Security
Regex Bypass to SQLi
Challenge
5 points Jan 04, 2026 25m
SQL InjectionRegex BypassInput ValidationWeb Application SecuritySQLiteUNION-Based SQLi
Crack SHA1 Hash
Challenge
5 points Jan 04, 2026 3m
CryptographyHash CrackingPassword AnalysisSecurity Tools
Office Password Cracker
Challenge
5 points Jan 03, 2026 8m
Password CrackingOffice SecurityHash ExtractionJohn the RipperHashcat
Windows Password Cracker
Challenge
5 points Jan 03, 2026 9m
Password CrackingWindows SecurityNTLMHashcatJohn the RipperHash Analysis
Internal
Hard
70 points Jan 03, 2026 40m
Command InjectionLinux CapabilitiesPrivilege EscalationReverse ShellWeb Application SecuritySystem EnumerationNetwork Reconnaissance
Linux Fundamentals Practice
Challenge
5 points Jan 03, 2026 17m
LinuxCommand LineFile System NavigationHidden Filesgrepfind
Broken Chain
Hard
70 points Dec 31, 2025 1h 22m
IDOR ExploitationZip Slip VulnerabilityServer-Side Template InjectionInternal Service DiscoveryBackup Service ExploitationPrivilege EscalationSudo Vim Exploitation
FortiPy
Hard
70 points Dec 31, 2025 43m
Web Application SecuritySSTIFlask SecuritySSH Brute ForceDatabase EnumerationHash CrackingPrivilege Escalation
Hack the Box
Hard
70 points Dec 31, 2025 2h 36m
Directory FuzzingX-Forwarded-For SpoofingBruteforceffufCommand InjectionNewline InjectionWeb SecurityLinux EnumerationSUID ExploitationBuffer OverflowARM64 ROPStatic Binary AnalysisBinary ExploitationpwntoolsropperGDB
TechNova Infiltration
Medium
40 points Dec 30, 2025 1h 3m
Web EnumerationSSHPassword CrackingPrivilege EscalationLinux SecurityCVE Exploitation
Alpwned
Medium
40 points Dec 30, 2025 19m
SQL InjectionAuthentication BypassSSHLinux Privilege EscalationFile PermissionsWeb Application Security
Compromised 1
Medium
40 points Dec 30, 2025 1h 13m
Apache TomcatWeb Application SecurityWAR DeploymentDefault CredentialsPrivilege EscalationLinuxSudoWeb Shells
Matsudo
Medium
40 points Dec 30, 2025 53m
SSHBrute ForcePrivilege EscalationLinuxSudoNetwork ReconnaissancePenetration Testing
Beyond Echo
Medium
20 points Dec 29, 2025 1h 17m
PHPRCE
Hidden CMS Breach
Medium
40 points Dec 28, 2025 4h 10m
Web EnumerationWeb SecurityAuthenticationRCEPrivilege EscalationLinux
FiPloit
Easy
20 points Dec 23, 2025 2h 2m
Local File InclusionFile Upload BypassPHP SecurityDirectory TraversalWeb Shell ExploitationPrivilege EscalationLog Analysis
Anonymous 2
Easy
10 points Dec 15, 2025 12m
FTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem Exploitation
Spoof!
Easy
10 points Dec 15, 2025 1h 27m
IP SPOOFING
Anonymous
Easy
10 points Dec 15, 2025 6m
FTP
Traversed
Medium
40 points Dec 15, 2025 1h 6m
GIT
Infiltrator
Easy
20 points Dec 14, 2025 3h 36m
JWT ManipulationSSH ExploitationLog InjectionPrivilege EscalationWeb SecurityLinux Security
Shadow Cracker
Challenge
5 points Dec 09, 2025 17m
Password CrackingLinux SecurityJohn the RipperhashcatCryptography
Nmap Lab 102
Very Easy
10 points Dec 09, 2025 39m
TELNETLearning Path
Secrets in Source 2
Very Easy
5 points Dec 09, 2025 20m
Web SecurityHTMLBrowser DevToolsClient-Side SecuritySource Code AnalysisLearning Path
Hack the Cookie
Very Easy
5 points Dec 07, 2025 38m
WEBLearning Path
Hack the Login
Very Easy
5 points Dec 07, 2025 6m
WebAuthenticationClient-Side SecurityLearning Path
Onboarding Lab: Access and Flags
Very Easy
5 points Dec 07, 2025
NetworkingReconnaissanceCommand LineWeb ServicesLearning Path
Include me
Easy
10 points Jan 02, 2025 1h 0m
PHPLFI
Secrets in Source
Very Easy
5 points Jan 02, 2025 1h 0m
HTMLLearning Path

Courses Progress

Your learning paths and modules

Join 5,000+ hackers learning cybersecurity with hands-on labs. Create Account