Profile Avatar

skalvin

Grandmaster
Lebanon Joined May 2025

Live Ranking

#6

Best: #6

Total Points

1408

Total Earned

Labs Completed

115

115 User • 18 Root

Modules

62

Validated

First Bloods

1

First to Complete

Best Streak

27

Days

Skills Acquired

Technical skills practiced through completed labs

LinuxCommand LineFile System NavigationHidden FilesgrepfindAdvanced ReconnaissanceAndroid Reverse EngineeringSCADA ExploitationCVE ExploitationAuthentication BypassPrivilege EscalationJavaScriptWeb DevelopmentHexadecimalBrowser DevToolsSteganographyImage AnalysisWebCTF BasicsNetwork AnalysisPacket CaptureWiresharkProtocol AnalysisBinary AnalysisHex EditorsData StructuresReverse EngineeringFile AnalysisAPI SecurityWeb HackingLogic FlawsToken ManipulationBase64 EncodingAuthorization BypassMemory ForensicsDigital ForensicsPattern RecognitionIncident ResponseTool UsageData RecoveryROT13 EncodingWeb SecuritySession ManagementAuthenticationPHPFile UploadBypass TechniquesWeb ShellsInput ValidationSocial EngineeringPost ExploitationAudio AnalysisLSBForensicsPythonKeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool LimitationsJWTAlgorithm ConfusionRS256HS256Token ForgeryLogic FlawParameter ManipulationMD5Rainbow TablesDirectory FuzzingX-Forwarded-For SpoofingBruteforceffufCommand InjectionNewline InjectionLinux EnumerationSUID ExploitationBuffer OverflowARM64 ROPStatic Binary AnalysisBinary ExploitationpwntoolsropperGDBWeb EnumerationRCEWPHTMLClient-Side SecuritySource Code AnalysisLearning PathIDOR ExploitationZip Slip VulnerabilityServer-Side Template InjectionInternal Service DiscoveryBackup Service ExploitationSudo Vim ExploitationPassword CrackingLinux SecurityJohn the RipperhashcatCryptographySSHWindows SecurityNTLMHashcatHash AnalysisOffice SecurityHash ExtractionSQL InjectionRegex BypassWeb Application SecuritySQLiteUNION-Based SQLiGitVersion ControlReconnaissanceFile DiscoveryInformation GatheringType JugglingHash CrackingPassword AnalysisSecurity ToolsDatabase SecurityPenetration TestingDeobfuscationCode AnalysisHTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisPacket AnalysisEmail ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital InvestigationSSRFURL ManipulationInternal Network AccessProtocol BypassSSTIFlask SecuritySSH Brute ForceDatabase EnumerationClassical CiphersPolyalphabetic CiphersDirectory TraversalPath InjectionFile System SecurityPath ManipulationFile AccessYAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing SecurityWebDAV ExploitationRemote File AccessHTTP MethodsWeb Server SecurityFile System EnumerationPrototype PollutionNode.js SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web VulnerabilitiesRace ConditionsTiming AttacksConcurrent ExploitationIDORHTTP HeadersSecurity BypassClient-Side ManipulationDirectory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity AssessmentLocal File InclusionFilter BypassApache AuthenticationCookie ManipulationDOM ManipulationFilter EvasionGraphQLSchema IntrospectionInjectionDNS AnalysisData ExfiltrationFrequency AnalysisDocker Registry APIContainer SecurityAPI ManipulationRegistry ExploitationSUID BinariesNoSQL InjectionMongoDBDocument DatabasesCRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationLDAP InjectionDirectory ServicesEnterprise SecurityJWT ManipulationSSH ExploitationLog InjectionPython PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksIP SpoofingAccess Control BypassJinja2 ExploitationWiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingNetwork SecurityWireless SecurityWEP CrackingRC4 AnalysisCryptographic AttacksLegacy Protocol ExploitationWindows RegistryPersistence AnalysisMalware AnalysisHistorical CryptanalysisMD5 CrackingPassword AttacksGit ForensicsVersion Control SecurityRepository AnalysisSecret RecoveryZIP Password CrackingfcrackzipBrute ForceArchive SecurityJinja2Web Application TestingCode InjectionPDF SecurityDocument SecurityBrute Force AttacksShell CommandsSystem AdministrationHTTP Parameter ManipulationUser-Agent Log PoisoningApache SecurityLog AnalysisVisibility ControlsSecurity TestingOperator ExploitationLinux CapabilitiesReverse ShellSystem EnumerationNetwork ReconnaissanceServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsAWS EC2Linux Privilege EscalationFile PermissionsCSRFCross-Site Request ForgerySession SecurityForm SecurityHTTP SecurityState ManagementXSSCross-Site ScriptingStored XSSSession HijackingPath TraversalCGIClaims ManipulationTime-Based AttacksSignature CrackingBlind SQLiTime-based SQLiBoolean-based SQLiVulnerability AssessmentXXEXML SecurityFile DisclosureExternal EntityToken AuthenticationWeb ExploitationService DiscoveryCommand Line ToolsAttack DetectionFlaskDebug ModeMemory AnalysisTransposition CipherRail FencePDF ForensicsMetadataHidden DataForensic ToolsBlockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic AnalysisLFIFile InclusionDNSCryptanalysisClassical CryptoData EncodingJenkinsCI/CDDevOpsPentestAutomationDatabase ForensicsCLI UsageBase64Hex EncodingRedisQR Code AnalysisMYSQLIWeb InspectionHTML AnalysisWEBFile Upload BypassPHP SecurityWeb Shell ExploitationApache TomcatWAR DeploymentDefault CredentialsSudoGITTELNETFTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem ExploitationFTPNetworkingWeb ServicesIP SPOOFING

Completed Modules

Educational modules successfully validated

Nmap Mastery: Dominate Network Scanning

4 modules
Installing Nmap
1 pts Completed: Dec 24, 2025
Advanced Techniques
1 pts Completed: Dec 24, 2025
Introduction to Nmap
1 pts Completed: May 29, 2025
Essential Nmap Scanning
1 pts Completed: Dec 24, 2025

HTTP Header Manipulation: IP Spoofing

3 modules
Remediate
1 pts Completed: Dec 24, 2025
Techniques for IP Spoofing in HTTP Headers
1 pts Completed: Dec 24, 2025
Manipulating Headers
1 pts Completed: May 29, 2025

Password Cracking: Advanced Techniques for Security Assessment

10 modules
Rainbow Tables and Precomputed Attacks
1 pts Completed: Dec 24, 2025
Wireless Network Password Attacks
1 pts Completed: Dec 24, 2025
PDF Password Cracking and Document Security
1 pts Completed: Dec 31, 2025
Linux Password Cracking (Shadow Files)
1 pts Completed: Dec 24, 2025
Office Document Password Recovery
1 pts Completed: Dec 24, 2025
ZIP Archive Password Recovery
1 pts Completed: Dec 31, 2025
Brute Force and Hybrid Attack Techniques
1 pts Completed: Aug 28, 2025
Password Security Fundamentals
1 pts Completed: Aug 21, 2025
Dictionary Attacks and Wordlist Optimization
1 pts Completed: Aug 22, 2025
Windows System Password Recovery
1 pts Completed: Dec 24, 2025

Network Penetration Testing: From Reconnaissance to Shell Access

10 modules
Active Information Gathering
1 pts Completed: Dec 31, 2025
Post-Exploitation Basics
1 pts Completed: Dec 31, 2025
Pivoting & Port Forwarding
1 pts Completed: Dec 31, 2025
Exploiting Network Services
1 pts Completed: Dec 31, 2025
Reporting & Documentation
1 pts Completed: Dec 31, 2025
Password Attacks on Network Services
1 pts Completed: Dec 31, 2025
Man-in-the-Middle Attacks
1 pts Completed: Dec 31, 2025
Vulnerability Scanning
1 pts Completed: Dec 31, 2025
Network Fundamentals for Pentesters
1 pts Completed: Dec 24, 2025
Service Enumeration & Banner Grabbing
1 pts Completed: Dec 31, 2025

Cybersecurity Tools Cheat Sheets: Quick Reference Commands and Techniques

10 modules
Hydra Cheat Sheet
1 pts Completed: Jan 04, 2026
Nikto Cheat Sheet
1 pts Completed: Jan 07, 2026
John the Ripper Cheat Sheet
1 pts Completed: Jan 15, 2026
SQLMap Cheat Sheet
1 pts Completed: Jan 07, 2026
Wireshark Cheat Sheet
1 pts Completed: Jan 15, 2026
Burp Suite Cheat Sheet
1 pts Completed: Jan 04, 2026
Gobuster Cheat Sheet
1 pts Completed: Jan 07, 2026
Nmap Cheat Sheet
1 pts Completed: Jan 01, 2026
Hashcat Cheat Sheet
1 pts Completed: Jan 15, 2026
Metasploit Cheat Sheet
1 pts Completed: Jan 04, 2026

HDNA Ethical Hacking Course

5 modules
1. Legal & Compliance
1 pts Completed: Dec 24, 2025
2. Network Protocols and Security
1 pts Completed: Dec 24, 2025
4. Network Scanning
1 pts Completed: Dec 24, 2025
3. Reconnaissance
1 pts Completed: Dec 24, 2025
Course Summary
1 pts Completed: May 29, 2025

Web Application Security: Exploitation and Defense

12 modules
Cross-Site Request Forgery
1 pts Completed: Dec 24, 2025
XML External Entity Injection
1 pts Completed: Dec 24, 2025
Server-Side Request Forgery
1 pts Completed: Dec 24, 2025
Local and Remote File Inclusion
1 pts Completed: Dec 24, 2025
Course Introduction
1 pts Completed: Dec 24, 2025
Server-Side Template Injection
1 pts Completed: Aug 14, 2025
Deserialization Attacks
1 pts Completed: Aug 16, 2025
File Upload Exploitation
1 pts Completed: Dec 24, 2025
Cross-Site Scripting
1 pts Completed: Dec 24, 2025
Authentication Bypass
1 pts Completed: Dec 24, 2025
SQL Injection
1 pts Completed: Dec 24, 2025
Command Injection
1 pts Completed: Aug 13, 2025

JWT Ethical Hacking: Token Takeover Tactics

4 modules
Introduction to JWT Tokens
1 pts Completed: Aug 13, 2025
Claims Manipulation and Time-Based Attacks
1 pts Completed: Dec 24, 2025
Secret Key Brute Forcing
1 pts Completed: Dec 24, 2025
Algorithm Confusion Exploits
1 pts Completed: Dec 24, 2025

Remote Code Execution (RCE)

3 modules
Shellshock (CVE-2014-6271)
1 pts Completed: Dec 24, 2025
RCE: Introduction
1 pts Completed: May 29, 2025
RCE in PHP
1 pts Completed: Dec 24, 2025

CVE

1 modules
CVE-2024-34899
0 pts Completed: May 29, 2025

Completed Labs & Challenges

Hands-on cybersecurity challenges successfully completed

Linux Fundamentals Practice
Challenge
5 points Jan 04, 2026 3m
LinuxCommand LineFile System NavigationHidden Filesgrepfind
Compromised 2
Hard
70 points Dec 31, 2025 4h 35m
Advanced ReconnaissanceAndroid Reverse EngineeringSCADA ExploitationCVE ExploitationAuthentication BypassPrivilege Escalation
Hex Hunt
Challenge
5 points Dec 31, 2025
JavaScriptWeb DevelopmentHexadecimalBrowser DevTools
Stego Hunt
Challenge
5 points Dec 31, 2025 3m
SteganographyImage AnalysisWebCTF Basics
Packet Pursuit
Challenge
5 points Dec 31, 2025 2m
Network AnalysisPacket CaptureWiresharkProtocol Analysis
Binary Secrets
Challenge
5 points Dec 31, 2025
Binary AnalysisHex EditorsData StructuresReverse EngineeringFile Analysis
API Breaker
Challenge
5 points Dec 31, 2025
API SecurityWeb HackingLogic FlawsPrivilege EscalationToken ManipulationBase64 EncodingAuthorization Bypass
Memory Forensics
Challenge
5 points Dec 31, 2025
Memory ForensicsBinary AnalysisDigital ForensicsPattern RecognitionIncident ResponseTool UsageData RecoveryROT13 Encoding
Session Switch
Challenge
5 points Dec 31, 2025 1m
Web SecuritySession ManagementAuthenticationPrivilege EscalationPHP
File Upload Bypass
Challenge
5 points Dec 31, 2025 1h 0m
File UploadWeb SecurityBypass TechniquesPHPWeb ShellsInput ValidationSocial EngineeringPost Exploitation
Sonic Cipher
Challenge
5 points Dec 31, 2025 1h 0m
SteganographyAudio AnalysisLSBForensicsPython
KeePass Breaker
Challenge
5 points Dec 31, 2025 2h 3m
KeePass 4.x SecurityDirect Brute ForcePassword Manager AssessmentModern CryptographySecurity Tool Limitations
JWT Algo Confusion
Challenge
5 points Dec 31, 2025 1h 7m
JWTAlgorithm ConfusionRS256HS256Token ForgeryWeb Security
API Logic Flaw
Challenge
5 points Dec 31, 2025 3h 13m
API SecurityLogic FlawAuthentication BypassParameter ManipulationPHPWeb Security
Get the Password
Challenge
5 points Dec 31, 2025 1m
JavaScriptMD5Rainbow TablesWeb DevelopmentBrowser DevTools
Hack the Box
Hard
70 points Dec 16, 2025 2h 15m
Directory FuzzingX-Forwarded-For SpoofingBruteforceffufCommand InjectionNewline InjectionWeb SecurityLinux EnumerationSUID ExploitationBuffer OverflowARM64 ROPStatic Binary AnalysisBinary ExploitationpwntoolsropperGDB
Hidden CMS Breach
Medium
40 points Dec 02, 2025 2h 7m
Web EnumerationWeb SecurityAuthenticationRCEPrivilege EscalationLinux
WP Ultimate
Hard
70 points Nov 17, 2025 3h 56m
WP
Secrets in Source 2
Very Easy
5 points Nov 17, 2025 1m
Web SecurityHTMLBrowser DevToolsClient-Side SecuritySource Code AnalysisLearning Path
Broken Chain
Hard
70 points Nov 16, 2025 15h 45m
IDOR ExploitationZip Slip VulnerabilityServer-Side Template InjectionInternal Service DiscoveryBackup Service ExploitationPrivilege EscalationSudo Vim Exploitation
Shadow Cracker
Challenge
5 points Nov 12, 2025 4m
Password CrackingLinux SecurityJohn the RipperhashcatCryptography
TechNova Infiltration
Medium
40 points Nov 10, 2025 1h 9m
Web EnumerationSSHPassword CrackingPrivilege EscalationLinux SecurityCVE Exploitation
Windows Password Cracker
Challenge
5 points Nov 05, 2025 3m
Password CrackingWindows SecurityNTLMHashcatJohn the RipperHash Analysis
Office Password Cracker
Challenge
5 points Oct 30, 2025 6m
Password CrackingOffice SecurityHash ExtractionJohn the RipperHashcat
Regex Bypass to SQLi
Challenge
5 points Oct 27, 2025 6m
SQL InjectionRegex BypassInput ValidationWeb Application SecuritySQLiteUNION-Based SQLi
Git Exposed
Challenge
5 points Oct 22, 2025 11m
GitVersion ControlSource Code AnalysisReconnaissanceWeb Security
Backup Hunter
Challenge
5 points Oct 18, 2025 1h 13m
Web EnumerationFile DiscoveryReconnaissanceInformation Gathering
Type Juggling Bypass
Challenge
5 points Oct 14, 2025 1m
Web SecurityPHPType JugglingAuthentication BypassHash Analysis
Crack SHA1 Hash
Challenge
5 points Oct 09, 2025
CryptographyHash CrackingPassword AnalysisSecurity Tools
SQL Injection Test
Challenge
5 points Oct 08, 2025
SQL InjectionWeb SecurityDatabase SecurityAuthentication BypassInput ValidationPenetration Testing
Hack This Site
Challenge
5 points Oct 07, 2025 1m
JavaScriptDeobfuscationClient-Side SecurityBrowser DevToolsCode AnalysisAuthentication Bypass
HTTP Smuggling
Challenge
5 points Oct 07, 2025
HTTP ProtocolRequest SmugglingNetwork ForensicsTraffic AnalysisWeb SecurityPacket Analysis
Email Header Forensics
Challenge
5 points Oct 03, 2025 3m
Email ForensicsHeader AnalysisPhishing DetectionBase64 DecodingOSINTDigital Investigation
SSRF Validator
Challenge
5 points Oct 03, 2025 12m
SSRFWeb SecurityURL ManipulationInternal Network AccessProtocol Bypass
FortiPy
Hard
70 points Oct 01, 2025 1h 53m
Web Application SecuritySSTIFlask SecuritySSH Brute ForceDatabase EnumerationHash CrackingPrivilege Escalation
Vigenere Stego Hunt
Challenge
5 points Sep 30, 2025 2m
CryptographySteganographyClassical CiphersImage AnalysisPolyalphabetic Ciphers
Simple Directory Traversal
Challenge
5 points Sep 29, 2025 8m
Directory TraversalPath InjectionFile System SecurityWeb SecurityInput ValidationPath ManipulationFile Access
YAML Bomb
Challenge
5 points Sep 26, 2025 7m
YAML DeserializationPyYAML ExploitationConfiguration InjectionPython SecurityUnsafe DeserializationRemote Code ExecutionFile Processing Security
WebDAV Explorer
Challenge
5 points Sep 25, 2025 1h 56m
WebDAV ExploitationFile UploadDirectory TraversalRemote File AccessHTTP MethodsWeb Server SecurityFile System Enumeration
Prototype Pollution Hunter
Challenge
5 points Sep 24, 2025 5m
Prototype PollutionNode.js SecurityAPI SecurityJavaScript ExploitationObject ManipulationInput Validation BypassModern Web Vulnerabilities
Race Condition Hunter
Challenge
5 points Sep 23, 2025 1h 15m
Race ConditionsTiming AttacksConcurrent ExploitationWeb Application Security
IDOR Explorer
Challenge
5 points Sep 22, 2025 4m
IDORParameter ManipulationWeb Application SecurityAuthorization Bypass
Header Hijacker
Challenge
5 points Sep 19, 2025 7m
HTTP HeadersSecurity BypassWeb Application SecurityClient-Side Manipulation
Corporate Directory Hunt
Challenge
5 points Sep 18, 2025 19m
Directory EnumerationWeb ReconnaissanceAdministrative Panel DiscoverySecurity Assessment
File Include Bypass
Challenge
5 points Sep 17, 2025 1h 8m
Local File InclusionFilter BypassApache AuthenticationPassword Cracking
Cookie Forge
Challenge
5 points Sep 16, 2025 1h 27m
JWTCookie ManipulationAuthentication BypassPrivilege Escalation
Button Activator
Challenge
5 points Sep 15, 2025 1m
JavaScriptBrowser DevToolsDOM ManipulationClient-Side Security
RCE Playground
Medium
20 points Sep 12, 2025 5h 34m
Command InjectionInput Validation BypassRemote Code ExecutionFilter EvasionWeb Security
GraphQL Gateway
Challenge
5 points Sep 12, 2025 12m
GraphQLAPI SecuritySchema IntrospectionAuthorization BypassInjection
DNS Tunneling Detective
Challenge
5 points Sep 11, 2025 2m
Network ForensicsDNS AnalysisData ExfiltrationTraffic Analysis
Caesar Shift Decoder
Challenge
5 points Sep 10, 2025 1m
CryptographyClassical CiphersFrequency AnalysisPattern Recognition
Registry Hijacker
Challenge
5 points Sep 09, 2025 2m
Docker Registry APIAuthentication BypassContainer SecurityAPI ManipulationRegistry Exploitation
SUID Privilege Hunter
Challenge
5 points Sep 08, 2025 3m
SUID BinariesPrivilege EscalationCommand InjectionLinux SecurityBinary Exploitation
MongoDB Injector
Challenge
5 points Sep 05, 2025 6m
NoSQL InjectionMongoDBAuthentication BypassDocument DatabasesWeb Security
Redis Cache Poisoner
Challenge
5 points Sep 04, 2025 10m
CRLF InjectionRedis Command InjectionCache PoisoningProtocol ManipulationWeb Security
LDAP Injector
Challenge
5 points Sep 03, 2025 5m
LDAP InjectionAuthentication BypassDirectory ServicesEnterprise SecurityWeb Security
Infiltrator
Easy
20 points Sep 01, 2025 55m
JWT ManipulationSSH ExploitationLog InjectionPrivilege EscalationWeb SecurityLinux Security
Corporate Backup Deserializer
Challenge
5 points Sep 01, 2025 1h 10m
Python PickleEnterprise DeserializationCorporate Backup SystemsDisaster Recovery ExploitationConfiguration Import AttacksEnterprise Security
IP Spoofing Admin
Challenge
5 points Sep 01, 2025 3h 57m
Web SecurityHTTP HeadersIP SpoofingAccess Control BypassInformation Gathering
Template Injector
Challenge
5 points Sep 01, 2025 34m
Server-Side Template InjectionFlask SecurityJinja2 ExploitationRemote Code ExecutionWeb Security
WiFi Password Cracker
Challenge
5 points Aug 27, 2025 1h 55m
WiFi SecurityWPA CrackingDictionary AttacksWireless Penetration TestingNetwork SecurityPacket Analysis
WEP Cracker
Challenge
5 points Aug 27, 2025 3m
Wireless SecurityWEP CrackingRC4 AnalysisPacket AnalysisCryptographic AttacksLegacy Protocol Exploitation
Registry Hunter
Challenge
5 points Aug 26, 2025 40m
Digital ForensicsWindows RegistryPersistence AnalysisBase64 DecodingIncident ResponseMalware Analysis
Book Cipher Challenge
Challenge
5 points Aug 23, 2025 13m
CryptographyClassical CiphersPattern RecognitionHistorical Cryptanalysis
Admin Portal Breach
Challenge
5 points Aug 21, 2025 1m
Client-Side SecurityMD5 CrackingSource Code AnalysisWeb Application SecurityPassword AttacksAuthentication Bypass
Git Secrets Hunter
Challenge
5 points Aug 20, 2025 10m
Git ForensicsVersion Control SecurityRepository AnalysisPenetration TestingSecret RecoveryOSINT
ZIP Cracker
Challenge
5 points Aug 19, 2025 14m
ZIP Password CrackingJohn the RipperfcrackzipDictionary AttacksBrute ForceArchive Security
Template Injection
Challenge
5 points Aug 14, 2025 1h 0m
Server-Side Template InjectionJinja2Flask SecurityWeb Application TestingCode InjectionPrivilege Escalation
PDF Password Cracker
Challenge
5 points Aug 13, 2025 1h 6m
PDF SecurityPassword CrackingDictionary AttacksDigital ForensicsDocument SecurityBrute Force Attacks
Shell Command Scanner
Challenge
5 points Aug 12, 2025 1h 2m
Command InjectionWeb SecurityShell CommandsSystem AdministrationHTTP Parameter ManipulationSecurity Assessment
LFI Log Poison
Challenge
5 points Aug 11, 2025 1h 0m
Local File InclusionUser-Agent Log PoisoningRemote Code ExecutionDirectory TraversalWeb SecurityApache SecuritySystem AdministrationLog Analysis
NoSQL Injection
Challenge
5 points Aug 08, 2025 2h 0m
NoSQL InjectionMongoDBVisibility ControlsAccess Control BypassSecurity TestingOperator Exploitation
Internal
Hard
70 points Aug 06, 2025 11h 29m
Command InjectionLinux CapabilitiesPrivilege EscalationReverse ShellWeb Application SecuritySystem EnumerationNetwork Reconnaissance
URL Scanner
Challenge
5 points Aug 06, 2025 1h 15m
SSRFServer-Side Request ForgeryAWS MetadataCloud SecurityIAM CredentialsNetwork SecurityWeb SecurityAWS EC2
Alpwned
Medium
40 points Aug 05, 2025 9h 34m
SQL InjectionAuthentication BypassSSHLinux Privilege EscalationFile PermissionsWeb Application Security
CSRF Bank Transfer
Challenge
5 points Aug 05, 2025 1h 0m
CSRFCross-Site Request ForgerySession SecurityWeb SecuritySocial EngineeringForm SecurityHTTP SecurityState Management
XSS Playground
Challenge
5 points Aug 04, 2025 1h 0m
XSSCross-Site ScriptingStored XSSSession HijackingJavaScriptWeb SecurityClient-Side SecurityDOM Manipulation
Path Traversal
Challenge
5 points Aug 02, 2025 4h 0m
Path TraversalCGIWeb SecurityFile AccessDirectory TraversalInput Validation
JWT Claims Manipulation
Challenge
5 points Jul 31, 2025 1h 0m
JWTClaims ManipulationPrivilege EscalationAuthentication BypassTime-Based AttacksSignature Cracking
SQL Injection
Challenge
5 points Jul 30, 2025 2h 0m
SQL InjectionDatabase SecurityWeb SecurityBlind SQLiTime-based SQLiBoolean-based SQLiDatabase EnumerationVulnerability Assessment
XXE Exposed
Challenge
5 points Jul 29, 2025 1h 0m
XXEXML SecurityFile DisclosureExternal EntityWeb SecurityVulnerability Assessment
JWT Bypass
Challenge
5 points Jul 25, 2025 1h 0m
JWTWeb SecurityToken AuthenticationCryptography
Auth Bypass
Challenge
5 points Jul 24, 2025 1h 0m
SQL InjectionAuthentication BypassWeb SecurityDatabase Security
Ping Pwn
Challenge
5 points Jul 23, 2025 18m
Command InjectionWeb ExploitationService DiscoveryNetwork Security
Log Hunter
Challenge
5 points Jul 22, 2025 1h 0m
Log AnalysisWeb SecurityIncident ResponsePattern RecognitionFile DiscoveryCommand Line ToolsForensicsHTTP ProtocolAttack DetectionSecurity Assessment
Flask Error
Challenge
5 points Jul 17, 2025 2h 0m
FlaskDebug ModePythonWeb SecurityMemory Analysis
Rail Fence
Challenge
5 points Jul 16, 2025 1h 0m
CryptographyTransposition CipherRail FencePattern RecognitionPython
Pixel Puzzler
Challenge
5 points Jul 14, 2025 1h 0m
SteganographyImage AnalysisLSBForensicsPython
PDF Trap
Challenge
5 points Jul 11, 2025 1h 0m
PDF ForensicsFile AnalysisMetadataHidden DataForensic Tools
Blockchain Secrets
Challenge
5 points Jul 10, 2025 1h 0m
Blockchain AnalysisBitcoinOP_RETURNHex DecodingData ExtractionForensic Analysis
Corporate Breach 2
Challenge
5 points Jul 09, 2025 1h 0m
Web SecurityPHPLFIPath ManipulationFile Inclusion
Corporate Breach
Challenge
5 points Jul 08, 2025 1h 0m
Web SecurityPHPLFIPassword CrackingAuthentication BypassDirectory Traversal
DNS Exfil
Challenge
5 points Jul 07, 2025 33m
Network AnalysisDNSPacket AnalysisData ExfiltrationBase64 Decoding
Crypto Cipher
Challenge
5 points Jul 04, 2025 1h 0m
CryptanalysisClassical CryptoPattern RecognitionData Encoding
Snapchat Exposed
Challenge
5 points Jul 02, 2025 1h 0m
JenkinsCI/CDDevOpsWeb SecurityPentestAutomation
Red is Dead
Challenge
5 points Jun 30, 2025 1h 0m
Network ReconnaissanceService DiscoveryDatabase ForensicsData EncodingCLI UsageData RecoveryIncident ResponseBase64Hex EncodingRedis
QR Code Quest
Challenge
5 points Jun 25, 2025 1h 0m
QR Code AnalysisImage AnalysisData ExtractionSteganographyDigital Forensics
Query Quake
Medium
40 points Jun 25, 2025 12h 50m
MYSQLIRCE
Base64 Detective
Challenge
5 points Jun 24, 2025 1h 0m
Base64Web InspectionBrowser DevToolsData EncodingHTML Analysis
AlVault
Medium
40 points Jun 06, 2025 6h 24m
WEB
FiPloit
Easy
20 points Jun 02, 2025 1h 0m
Local File InclusionFile Upload BypassPHP SecurityDirectory TraversalWeb Shell ExploitationPrivilege EscalationLog Analysis
Compromised 1
Medium
40 points May 29, 2025 1h 10m
Apache TomcatWeb Application SecurityWAR DeploymentDefault CredentialsPrivilege EscalationLinuxSudoWeb Shells
Traversed
Medium
40 points May 29, 2025 46m
GIT
Matsudo
Medium
40 points May 29, 2025 26m
SSHBrute ForcePrivilege EscalationLinuxSudoNetwork ReconnaissancePenetration Testing
Beyond Echo
Medium
20 points May 29, 2025 1h 0m
PHPRCE
Cronpocalypse
Easy
20 points May 29, 2025 3h 0m
SSH
Secrets in Source
Very Easy
5 points May 29, 2025 2m
HTMLLearning Path
Nmap Lab 102
Very Easy
10 points May 29, 2025 19m
TELNETLearning Path
Include me
Easy
10 points May 29, 2025 4m
PHPLFI
Anonymous 2
Easy
10 points May 29, 2025 38m
FTP ExploitationBackdoor DetectionNetwork ServicesRemote ShellSystem Exploitation
Anonymous
Easy
10 points May 29, 2025 1h 37m
FTP
Onboarding Lab: Access and Flags
Very Easy
5 points May 29, 2025 35m
NetworkingReconnaissanceCommand LineWeb ServicesLearning Path
Spoof!
Easy
10 points May 28, 2025 4m
IP SPOOFING
Hack the Cookie
Very Easy
5 points May 28, 2025 2h 1m
WEBLearning Path
Hack the Login
Very Easy
5 points May 28, 2025 6m
WebAuthenticationClient-Side SecurityLearning Path

Courses Progress

Your learning paths and modules

CVE
1 / 1 modules completed
100%
Nmap Mastery: Dominate Network Scanning
4 / 4 modules completed
100%
HTTP Header Manipulation: IP Spoofing
3 / 3 modules completed
100%
HDNA Ethical Hacking Course
5 / 5 modules completed
100%
JWT Ethical Hacking: Token Takeover Tactics
4 / 4 modules completed
100%
Remote Code Execution (RCE)
3 / 3 modules completed
100%
Join 5,000+ hackers learning cybersecurity with hands-on labs. Create Account