Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials
linux
cybersecurity
blue-team
intermediate
Face an internal sabotage that has taken down the main web service. Investigate, escalate privileges, and unmask the imposter to restore operability.
Start projectlinux
cybersecurity
red team
intermediate
A police officer went missing while investigating a trafficking network in Eastern Europe. It is believed he managed to leave a hidden clue on a web server. Your mission is to trace his exact location using analytical thinking, logical deduction, and OSINT techniques. If you identify the correct city, you will be rewarded with a flag.
Start projectcybersecurity
incident response
linux security
intermediate
In this final cybersecurity project, students must take immediate action to identify, contain, and remediate a live cyberattack on a compromised Linux server. Acting as cybersecurity analysts, they will investigate malicious processes, identify persistence mechanisms, remove backdoors, and restore system integrity.
Start projectftp
burpsuite
cybersecurity
intermediate
Learn to intercept unencrypted HTTP traffic, identify information leaks, and access FTP services using hashes and decoding techniques.
Start projectwindows
cybersecurity
smb
intermediate
Explore a corporate Windows server, identify poor security practices, and perform brute force attacks to access a privileged user and escalate to administrator.
Start projectlinux
cybersecurity
red team
intermediate
Investigate a web application vulnerable to SQL Injection, access internal data from the Alabama Suites hotel system, and uncover who is sabotaging Diego by analyzing user panels.
Start projectread-team
apache
web
intermediate
Explore a web application to detect hidden routes and broken access control. Crack MD5 passwords and simulate logins to retrieve sensitive information.
Start projectPHP
HTML and CSS
cybersecurity
beginner
Analyze a vulnerable form in a fictional licensing site, identify the XSS vulnerability, and validate your finding with a script.
Start projectPython
cybersecurity
blue-team
easy
Analyze and repair a Python script sabotaged by an internal attacker to recover the original password. Once fixed, validate it and decode a flag using CyberChef.
Start projectData Science
Machine Learning
beginner
Use ARIMA model to forecast sales using time series analysis to estimate future sales rate.
Start projectlinux
cybersecurity
wordpress
intermediate
Explore a realistic vulnerability in a WordPress site by identifying and analyzing the vulnerable TimThumb script. Learn to recognize suspicious paths and formulate attack hypotheses.
Start projectsuid
cybersecurity
linux
intermediate
Access a corporate Linux system and use brute force and privilege escalation techniques to become root and retrieve a protected flag.
Start projectwindows
cybersecurity
smb
intermediate
Gain Administrator access to a Windows machine using an NTLM hash exposed in a public SMB share. Learn to exploit insecure configurations and perform Pass-the-Hash authentication.
Start projectlinux
cybersecurity
red team
intermediate
Exploit a SQL Injection vulnerability in a dating app to access as admin, retrieve credentials, uncover hidden secrets, and escalate privileges to gain root access.
Start projectPHP
cybersecurity
blue-team
beginner
Investigate a compromised website to detect a hidden reverse shell. Find the backdoor and validate your discovery.
Start projectosint
owasp-a05-security-misconfiguration
Python
beginner
Analyze a suspicious script, deduce the criminal's name from clues, and decode a flag using CyberChef.
Start projectevil-winrm
A01:2021 - Broken Access Control
windows
intermediate
Analyze a web server full of decoys, discover an exposed backup file, and exploit a misconfigured scheduled task to escalate privileges in a Windows system.
Start projectwindows
cybersecurity
smb
intermediate
Explore a Windows server hosting a WordPress site and vulnerable SMB shares. Enumerate users, build custom dictionaries, and use discovered credentials to capture a flag.
Start projectlinux
cybersecurity
red team
intermediate
Analyze a casino web app and exploit a Local File Inclusion (LFI) vulnerability to access sensitive server content.
Start projectwindows
cybersecurity
red team
intermediate
Analyze a Windows 7 system vulnerable to EternalBlue, exploit the flaw using Metasploit, and remotely access the system to retrieve a flag from the user's desktop.
Start project