Every lab is based on real CVEs and bug bounty techniques. No CTF toy challenges — these mirror actual production environments.
WEB
Web Application Security
XSS, SQLi, IDOR, SSRF, authentication bypasses and more. Built around real targets.
Coming Soon
API
API & Business Logic
REST, GraphQL, OAuth flaws, rate limit bypasses, and mass assignment vulnerabilities.
Coming Soon
2FA
Auth & 2FA Bypass
Advanced authentication attacks including OTP reuse, response manipulation, and session flaws.
Coming Soon
CVE
WordPress & CMS Hacking
Plugin vulnerabilities, XML-RPC exploits, privilege escalation, and real CVE reproductions.
Coming Soon
RECON
Recon & OSINT
Subdomain enumeration, fingerprinting, OSINT workflows and attack surface mapping.
Coming Soon
BURP
Burp Suite Mastery
Pro-level Burp workflows, extensions, Intruder strategies and scanner customization.
Coming Soon