All Simulations50 simulations
Interactive attack simulations. No setup, no backend — everything runs in your browser. Learn by doing, not by reading.
IDOR
Beginner3 challengesChange an order ID to read another user's data. Enumerate sequential IDs, exploit mass assignment, then apply ownership checks.
SSRF
Intermediate3 challengesTrick the server into fetching internal URLs — Redis session tokens, AWS IAM credentials, admin panels. Apply allowlists to fix it.
Clickjacking
Beginner3 challengesA transparent iframe tricks you into confirming a bank transfer. Configure X-Frame-Options and CSP frame-ancestors to stop it.
Race Condition
Intermediate2 challengesFire 5 parallel transfer requests at a $100 account — watch the balance go negative. Fix with SELECT FOR UPDATE.
OAuth Misconfig
Intermediate3 challengesSteal auth codes via open redirect_uri. Bypass CSRF protection with a missing state parameter. Apply both fixes.
XXE Injection
Intermediate2 challengesSupply a malicious XML document that references external entities — read /etc/passwd and make the server fetch internal URLs.
Command Injection
Intermediate3 challengesInject shell metacharacters into a server-side ping utility. Chain commands with ; and | to read sensitive files and exfiltrate data.
Subdomain Takeover
Advanced3 challengesA dangling CNAME points to an unclaimed cloud resource. Claim it and serve content under the victim's trusted subdomain.
SQL Injection
Beginner3 challengesBypass authentication and extract database rows from a vulnerable login form using classic SQLi techniques.
Cross-Site Scripting
Beginner3 challengesInject malicious scripts into a fake comment board. See reflected vs stored XSS — and what a CSP blocks.
CSRF Attack
Intermediate2 challengesWatch an evil site silently trigger actions on your "bank" using your session cookies — without you knowing.
Brute Force Attack
Beginner2 challengesSimulate an attacker hammering a login endpoint. Configure rate limiting and lockout policies to stop it.
Path Traversal
Intermediate3 challengesEscape the web root using ../../../ sequences and read files you were never supposed to access.
Crack the Hash
Beginner3 challengesRun a dictionary attack against MD5, SHA-1, and bcrypt hashes. See why MD5 falls in seconds — and why bcrypt stops attacks cold.
JWT Forgery
Intermediate3 challengesExploit alg:none bypass, brute-force a weak HMAC secret, and tamper with expired claims to forge admin tokens.
Padding Oracle
Advanced3 challengesFlip bytes in an AES-CBC IV and query a padding oracle to decrypt ciphertext one byte at a time — without ever knowing the key.
Supply Chain Attack
Intermediate3 challengesFind typosquatted packages, detect dependency confusion, and spot malicious post-install scripts targeting your dependencies.
Phishing Email Builder
Beginner3 challengesCraft a phishing email, detect suspicious indicators, and configure SPF, DKIM, and DMARC defenses.
API Key Leak Scanner
Beginner3 challengesFind hardcoded secrets in code, spot leaked .env files in git diffs, and learn to secure credentials properly.
Ransomware Incident
Intermediate3 challengesRespond to a ransomware attack — isolate, assess damage, and make critical recovery decisions under pressure.
Zero-Day Exploit Chain
Advanced3 challengesChain SSRF → AWS metadata → IAM credential theft into a full cloud compromise. Learn how attackers combine vulnerabilities.
DNS Poisoning
Intermediate3 challengesInject fake DNS records, redirect traffic to a spoofed login page, and harvest credentials. Then defend with DNSSEC.
Container Escape
Advanced3 challengesBreak out of a Docker container — exploit privileged mode, mount the host filesystem, and exfiltrate /etc/shadow.
JWT Algorithm Swap
Intermediate3 challengesSwap RS256 to HS256 using the public key as HMAC secret. Forge admin tokens with algorithm confusion.
Insecure Deserialization
Advanced2 challengesCraft malicious serialized objects that execute code on the server when deserialized.
GraphQL Introspection
Beginner3 challengesExploit an open GraphQL endpoint — run introspection queries, discover hidden fields, and extract sensitive data.
Wi-Fi Evil Twin
Intermediate3 challengesSet up a rogue access point, intercept unencrypted traffic, and capture credentials via a captive portal.
Prototype Pollution
Intermediate3 challengesPollute JavaScript's prototype chain via __proto__ injection. Bypass auth checks and escalate privileges.
CORS Exploit
Intermediate3 challengesExploit misconfigured CORS headers to steal data cross-origin. Then configure proper CORS defenses.
Server Timing Attack
Advanced2 challengesExploit response time differences to guess passwords character by character. Then fix with constant-time comparison.
LDAP Injection
Intermediate2 challengesInject LDAP queries to bypass authentication and extract directory data.
NoSQL Injection
Intermediate3 challengesExploit MongoDB queries with $gt, $ne, and $where operators to bypass login.
XML Bomb
Advanced2 challengesCraft a Billion Laughs attack with nested XML entities that consume exponential memory.
HTTP Header Injection
Beginner2 challengesInject CRLF characters to add malicious headers and set cookies.
Open Redirect
Beginner3 challengesExploit unvalidated redirects to send users to phishing sites after login.
Mass Assignment
Intermediate2 challengesAdd role:admin to a profile update request and escalate your privileges.
Insecure File Upload
Intermediate3 challengesBypass file type checks to upload a web shell and achieve remote code execution.
Session Fixation
Intermediate2 challengesSet a victim's session ID before they log in, then hijack their authenticated session.
HTTP Request Smuggling
Advanced2 challengesExploit CL/TE desync between a proxy and backend to smuggle hidden requests.
Server-Side Template Injection
Advanced3 challengesInject {{7*7}} into a template engine and escalate to remote code execution.
WebSocket Hijacking
Intermediate2 challengesExploit missing origin validation to hijack WebSocket connections cross-origin.
Credential Stuffing
Beginner3 challengesUse leaked credentials from one breach to take over accounts on another service.
S3 Bucket Misconfiguration
Beginner3 challengesList and download files from a publicly accessible S3 bucket.
Kubernetes Pod Escape
Advanced2 challengesSteal a service account token and query the Kubernetes API from inside a pod.
Log Injection
Beginner2 challengesInject fake log entries with newline characters to manipulate audit trails.
ReDoS
Intermediate2 challengesCraft input that causes exponential regex backtracking and hangs the server.
Broken Object-Level Auth
Intermediate3 challengesChange an API resource ID to access other users' data — no ownership check.
JWT Key Injection
Advanced2 challengesExploit the JKU header to point JWT verification to your own key server.
API Rate Limit Bypass
Intermediate3 challengesBypass rate limiting with X-Forwarded-For, User-Agent rotation, and header tricks.
Prompt Injection
Beginner3 challengesInject instructions into an AI chatbot to reveal its system prompt and bypass filters.