
Pentest Machines
Explore corporate networks, authentication and authorization mechanisms, and privilege escalation techniques

OSINT
Develop your skills in searching, analyzing and collecting information by exploring open sources

PWN
Exploit software vulnerabilities to gain control of the application

Web
Explore and exploit vulnerabilities in web applications and servers

Steganography
Decipher hidden messages and information hidden in other data

Reverse engineering
Analyze executable code to understand how it works and find potential vulnerabilities

Entertainment
Solve unusual and fun problems. Immerse yourself in the world of information security with humor

Forensics
Examine digital traces and evidence to investigate incidents and identify causes

Cryptography
Unravel ciphers and encrypted messages using various methods and algorithms