• Dashboard

  • Categories

  • Training

Tech support

dev@codeby.email

EN

  • Pentest Machines (<p>Explore corporate networks, authentication and authorization mechanisms, and privilege escalation techniques</p>)

    Pentest Machines

    Explore corporate networks, authentication and authorization mechanisms, and privilege escalation techniques

  • OSINT (<p>Develop your skills in searching, analyzing and collecting information by exploring open sources</p>)

    OSINT

    Develop your skills in searching, analyzing and collecting information by exploring open sources

  • PWN (<p>Exploit software vulnerabilities to gain control of the application</p>)

    PWN

    Exploit software vulnerabilities to gain control of the application

  • Web (<p>Explore and exploit vulnerabilities in web applications and servers</p>)

    Web

    Explore and exploit vulnerabilities in web applications and servers

  • Steganography (<p>Decipher hidden messages and information hidden in other data</p>)

    Steganography

    Decipher hidden messages and information hidden in other data

  • Reverse engineering (<p>Analyze executable code to understand how it works and find potential vulnerabilities</p>)

    Reverse engineering

    Analyze executable code to understand how it works and find potential vulnerabilities

  • Entertainment (<p>Solve unusual and fun problems. Immerse yourself in the world of information security with humor</p>)

    Entertainment

    Solve unusual and fun problems. Immerse yourself in the world of information security with humor

  • Forensics (<p>Examine digital traces and evidence to investigate incidents and identify causes</p>)

    Forensics

    Examine digital traces and evidence to investigate incidents and identify causes

  • Cryptography (<p>Unravel ciphers and encrypted messages using various methods and algorithms</p>)

    Cryptography

    Unravel ciphers and encrypted messages using various methods and algorithms