Pentest Machines
Explore corporate networks, authentication and authorization mechanisms, and privilege escalation techniques
OSINT
Develop your skills in searching, analyzing and collecting information by exploring open sources
PWN
Exploit software vulnerabilities to gain control of the application
Web
Explore and exploit vulnerabilities in web applications and servers
Steganography
Decipher hidden messages and information hidden in other data
Reverse engineering
Analyze executable code to understand how it works and find potential vulnerabilities
Entertainment
Solve unusual and fun problems. Immerse yourself in the world of information security with humor
Forensics
Examine digital traces and evidence to investigate incidents and identify causes
Cryptography
Unravel ciphers and encrypted messages using various methods and algorithms