Academy

Structured courses for beginners. Learn the theory, answer questions, hack the lab.

InjectionBeginnerLab
35 min

Cross-Site Scripting (XSS)

Learn how attackers inject malicious scripts into websites and how to find them yourself.

6 tasks · includes labStart Course →
FoundationBeginner
45 min

How the Web Works

Before you hack anything, you need to understand how the web works under the hood. HTTP, requests, responses, status codes, ports, cookies, sessions — all of it.

8 tasksStart Course →
FoundationBeginner
35 min

How Authentication Works

Understand how websites verify who you are — passwords, sessions, tokens, OAuth, and MFA. Essential knowledge before attacking any auth system.

5 tasksStart Course →
FoundationBeginner
35 min

APIs & Modern Web Apps

Most vulnerabilities today live in APIs, not web pages. Learn how REST APIs and GraphQL work, how they're authenticated, and what to look for when testing them.

5 tasksStart Course →
FoundationBeginner
20 min

Browser DevTools for Hackers

Your browser's built-in DevTools are one of the most powerful hacking tools you have. Learn to use them like a pro — no installs required.

4 tasksStart Course →
InjectionBeginnerLab
50 min

SQL Injection

Learn how attackers manipulate database queries through unsanitised input — and bypass logins, extract data, and own the backend.

8 tasks · includes labStart Course →
Access ControlBeginnerLab
45 min

IDOR — Broken Access Control

Learn how to access other users' data by manipulating object references — one of the most common and impactful vulnerabilities in web applications.

7 tasks · includes labStart Course →
ToolsBeginnerLab
15 min

sqlmap — Automated SQL Injection

sqlmap finds and exploits SQL injection vulnerabilities automatically. Point it at a login form and watch it do in seconds what would take hours by hand.

2 tasks · includes labStart Course →
ToolsBeginner
15 min

hashcat — Password Cracking

When attackers steal a database, they get hashes — not passwords. hashcat cracks them by trying millions of passwords per second until the hash matches.

2 tasksStart Course →
ToolsBeginnerLab
15 min

ffuf — Directory & Endpoint Fuzzing

Hidden admin panels, forgotten backup files, undocumented API routes — ffuf finds them by brute-forcing paths that are never linked from the site.

2 tasks · includes labStart Course →
ToolsBeginnerLab
15 min

curl — Manual HTTP Requests

curl lets you make raw HTTP requests from the terminal — no browser needed. Add headers, change methods, strip auth tokens, and see exactly what the server sends back.

2 tasks · includes labStart Course →
AuthenticationIntermediateLab
50 min

Broken Authentication

Weak login flows, no rate limiting, insecure password resets — learn how authentication systems fail and how to find and exploit those failures.

7 tasks · includes labStart Course →
MisconfigurationBeginnerLab
40 min

Security Misconfiguration

Default credentials, exposed admin panels, verbose error messages, open cloud storage — misconfiguration is the #1 finding on real pentests.

6 tasks · includes labStart Course →
InjectionIntermediateLab
45 min

File Upload Vulnerabilities

File upload features are one of the most dangerous attack surfaces. Learn how attackers bypass extension checks and upload webshells to execute code on servers.

4 tasks · includes labStart Course →
InjectionIntermediateLab
30 min

SSRF — Server-Side Request Forgery

Make the server fetch URLs on your behalf — reaching internal services, cloud metadata APIs, and systems that are completely inaccessible from the internet.

5 tasks · includes labStart Course →
LogicIntermediateLab
40 min

Business Logic Flaws

The application works exactly as coded — but the code doesn't match how the business should work. Negative prices, skipping steps, discount stacking.

4 tasks · includes labStart Course →
InjectionIntermediateLab
40 min

Command Injection

When web apps pass user input to a system shell, attackers can append their own OS commands. The result is direct code execution on the server.

4 tasks · includes labStart Course →
FundamentalsBeginner
20 min

OWASP Top 10

The industry standard list of the most critical web application security risks. Learn what each category means and where the vulnerabilities you have studied fit in.

2 tasksStart Course →
CryptographyBeginner
40 min

Cryptographic Failures

Passwords stored in plaintext, sensitive data sent over HTTP, weak encryption keys, MD5 where bcrypt should be. Learn what goes wrong when applications mishandle cryptography.

4 tasksStart Course →
FundamentalsBeginner
20 min

Vulnerable & Outdated Components

Every library, framework, and plugin your application uses is a potential attack surface. Learn how attackers exploit known CVEs in outdated dependencies and how to check for them.

6 tasksStart Course →
Client-SideIntermediateLab
45 min

CSRF — Cross-Site Request Forgery

Trick a logged-in user's browser into making a request to another site without them knowing. The browser sends the session cookie automatically — and the server thinks it's a real request.

4 tasks · includes labStart Course →
FundamentalsBeginnerLab
35 min

Security Logging & Monitoring Failures

Attackers count on not being noticed. When applications do not log security events or nobody watches the logs, breaches go undetected for months. Learn what should be logged and why.

6 tasks · includes labStart Course →
AuthenticationIntermediateLab
40 min

JWT Attacks

JSON Web Tokens are everywhere — and frequently misconfigured. Learn the full attack surface: weak secrets, the none algorithm, algorithm confusion, and key injection.

5 tasks · includes labStart Course →
InjectionBeginnerLab
25 min

Path Traversal

Apps that read files based on user-supplied filenames can be tricked into reading any file on the server. Learn how ../ sequences escape the intended directory.

4 tasks · includes labStart Course →
Brute ForceBeginnerLab
30 min

FirstBank — Brute Force

No lockout. No rate limiting. A 4-digit PIN. Learn how brute force attacks work against real login systems and build the mindset for testing authentication.

4 tasks · includes labStart Course →
IDORBeginnerLab
20 min

FirstBank — Account Statements

Account numbers are sequential. The server never checks ownership. One request away from reading every customer's balance and transaction history.

3 tasks · includes labStart Course →
Business LogicIntermediateLab
20 min

FirstBank — Transfer Funds

The transfer API accepts the amount from the client. Send a negative number and the money flows the wrong way.

3 tasks · includes labStart Course →
JWT AttacksIntermediateLab
35 min

FirstBank — Session Token

FirstBank signs JWTs with a weak secret. Crack it with hashcat, forge a token with role: admin, and access accounts that aren't yours.

3 tasks · includes labStart Course →
AI SecurityBeginnerLab
35 min

Prompt Injection

LLMs follow instructions — including instructions hidden inside user input. Learn how attackers hijack AI systems by injecting commands that override the developer's system prompt.

4 tasks · includes labStart Course →
AI SecurityBeginnerLab
30 min

LLM Jailbreaking

Safety filters trained into LLMs can be bypassed without touching the code. Learn the classic jailbreak techniques — DAN, fictional framing, the grandma exploit — and why they work.

3 tasks · includes labStart Course →
AI SecurityIntermediateLab
30 min

Indirect Prompt Injection

When an AI reads external content — web pages, emails, documents — an attacker can hide instructions inside that content. The AI reads it and obeys. The user never sees the injection.

3 tasks · includes labStart Course →
InjectionIntermediateLab
40 min

NoSQL Injection

Bypass login systems by injecting MongoDB query operators — no SQL knowledge required.

6 tasks · includes labStart Course →
Recon & OSINTBeginnerLab
35 min

Recon — Asset Discovery

Find every subdomain, IP, and live host a target owns. The starting point of every bug bounty engagement.

4 tasks · includes labStart Course →
Recon & OSINTBeginnerLab
35 min

Recon — Content Discovery

Find hidden paths, admin panels, backup files, and exposed configs that developers forgot to lock down.

4 tasks · includes labStart Course →
Recon & OSINTIntermediateLab
30 min

Recon — Tech Stack Fingerprinting

Identify what software a target runs — frameworks, versions, databases — and match it to known CVEs.

4 tasks · includes labStart Course →
Recon & OSINTIntermediateLab
35 min

Recon — Secrets & Code Recon

Find leaked API keys, hardcoded credentials, and sensitive data hidden in git history, GitHub repos, and exposed config files.

4 tasks · includes labStart Course →
Recon & OSINTBeginnerLab
30 min

Recon — Google Dorking

Use Google search operators to find exposed admin panels, config files, login pages, and sensitive data indexed by search engines.

4 tasks · includes labStart Course →
Recon & OSINTIntermediateLab
35 min

Recon — Shodan

Use the world's most powerful internet scanner to find exposed databases, open ports, default credentials, and misconfigured cloud services.

4 tasks · includes labStart Course →
Recon & OSINTIntermediateLab
40 min

Recon — Nuclei Deep Dive

Master the most powerful vulnerability scanner in modern bug bounty — templates, tags, custom detection, and full pipeline integration.

4 tasks · includes labStart Course →
Recon & OSINTIntermediate
45 min

Recon Tools — Subfinder, httpx & ffuf

Master the three tools every bug bounty hunter runs on every target — every flag, every mode, and how they work together.

5 tasksStart Course →
Recon & OSINTIntermediate
45 min

Bug Bounty Methodology

The complete playbook — from picking a program and reading scope to chaining findings, writing reports, and getting paid.

5 tasksStart Course →
InjectionIntermediateLab
45 min

Server-Side Template Injection (SSTI)

Learn how template engines become weapons when user input reaches the template renderer — from math expressions to full remote code execution.

5 tasks · includes labStart Course →
InjectionIntermediateLab
40 min

XML External Entity (XXE)

Learn how attackers abuse XML parsers to read server files, perform SSRF, and exfiltrate data — a vulnerability hiding in every API that accepts XML.

4 tasks · includes labStart Course →
API SecurityIntermediateLab
50 min

GraphQL Attacks

Learn how to exploit GraphQL APIs — introspection abuse, BOLA/IDOR, batching attacks, and field suggestions to map hidden data.

4 tasks · includes labStart Course →
API SecurityIntermediateLab
35 min

Mass Assignment

Learn how developers accidentally expose internal object fields through JSON body assignment — and how attackers use it to escalate privileges and manipulate data.

3 tasks · includes labStart Course →
AuthenticationIntermediateLab
40 min

Session Security

Learn how session management fails — predictable session IDs, session fixation, missing cookie flags, and sessions that survive logout.

3 tasks · includes labStart Course →
Web SecurityIntermediateLab
35 min

CORS Misconfiguration

Learn how misconfigured Cross-Origin Resource Sharing headers let any website silently steal authenticated user data from APIs.

3 tasks · includes labStart Course →
AuthenticationIntermediateLab
50 min

OAuth 2.0 Attacks

Learn how OAuth authorization flows break under redirect_uri manipulation, missing state parameters, and authorization code interception.

3 tasks · includes labStart Course →
AuthenticationIntermediateLab
40 min

Password Reset Flaws

Learn how password reset flows break — Host header poisoning redirects reset links to attacker servers, and predictable tokens are brute forced in seconds.

3 tasks · includes labStart Course →
AuthenticationIntermediateLab
35 min

2FA / MFA Bypass

Learn how two-factor authentication fails — skipping the MFA step entirely via direct API access, and brute forcing weak OTP codes with no rate limiting.

3 tasks · includes labStart Course →
Web SecurityBeginnerLab
30 min

Open Redirect

Learn how unvalidated redirect parameters let attackers redirect users to malicious sites — and how chaining with OAuth creates critical token theft.

3 tasks · includes labStart Course →
Business LogicIntermediateLab
45 min

Race Conditions

Learn how sending simultaneous requests exploits TOCTOU flaws — redeeming coupons multiple times, buying out-of-stock items, and bypassing rate limits.

3 tasks · includes labStart Course →
Social EngineeringBeginnerLab
45 min

NovaPay — Phishing a Fintech Employee

Clone a login page, craft a convincing IT security alert, trick an operations manager into handing over her credentials, and access her company dashboard.

4 tasks · includes labStart Course →