Algorethm

Hacker Portfolio & Security Toolkit

Welcome to my digital space. Here you'll find security resources, command generators, and my latest content from YouTube.

Latest Videos

Loading videos...

r00tglyph

Vulnerable Web Application CTF

Test your skills against a deliberately vulnerable web application with multiple security challenges across XSS, SQLi, CSRF, XXE, SSRF, and Command Injection.

100+ Challenges
6 Vulnerability Categories
Progressive Difficulty

Ready to Hack?

Practice your penetration testing skills in a safe, controlled environment with guided solutions and explanations.

For educational purposes only

🌐

Cross-Site Scripting (XSS)

23 levels of XSS challenges from basic reflected to advanced CSP bypass

💉

SQL Injection (SQLi)

24 levels covering union-based, blind, time-based, and NoSQL injection

Command Injection

23 levels from basic command injection to advanced WAF bypass

🔄

CSRF

23 levels of Cross-Site Request Forgery with modern protection bypasses

🌍

SSRF

24 levels of Server-Side Request Forgery including cloud metadata access

📄

XXE

24 levels of XML External Entity attacks with data exfiltration techniques

Command Generator

Enter a target domain to generate security commands

Legal Notice

Only test targets you own or have explicit authorization to test. Using these commands on targets without permission is illegal. Unauthorized scanning or exploitation of computer systems is prohibited by law in most countries. The creator of this tool is not responsible for any misuse.

Media & Content

YouTube Channel

Latest Videos

Loading videos...

About Algorethm

Security Researcher & Content Creator

I'm Algorethm, a cybersecurity enthusiast with a passion for ethical hacking, penetration testing, and security research. My goal is to share knowledge and help others learn about cybersecurity in an ethical and responsible way.

Penetration Testing Web Security Network Security Red Teaming Bug Bounty

Skills & Expertise

  • Penetration Testing (Web, Network, Mobile)
  • Vulnerability Assessment & Exploitation
  • Security Tool Development & Automation
  • Secure Code Review & Architecture
  • Incident Response & Forensics

Certifications

  • Offensive Security Certified Professional (OSCP)
  • Certified Ethical Hacker (CEH)
  • GIAC Penetration Tester (GPEN)
  • AWS Certified Security - Specialty
  • Certified Information Systems Security Professional (CISSP)

My Mission

I believe in making cybersecurity knowledge accessible to everyone while emphasizing the importance of ethical hacking practices. Through my YouTube channel and this platform, I aim to:

  • Educate aspiring security professionals with practical, hands-on content
  • Promote responsible disclosure and ethical hacking practices
  • Develop tools and resources that help automate security testing workflows
  • Build a community of security enthusiasts who share knowledge and collaborate

R00tGlyph

Advanced Web Security Training Platform

Master web application security through hands-on challenges covering XSS, SQLi, CSRF, XXE, SSRF, and Command Injection.

138

Security Challenges

6

Vulnerability Categories

3

Difficulty Levels

0

Your Completed

🎯 Challenge Categories

🌐
Cross-Site Scripting (XSS)
23 Challenges

Master client-side code injection attacks from basic reflected XSS to advanced CSP bypass and prototype pollution techniques.

Progress 0/23
Beginner → Intermediate → Expert
💉
SQL Injection (SQLi)
23 Challenges

Exploit database vulnerabilities through union-based, blind, time-based, and NoSQL injection techniques.

Progress 0/23
Basic → Advanced → Expert
Command Injection
23 Challenges

Execute system commands through web applications using various injection and WAF bypass techniques.

Progress 0/23
Basic → WAF Bypass → Advanced
🔄
Cross-Site Request Forgery
23 Challenges

Force authenticated users to perform unintended actions through CSRF attacks and modern protection bypasses.

Progress 0/23
Form CSRF → SameSite Bypass → Advanced
🌍
Server-Side Request Forgery
23 Challenges

Access internal services and cloud metadata through server-side request forgery vulnerabilities.

Progress 0/23
Internal Scan → Cloud Metadata → DNS Rebinding
📄
XML External Entity (XXE)
23 Challenges

Exploit XML processing vulnerabilities for file disclosure, internal network scanning, and data exfiltration.

Progress 0/23
File Disclosure → OOB Exfiltration → Advanced

🚀 Platform Features

🎯
Progressive Difficulty

Start with beginner-friendly challenges and advance to expert-level techniques.

🏆
Scoring System

Earn points for each completed challenge and track your progress on the leaderboard.

📚
Detailed Solutions

Learn from comprehensive solutions and explanations for every challenge.

🎨
Multiple Themes

Choose from Dark, Cyberpunk, Hacker, or Light themes to match your style.

🚀 Getting Started

1
Choose Your Path

Start with beginner challenges or jump to your preferred vulnerability category.

2
Exploit Vulnerabilities

Use various techniques to exploit web application vulnerabilities and capture flags.

3
Learn & Improve

Study solutions, earn points, and advance to more complex challenges.

🏆 Top Performers

Rank User Score Challenges Last Activity
🥇 1 Algorethm 138/138 All Platform Creator
🥈 2 Anonymous 0/138 None Start your journey!

⚠️ Legal Notice

This platform is for educational purposes only. The techniques demonstrated should only be used on: R00tGlyph platform, your own applications, or authorized testing environments. Unauthorized testing on systems you don't own is illegal and unethical.

Get In Touch

Contact Form

Support My Work

If you find my content valuable and would like to support my work, consider buying me a coffee.

Buy Me Coffee