Structured missions designed to take you from a curious beginner to a proficient security researcher.
Learn the art of information gathering. Master tools like Amass, Shodan, and Subfinder to map out attack surfaces without touching the target.
Understand the OWASP Top 10. Learn how to identify and exploit SQL Injection, XSS, and broken access controls using automated and manual tools.
Move beyond the web. Learn network protocols, service enumeration, and how to gain initial access through vulnerable network services.
Connect your GitHub or local storage to save your mission progress and unlocked achievements.