CyberSecurity Training Lab
Hands-on security training with live pentest exercises in isolated containers. Learn by doing, exploit real vulnerabilities, and master the art of ethical hacking.
Available Labs
Choose a challenge and spawn your dedicated pentest environment.
SQL Injection Fundamentals
Learn basic SQL injection techniques on a vulnerable login form. Extract data from the database.
Reflected XSS Attack
Exploit a search functionality to execute JavaScript in victims' browsers.
Stored XSS Exploitation
Plant persistent XSS payloads in a comment system to affect all users.
JWT Authentication Bypass
Exploit weak JWT implementations to escalate privileges and access admin functionality.
SSRF on AWS Infrastructure
Exploit Server-Side Request Forgery to access AWS metadata and steal IAM credentials.
Docker Container Escape
Break out of a misconfigured Docker container to access the host system.
LFI to RCE
Chain Local File Inclusion with log poisoning to achieve Remote Code Execution.
Buffer Overflow Basics
Exploit a simple buffer overflow to gain control of program execution.
Network Pivoting & Lateral Movement
Compromise an initial host and pivot through the network to reach internal systems.
API IDOR Exploitation
Exploit Insecure Direct Object References in a REST API to access other users' data.
OAuth2 Misconfiguration
Exploit OAuth implementation flaws to take over user accounts.
Padding Oracle Attack
Exploit a padding oracle vulnerability to decrypt encrypted data.