Projects

Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials

2hrs average

Movie Catalogue

Build a mobile app that lets users explore a movie catalogue, view details, and navigate through different categories using react. Work entirely with local data from data/movies.ts (no APIs, no global state). Perfect to master navigation and parameter typing in React Native.

Intermediate

2hrs average

In this project, students will perform the exploitation phase on the vulnerable machine The Lovers. The goal is to use the reconnaissance findings to gain access, explore the system, and escalate privileges to full control. Students must include evidence of the exploitation, obtained credentials, exploration findings, escalation techniques, and the discovered flags in their final report.

Intermediate

1hrs average

You’ve received a suspicious executable. Your task is to decompile it, identify the malicious behavior, and clean the binary. Only by successfully removing the malicious activity will the program execute fully and reveal a message that contains the flag.

Intermediate

1hrs average

A critical database backup was found damaged. As an analyst, your task is to recover usable data and find the flag.

Intermediate

1hrs average

A police officer went missing while investigating a trafficking network in Eastern Europe. It is believed he managed to leave a hidden clue on a web server. Your mission is to trace his exact location using analytical thinking, logical deduction, and OSINT techniques. If you identify the correct city, you will be rewarded with a flag.

Intermediate

2hrs average

Learn to intercept unencrypted HTTP traffic, identify information leaks, and access FTP services using hashes and decoding techniques.

Intermediate

2hrs average

Explore a corporate Windows server, identify poor security practices, and perform brute force attacks to access a privileged user and escalate to administrator.

Intermediate

8hrs average

Build a simple mobile app that lets users record their daily mood (Happy, Neutral, Sad), see the current mood, and browse a recent history. Practice useState for local state, useEffect for lifecycle (no fetch), conditional rendering, and FlatList for performant lists. Perfect for getting started with React Native + TypeScript.

Intermediate

2hrs average

An AI startup was compromised overnight. As a forensic analyst, you must reconstruct the incident from collected evidence and recover a hidden password inside a suspicious executable.

Intermediate

1hrs average

Analyze a seemingly anonymous photo to determine the city and country where it was taken. Use OSINT techniques to validate the flag.

Intermediate

1hrs average

A Linux server has been compromised and multiple hidden reverse shells were planted. Your job as an analyst is to detect and remove them.

Intermediate

3hrs average

In this final cybersecurity project, students must take immediate action to identify, contain, and remediate a live cyberattack on a compromised Linux server. Acting as cybersecurity analysts, they will investigate malicious processes, identify persistence mechanisms, remove backdoors, and restore system integrity.

Intermediate

2hrs average

Explore a realistic vulnerability in a WordPress site by identifying and analyzing the vulnerable TimThumb script. Learn to recognize suspicious paths and formulate attack hypotheses.

Intermediate

2hrs average

Access a corporate Linux system and use brute force and privilege escalation techniques to become root and retrieve a protected flag.

Intermediate

2hrs average

Transform your static Product Landing Page into an interactive conversion machine. You'll add dynamic pricing comparison (monthly/annual toggle, quantity sliders), multi-step intelligent forms with validation, FAQ accordion with search, and dynamic testimonial carousel with filters. This project emphasizes advanced prompting, iterative development, state management, and collaborative debugging with AI to create components that increase conversions.

Intermediate

1hrs average

A Linux system has been compromised. Your mission is to investigate a suspicious image, track the attacker, and uncover hidden persistence tasks. Only by cleaning the system correctly will you be able to reconstruct the final flag.

Intermediate

1hrs average

A user known as johnclick1337 posted a threat before disappearing. Use OSINT techniques to uncover his email and validate the flag.

Intermediate

2hrs average

Face an internal sabotage that has taken down the main web service. Investigate, escalate privileges, and unmask the imposter to restore operability.

Intermediate

2hrs average

Analyze a web server full of decoys, discover an exposed backup file, and exploit a misconfigured scheduled task to escalate privileges in a Windows system.

Intermediate

2hrs average

Explore a Windows server hosting a WordPress site and vulnerable SMB shares. Enumerate users, build custom dictionaries, and use discovered credentials to capture a flag.

Intermediate

Load more...