Projects

Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials

2hrs average

The Secret Detective Http Project

Explore how web servers respond to HTTP requests. Learn to read headers, status codes, and analyze cache behavior using only browser tools and online services—no coding required.

Beginner

1hrs average

A Linux system has been compromised. Your mission is to investigate a suspicious image, track the attacker, and uncover hidden persistence tasks. Only by cleaning the system correctly will you be able to reconstruct the final flag.

Intermediate

1hrs average

You’ve received a suspicious executable. Your task is to decompile it, identify the malicious behavior, and clean the binary. Only by successfully removing the malicious activity will the program execute fully and reveal a message that contains the flag.

Intermediate

1hrs average

A critical database backup was found damaged. As an analyst, your task is to recover usable data and find the flag.

Intermediate

1hrs average

Analyze a vulnerable form in a fictional licensing site, identify the XSS vulnerability, and validate your finding with a script.

Beginner

1hrs average

Analyze and repair a Python script sabotaged by an internal attacker to recover the original password. Once fixed, validate it and decode a flag using CyberChef.

Easy

2hrs average

This is an alternative Time Series project. Use ARIMA model to forecast sales using time series analysis to estimate future sales rate.

Beginner

2hrs average

Beginner

1hrs average

Analyze a .pcap file containing a suspicious HTTP transaction, find a Base64-encoded string, and decode the flag.

Beginner

1hrs average

Analyze a seemingly anonymous photo to determine the city and country where it was taken. Use OSINT techniques to validate the flag.

Intermediate

1hrs average

A Linux server has been compromised and multiple hidden reverse shells were planted. Your job as an analyst is to detect and remove them.

Intermediate

1hrs average

Investigate a compromised website to detect a hidden reverse shell. Find the backdoor and validate your discovery.

Beginner

1hrs average

Analyze a suspicious script, deduce the criminal's name from clues, and decode a flag using CyberChef.

Beginner

2hrs average

Analyze a web server full of decoys, discover an exposed backup file, and exploit a misconfigured scheduled task to escalate privileges in a Windows system.

Intermediate

2hrs average

An AI startup was compromised overnight. As a forensic analyst, you must reconstruct the incident from collected evidence and recover a hidden password inside a suspicious executable.

Intermediate

1hrs average

You’ve recovered a suspicious string. Your goal is to decrypt it using a classic cipher method called Atbash and validate your result using a script. Only if you decrypt it correctly will you receive the final reward.

Easy

1hrs average

A user known as johnclick1337 posted a threat before disappearing. Use OSINT techniques to uncover his email and validate the flag.

Intermediate

2hrs average

Face an internal sabotage that has taken down the main web service. Investigate, escalate privileges, and unmask the imposter to restore operability.

Intermediate

1hrs average

A police officer went missing while investigating a trafficking network in Eastern Europe. It is believed he managed to leave a hidden clue on a web server. Your mission is to trace his exact location using analytical thinking, logical deduction, and OSINT techniques. If you identify the correct city, you will be rewarded with a flag.

Intermediate

3hrs average

In this final cybersecurity project, students must take immediate action to identify, contain, and remediate a live cyberattack on a compromised Linux server. Acting as cybersecurity analysts, they will investigate malicious processes, identify persistence mechanisms, remove backdoors, and restore system integrity.

Intermediate

Load more...