Browse our list of curated database of projects, exercises, and lessons to learn blue-team
1hrs average
A Linux system has been compromised. Your mission is to investigate a suspicious image, track the attacker, and uncover hidden persistence tasks. Only by cleaning the system correctly will you be able to reconstruct the final flag.
1hrs average
You’ve received a suspicious executable. Your task is to decompile it, identify the malicious behavior, and clean the binary. Only by successfully removing the malicious activity will the program execute fully and reveal a message that contains the flag.
1hrs average
A critical database backup was found damaged. As an analyst, your task is to recover usable data and find the flag.
1hrs average
Analyze a vulnerable form in a fictional licensing site, identify the XSS vulnerability, and validate your finding with a script.
1hrs average
Analyze a suspicious script, deduce the criminal's name from clues, and decode a flag using CyberChef.
1hrs average
Analyze a .pcap file containing a suspicious HTTP transaction, find a Base64-encoded string, and decode the flag.
1hrs average
Analyze a seemingly anonymous photo to determine the city and country where it was taken. Use OSINT techniques to validate the flag.
1hrs average
A Linux server has been compromised and multiple hidden reverse shells were planted. Your job as an analyst is to detect and remove them.
1hrs average
Investigate a compromised website to detect a hidden reverse shell. Find the backdoor and validate your discovery.
Ready to dive into Cybersecurity? Join our waiting list for an intensive bootcamp, master ethical hacking, and build a standout portfolio for your InfoSec career!
1hrs average
You’ve recovered a suspicious string. Your goal is to decrypt it using a classic cipher method called Atbash and validate your result using a script. Only if you decrypt it correctly will you receive the final reward.
1hrs average
A user known as johnclick1337 posted a threat before disappearing. Use OSINT techniques to uncover his email and validate the flag.
2hrs average
Face an internal sabotage that has taken down the main web service. Investigate, escalate privileges, and unmask the imposter to restore operability.
1hrs average
Analyze and repair a Python script sabotaged by an internal attacker to recover the original password. Once fixed, validate it and decode a flag using CyberChef.
Explore the world of Endpoint Detection and Response (EDR) systems, focusing on advanced threat detection and real-time response to safeguard modern businesses. Learn how EDR provides proactive protection, using monitoring, machine learning, and automation to detect and address security risks efficiently.