Exercises

Exercise Avg. Time Difficulty Solved by Tier
CVE-2026-24895: FrankenPHP Path Confusion RCE using Unicode 1-2 Hr. hard 3 PRO
CVE-2021-X5X8
This challenge covers the review of a CVE in a Golang codebase and its patch
-- hard 36 PRO
GCM Tag Truncation
This challenge covers the exploitation of tag truncation on GCM
> 4 Hr. hard 14 PRO
SAML: CVE-2025-25291
This exercise covers the exploitation of CVE-2025-25291 (impacting ruby-saml)
2-4 Hr. hard 11 PRO
SAML: CVE-2025-29775 Signed Metadata
This exercise covers the exploitation of CVE-2025-29775 (impacting xml-crypto) without XMLResponse
2-4 Hr. hard 8 PRO
SAML: CVE-2025-29775
This exercise covers the exploitation of CVE-2025-29775 (impacting xml-crypto)
1-2 Hr. hard 16 PRO
Mongo IDOR IV 2-4 Hr. hard 88 PRO
Puzzle 01
Find the XSS by leveraging backreferences in a regular expression
< 1 Hr. hard 62 PRO
Puzzle 02 CSP XSS
Leverage a PHP trick to bypass CSP
< 1 Hr. hard 43 PRO
API 15
This exercise covers how to exploit a leaked encrypted password with an API.
< 1 Hr. hard 572 PRO
API 13
This exercise covers a complex filter bypass in API.
< 1 Hr. hard 572 PRO
JSON Web Token XV: CVE-2022-39227 JWT
This exercise covers the exploitation of polyglot token against python_jwt (CVE-2022-39227)
< 1 Hr. hard 35 PRO
Java Serialize 06
This exercise is one of our challenges to help you learn Java Serialisation exploitation
2-4 Hr. hard 49 PRO
JWT Algorithm Confusion with ECDSA Public Key Recovery JWT
This exercise covers the exploitation of algorithm confusion when no public key is available with a ECDSA key
1-2 Hr. hard 38 PRO
DOMPDF RCE IV
This exercise covers the automation of the exploitation of a vulnerability in the DOMPDF library
> 4 Hr. hard 27 PRO
XSL PHP V
This exercise covers the exploitation of a PHP application using XSL
< 1 Hr. hard 117 PRO
API Payments 05
This exercise covers how to abuse a shopping cart allowing users to apply a voucher.
< 1 Hr. hard 888 PRO
CVE-2005-2x8x
This challenge covers the review of a CVE and its patch
< 1 Hr. hard 623 PRO
PHP Snippet #08
This challenge covers the review of a snippet of code written in PHP
< 1 Hr. hard 1535 PRO
Ox Remote Code Execution II
This exercise covers how you can gain code execution when an application is using Ox to deserialize data and is running on Ruby 2.7
2-4 Hr. hard 37 PRO
HTTP 30
This challenge covers how to send specific HTTP requests
< 1 Hr. hard 3094 PRO
Ox Remote Code Execution
This exercise covers how you can gain code execution when an application is using Ox to deserialize data and is running on Ruby 2.3
2-4 Hr. hard 87 PRO
CVE-2021-22204: Exiftool RCE
This exercise covers how you can gain code execution when an application uses exiftool on user-controlled files
1-2 Hr. hard 175 PRO
SSRF via FFMPEG II
This exercise covers how you can read arbitrary files when an application uses ffmpeg to render videos from a video you provide
< 1 Hr. hard 131 PRO
OAuth2: Authorization Server XSS II
This exercise covers the exploitation of an XSS in an OAuth2 Authorization Server
< 1 Hr. hard 281 PRO
JWT Algorithm Confusion with RSA Public Key Recovery JWT
This exercise covers the exploitation of algorithm confusion when no public key is available
< 1 Hr. hard 211 PRO
SAML: Signature Wrapping II
This exercise covers how to use Signature Wrapping to become an arbitrary user
< 1 Hr. hard 460 PRO
RCE via argument injection
This exercise covers a remote command execution vulnerability via argument injection
2-4 Hr. hard 57 PRO
SAML: Signature Wrapping
This exercise covers how to use Signature Wrapping to become an arbitrary user
< 1 Hr. hard 558 PRO
Code Review 13
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. hard 343 PRO
1 2 3
Showing 1–30 of 71 exercises