CVE-2025-11582 (React2Shell)
Flag Red73
Classroom CyberSecurity Training. Deploy instantly with Docker.
Flag Red73
Deploy this container to practice specific exploitation techniques.
Solution Guide Included
CTF Activity/Lesson: Understanding PHP Filter Chains. Solution Guide Included
CTF Activity: CVE-2024-51793 (Wordpress). Black Box This Time. Solution Guide Release TBA
CTF Activity: Can you reveal the flag? (Solution Guide Not Published Yet.) Live challenge!
CTF Activity: PHP Serialization Magic Methods Tutorial. (Solution Guide Included)
CTF Activity: Learn the basics of PHP serialization. (Nothing Fancy!) Solution Guide Included.
CTF Activity: WPQuery CVE-2024-50498. Solution Guide Included
CTF: CVE-2026-24061 (Telnetd) via USER Variable. Solution Guide Included.
CTF Activity: Blind SQL Injection. Solution Guide Included
CTF Activity: Advanced SQL Injection Training. Solution Guide Included
CTF: Use CEWL and brute force phpmyadmin bypassing csrf. Solution Guide Included.
CTF Activity: Wordpress-wpspritz-1.0.0. Solution Guide Included.
CTF Activity: Timing attack, reverse shell, privesc. Solution Guide Included
CTF Activity: cve-2023-42793 (TeamCity RPC2 Bypass). Solution Included
CTF Activity: cve-2024-23897 Jenkins LFI to RCE. Walkthrough Included
CTF Activity: Exploit a server running postgres/grafana. (RCE). Solution guide included
CTF Activity: What is a .har file anyway? --Solution Guide included
CTF Activity: Exploit RFI. Use Linpeas. Identify pam permission issue. Solution Guide Included
CTF activity: Ghost Symlink File Disclosure. Solution Guide Included.
CTF Activity: Nextjs. Solution Guide Included
Deploy this container to practice specific exploitation techniques.
Stand up this server and challenge students to recover the flag.
This is an sql injection challenge.
CTF Activity: The flag is the admin password!
CTF Challenge. Can you reveal the flag! OOB XXE
This is an nginx server hosting a CTF activity. Can you uncover the flag?
This is a CTF activity. Can you uncover the flag?
Can you sum up the values to produce a negative result and receive the flag?
Deploy this container to practice specific exploitation techniques.
CTF Activity: Simple Webserver Can you find the flag?
SImple CTF example. Students go to robots.txt, which leads to the next step.
Python nc server. Can you add them up to get the flag?
Can you sum up the values to produce a negative result and receive the flag?
CTF Activity: Simple Webserver Can you find the flag?
Mary can't log into her account. Can you help? She uses a simple password
CTF Challenge: Can you overflow the cookie jar of the admin bot.
Can you fuzz the API endpoint to mine more that 100,000 coins to get the flag?
CTF Challenge: Change the request method to get the flag.
CTF Challenge: Can you bypass the 403 page and reveal the flag?
Can you guess the correct number and reveal the flag?
Can you upload an XML file to reveal the flag at /flag/flag.txt?
Deploy this container to practice specific exploitation techniques.
CTF Activity: Provide the server.js source code to participants.
CTF Activity: Can you pop a shell. The flag is in /flag/Flag.txt
CTF Challenge: Can you get more than 10,000 coins?
CTF Activity: Can you get admin?> Provide the file passwords.txt to participants.
Can you post the correct data to this webserver to reveal the flag?
CTF Activity: nc IP_ADDRESS 3111. Can you get the flag?
CTF: pcap analysis. Can you login as admin and get the flag?
CTF: Use phpfilter:// to obtain the flag.
CTF: The admin bot checks your messages every minute. Can you exploit this behavior with XSS?
CTF: Can you find the flag? (Developer tools!)
CTF: Can you find the flag using Burp Suite.
Deploy this container to practice specific exploitation techniques.
Deploy this container to practice specific exploitation techniques.
Can you exploit this using a malicious LDAP server? Solution Guide Included.
CTF: Bypass a firewall rule that only allows data to leave the machine on port 5353
CTF: Roundcube CVE-2017-16651
CTF: PHP Type Juggling. Directions Included.
CTF Activity: 403 Bypass/SSH Key Exfil
CTF: Can you pop a basic reverse shell and find the flag?
CTF: Can you bypass the MIME type check to pop a reverse shell
CTF Activity: Can you encode a reverse shell using Base64?
CTF: Can you pop a reverse shell?
CTF: Can you exploit this using Server Side Template Injection
CTF: Can you use Burp to uncover the flags?
CTF Activity: Simple SQL Injection
CTF Activity: Can you craft a malicious phar file
CTF: Git Dumper Training. Solution Guide Included
CTF: Brute force cookie values: Training
CTF Training: Using SSH -L to pivot. Directions included
CTF Training: dig axfr --Directions included
CTF Activity: Base64 encoded cookie challenge. Directions Included.
CTF Activity: SSH Brute Force Login. Directions Included
CTF Activity: Using python to brute force POST parameters. Directions Included.
CTF Training: Use Burp Suite to modify a GET request to a POST request. Directions Included.
CTF Activity: Obtain RCE through this handy weather API webpage. Directions Included
CTF Activity: PHP Deserialization Example. Directions Included.
CTF: SSRF Bypass using Hexadecimal to bypass an IP filter. Directions included.
CTF Activity: Can you decode the audio file and find the flag?
No challenges found matching your search.