Modules

Realistic application modules, each with hidden vulnerabilities

Beginner

Social Media Clone

A social platform with profiles, posts, and messaging. Hidden XSS, IDOR, CSRF vulnerabilities.

Reflected XSSStored XSSDOM XSS+3 more
6 vulnerabilitiesExplore →
Intermediate

E-Commerce Store

Full shopping experience with cart, payments, and coupons. Business logic bugs everywhere.

Payment ManipulationRace ConditionCoupon Abuse+2 more
5 vulnerabilitiesExplore →
Intermediate

Admin Dashboard

Internal admin panel with user management and system tools. Command injection and forced browsing.

Forced BrowsingCommand InjectionSSTI+2 more
5 vulnerabilitiesExplore →
Advanced

API Developer Portal

REST and GraphQL APIs with intentional misconfigurations. Introspection, SSRF, and more.

GraphQL IntrospectionSSRFXXE+3 more
6 vulnerabilitiesExplore →
Intermediate

File Sharing Portal

Upload and share files. Bypass upload restrictions and read server files.

File Upload BypassPath TraversalLFI+1 more
4 vulnerabilitiesExplore →
Beginner

Messaging System

Real-time WebSocket chat with message history. Injection and impersonation vulnerabilities.

WebSocket InjectionMessage ImpersonationXSS via Messages
3 vulnerabilitiesExplore →
Intermediate

Authentication Lab

Login, registration, OAuth, JWT, and MFA systems - all deliberately flawed.

SQL Injection LoginJWT None AlgJWT Key Confusion+5 more
8 vulnerabilitiesExplore →
Advanced

Banking Panel

Simulated banking with transfers and transactions. Race conditions and logic flaws.

Race ConditionTransaction ManipulationInsufficient Validation
3 vulnerabilitiesExplore →
Advanced

Crypto Wallet

Cryptocurrency wallet simulation with exposed private keys and transfer vulnerabilities.

Private Key ExposureTransaction ManipulationIDOR
3 vulnerabilitiesExplore →
Beginner

Support Ticket System

Customer support with file attachments and status tracking. XSS and file upload issues.

Stored XSSFile UploadIDOR
3 vulnerabilitiesExplore →
Advanced

CI/CD & DevOps

Simulated CI/CD pipeline with exposed secrets, tokens, and configuration files.

Git ExposureCI/CD Token LeakDocker Secrets+1 more
4 vulnerabilitiesExplore →
Intermediate

Internal Employee Panel

Internal tools with weak access controls. Find backup files and hidden endpoints.

Forced BrowsingBackup File ExposureInfo Disclosure+1 more
4 vulnerabilitiesExplore →