Web Security Training Platform

Master cybersecurity vulnerabilities through hands-on labs designed to challenge and enhance your penetration testing skills.

217+
Labs Available
22
Vulnerability Types
3
Difficulty Levels
100%
Hands-On

Vulnerability Categories

Cross-Site Scripting (XSS)

LAB 1
Easy
Reflected XSS - Basic Input
LAB 2
Easy
Reflected XSS - Script Tag Filter Evasion
LAB 3
Medium
Reflected XSS - Script & Img Tag Filter
LAB 4
Medium
Reflected XSS - Case-Insensitive Filter Bypass
LAB 5
Hard
Reflected XSS - Less-Than Sign Filter
LAB 6
Hard
Reflected XSS in HTML Title Tag
LAB 7
Easy
Reflected XSS in Page Heading
LAB 8
Easy
Reflected XSS - Function Name Filter
LAB 9
Medium
Reflected XSS - Extended Function Filter
LAB 10
Medium
Reflected XSS - Event Handler Filter
LAB 11
Hard
Reflected XSS - Multi-Parameter Filter Evasion
LAB 12
Hard
Reflected XSS - Encoding Bypass Attempts
LAB 13
Hard
Reflected XSS - Mixed Security Parameters
LAB 14
Hard
Reflected XSS - String Concatenation Bypass
LAB 15
Hard
Reflected XSS - URL Encoding Context
LAB 16
Hard
Reflected XSS in Search Function
LAB 17
Hard
Reflected XSS in Category Filter
LAB 18
Hard
Stored XSS - User Comments System
LAB 19
Hard
Stored XSS - User Profile Management
LAB 20
Hard
Stored XSS - Blog Post System
LAB 21
Hard
Stored XSS - Support Ticket System
LAB 22
Hard
Stored XSS - Admin Panel Settings
LAB 48
Hard
CSP Bypass - Unsafe Inline Scripts
LAB 49
Hard
CSP Protected Page
LAB 50
Hard
Self XSS via POST Parameter
LAB 51
Hard
POST-Based Reflected XSS
LAB 52
Hard
POST XSS in Input Tag Value
LAB 53
Hard
POST XSS in Document Title
LAB 54
Hard
DOM-based XSS with jQuery
LAB 55
Hard Real World
Reflected XSS in JS Analytics Context (Equifax — HackerOne #1818163)
LAB 56
Low Real World
Reflected XSS in HTML Attribute Context (PUBG — HackerOne #751870)
LAB 57
Low Real World
XSS via javascript: URI in Redirect Parameter (Shopify — HackerOne #1940245)
LAB 58
Medium Real World
Reflected XSS in URL Path Segment (Imgur Mobile — HackerOne #149855)
LAB 59
Hard Real World
Reflected XSS via Unquoted Attribute Injection (Reddit — HackerOne #1549206)

SQL Injection (SQLI)

LAB 1
Easy
SQL Injection - Login Bypass
LAB 2
Easy
INSERT SQL Injection - Comment System
LAB 3
Medium
CRUD SQL Injection - Book Management
LAB 4
Medium
Time-based Blind SQL Injection
LAB 5
Medium
Integer-based SQL Injection
LAB 6
Hard
User-Agent Header Blind SQL Injection
LAB 7
Hard
Referer Header Blind SQL Injection
LAB 8
Hard
X-Forwarded-For Header Blind SQL Injection

Authentication Bypass

LAB 1
Medium Real World
Admin Auth Bypass via Response Manipulation (UPS — HackerOne #1490470)
LAB 2
Medium
OTP Verification Bypass via Response Manipulation
LAB 3
Medium
Phone OTP Bypass via Response Manipulation

Open Redirect

LAB 1
Easy
Basic URL Parameter Redirect

Server-Side Request Forgery (SSRF)

LAB 1
Easy
Source Code Viewer - Basic cURL SSRF
LAB 2
Easy
Screenshot Tool - URL to Image
LAB 3
Medium
Port-based Timing Attack
LAB 4
Medium
Domain Restriction Bypass with Redirects
LAB 5
Medium
Website Checker with IP Blacklist
LAB 6
Medium
AWS Metadata Filter Bypass
LAB 7
Easy
PDF Generator - URL to PDF

Insecure Direct Object Reference (IDOR)

LAB 1
Easy
User Account Information Disclosure

Server-Side Template Injection (SSTI)

LAB 1
Easy
Template Engine Code Injection

Local File Inclusion (LFI)

LAB 1
Easy
Path Traversal - Basic
LAB 2
Medium
CMS Local File Inclusion
LAB 3
Hard
File Upload with LFI Vulnerability
LAB 4
Easy
Image Gallery File Inclusion

Remote File Inclusion (RFI)

LAB 1
Easy
Remote File Inclusion via URL

Remote Code Execution (RCE)

LAB 1
Easy
OS Command Injection