// CTF PLATFORM v2.0 — AUTHORIZED ACCESS ONLY
Access granted. A collection of high-stakes web security challenges awaits. Decrypt, infiltrate, and exploit your way to victory, Agent.
Explore the site and uncover hidden secrets within the source code. Your first challenge is to find the flag buried in plain sight.
Bypass authentication with an IDOR vulnerability and use prompt injection to manipulate an AI model into revealing the hidden flag.
Exploit Reflected XSS, DOM-based XSS, and a timing attack to penetrate a highly-secured, multi-layered vault system.
— Sponsored —
All challenges run in isolated, sandboxed environments. Practise real-world exploits legally and ethically.
Challenges are designed with increasing difficulty — from beginner recon to advanced multi-vector attacks.
Learn IDOR, XSS, prompt injection, timing attacks and more — skills used in real bug bounty programs.