about://mission

Mission

Build a practical cybersecurity training ground for university students where learning is measured through repeatable labs, ethical challenge solving, and clear skill progression.

Web exploitation and secure coding practices
Cryptography implementation pitfalls and abuse patterns
Binary exploitation fundamentals and hardening awareness
Forensics triage, artifact analysis, and reporting
Reverse engineering workflows for malware and binaries
OSINT collection, validation, and investigative discipline

policy://principles

Platform Principles

  • Use platform skills only in authorized environments.
  • No attempts to attack systems outside approved challenge/lab scope.
  • Respect privacy, academic integrity, and responsible disclosure standards.
  • Document methodology clearly and avoid plagiarism of writeups or flags.

rules://conduct

Rules / Code of Conduct

  1. 1. Do not share flags, credentials, or private solutions publicly.
  2. 2. Do not automate abusive traffic against platform infrastructure.
  3. 3. Report vulnerabilities through the contact page with reproducible steps.
  4. 4. Keep collaboration educational; no harassment or sabotage of peers.

FAQ

No. Beginner tracks are designed for first-time learners with gradual difficulty progression.

credits://maintainer

Developed by Lasri Abdelhakim (0xabdelhakim)