The Hackademic Challenges implement realistic scenarios with known vulnerabilities in a safe and controllable environment. Users can attempt to discover and exploit these vulnerabilities in order to learn important concepts of information security through an attacker's perspective. Currently, there are 10 scenarios available. You can choose to start from the one that you find most appealing, although we suggest to follow the order presented on the first page. We intend to expand the available challenges with additional scenarios that involve cryptography, and even vulnerable systems being implemented in downloadable virtual machines. Deployment Dependencies of Hackademic involve a web server (Apache, nginx) with PHP and Mysql/MariaDB connected with it. Make sure you have installed these before you start deploying Hackademic. We recommand to use Apache as the web server.
FEATURES
ALTERNATIVES
A Burp Suite content discovery plugin that adds smart functionality to the Buster plugin.
This article discusses the different types of remote timing attacks and provides defense strategies against them.
ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.
A tool to profile web applications based on response time discrepancies.
A tool for detecting capabilities in executable files, providing insights into a program's behavior and potential malicious activities.
Akamai App & API Protector is an integrated security solution that safeguards web applications and APIs against various cyber threats using edge computing and adaptive technologies.
Orchestration toolchain for scanning source code and infrastructure IaC against security risks.
StepSecurity is a platform that enhances GitHub Actions security by providing network egress control, risk discovery, action replacement, and security best practices orchestration.
PINNED
![InfoSecHired Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Finfosechired-U6U90c3Q6Cba3cSOZeZKsqvzJIuopf.webp&w=96&q=75)
InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
![Fabric Platform by BlackStork Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Ffabric-platform-by-blackstork-phi1uhUgEJZE9Ya8iuCSaCo0snAElq.webp&w=96&q=75)
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
![Mandos Brief Newsletter Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fmandos-brief-newsletter-mandos-brief-newsletter-bVEIOy0EGaEW4CfsFNgqMc4Ck7DBMJ.webp&w=96&q=75)
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
![System Two Security Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fsystem-two-security-O0dnMtVxvDr4lsOQN548cxgvMBaChN.webp&w=96&q=75)
System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
![Aikido Security Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Faikido-y5FboqNnnVz6G816AUVeOgyCWu9CLQ.webp&w=96&q=75)
Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
![Permiso Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fpermiso-6PYopYA8QMCIQw6oVuJQct9dodan2Y.webp&w=96&q=75)
Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
![Wiz Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fwiz-HVmg8jGNvHcayd5g99UUUf8jHoFZRK.webp&w=96&q=75)
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
![Adversa AI Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fadversa-ai-UnkKaoTvjZuLWZDiYE44HHO7bqy7AH.webp&w=96&q=75)
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.