Explore Hacktivities

Discover and join cybersecurity labs, challenges, and training exercises

CTF Championship 2026 - Registration Open!
Join the ultimate cybersecurity challenge. Team-based competition with prizes worth $5,000
Starts In
3d 14h 22m
Register Now
52 labs

Featured Labs

View All Featured

All Labs

PowerShell for Digital Forensics

PowerShell for Digital Forensics

Easy New

Discover how to leverage native Windows capabilities for effective digital forensics and incident response. This hands-on lab introduces you to powerful scripting techniques for collecting system artifacts, analyzing user activity, and extracting critical evidence from Windows environments. You'll b...

17 tasks 15m 7
WannaCry Ransomware Investigation

WannaCry Ransomware Investigation

Easy New

Analyze a real-world ransomware incident by examining volatile memory artifacts from an infected system. In this investigation, you'll uncover malicious processes, trace encryption activity, identify persistence mechanisms, and reconstruct the complete attack timeline. Through hands-on RAM analysis,...

16 tasks 10
Windows Memory Forensics

Windows Memory Forensics

Easy New

Investigate compromised Windows systems by analyzing volatile memory dumps to recover evidence that disappears when systems power down. This hands-on lab teaches you to extract running processes, active network connections, credential information, and command history from RAM snapshots. You'll uncov...

11 tasks 4
Email Security Fundamentals

Email Security Fundamentals

Easy New

Explore the essential techniques for recognizing fraudulent emails in this foundational exercise. You'll examine email headers, understand authentication protocols like SPF, DKIM, and DMARC, and learn how attackers craft deceptive messages. By analyzing a real-world example, you'll develop practical...

17 tasks 7
SSH Authentication Threat Hunting

SSH Authentication Threat Hunting

Easy New

Dive into security operations by investigating SSH authentication activity within a corporate network environment. This lab guides you through analyzing authentication logs to uncover failed login patterns, identify brute-force attempts, detect reconnaissance behavior, and correlate indicators of po...

17 tasks 3
HTTP Traffic Threat Hunting

HTTP Traffic Threat Hunting

Easy New

Analyzing web server traffic to identify potential threats and suspicious activities. Through this investigation, you'll master the art of querying enterprise log data, detecting attack patterns through user behavior analysis, identifying server misconfigurations, and uncovering indicators of data e...

17 tasks 4
Hidden Malware Memory Hunt

Hidden Malware Memory Hunt

Easy New

Investigate a compromised workstation by analyzing its volatile memory to uncover what traditional forensics might miss. This hands-on tutorial guides you through analyzing volatile memory to uncover hidden malicious processes, extract suspicious artifacts, and decode obfuscated data that adversarie...

10 tasks 4
 Memory Forensics Investigation

Memory Forensics Investigation

Easy New

Step into the role of a digital investigator tasked with recovering vital information from a compromised system's volatile memory. This hands-on tutorial teaches you how to identify system profiles, enumerate running processes, and extract hidden artifacts including encrypted databases, browser acti...

11 tasks 2
Network Forensics & Evidence Recovery

Network Forensics & Evidence Recovery

Easy New

A digital forensics analyst responding to a potential insider threat incident. This hands-on investigation teaches you how to examine captured network communications to uncover what a suspicious user accessed, downloaded, and attempted to hide.

9 tasks 0
Multi-Source Attack Investigation

Multi-Source Attack Investigation

Easy New

Step into the role of a security consultant investigating a real-world data breach scenario. This tutorial challenges you to correlate evidence across network traffic captures, authentication records, intrusion detection alerts, and system logs to build a complete attack timeline.

11 tasks 5
APT Threat Detection & SIEM Analysis

APT Threat Detection & SIEM Analysis

Intermediate New

Act as security analyst investigating a multi-stage cyber attack on a Windows workstation. This hands-on tutorial guides you through analyzing 31 distinct malicious activities—from initial compromise to persistence establishment—teaching you how to write effective detection queries, correlate attack...

47 tasks 10
Zeus Banking Trojan - Memory Forensics with Volatility

Zeus Banking Trojan - Memory Forensics with Volatility

Easy

Learn the art of memory forensics by investigating a real Zeus banking trojan infection. This comprehensive investigation teaches you to analyze memory dumps, detect process injection, trace network connections, and uncover sophisticated evasion techniques. You'll develop critical skills in malware...

18 tasks 4
Web-to-Root Linux Lab: Exploiting a GLPI Intranet Misconfiguration

Web-to-Root Linux Lab: Exploiting a GLPI Intranet Misconfiguration

Intermediate

Dive into a step-by-step penetration testing guide for the vulnerable VM. This medium-difficulty walkthrough simulates a real-world assessment, from initial reconnaissance to full root access. Learn how to identify default credentials, bypass file upload restrictions, exploit web shells, crack passw...

16 tasks 37
Active Directory Attack Lab

Active Directory Attack Lab

Easy

This hands-on lab walks you through the full lifecycle of an Active Directory breach—starting from initial network reconnaissance and LLMNR poisoning, to password cracking, enumeration of domain trusts, privilege escalation via group membership abuse, and ultimately gaining Domain Admin access.

16 tasks 92
Web API Attack Lab: OWASP crAPI

Web API Attack Lab: OWASP crAPI

Intermediate

This hands-on lab is crafted to teach you how to identify a serious vulnerability known as BOLA (Broken Object-Level Authorization) using a realistic, intentionally vulnerable API environment called crAPI. You’ll simulate the role of a penetration tester investigating how weak access controls can al...

14 tasks 29
Apache Web Server Exploitation Lab

Apache Web Server Exploitation Lab

Easy

Learn to exploit Apache HTTP Server (CVE-2021-42013) with real-world techniques. In this lab, you'll perform path traversal attacks, access system files, and trigger remote code execution through vulnerable CGI endpoints. From basic enumeration to remote code execution — hands-on and practical.

5 tasks 49
 Network Investigation - Walkthrough

Network Investigation - Walkthrough

Easy

You are a cybersecurity analyst working for a company that hosts customer web applications using KVM-based virtual machines. Over the weekend, one of the production VMs unexpectedly went offline. The web application team suspects this outage was caused by malicious activity. As part of the incident...

15 tasks 64
Network Investigation - CTF

Network Investigation - CTF

Easy

You are a cybersecurity analyst working for a company that hosts customer web applications using KVM-based virtual machines. Over the weekend, one of the production VMs unexpectedly went offline. The web application team suspects this outage was caused by malicious activity. As part of the incident...

15 tasks 68
Active Directory Attack Lab: Recon-to-Root

Active Directory Attack Lab: Recon-to-Root

Intermediate

This step-by-step lab walks you through real-world AD attack techniques—starting with port scans and ending in full domain compromise using tools like nmap, kerbrute, evil-winrm, and BloodHound. Perfect for aspiring red teamers and security learners.

18 tasks 84
The Forgotten Gateway - PenTest Walkthrough

The Forgotten Gateway - PenTest Walkthrough

Easy

A beginner-friendly but realistic PenTest walkthrough that tests your ability to chain multiple misconfigurations into a full root compromise.

15 tasks 34
Elastic Stack Lab

Elastic Stack Lab

Easy

Test your Blue Team analysis skills by uncovering the details of a stealthy network intrusion using the Elastic Stack. Demonstrate your expertise in threat detection, log analysis, and incident response

17 tasks 100
SNMP Exploitation Lab: Scan, Attack, and Capture the Flag

SNMP Exploitation Lab: Scan, Attack, and Capture the Flag

Easy

Learn how network attacks happen — from finding open ports to running exploit and taking control.

10 tasks 47
Basic Pentesting 1 – From Recon to Root

Basic Pentesting 1 – From Recon to Root

Easy

A beginner-friendly lab focused on real-world pentesting. Discover services, exploit a WordPress site, gain a foothold, and escalate to root. Perfect for CTF newcomers.

12 tasks 177
Exploit Erlang/OTP SSH — Unauthenticated RCE to Reverse Shell

Exploit Erlang/OTP SSH — Unauthenticated RCE to Reverse Shell

Easy

Explore a critical vulnerability (CVE-2025-32433) in the Erlang/OTP SSH daemon that allows unauthenticated remote code execution

3 tasks 34
Loading...