TryHackMe
Rabbit Hole
It's easy to fall into rabbit holes.
TryHack3M: Subscribe
Can you help Hack3M reach 3M subscribers?
Retro
New high score!
AllSignsPoint2Pwnage
A room that contains a rushed Windows based Digital Sign system. Can you breach it?
Year of the Pig
Some pigs do fly...
Year of the Fox
Don't underestimate the sly old fox...
Hack Smarter Security
Can you hack the hackers?
Weasel
I think the data science team has been a bit fast and loose with their project resources.
CyberLens
Can you exploit the CyberLens web server and discover the hidden flags?
Blueprint
Hack into this Windows machine and escalate your privileges to Administrator.
Year of the Owl
The foolish owl sits on his throne...
Year of the Rabbit
Time to enter the warren...
Year of the Dog
Always so polite...
Year of the Jellyfish
Some boxes sting...
Silver Platter
Can you breach the server?
Zeno
Do you have the same patience as the great stoic philosopher Zeno? Try it out!
CMesS
Can you root this Gila CMS box?
tomghost
Identify recent vulnerabilities to try exploit the system or read files that you should not have access to.
Thompson
boot2root machine for FIT and bsides guatemala CTF.
GoldenEye
Bond, James Bond. A guided CTF.
dogcat
I made a website where you can look at pictures of dogs and/or cats! Exploit a PHP application via LFI...
Internal
Penetration Testing Challenge.
Relevant
Penetration Testing Challenge.
Daily Bugle
Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.
Skynet
A vulnerable Terminator themed Linux machine.
Game Zone
Learn to hack into this machine. Understand how to use SQLMap, crack some passwords, reveal services using a reverse SSH...
HackPark
Bruteforce a websites login with Hydra, identify and use a public exploit then escalate your privileges on this Windows machine!
Alfred
Exploit Jenkins to gain an initial shell, then escalate your privileges by exploiting Windows authentication tokens.
Steel Mountain
Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration...
Kenobi
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges...
UltraTech
The basics of Penetration Testing, Enumeration, Privilege Escalation and WebApp testing.
Cheese CTF
Inspired by the great cheese talk of THM!
0day
Exploit Ubuntu, like a Turtle in a Hurricane.
Wonderland
Fall down the rabbit hole and enter wonderland.
TryHack3M: Bricks Heist
Crack the code, command the exploit! Dive into the heart of the system with just an RCE CVE as your...
Smol
Test your enumeration skills on this boot-to-root machine.
Basic Pentesting
This is a machine that allows you to practise web app hacking and privilege escalation.