Welcome to BETA! is a first-stage education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion. It is designed to take a “white belt” in cybersecurity to becoming a “yellow belt”, able to approach (simple) CTFs and wargames.

The philosophy of is “practice makes perfect”. Good luck! is in BETA

Following the open-source philosophy of “release early, release often”, is in BETA. This is not yet a polished education platform, but we’re pushing there! Right now, we are working on resolving the following known issues:

  1. The module slides are not very useful without video (and demos).
  2. Some of the module challenge sets have problems with difficulty scaling (ROP suffers from this especially).
  3. Some of the module challenge sets are missing concepts (example: GOT overwrites for memory corruption, actual memory corruption in the kernel).
  4. Security doesn’t start and stop with binary analysis! As is used in more courses, it’ll acquire more modules.

If you have other comments, suggestions, and feedback, please email us at!

Who is this for?

Consider hacking as a martial art. Newcomers begin as white belts, with zero security knowledge. Slowly and painfully, they become yellow belts, able to reason about simple security challenges and start down the road of, for example, CTF competitions. Over time, they become more sure in their skills, achieving brown belt status (and able to, for example, contribute to the cybersecurity industry), before finally graduating to hacking masters: black belts. is meant for white belts. If you already know the basics of hacking (and, thus, are a yellow belt), you will find this resource very easy. If you are a brown belt, you will find it quite boring. If you are a black belt, it will put you to sleep.

That being said, just because the material is for beginners does not mean that the concepts are basic. The course tackles complex concepts, up to and including the inner working of OS kernels. Be ready to do some real work!

Who is responsible? was created by Zardus (Yan Shoshitaishvili) and kanak (Connor Nelson) for the CSE 466 course at Arizona State University. It has powered the Fall 2018 and Fall 2019 editions of CSE466, and is moving forward toward changing the world!

The modules of is organized as a set of modules covering different topics. Each module has a set of lectures (slides available now, videos coming soon!) and practice problems, auto-generated for each aspiring hacker to practice on. Challenges come in a teaching variety, which will walk you through their own solutions, and a testing variety, which will challenge you with less guidance. Challenges are run directly on, and can be launched in practice mode, where you have root access but there is a fake flag, and real mode, where you cannot read the flag without exploiting the challenge. The following modules are currently available at


Aside from directed module, contains a wiki-like set of hacking concepts! These are designed to be linked directly from challenge problems.

Further Practice

After you learn the basics of cybersecurity and achieve yellow belt status, you should move on to harder challenges.

Capture The Flags (CTFs) are a great way to practice your hacking skills in a fun and ethical way. The most popular way to find upcoming events is at If you are at ASU, feel free to check out and join ASU’s CTF Team pwndevils at

Wargames are another great way to practice your hacking skills. Whereas CTFs are short (normally 48 hour) events, wargames are not time-based. You can find a list of wargames at


The infrastructure powering and the web-facing content are open source, and we welcome pull requests and issues. The modules are closed-source, because they include source code and solution scripts. If you are an educator, or otherwise someone we trust, and are interested in collaborating on the modules themselves, please email us at Likewise, drop us a line if you are interested in collaborating on the slides!