Get a modern cybersecurity education worth your time.

You didn’t struggle to pick up web dev or programming once you found the resource that clicked for you. Learn cybersecurity with just as much ease and efficiency.

3 flamingos
Dev Aviary interface wireframe

Want to skip the CTF grind? Be ready for bug bounties by the end of a single course.

Hours of scrubbing through long-winded videos (recorded in one take) can’t beat learning by exploiting vulns in our engaging practical labs.

Attack Wordpress plugins, a Git service, and more real software to prepare you to crush bug bounties. When automated tools can’t cut it (nobody wants brute-forcing on their servers), learn to intelligently discover vulns.

We demystify vulnerabilities both old and new (so new that other platforms barely scratch the surface). You get clear, full explanations, down to the guts of the source code. So you’ll know how to find and exploit those bugs before everyone else.

Our SQLI playground: Squeal Games

Weaponize SQL injections to leak game codes at our Squeal Games lab in the Comprehensive SQL Injection course.

Our XSS playground: Cross Site Dragons

Dual-wield XSS exploits & social engineering at our Cross-Site Dragons lab in the Comprehensive XSS course.

Not all cybersec experts can teach. We can.

Don’t let your time and passion be eroded by experts without teaching expertise. See how we’ve designed our courses with evidence-based learning techniques (spaced repetition!) and years of experience.

How we teach each vulnerability

Learn the inner workings of the vulnerability

Lab: Demo

Practice the attack with guidance

One challenge prompt
            from Comprehensive SQL Injection
Lab: Real-world case study

Practice the attack on real vulnerable software

Lab: Playground

Tackle full scenarios on your own, combining everything you’ve learned

Messages in XSS
            playground Cross-Site Dragons

Review a summary of the material, and onto the next vulnerability in the course!

Never stay stuck for long with 1-on-1 support and guidance.

Come to our daily office hours and never be alone in your studies. We are dedicated to supporting you through your journey and will personally answer every email.

How it works.

Byte-sized lessons

We guide you through labs and case studies with clear explanations and helpful tips. All the gory details and source code included!

Kali machine

Interact with your own virtual machine loaded with all the pentesting tools you’ll need for the courses you own, right in the browser. Unlimited hours.

interface of dev aviary

Interactive exercises

Prove your mastery by answering questions that check your understanding of the material. Action reinforces learning.

Practical labs

Solve a series of challenging, fun practical labs—each designed to help you master the exploits you’ve learned.

Real-world case studies

Experience actual vulnerabilities out in the wild and test your skills against them. We’ve resurrected relevant case studies for you to exploit.

Preview your courses.

purchase once or subscribe to get them all

UNION-based SQLIClassic SQLIBlind SQLINoSQLI
7 labs
+
3 real software vulns
Reflected XSSPersistent XSS
4 labs
+
2 real software vulns
RCEMetasploitNmap
1 short and sweet lab
Coming soon

Binary Exploitation

Get notified when new courses are ready!

TIP : use email alias services when possible to maximise your privacy.

Simple pricing.

Buy to hack it forever

£50and up

  • Own your courses, forever
  • 1-on-1 study support, forever
  • Get updates for your courses, forever
  • Buy once, learn the newest exploits before anyone else (GraphQL exploits coming soon)
  • Perfect if you’re busy and want to study at your own pace

30-day happy hacker or money back guarantee

Subscribe to hack them all

£25£20/mo

  • Comprehensive SQL Injection
  • Comprehensive XSS
  • Penetration Testing Crash Course
  • All our future courses (Binary Exploitation, Hacking Cryptography and more)
  • 1-on-1 study support
  • Perfect if you have more free time per month to binge our courses

30-day happy hacker or money back guarantee

Price becomes £25 when we reach 5 courses :) Early birds keep this price forever.

FAQs.

Kali machine
What are the specs for my Kali Linux virtual machine?

Internet is disabled, CPU is limited to 1.5 units and RAM is limited to 2G. But other than that, you have access to your machine 24/7.

Will my data (my files, scripts etc) be persisted in my Kali machine?

Store all your scripts & data in ~/nest as this folder (and nothing else!) will be persisted across restarts & updates.

All your servers are too far from me and my machine is laggy. Can you set one up near me?

Of course! Let us know where you’d like your lab to be hosted and we’d happily create a new server near it.

We’re also already working on making servers in the US available.

How long do I get access to the machine?

Subscribers get access for as long as you’re subscribed. If you’ve purchased a course, then you always have access to it.

Can I request additional tools on my machine?

Of course you can! Please contact us with your requests (see our help centre when logged in).

Are there any minimum requirements to run this?

Since there’s an entire machine in our app, make sure your screen is big enough (1920x1680)!

Account
Can I change the location of my machine & labs any time?

Send us your request via the help center when logged in. This will be automated soon!

What’s the refund policy?

We give refunds if requested within 1 month (i.e. for the current month of subscription, or courses purchased less than a month ago).

Courses
Are there prerequisites to your courses?

As long as you have a general tech background (programmer, IT, computer science student etc), we don’t assume any prior cybersecurity knowledge!

Why do you require a general tech background for your courses?

Being able to break / exploit something comes from knowing it as well as you know your palm. We leave the prerequisite tech background to other people’s capable hands, so that we can focus on teaching you how to break the tech.

We also blog spoiler-free CTF guides, cybersec tutorials, and more!

We finally launched publicly!

Months of grueling dev work: wrangling Dockerfiles, Kali’s rolling release breaking our build for the umpteenth time, naming all our internal tools after cool birds…. And it’s finally left the nest, ready for the public.

My eCXD Review & Tips

My experience and tips from studying the eLearnSecurity Exploit Development Student course and taking the eCXD exam.