BROWSER-BASED DFIR TRAINING PLATFORM

Investigate.Analyze.Respond.

Master Digital Forensics & Incident Response through realistic, gamified investigations. No setup, no VMs — open your browser and start hunting threats.

No credit card required
2 free cases included
Instant access
0
ACTIVE CASES
0
FLAGS TO FIND
0
DIFFICULTY TIERS
0%
BROWSER BASED
SCROLL TO EXPLORE
CAPABILITIES

Built for Real Learning

Every feature mirrors real-world DFIR workflows — not oversimplified tutorials.

Simulated Environments

Windows desktop, Linux terminal, Wireshark — all in your browser. Zero setup, zero VMs.

Real Investigation Workflows

Analyze email headers, hex dumps, network packets, registry hives — actual forensic techniques.

Guided Learning System

Progressive hints, DFIR concept explanations, step-by-step guidance ensures you learn.

Certificates & Points

Earn verifiable certificates, rack up points, and track your progress on the leaderboard.

Realistic Case Data

Cases built from real attack patterns — phishing, ransomware, APTs, log analysis, and more.

Anti-Cheat & Fair Play

Usage of unfair means is strongly discouraged. All investigations are expected to reflect genuine analytical effort.

ACTIVE CASES

Choose Your Investigation

Hands-on cases built from real attack patterns. 2 free, rest on Pro.

BEGINNER
FREE5 flags

The Suspicious Invoice

A finance employee received an urgent wire transfer request. Analyze the email headers and trace the social engineering chain before money moves.

phishingemailBEC
Investigate Case
BEGINNER
FREE5 flags

Midnight Breach

An SSH brute force succeeded at 11:47 PM. Sift through auth logs to reconstruct the full attack timeline and C2 infrastructure.

log analysislinuxSSH
Investigate Case
INTERMEDIATE
PRO7 flags

Operation Dark Cipher

Company files encrypted. Investigate the ransomware chain from initial access through deployment and identify the threat actor.

ransomwarewindowsregistry
Investigate Case
ADVANCED
PRO10 flags

APT Infiltration

State-sponsored actor on the network. Analyze PCAP data to reconstruct C2 communication, lateral movement, and persistence mechanisms.

networkAPTC2
Investigate Case
BEGIN TRAINING

Ready to investigate?

Join analysts learning DFIR through hands-on practice.
2 free cases. No credit card required.