Master Digital Forensics & Incident Response through realistic, gamified investigations. No setup, no VMs — open your browser and start hunting threats.
Every feature mirrors real-world DFIR workflows — not oversimplified tutorials.
Windows desktop, Linux terminal, Wireshark — all in your browser. Zero setup, zero VMs.
Analyze email headers, hex dumps, network packets, registry hives — actual forensic techniques.
Progressive hints, DFIR concept explanations, step-by-step guidance ensures you learn.
Earn verifiable certificates, rack up points, and track your progress on the leaderboard.
Cases built from real attack patterns — phishing, ransomware, APTs, log analysis, and more.
Usage of unfair means is strongly discouraged. All investigations are expected to reflect genuine analytical effort.
Hands-on cases built from real attack patterns. 2 free, rest on Pro.
A finance employee received an urgent wire transfer request. Analyze the email headers and trace the social engineering chain before money moves.
An SSH brute force succeeded at 11:47 PM. Sift through auth logs to reconstruct the full attack timeline and C2 infrastructure.
Company files encrypted. Investigate the ransomware chain from initial access through deployment and identify the threat actor.
State-sponsored actor on the network. Analyze PCAP data to reconstruct C2 communication, lateral movement, and persistence mechanisms.