- Bob (Difficulty: Easy, Subject: Basic enumeration, web exploitation)
- Brainpan (Difficulty: Easy, Subject: Buffer overflow exploitation)
- GoldenEye (Difficulty: Easy, Subject: Web enumeration, SQL injection)
- NullByte (Difficulty: Easy, Subject: Web enumeration, basic Linux privilege escalation)
- Pluck (Difficulty: Easy, Subject: Web exploitation, file inclusion)
- Sedna (Difficulty: Easy, Subject: Directory traversal, file inclusion)
- Retired (Difficulty: Medium, Subject: Linux enumeration, privilege escalation)
- Colt (Difficulty: Medium, Subject: Web exploitation, credential stuffing)
- Tibra (Difficulty: Medium, Subject: OSINT, Linux privilege escalation)
- MicroVuln (Difficulty: Medium, Subject: Active Directory enumeration, SMB exploitation)
- Razorback (Difficulty: Medium, Subject: Active Directory enumeration, Kerberos exploitation)
- Rocky (Difficulty: Medium, Subject: Network enumeration, service identification)
- Vulnix (Difficulty: Medium, Subject: Linux enumeration, Sudo exploitation)
- Surveillance (Difficulty: Medium, Subject: Web enumeration, XSS and RCE exploitation)
- Maverick (Difficulty: Medium, Subject: Web application vulnerabilities, PHP exploitation)