Dataset Viewer
Auto-converted to Parquet Duplicate
module_id
string
title
string
difficulty
string
tags
list
objectives
list
environment
dict
tasks
list
HTB-0001
Penetration Testing Module 1
Fundamental
[ "Enumeration", "Exploitation", "Scripting" ]
[ "Objective 1: zg0k5701EsL8uFsCxyKK", "Objective 2: 1OysSCGPHUS9H419kHnA", "Objective 3: T5y76jEUpA2Sei3P1Wya", "Objective 4: tFe75d9uxlRzaN4uubdP", "Objective 5: TW4sbHMUfY81OUO48e84" ]
{ "os": "Kali Linux", "tools": [ "john", "metasploit", "hydra", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 7N7AuvFYL6xJDItxb8OIFka5KdUZfISF1ivYG9aaR3LpjU0yMxXbq9Sq861wigVvi021vckVdmrnoSBAqLS1eALonAiPZCKSLWbnaUTD5vf826OsLuLovDL9l0N2IALhnkosuDMXuvWrgnCMkqNbP7", "expected_output": "Expected output 1: MXZNhlN5nd0a64c8mdP8567Ng663vS", "explanation": "Explanation 1: A4t...
HTB-0002
Penetration Testing Module 2
Intermediate
[ "Enumeration", "Reverse Engineering", "Linux" ]
[ "Objective 1: r7FV2dvK1MHm2LkEzR3o", "Objective 2: R9C1B44ftGLXMGGceIid", "Objective 3: 2BXsZAY45rQKIpYOhUxV", "Objective 4: RFCUpQJmtZthOxdKJ9o2", "Objective 5: ESp9Ce3K7WgEb9NcaZCB" ]
{ "os": "Kali Linux", "tools": [ "john", "netcat", "metasploit", "sqlmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: 4iEqeYW4KDe9QMlmA0owm0XNEYMnP2DvbGXCEet9rO3m19hRNhFLTf9INFzn1DOwGXLfBCwtWosXQMdFVEZS3gtkPnk1cCTxChGa8ANN15iPgYLr2MZSzEblz7qUHpcBwUay77sYWTvJ5ReKXe6P21", "expected_output": "Expected output 1: 0TepombSvKRn3C4sPRYADCoqetRIwg", "explanation": "Explanation 1: J5S...
HTB-0003
Penetration Testing Module 3
Intermediate
[ "Reverse Engineering", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: CGMDo72pA9qQ5TOfxFn2", "Objective 2: YDcptJerOJSK0Qck2HWa", "Objective 3: OBidxpXdUZdC4evh5LLD", "Objective 4: XbMvhnJWHCwgN8NynKlp", "Objective 5: xL5SCyi9xA6cH9x4mVhp" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "nmap", "sqlmap", "metasploit", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: Tw9R1iVBUt5b1PemHmzXlTjcfA7jARCg5AwjuJi01IRE2t5px2HP1YBIsdaIHmqoiS9R480ROcHeoST9y5juRAEloJ1To9qlDdpmPKt6TJkQjtX4nBltyQlRv25zeN0E1pk4g12HCknHtAfdAoucEO", "expected_output": "Expected output 1: NH5zEbNksXepK9GWZtQYiniurhqRgs", "explanation": "Explanation 1: 2xd...
HTB-0004
Penetration Testing Module 4
Intermediate
[ "Linux", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: ofNPh3aJxq8T1O2l0LDq", "Objective 2: 67Fn2u97th4d5EGrnPVc", "Objective 3: wq7AOFwsduZxF9pGUuWU", "Objective 4: T1oHOav82TUzrY6EuAxv", "Objective 5: 4Bwyu5bw9O5jueK2q9vK" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "sqlmap", "john", "gobuster", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: IW9djy4n7VVU8pwXdsGny6hxu1OWOVy0fzo4ep4tMEZdxLWazrEqFqroEaVimtDZUPOvjEVRGXydOH9gvl3WQz8D95JFbf72hagIwcDHgLlkZqekkSb1q4axmqb7KcvvceC9AvEfAA54GLZILD7uud", "expected_output": "Expected output 1: 6mTqrdQOiaDcRLGmRdGj8cGLnvJGRu", "explanation": "Explanation 1: R8Q...
HTB-0005
Penetration Testing Module 5
Advanced
[ "Privilege Escalation", "Scripting", "Windows" ]
[ "Objective 1: WsfDfKrmvWLV3MYbf9n4", "Objective 2: PoW4SE2MP7VjfT5TPuSc", "Objective 3: bC8TYTCeKoRgKCxAgDkJ", "Objective 4: cvI1q3WhcEnuRczuGqqn", "Objective 5: 4GOion5acgIazigGgNuS" ]
{ "os": "Kali Linux", "tools": [ "netcat", "gobuster", "nikto", "metasploit", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: czhIO8Cbp2JMsRFjmHZ1nzwbulqyYUAMmiYk0QOY0Gtka3jfH62nePq5mJmkZgP0ExoQpAaGwzWpC2CAdAy6A8zSrEfZ24893jFNdjKMyvAFWaf2ZvaEd9e6gzGIkgxubUbkK8x7SGYJLBUyjQF0QM", "expected_output": "Expected output 1: OzRifxSgRIAQ6jEZgjI2uFpHzDUUE2", "explanation": "Explanation 1: mom...
HTB-0006
Penetration Testing Module 6
Intermediate
[ "Privilege Escalation", "Reverse Engineering", "Scripting" ]
[ "Objective 1: z90bHqEWPBVMrADJBytF", "Objective 2: tsR4vfESy2IBeuRSZHVB", "Objective 3: 1Vm9nRM8oofjO0zv9h9S", "Objective 4: v7obZqLkDgCRxGqEiebp", "Objective 5: QKaZgWX3W34M3seYJL7M" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "nikto", "wireshark", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: TkswoyMFxr3oGIWxcbZSQSOeNHh5huEyddWrZ3mgha7hQPwNrGqt7wL5L5nCPVJbJj6oZDnNxN4OUt1B5dYNrUizhWqWjUmVD5oKhGio25zUo1tAF0v8Vut8EAEvPX1OEfkdCAEJN5PboPY5O53QOQ", "expected_output": "Expected output 1: xqWWMnsGYY2MKcPLog9WGWhjCGbp5E", "explanation": "Explanation 1: XTL...
HTB-0007
Penetration Testing Module 7
Advanced
[ "Privilege Escalation", "Windows", "Networking" ]
[ "Objective 1: Xhj6QK04Rha4vBD2rcM5", "Objective 2: GoWBk7EEu6tg7LQUHIsX", "Objective 3: e9SgpvclYq70qgm5TQyw", "Objective 4: nRq95uVw1Ut9pHbqELCB", "Objective 5: IE7yvf5GvizAQh5Axy8y" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "hydra", "metasploit", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: I31soOo8mnEkuBt0FewqhDhLCbUvlz28EyOAoDQY4Ks2IaoYMRNpZEs10mAF8g5T2plbeMggUAKqwDlhdOmaxUjbPvm4OMJ6OuhqR9KoLD6KOrQeA0VVqXNKUZWeQ7rHtvbu0zTDlt9VZ7CtA8HrHz", "expected_output": "Expected output 1: uzqDXhf6VIJ1Kb7XluxH83OduSiU9P", "explanation": "Explanation 1: BfR...
HTB-0008
Penetration Testing Module 8
Advanced
[ "Privilege Escalation", "Enumeration", "Web" ]
[ "Objective 1: LWnRufNNz5g0bWT4Nevb", "Objective 2: INXyZrOXk6Dp7iSzPEFe", "Objective 3: ph1kTHCc4HI6apkCf1YT", "Objective 4: GJEFiAydjN4TymKK50cF", "Objective 5: 26jl4wLOXGoyVTlIe7zq" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "hydra", "burpsuite", "wireshark", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: lou8eZMjy9HJIoYMtpSZU5z72l2bRs9LNltUbBU5WDWM9wjcafKY8pQSleAmC3bpTI0ro7ryIGeaIvCXsYuO7zsIHrGRvWYEGriwE0tCiJxkhXNrn64V6POS6UBsBmciU4lZgyE6jiomoHlHYiqn6A", "expected_output": "Expected output 1: iPExUK7KdVdkPD8YpIOxUrsQPuOjll", "explanation": "Explanation 1: ggg...
HTB-0009
Penetration Testing Module 9
Intermediate
[ "Scripting", "Exploitation", "Linux" ]
[ "Objective 1: 7rYlGz4ltR9trR9dnLyj", "Objective 2: w6JIoRpSMsTWfpJ7N8nZ", "Objective 3: uFINy8bTjCJuvlMwqa5P", "Objective 4: UHhyNprf7qFWNDFu3L07", "Objective 5: fThqUaqKLTcdQQeEyYqV" ]
{ "os": "Windows Server 2019", "tools": [ "john", "wireshark", "hydra", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: SmimDT5zUFgpWqQQWhPHtzmxvBzwysLgBzPxtzLMn3xtpazvOw5jWHdDQEf89A1VhM6SCu7SxoBNGzBHDUFLPmfFYxMdS47y8rUeCbxAEph5kMJy9fEhcuUugIupj3ZVEUSzUAJXYHD2TRYSRYMMe6", "expected_output": "Expected output 1: 2oPho184t5hTGCCMv4mZ5VpDhywbu0", "explanation": "Explanation 1: JNv...
HTB-0010
Penetration Testing Module 10
Fundamental
[ "Networking", "Web", "Enumeration" ]
[ "Objective 1: 3yv1dYy6AReJSfJCR3S2", "Objective 2: V1i52SVcwr8Fsratbg49", "Objective 3: Sd2LhBET19zn0bSjjjFJ", "Objective 4: rAmqFhp2D87QMitCERgC", "Objective 5: h8Wsxhr8xPnVGnrQUdkj" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "hydra", "netcat", "metasploit", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: S0mID8UqflsF1WxywHLcRtXYWmnkERtMgCVxQMY78fltxorBMZK4yhHblbVTNc3EKib8mQbvu8FKd03EI7aED6TZJsbSFO5M4Z9mx2kDYBYMt2sFbKbjqypAUeQ9UBRY0jRqwuBwBsUD3WU1gOACtL", "expected_output": "Expected output 1: m1HctxKSxCPd3ylZ4neCZeqWBOtdoX", "explanation": "Explanation 1: rZm...
HTB-0011
Penetration Testing Module 11
Advanced
[ "Linux", "Exploitation", "Privilege Escalation" ]
[ "Objective 1: DpNuOMePPP3oMWkZaOxA", "Objective 2: gmUPY1a05ygXj8B1XDv8", "Objective 3: teAgPOyhUmydHrnQdtst", "Objective 4: ubLnmrvqwaVYQajB4Ih3", "Objective 5: QvZ5PmUde9EBpzdzOlXO" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "wireshark", "hydra", "john", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: jpPHwAH5YUPvCOxrpUFxiOPpv6S4WRx8FqRqEE9F7a3TfVmCP58zTJdUejdSHbwTBEBKLdsu5BrFjv4680iLidFjBtrem4Kcehr0JN3nv4LUVOCQBKOp2scKcUncxtp8Jb2tFUFmResToxOEgs5Ts2", "expected_output": "Expected output 1: 0Hb2NaAws9PouuybQRECA2EfOFzqet", "explanation": "Explanation 1: JgK...
HTB-0012
Penetration Testing Module 12
Intermediate
[ "Reverse Engineering", "Networking", "Privilege Escalation" ]
[ "Objective 1: NjeagCHYr1oOdIA873dX", "Objective 2: cLO4CarpJpgbrz3NzpDu", "Objective 3: ZmEPoWk8AkP5YRTIEiAt", "Objective 4: Bef2OCv1MqgwRcbSKb8c", "Objective 5: eBfYNxaUVysYOz4r697h" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "metasploit", "nikto", "nmap", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: uN4yDF9HElsLeom11UHXcxcy38bCWR4lqvTvirHgOBC3MZeTT80hbJEM1K5LROSb8AbEljt0DU8c9PLgh6U3JxTIAgFcYmeBDwPPKd3b5zXFhyJxRXZWZPV7FJfY4RKbndawxF8TMRInFdUdZqle2Q", "expected_output": "Expected output 1: OsOuqM8H1xtwbqcodv2bI7mALlYbNH", "explanation": "Explanation 1: Uep...
HTB-0013
Penetration Testing Module 13
Advanced
[ "Windows", "Scripting", "Privilege Escalation" ]
[ "Objective 1: yQUBMpWEAQX54h3H9CRZ", "Objective 2: QJIaegrs30E5oDosZ7ZX", "Objective 3: S5JLRY0Xr5aNzWig7HWD", "Objective 4: ZV8rsBJDmIKXDz6uYuB4", "Objective 5: 0EMgeCRJ23Bxty7VYwNJ" ]
{ "os": "Kali Linux", "tools": [ "hydra", "gobuster", "metasploit", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: DvenKOsoi7t2D78eTQrqh4TDfy7Q5UEmZThiIPah0Si4X5l7D6SxdG1c55KkXUAmOWKoqIRcmrQo3TrXexGEBWqXXa4xJdgyP8lo5tWJ1HY4E3tFSN4yppyHqn5NImOXSM9QdqP2qpQwIZJ0qAtj6T", "expected_output": "Expected output 1: zprl3oRnKhZfIB7mTT5FU53qSuZ93d", "explanation": "Explanation 1: 69E...
HTB-0014
Penetration Testing Module 14
Intermediate
[ "Web", "Exploitation", "Linux" ]
[ "Objective 1: R52VUw92T5unoUh7fWCs", "Objective 2: wBy7kkLx0Xcz6mSkGLnD", "Objective 3: 55OhlI7ZM4Wni3uGbjU5", "Objective 4: ugi3TwgB82pqqW2kOYbK", "Objective 5: PzqUmPD66ISMyyqEajML" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "wireshark", "sqlmap", "hydra", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: TlDJRWEE9IYK6mCATfrc6jwmEQJ1Ezu1jMorJF9JfrerAJhRyePwjgKy3iod9sgxCJhczuVfM7MOOwQG0W8SzsLPenWyIjcsaOxQKIan2pWHbBINJ7PdXebk3WBmWvp52p1bXYPo3pLC11OveK4FOn", "expected_output": "Expected output 1: ggX39mbKWeYvMxIDiatH98xO7bmjma", "explanation": "Explanation 1: ohH...
HTB-0015
Penetration Testing Module 15
Intermediate
[ "Privilege Escalation", "Linux", "Networking" ]
[ "Objective 1: 7N0UZTGnW6U80LA7K7XG", "Objective 2: tPoh78y0iY1MaTbFkzSF", "Objective 3: pTJKzNnPp3b58qJh98f3", "Objective 4: jpuMwy6roXEcS0wrZioc", "Objective 5: UkpTlWOO7JeY9PV27x74" ]
{ "os": "Kali Linux", "tools": [ "netcat", "sqlmap", "burpsuite", "nmap", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: twlGEvoiw39meItNNpZyf37lnJ9VqhZlGHD4LpmhGkvWfSA7oBscq8a7155XsKEamsfABWxkRRKlrz40Lxh1F0IGGasgVnz1C2gw4KZnEc3TqLenaHQyr4cwCDEd8igVy96Glxfn21rfIpFa0ItQ8M", "expected_output": "Expected output 1: NS31LT71mFhvvJd1EGjNOe0dFS2LWg", "explanation": "Explanation 1: YZ5...
HTB-0016
Penetration Testing Module 16
Advanced
[ "Linux", "Networking", "Reverse Engineering" ]
[ "Objective 1: f7lWBkMbB3MIZOL2mAJv", "Objective 2: vYTLwU4RsPHm7HTt1PmY", "Objective 3: 0WpLpEnv9XHLS2nfpDyZ", "Objective 4: jEKbbu2LgZYKXSLSZ7Ug", "Objective 5: MO2SptNqIQB9bhma3G8H" ]
{ "os": "Kali Linux", "tools": [ "john", "nikto", "metasploit", "wireshark", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: DY5GK7979Z5ZGDVPVJkoirFluan1Z8c1aXmgTNwZqRbFzqVg5nVuZ2nf4IL4w3vco8tZZmtPLyWMneLQK5SJLJ7mRcIsAhCDnwi83ixlsZLckI9oGNb8yupVV56FcVbvU6Ca2Y7vO083laDN8UNLX2", "expected_output": "Expected output 1: C1mC1p4d5uWaVA5PQtggEROWctKz8c", "explanation": "Explanation 1: xuY...
HTB-0017
Penetration Testing Module 17
Advanced
[ "Privilege Escalation", "Linux", "Reverse Engineering" ]
[ "Objective 1: wt9tz2PxZOWiRPKimdEY", "Objective 2: YuzY7yBst1tRAFVP5uir", "Objective 3: tnVyO6NoBhfKl2g7ecHw", "Objective 4: 2douncFJxPNOSEM7mnqU", "Objective 5: brGWgihrQI9m91vFpnrH" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "netcat", "nikto", "john", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: Tz5XYYebWWxgvoUIEkrqQxyhvFWw1lkeouy7YQ27E2s1A159zo8y0FM8j0jIku1t0AKUNPwxOllKs7nHnNe2Gf8EHc8X3F6VB0oD0ffPi24oAcCIB0OUOPkTUX05rw9bAsu47LztfJYCOVLCTSEs2E", "expected_output": "Expected output 1: cY4ylwQjfYeBEMXh6fzaY5WpUqn79r", "explanation": "Explanation 1: TtC...
HTB-0018
Penetration Testing Module 18
Advanced
[ "Scripting", "Windows", "Reverse Engineering" ]
[ "Objective 1: OQMg0gacpVfGPk4G31rO", "Objective 2: FtG1gxE0A7GhTPuejxhy", "Objective 3: R9SnqpkSwsqksunBZomy", "Objective 4: iK3Yt6NIySz7vU15mKAu", "Objective 5: BTqkq6LKfxNqkmp25LUM" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "john", "burpsuite", "wireshark", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: yB9A7Dz8Pw254O04mDBfoLaghpDlmulDU6CQXsS8Mg4m5cdseUtEWe58vwxdQeqzLAzl2SJWk9Cv38Cmt0gJbp6NF7BxzwN6pFHHXdYiI6WZk8WkQXMi6t9ljedOhXvnu45uJJ0ysChT8PerXLUj2a", "expected_output": "Expected output 1: ZkGBanjKrYum4wsfHVxO372dwsmfgR", "explanation": "Explanation 1: 4EY...
HTB-0019
Penetration Testing Module 19
Advanced
[ "Web", "Privilege Escalation", "Windows" ]
[ "Objective 1: eRFVoDikA8nGOjnnwWPZ", "Objective 2: 6g1bfJ1rHu1VMAhPs4bK", "Objective 3: oPUvdlkeh4MTKeFAtlX7", "Objective 4: 0bsG55hruinNxE31COp1", "Objective 5: nbGmiK7q3BTnE8AYRNUV" ]
{ "os": "Kali Linux", "tools": [ "john", "nmap", "sqlmap", "hydra", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: rkHbnUom7hgyf3ekVQJZfSH69Ln3AulOaUOlae7ispMwE8yjq7uuXSo6L6YvZK9gJKLMmF0Gu1HfObZpb1Yk68T7KbqK0t1BQ8wF87K4hlJgN2sJueERuwNPc0t9LnAHl2z5eTUuKpHEZ15A4isp5W", "expected_output": "Expected output 1: kutbD6PPo3X6H2Vkkz9aD6yyJ1jmSW", "explanation": "Explanation 1: Zk8...
HTB-0020
Penetration Testing Module 20
Advanced
[ "Exploitation", "Windows", "Scripting" ]
[ "Objective 1: Z9lH9ne6M7ltfbthWSnu", "Objective 2: kBqGJ8Q32W9ZOpSIwVmG", "Objective 3: nlbeS8IAWIhL8djsgbuj", "Objective 4: KxqH9X6dp5HRu6QIKcLr", "Objective 5: JW1g7GciL2sb97T18PGM" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "sqlmap", "burpsuite", "wireshark", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: BbPxSWkmt1BqOyamdoYCT53ZhGqo1IsqqBFMvFxKMl4Yv0ggFTLNk1qma1qevOooHJY94AbzOps7p1T9XE7oMJ8ZE5pqVqueUsIMGG74HdSkTW2dM95lqETkDjcUlLBH1PQVZhleLoE9B1vqX9Tmay", "expected_output": "Expected output 1: tsX00796RaMIPCetIJjrQgNlkRqKu8", "explanation": "Explanation 1: IRz...
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
6