Real vulnerabilities, running in real sandboxes you break into from your browser — with tutorials written in Tanglish and English.
Tutorials available in
/labs · what's inside
The method
Each lab opens in a split screen. The vulnerable app on one side. The tutorial and your terminal on the other.
No 40-minute video first. No 12-page PDF. The whole point is to get your hands on something exploitable in under sixty seconds.
If a step is confusing, leave feedback in the lab — we actually read it, and tutorials get rewritten.

The curriculum
Not "you'll learn about cybersecurity." Specifically these things — with a real lab attached to each.
SQL injection
Login bypass, blind SQLi, UNION attacks
Cross-site scripting
Reflected, stored, and DOM-based XSS
A note from us
We tried teaching this the way everyone else does — long lecture videos, slide decks, links to external CTF sites. About half the room understood. The other half nodded politely and quietly looked up the words.
The hard part wasn't the security. It was English.
So we wrote every tutorial twice — once in Tanglish, once in plain English — and we'll keep adding more languages as we grow. Cyfotok Labs is small and opinionated. There aren't 500 labs yet. The ones we have, we've sat with someone less technical than you and watched them work through.
Pricing
Free
₹0 foreverBeginner labs, leaderboard, progress tracking. The full platform — not a teaser.
Everything: advanced labs, learning paths, certificates, priority support.
Colleges can buy seats in bulk with a discount and get an instructor dashboard. Email sales@cyfotok.com.
See the pricing pagearrow_forwardA hands-on cybersecurity learning platform built for students from South India. Every lab runs a real vulnerable application in a sandboxed environment, with step-by-step tutorials in Tanglish or English so you can learn in the language you actually think in.
Yes — the beginner labs and the full free tier are free forever, no credit card. Pro is ₹399/month or ₹2,489/year if you want unlimited access to advanced labs, learning paths and certificates.
No. The first few labs assume only that you've used a computer and know what HTML and a browser are. Each lab teaches the underlying concept before asking you to exploit it.
You don't need to read more about it. Sign up, pick a lab, and we'll see you in the terminal.
╴╴ no credit card · cancel anything any time ╴╴
$ ▌
$
CSRF
Forging requests as another user
Command injection
Breaking out of shell calls
File upload bugs
Bypassing MIME and extension checks
Directory traversal
Reading files you shouldn't
JWT attacks
Algorithm confusion, key cracking
Broken authentication
Sessions, password resets, weak flows
IDOR
Reading other users' data via the API
Subdomain enumeration
Find what they didn't mean to expose
Plus a learning path that strings them together end-to-end, so you're not just collecting techniques — you're building toward something you can put on a résumé. See the paths.
SQL injection, XSS, CSRF, IDOR, command injection, file upload bugs, JWT attacks, directory traversal, subdomain enumeration, broken authentication and more. Roughly the OWASP Top 10 plus the practical recon and exploitation skills bug-bounty hunters use.
Completely. You're attacking targets we host inside isolated sandboxes — never real third-party systems. This is the same legal practice setup that platforms like HackTheBox and TryHackMe use.
Yes. Finishing a learning path unlocks a verifiable certificate you can post on LinkedIn or attach to your résumé.