$loading...
Five browser-based vulnerable labs to practice your offensive security skills. Test XSS, SQL injection, command injection, and SSTI payloads in safe sandboxed environments. No setup required.
A search form reflects user input into the page without sanitization. Inject a payload that executes JavaScript.
Objective: Make an alert(), prompt(), or confirm() dialog appear in the sandbox.
This lab runs entirely in your browser. XSS payloads execute inside a sandboxed iframe with no access to the parent page. No real servers, databases, or systems are affected. Practice responsibly and only test against systems you own or have authorization to test.