Contenido con criterio
Cada módulo se diseña partiendo de vulnerabilidades y técnicas reales. Nada de ejemplos "de libro" que luego no se ven en auditorías.
SixHack Academy es una academia online de hacking ético y pentesting dirigida por un investigador con 67 CVE publicados y reconocimientos internacionales en CERN, WHO, UNESCO, Harvard y U.S. Department of Commerce. No es un curso más de teoría: aquí enseñamos lo que hacemos todos los días en el mundo real.
Cuatro principios que marcan la diferencia frente a la formación genérica en ciberseguridad.
Cada módulo se diseña partiendo de vulnerabilidades y técnicas reales. Nada de ejemplos "de libro" que luego no se ven en auditorías.
El 70% del tiempo se pasa en el laboratorio. SQLi, XSS, IDOR, SSRF, file upload, path traversal y más, en entornos controlados.
El investigador detrás de los cursos sigue descubriendo y publicando vulnerabilidades. El material se actualiza con lo que funciona hoy.
Del hallazgo al informe: enumerar, validar, explotar, documentar y comunicar impacto. Como se hace en auditorías reales.
Head of Cybersecurity en K-LAGAN · Investigador en seguridad ofensiva · Conocido en la comunidad como 6h4ack
Ingeniero informático especialista en seguridad ofensiva, con enfoque en investigación de vulnerabilidades y auditoría de aplicaciones en escenarios reales. Actualmente lidera la estrategia y el gobierno de seguridad en K-LAGAN, compaginando esa responsabilidad con la publicación de investigación independiente y la dirección técnica de SixHack Academy.
Su trabajo se centra en identificar y evaluar vulnerabilidades de impacto real, con un historial verificable de divulgación responsable ante organismos y empresas de referencia a nivel internacional.
Vulnerabilidades descubiertas y divulgadas de forma responsable. Cada tarjeta enlaza al registro oficial.
Reflected Cross-Site Scripting (XSS) in Sanoma’s Clickedu Summary A reflected Cross-Site Scripting (XSS) vulnerability has been discovered in Clickedu. This vulnerability allows an attacker to execute JavaScript code in…
Multiple vulnerabilities in GDTaller Summary Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a…
Multiple vulnerabilities in GDTaller Summary Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a…
Reflected Cross Site Scripting (XSS) vulnerability in Support Board Summary A Reflected Cross Site Scripting (XSS) vulnerability has been found in Support Board v3.7.7. This vulnerability allows an attacker to execute…
SQL Injection vulnerability in Support Board Summary A SQL Injection vulnerability has been found in Support Board v3.7.7. This vulnerability allows an attacker to retrieve, create, update and delete database via…
SQL Injection in Cuantis Summary SQL Injection in Cuantis. This vulnerability allows an attacker to retrieve, create, update and delete databases through the 'search' parameter in the '/search.php' endpoint. Severity ?…
SQL Injection in Sinturno Summary SQL injection vulnerability in Sinturno. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'client' parameter in the…
Reflected Cross-Site Scripting (XSS) in Eventobot Summary A reflected Cross-Site Scripting (XSS) vulnerability has been found in Eventobot. This vulnerability allows an attacker to execute JavaScript code in the…
SQL injection in Eventobot Summary A SQL injection vulnerability has been found in Eventobot. This vulnerability allows an attacker to retrieve, create, update and delete databases through the 'promo_send' parameter in…
Reflected Cross-Site scripting (XSS) in SOTE's SOTESHOP Summary Reflected Cross-Site Scripting vulnerability in SOTESHOP, version 8.3.4. THis vulnerability allows an attacker execute JavaScript code in the victim's…
Reflected Cross-Site Scripting in PideTuCita Summary Reflected Cross-Site Scripting (XSS) vulnerability in PideTuCita. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending…
SQL injection in Infoticketing Summary SQL injection vulnerability in Infoticketing. This vulnerability allows an unauthenticated attacker to retrieve, create, update, and delete the database by sending a POST request…
Reflected Cross-Site Scripting (XSS) in Lewe WebMeasure Summary Reflected Cross-Site Scripting (XSS) vulnerability in '/index.php' in Lewe WebMeasure, which allows remote attackers to execute arbitrary code through the…
Authentication bypass in AutoGPT de Thesamur Summary An authentication bypass vulnerability has been found in Thesamur's AutoGPT. This vulnerability allows an attacker to bypass authentication mechanisms. Once inside…
Stored Cross-Site Scripting (XSS) vulnerability in Alkacon's OpenCms Summary Stored Cross-Site Scripting (XSS) in Alkacon's OpenCms v18.0, which occurs when user input is not properly validated when sending a POST…
Reflected Cross-Site Scripting (XSS) vulnerability in Alkacon's OpenCms Summary Reflected Cross-site Scripting (XSS) in Alkacon's OpenCms v18.0, which allows an attacker to execute JavaScript code in the victim's…
Reflected Cross-Site Scripting (XSS) in QRGen's Riftzilla Summary Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows an attavker to execute JavaScript code in the victim's…
HTML injection in Isshue from Bdtask Summary HTML Injection vulnerability in Isshue by Bdtask, consisting os an HTML injection due to a lack os proper validation of user input by sending a POST request to…
Reflected Cross-Site Scripting (XSS) in IsMyGym Summary Reflected Cross-Site Scripting (XSS) vulnerability in IsMyGym by Zuinq Studio. This vulnerability allows an attacker to execute JavaScript code in the victim's…
HTML injection in multiple Botble products Summary HTML injection vulnerability in multiple Botble products such as TransP, Athena, Martfury, and Homzen, consisting of an HTML injection due to a lack of proper…
Multiple vulnerabilities in WorkDo products Summary Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's HRMGo, consisting of a lack of proper validation of user input by sending a POST request to…
Multiple vulnerabilities in WorkDo products Summary Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's TicketGo, consisting of a lack of proper validation of user input by sending a POST request to…
Multiple vulnerabilities in WorkDo products Summary Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's eCommerceGo SaaS, consisting of a lack of proper validation of user input by sending a POST request to…
Multiple vulnerabilities in WorkDo products Summary Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's eCommerceGo SaaS, consisting of a stored XSS due to a lack of proper validation of user input by sending a…
Multiple vulnerabilities in Imaster products Open configuration options Summary Imaster's Patient Record Management System contains a stored Cross-Site Scripting (XSS) vulnerability in the endpoint…
Multiple vulnerabilities in Imaster products Open configuration options Summary Imaster's Patient Records Management System is vulnerable to SQL Injection in the endpoint ‘/projects/hospital/admin/complaints.php’…
Multiple vulnerabilities in Imaster products Open configuration options Summary Imaster's MEMS Events CRM contains an SQL injection vulnerability in‘keyword’ parameter in ‘/memsdemo/exchange_offers.php’. Severity ? 8.7…
Multiple vulnerabilities in Imaster products Open configuration options Summary Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ parameter in ‘/memsdemo/login.php’. Severity ? 9.3 (Critical)…
Reflected Cross-Site Scripting (XSS) in Governalia by IDI Eikon Summary Reflected Cross-Site Scripting (XSS) in IDI Eikon's Governalia. The vulnerability allows an attacker to execute JavaScript code in the victim's…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Stored XSS in Smart School Summary Stored Cross Site Scripting (XSS) vulnerability in Smart School 7.0 due to lack of proper validation of user input when sending a POST request to '/online_admission', wich affects the…
SQL injection on the virtual campus platform of Diseño de Recursos Educativos Summary SQL injection vulnerability in the DRED virtual campus platform. This vulnerability allows an attacker to retrieve, create, update,…
Stored XSS in Creativeitem Ekushey CRM Summary Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the…
Stored XSS in Creativeitem Ekushey CRM Summary Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the…
Stored XSS in Creativeitem Ekushey CRM Summary Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the…
Stored XSS in Creativeitem Sociopro Summary Stored XSS vulnerability in Creativeitem Sociopro due to lack of proper validation of user inputs via the endpoint '/sociopro/profile/update_profile', affecting to 'name'…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameter…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameter…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameter…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameters…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameters…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameters…
Reflected Cross-Site Scripting (XSS) in Azon Dominator Summary Reflected Cross-Site Scripting (XSS) vulnerability in Azon Dominator. This vulnerability allows an attacker to execute JavaScript code in the victim's…
Stored Cross-Site Scripting (XSS) in the Multi-purpose Inventory Management System Summary Cross-site Scripting (XSS) vulnerability stored in Multi-Purpose Inventory Management System, consisting of a stored XSS due to…
Reflected Cross-Site Scripting (XSS) in WebWork Summary Reflected Cross-Site Scripting (XSS) vulnerability in WebWork, which allows remote attackers to execute arbitrary code through the 'q' and 'engine' request…
HTML injection in Vox Media's Chorus CMS Summary HTML injection in Vox Media's Chorus CMS. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL using…
Stored Cross-Site Scripting (XSS) in Pharmacy POS PHP Script Summary Stored Cross-Site Scripting (XSS) vulnerability in Pharmacy POS PHP Script. This vulnerability allows an attacker to execute JavaScript code in the…
Reflected Cross-Site Scripting (XSS) in osCommerce Summary Reflected Cross-Site Scripting (XSS) in osCommerce v4. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the…
Cross-Site Scripting (XSS) reflected in Nosto Summary Reflected Cross-Site Scripting (XSS) vulnerability in /pages/search-results-page in Nosto, which allows remote attackers to execute arbitrary code via the q GET…
Reflected Cross-Site Scripting (XSS) in Phoenix CMS Summary A Reflected Cross Site Scripting (XSS) vulnerability was found in '/search' in Phoenix Site CMS from Phoenix, which allows remote attackers to execute…
Reflected Cross-Site Scripting (XSS) in Bagisto Summary A Reflected Cross-Site Scripting (XSS) vulnerability has been found in Bagisto v2.0.0. This vulnerability allows an attacker to execute JavaScript code in the…
SQL Injection in DomainsPRO Summary SQL injection vulnerability in DomainsPRO 1.2. This vulnerability could allow an attacker to retrieve, create, update and delete databases via the “d” parameter in the “/article.php”…
Reflected Cross-Site Scripting (XSS) in AbanteCart Summary Reflected Cross-Site Scripting (XSS) vulnerability in AbanteCart v1.4.0, that could allow an attacker to execute JavaScript code in a victim's browser by…
Reflected Cross-Site Scripting (XSS) in AbanteCart Summary Reflected Cross-Site Scripting (XSS) vulnerability in AbanteCart v1.4.0, that could allow an attacker to execute JavaScript code in a victim's browser by…
Cross-Site Scripting vulnerability in OpenCart Summary Cross-Site Scripting vulnerability in OpenCart versions prior to 4.1.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by…
HTML injection vulnerability in OpenCart Summary HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a…
HTML injection vulnerability in OpenCart Summary HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a…
HTML injection vulnerability in OpenCart Summary HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a…
Cross-Site Scripting (XSS) vulnerability in Soteshop Summary Cross-Site Scripting (XSS) vulnerability in Soteshop, versions prior to 8.3.4, which could allow remote attackers to execute arbitrary code via the ‘query’…
SQL Injection CIGES Summary A SQL Injection vulnerability has been found in Ciges 2.15.5 from ATISoluciones. This vulnerability allows an attacker to retrieve, create, update and delete database via $idServicio…
Internet Web Solutions Sublime CRM HTTP POST Request inicio.php cross site scripting Summary A vulnerability, which was classified as problematic, was found in Internet Web Solutions Sublime CRM up to 20250207. Affected…
A Cross-Site Scripting vulnerability has been found in Janto v4.3r11 from Impronta.
Reconocimientos por divulgación responsable e investigación de vulnerabilidades.
Formación técnica verificada en ofensiva, red team y appsec.
Un flujo de aprendizaje pensado para construir habilidad real y reproducible, paso a paso.
Redes, HTTP/HTTPS, aplicaciones web y flujo del tráfico. Sin estos cimientos, las técnicas ofensivas son trucos sin contexto. Empezamos por aquí aunque tengas experiencia, para fijar vocabulario común.
Cómo estudia un atacante un objetivo antes de tocar nada: descubrimiento de superficie, mapeo de endpoints, identificación de tecnologías y priorización. La enumeración buena ahorra horas en todo lo que viene después.
Cada vulnerabilidad del OWASP Top 10 se trabaja en un laboratorio real: SQL injection, XSS, IDOR, SSRF, path traversal, file upload, deserialización, SSTI... Detección, prueba de concepto e impacto.
Encontrar un fallo no basta: hay que demostrar que es explotable y medir el impacto. Te enseñamos a construir evidencia reproducible que aguanta una auditoría seria.
De los hallazgos al documento final: cómo priorizar, describir riesgo, proponer remediación y comunicar de forma útil tanto al equipo técnico como a negocio. El entregable que se exige en el mundo real.
Tres perfiles tipo que encajan especialmente bien con la metodología de SixHack Academy.
Nunca has hecho hacking ético y quieres entrar con base sólida, no con 20 tutoriales sueltos de YouTube.
Ya sabes de tecnología pero nunca has auditado desde el otro lado. Aquí aprendes a romper lo que construyes.
Ya haces ciberseguridad pero quieres profundizar en web hacking y técnicas reales de explotación.
Lo que más nos preguntan sobre el instructor, la metodología y los cursos.
Entra al catálogo, elige tu curso y empieza a practicar con labs reales desde hoy.