SixHack Academy

Offensive Cybersecurity academy backed by real research.

SixHack Academy is an online ethical hacking and pentesting academy led by a security researcher with 67 published CVEs and international recognition from CERN, WHO, UNESCO, Harvard and the U.S. Department of Commerce. This isn't another theory course: we teach what we do in the real world every day.

Vulnerabilities
67CVE
Hall of Fame
17orgs
Certifications
14earned
Pillars

What defines SixHack Academy

Four principles that set us apart from generic cybersecurity training.

🎯

Content with judgment

Every module is designed from real vulnerabilities and techniques. No "textbook" examples that never show up in real audits.

🧪

Labs at the core

70% of your time is spent in the lab. SQLi, XSS, IDOR, SSRF, file upload, path traversal and more, in controlled environments.

🔬

Active research

The researcher behind the courses keeps finding and publishing vulnerabilities. Material is updated with what actually works today.

📝

Professional methodology

From finding to report: enumerate, validate, exploit, document and communicate impact. The way real audits are done.

Lead instructor

Gonzalo Aguilar García

Head of Cybersecurity at K-LAGAN · Offensive security researcher · Known in the community as 6h4ack

Computer engineer specialized in offensive security, focused on vulnerability research and real-world application auditing. Currently leads security strategy and governance at K-LAGAN, combining that role with independent research publishing and the technical direction of SixHack Academy.

His work focuses on identifying and assessing real-impact vulnerabilities, with a verifiable track record of responsible disclosure to leading international organizations and companies.

Red Team and Web/Mobile Pentesting
Application Security (AppSec)
Responsible Disclosure (CVD)
Automation with Python and Bash

Public research: published CVEs

Vulnerabilities discovered and responsibly disclosed. Each card links to the official record.

67 total CVEs

Hall of Fame and acknowledgments

Recognition for responsible disclosure and vulnerability research.

UNESCO
WHO
CERT-EU
CERN
Harvard University
Bayer
U.S. Department of Commerce
Universitetet i Oslo
Ayuntamiento de Madrid
Berlin.de
LG Electronics
Bournemouth University
Utrecht University
NCSC-NL (Dutch Gov)
BASF
EducaMadrid
GovTech Singapore

Certifications earned

Verified technical training in offensive security, red team and appsec.

OSCP
OSWE
OSEP
OSWP
CRTO
CRTP
CRTE
CARTP
CEH
eCPTXv2
eWPTXv2
eCDFP
eCTHP
eMAPT
Methodology

How the academy works

A learning flow designed to build real, reproducible skill step by step.

1

Technical fundamentals

Networking, HTTP/HTTPS, web applications and traffic flow. Without these foundations, offensive techniques are just tricks without context. We start here even if you have experience, to establish shared vocabulary.

2

Enumeration and reconnaissance

How an attacker studies a target before touching anything: surface discovery, endpoint mapping, technology identification and prioritization. Good enumeration saves hours in everything that follows.

3

Hands-on exploitation in labs

Every OWASP Top 10 vulnerability is worked in a real lab: SQL injection, XSS, IDOR, SSRF, path traversal, file upload, deserialization, SSTI... Detection, proof of concept and impact.

4

Validation and evidence

Finding a bug isn't enough: you have to prove it's exploitable and measure impact. We teach you how to build reproducible evidence that holds up in a serious audit.

5

Professional report

From findings to the final document: how to prioritize, describe risk, propose remediation and communicate usefully to both technical teams and business. The deliverable that's expected in the real world.

Who it's for

Who this academy is designed for

Three profiles that fit especially well with the SixHack Academy methodology.

🚀

If you're starting from zero

You've never done ethical hacking and you want to start with solid ground, not with 20 scattered YouTube tutorials.

  • Start with networking and web fundamentals
  • Clear progression with no technical gaps
  • Step-by-step guided labs
🔧

If you're a dev or sysadmin

You already know tech but you've never audited from the other side. Here you learn to break what you build.

  • Learn the applied offensive approach
  • Find flaws you couldn't see before
  • Your code comes out better protected
🎯

If you want to specialize

You already work in cybersecurity but want to go deeper into web hacking and real exploitation techniques.

  • Complex vulnerability chains
  • Real research cases
  • Full professional methodology
FAQ

Frequently asked questions about the academy

What people ask most about the instructor, the methodology and the courses.

Who is behind SixHack Academy?
SixHack Academy is led by Gonzalo Aguilar García (6h4ack), a computer engineer specialized in offensive security and current Head of Cybersecurity at K-LAGAN. He has 67 published CVEs and recognition from organizations including CERN, WHO, UNESCO, Harvard University and the U.S. Department of Commerce.
What makes this offensive cybersecurity academy different?
The content is designed by a researcher with a public, verifiable track record of discovering real vulnerabilities. It's not a course recorded from other courses: it's built from direct experience auditing production applications.
How long does it take to complete a course?
It depends on your level and time commitment. Courses have no deadline: you can move at your own pace, pause, come back and access the labs whenever you need. Access is lifetime.
Is there direct instructor support?
Yes. One of the real advantages of the academy is direct access for questions, feedback on your findings and technical guidance. It's not a pre-recorded video where you're left alone with a blocker.
What topics do the courses cover?
Full offensive cybersecurity: networking fundamentals, HTTP/HTTPS, enumeration and reconnaissance, OWASP Top 10 with its variants (SQLi, XSS, IDOR, SSRF, file upload, path traversal), web exploitation techniques, professional Burp Suite usage, audit methodology and report writing.

Start training in offensive cybersecurity

Browse the catalog, pick your course and start practicing with real labs today.