Content with judgment
Every module is designed from real vulnerabilities and techniques. No "textbook" examples that never show up in real audits.
SixHack Academy is an online ethical hacking and pentesting academy led by a security researcher with 67 published CVEs and international recognition from CERN, WHO, UNESCO, Harvard and the U.S. Department of Commerce. This isn't another theory course: we teach what we do in the real world every day.
Four principles that set us apart from generic cybersecurity training.
Every module is designed from real vulnerabilities and techniques. No "textbook" examples that never show up in real audits.
70% of your time is spent in the lab. SQLi, XSS, IDOR, SSRF, file upload, path traversal and more, in controlled environments.
The researcher behind the courses keeps finding and publishing vulnerabilities. Material is updated with what actually works today.
From finding to report: enumerate, validate, exploit, document and communicate impact. The way real audits are done.
Head of Cybersecurity at K-LAGAN · Offensive security researcher · Known in the community as 6h4ack
Computer engineer specialized in offensive security, focused on vulnerability research and real-world application auditing. Currently leads security strategy and governance at K-LAGAN, combining that role with independent research publishing and the technical direction of SixHack Academy.
His work focuses on identifying and assessing real-impact vulnerabilities, with a verifiable track record of responsible disclosure to leading international organizations and companies.
Vulnerabilities discovered and responsibly disclosed. Each card links to the official record.
Reflected Cross-Site Scripting (XSS) in Sanoma’s Clickedu Summary A reflected Cross-Site Scripting (XSS) vulnerability has been discovered in Clickedu. This vulnerability allows an attacker to execute JavaScript code in…
Multiple vulnerabilities in GDTaller Summary Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a…
Multiple vulnerabilities in GDTaller Summary Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a…
Reflected Cross Site Scripting (XSS) vulnerability in Support Board Summary A Reflected Cross Site Scripting (XSS) vulnerability has been found in Support Board v3.7.7. This vulnerability allows an attacker to execute…
SQL Injection vulnerability in Support Board Summary A SQL Injection vulnerability has been found in Support Board v3.7.7. This vulnerability allows an attacker to retrieve, create, update and delete database via…
SQL Injection in Cuantis Summary SQL Injection in Cuantis. This vulnerability allows an attacker to retrieve, create, update and delete databases through the 'search' parameter in the '/search.php' endpoint. Severity ?…
SQL Injection in Sinturno Summary SQL injection vulnerability in Sinturno. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'client' parameter in the…
Reflected Cross-Site Scripting (XSS) in Eventobot Summary A reflected Cross-Site Scripting (XSS) vulnerability has been found in Eventobot. This vulnerability allows an attacker to execute JavaScript code in the…
SQL injection in Eventobot Summary A SQL injection vulnerability has been found in Eventobot. This vulnerability allows an attacker to retrieve, create, update and delete databases through the 'promo_send' parameter in…
Reflected Cross-Site scripting (XSS) in SOTE's SOTESHOP Summary Reflected Cross-Site Scripting vulnerability in SOTESHOP, version 8.3.4. THis vulnerability allows an attacker execute JavaScript code in the victim's…
Reflected Cross-Site Scripting in PideTuCita Summary Reflected Cross-Site Scripting (XSS) vulnerability in PideTuCita. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending…
SQL injection in Infoticketing Summary SQL injection vulnerability in Infoticketing. This vulnerability allows an unauthenticated attacker to retrieve, create, update, and delete the database by sending a POST request…
Reflected Cross-Site Scripting (XSS) in Lewe WebMeasure Summary Reflected Cross-Site Scripting (XSS) vulnerability in '/index.php' in Lewe WebMeasure, which allows remote attackers to execute arbitrary code through the…
Authentication bypass in AutoGPT de Thesamur Summary An authentication bypass vulnerability has been found in Thesamur's AutoGPT. This vulnerability allows an attacker to bypass authentication mechanisms. Once inside…
Stored Cross-Site Scripting (XSS) vulnerability in Alkacon's OpenCms Summary Stored Cross-Site Scripting (XSS) in Alkacon's OpenCms v18.0, which occurs when user input is not properly validated when sending a POST…
Reflected Cross-Site Scripting (XSS) vulnerability in Alkacon's OpenCms Summary Reflected Cross-site Scripting (XSS) in Alkacon's OpenCms v18.0, which allows an attacker to execute JavaScript code in the victim's…
Reflected Cross-Site Scripting (XSS) in QRGen's Riftzilla Summary Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows an attavker to execute JavaScript code in the victim's…
HTML injection in Isshue from Bdtask Summary HTML Injection vulnerability in Isshue by Bdtask, consisting os an HTML injection due to a lack os proper validation of user input by sending a POST request to…
Reflected Cross-Site Scripting (XSS) in IsMyGym Summary Reflected Cross-Site Scripting (XSS) vulnerability in IsMyGym by Zuinq Studio. This vulnerability allows an attacker to execute JavaScript code in the victim's…
HTML injection in multiple Botble products Summary HTML injection vulnerability in multiple Botble products such as TransP, Athena, Martfury, and Homzen, consisting of an HTML injection due to a lack of proper…
Multiple vulnerabilities in WorkDo products Summary Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's HRMGo, consisting of a lack of proper validation of user input by sending a POST request to…
Multiple vulnerabilities in WorkDo products Summary Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's TicketGo, consisting of a lack of proper validation of user input by sending a POST request to…
Multiple vulnerabilities in WorkDo products Summary Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's eCommerceGo SaaS, consisting of a lack of proper validation of user input by sending a POST request to…
Multiple vulnerabilities in WorkDo products Summary Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's eCommerceGo SaaS, consisting of a stored XSS due to a lack of proper validation of user input by sending a…
Multiple vulnerabilities in Imaster products Open configuration options Summary Imaster's Patient Record Management System contains a stored Cross-Site Scripting (XSS) vulnerability in the endpoint…
Multiple vulnerabilities in Imaster products Open configuration options Summary Imaster's Patient Records Management System is vulnerable to SQL Injection in the endpoint ‘/projects/hospital/admin/complaints.php’…
Multiple vulnerabilities in Imaster products Open configuration options Summary Imaster's MEMS Events CRM contains an SQL injection vulnerability in‘keyword’ parameter in ‘/memsdemo/exchange_offers.php’. Severity ? 8.7…
Multiple vulnerabilities in Imaster products Open configuration options Summary Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ parameter in ‘/memsdemo/login.php’. Severity ? 9.3 (Critical)…
Reflected Cross-Site Scripting (XSS) in Governalia by IDI Eikon Summary Reflected Cross-Site Scripting (XSS) in IDI Eikon's Governalia. The vulnerability allows an attacker to execute JavaScript code in the victim's…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Multiple vulnerabilities in Fairsketch's RISE CRM Framework Summary HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation…
Stored XSS in Smart School Summary Stored Cross Site Scripting (XSS) vulnerability in Smart School 7.0 due to lack of proper validation of user input when sending a POST request to '/online_admission', wich affects the…
SQL injection on the virtual campus platform of Diseño de Recursos Educativos Summary SQL injection vulnerability in the DRED virtual campus platform. This vulnerability allows an attacker to retrieve, create, update,…
Stored XSS in Creativeitem Ekushey CRM Summary Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the…
Stored XSS in Creativeitem Ekushey CRM Summary Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the…
Stored XSS in Creativeitem Ekushey CRM Summary Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the…
Stored XSS in Creativeitem Sociopro Summary Stored XSS vulnerability in Creativeitem Sociopro due to lack of proper validation of user inputs via the endpoint '/sociopro/profile/update_profile', affecting to 'name'…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameter…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameter…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameter…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameters…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameters…
HTML injection in Perfex CRM Summary HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameters…
Reflected Cross-Site Scripting (XSS) in Azon Dominator Summary Reflected Cross-Site Scripting (XSS) vulnerability in Azon Dominator. This vulnerability allows an attacker to execute JavaScript code in the victim's…
Stored Cross-Site Scripting (XSS) in the Multi-purpose Inventory Management System Summary Cross-site Scripting (XSS) vulnerability stored in Multi-Purpose Inventory Management System, consisting of a stored XSS due to…
Reflected Cross-Site Scripting (XSS) in WebWork Summary Reflected Cross-Site Scripting (XSS) vulnerability in WebWork, which allows remote attackers to execute arbitrary code through the 'q' and 'engine' request…
HTML injection in Vox Media's Chorus CMS Summary HTML injection in Vox Media's Chorus CMS. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL using…
Stored Cross-Site Scripting (XSS) in Pharmacy POS PHP Script Summary Stored Cross-Site Scripting (XSS) vulnerability in Pharmacy POS PHP Script. This vulnerability allows an attacker to execute JavaScript code in the…
Reflected Cross-Site Scripting (XSS) in osCommerce Summary Reflected Cross-Site Scripting (XSS) in osCommerce v4. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the…
Cross-Site Scripting (XSS) reflected in Nosto Summary Reflected Cross-Site Scripting (XSS) vulnerability in /pages/search-results-page in Nosto, which allows remote attackers to execute arbitrary code via the q GET…
Reflected Cross-Site Scripting (XSS) in Phoenix CMS Summary A Reflected Cross Site Scripting (XSS) vulnerability was found in '/search' in Phoenix Site CMS from Phoenix, which allows remote attackers to execute…
Reflected Cross-Site Scripting (XSS) in Bagisto Summary A Reflected Cross-Site Scripting (XSS) vulnerability has been found in Bagisto v2.0.0. This vulnerability allows an attacker to execute JavaScript code in the…
SQL Injection in DomainsPRO Summary SQL injection vulnerability in DomainsPRO 1.2. This vulnerability could allow an attacker to retrieve, create, update and delete databases via the “d” parameter in the “/article.php”…
Reflected Cross-Site Scripting (XSS) in AbanteCart Summary Reflected Cross-Site Scripting (XSS) vulnerability in AbanteCart v1.4.0, that could allow an attacker to execute JavaScript code in a victim's browser by…
Reflected Cross-Site Scripting (XSS) in AbanteCart Summary Reflected Cross-Site Scripting (XSS) vulnerability in AbanteCart v1.4.0, that could allow an attacker to execute JavaScript code in a victim's browser by…
Cross-Site Scripting vulnerability in OpenCart Summary Cross-Site Scripting vulnerability in OpenCart versions prior to 4.1.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by…
HTML injection vulnerability in OpenCart Summary HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a…
HTML injection vulnerability in OpenCart Summary HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a…
HTML injection vulnerability in OpenCart Summary HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a…
Cross-Site Scripting (XSS) vulnerability in Soteshop Summary Cross-Site Scripting (XSS) vulnerability in Soteshop, versions prior to 8.3.4, which could allow remote attackers to execute arbitrary code via the ‘query’…
SQL Injection CIGES Summary A SQL Injection vulnerability has been found in Ciges 2.15.5 from ATISoluciones. This vulnerability allows an attacker to retrieve, create, update and delete database via $idServicio…
Internet Web Solutions Sublime CRM HTTP POST Request inicio.php cross site scripting Summary A vulnerability, which was classified as problematic, was found in Internet Web Solutions Sublime CRM up to 20250207. Affected…
A Cross-Site Scripting vulnerability has been found in Janto v4.3r11 from Impronta.
Recognition for responsible disclosure and vulnerability research.
Verified technical training in offensive security, red team and appsec.
A learning flow designed to build real, reproducible skill step by step.
Networking, HTTP/HTTPS, web applications and traffic flow. Without these foundations, offensive techniques are just tricks without context. We start here even if you have experience, to establish shared vocabulary.
How an attacker studies a target before touching anything: surface discovery, endpoint mapping, technology identification and prioritization. Good enumeration saves hours in everything that follows.
Every OWASP Top 10 vulnerability is worked in a real lab: SQL injection, XSS, IDOR, SSRF, path traversal, file upload, deserialization, SSTI... Detection, proof of concept and impact.
Finding a bug isn't enough: you have to prove it's exploitable and measure impact. We teach you how to build reproducible evidence that holds up in a serious audit.
From findings to the final document: how to prioritize, describe risk, propose remediation and communicate usefully to both technical teams and business. The deliverable that's expected in the real world.
Three profiles that fit especially well with the SixHack Academy methodology.
You've never done ethical hacking and you want to start with solid ground, not with 20 scattered YouTube tutorials.
You already know tech but you've never audited from the other side. Here you learn to break what you build.
You already work in cybersecurity but want to go deeper into web hacking and real exploitation techniques.
What people ask most about the instructor, the methodology and the courses.
Browse the catalog, pick your course and start practicing with real labs today.