DeepTrustxAI Arena

Web  ·  Binary Exploitation  ·  Jeopardy Format


01 / 02

Web

Application Security

Client & server-side vulnerabilities. From auth bypass to injection chains — think like an attacker.

XSS SQLi SSRF IDOR SSTI

02 / 02

PWN

Binary Exploitation

Low-level memory corruption and control-flow subversion. Understand systems at their seams.

Stack BOF ROP Heap ret2libc fmt str