Hackers School

System Online

Stop watching.
Start hacking.

The practice-first community for CTF and Linux kernel fuzzing. Don't just watch tutorials - solve real challenges through structured guidance.

See how it works

Secure signup via Polar checkout.

Mentored security practice
Expert Code Review
Pedagogy-First CTF Tooling
RegistersLive
RAX0x0000000000000000
RBX0x00007fffffffe310
RIP0x4141414141414141
RSP0x00007fffffffe2a0
RBP0x4242424242424242
Disassemblyvulner_func+42
0x4011d0 push rbp
0x4011d1 mov rbp, rsp
0x4011d4 sub rsp, 0x40
0x4011d8 lea rax, [rbp-0x40]
0x4011dc call gets@plt
0x4011e1 leave
0x4011e2 ret
Stack Visualization
High Address
Saved RIP (0x41414141)
Saved RBP (0x42424242)
BUFFER OVERFLOW IN PROGRESS
A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A
Low Address
Hex Dump0x7fffffffe2a0
0x0000: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
0x0010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
0x0020: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
0x0030: 41 41 41 41 41 41 41 41 42 42 42 42 42 42 42 42
0x0040: 41 41 41 41 41 41 41 41 00 00 00 00 00 00 00 00
pwndbg> run $(python -c 'print "A"*72 + "B"*8 + "\\x41"*8')
Palash Oswal

Palash Oswal

Lead Mentor

CMU Alumnus
picoCTF Challenge Author
Security Researcher Linux Kernel

A school that doesn't lecture

Most courses sell you hours of video. We sell you hours of practice. Stop the tutorial hell and start active exploitation. We focus on doing over watching.

The Tutorial Trap

  • Passive watching of 40-hour video playlists
  • Simulated, unrealistic environments
  • No feedback on your actual code

The Hacker's Way

  • Active recall through daily CTF challenges
  • Structured paths through real Linux kernel challenges
  • Expert review of your exploit scripts

How it works

From novice to kernel hacker in 5 steps

Pick a Track

Select from Foundations, Binary Exploitation, or Kernel.

Attempt

Jump into real challenges and attempt a clean solve.

Submit Exploit

Push your proof-of-concept code to the platform.

Get Feedback

Receive detailed code reviews from experts.

Level Up

Earn badges and unlock harder challenges.

Training Tracks

Specialized curriculums designed for modern security research.

View all tracks

CTF Foundations

Master the basics of scripting, cryptography, and reverse engineering.

Systems Practice:

  • Python Scripting
  • Basic Buffer Overflows

Binary Exploitation

Deep dive into memory corruption, heap grooming, and ROP chains.

Systems Practice:

  • Heap Exploitation
  • ROP / JOP Chains

Kernel Fuzzing

Learn to set up Syzkaller and analyze crash dumps effectively.

Systems Practice:

  • Syzkaller Setup
  • KASAN Analysis

Kernel Pwn

Advanced privilege escalation and race condition exploitation.

Systems Practice:

  • Race Conditions
  • SLUB Allocator

Simple Pricing

Invest in your career. No hidden fees, cancel anytime.

Founding Member

Full Access

$25 /month

The complete roadmap for serious hackers ready to master kernel exploitation.

  • Full access to All Tracks
  • Custom tools to learn and solve challenges
  • Priority Code Reviews
  • Guided tracks tailored to your learning level
Join Waitlist

SECURE ACCESS VIA POLAR

Frequently Asked Questions

Is this suitable for absolute beginners?

The Foundations track is designed for beginners with some basic programming knowledge (Python/C). If you've never coded before, we recommend learning the basics of Python first.

Do I need a powerful computer?

Not really. Most CTF challenges run well on a typical laptop, and for kernel work we provide setup guidance so you can practice on existing challenges without heavy hardware.

Do I get a certificate?

Yes, upon completing a track and passing the final challenge, you receive a cryptographically signed certificate of completion that you can add to your LinkedIn or resume.

Ready to get good?

Join the top 1% of security researchers who learn by doing. Your next exploit starts here.

Join Waitlist