- Enumeration - Initial Access - PrivEsc - Post-Exploit
- WebApps - Linux & Windows CLI - PCAP - Simulated Users
- Dumping & Cracking Hashes - Credential Reuse - Tunneling
- Deserialization - JSON Web Tokens - Auth Bypass
- Client Side Attacks with simulated users
- Command Injection - SQLi - LFI - Type Juggling
- 5+ Custom WebApps with no public exploits
- Navigate the complex networks of The Sprawl without frustration
- Follows the story of an elite cyberspace operator,   Case.
- Each mission offers a concise task, ultimately leading to the final level
- Achieve exclusive security software on The Sprawl's own black market!
- Run these custom tools to break the ICE on targets with advanced security.