Changelog
Follow up on the latest improvements and updates.
RSS
new
Academy
Enterprise
Defensive
Level up your malware detection skills with a new course
Ever wondered how to catch malware that hides deep inside Windows systems?
In our new Academy Module, you'll learn how to use a debugger to spot suspicious behavior in real time. Whether it’s a tricky rootkit or an exploit running under the radar, you’ll gain the skills to detect it.
Here’s what you’ll learn:
- How to use WinDbg for real-world malware analysis
- Spotting hidden behavior in user-mode and kernel-mode
- Understanding how Windows internals can reveal threats
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Ready for your skills to do the talking at your next interview?
Head to HTB Academy and start learning today →

new
Labs
Enterprise
Defensive
Tracing USB-based data leaks with a new defensive scenario
A suspicious USB was plugged into a Windows Machine... and now, sensitive data is missing. It’s your job to find out how.
In our latest Sherlock, you’ll step into the role of a digital forensic investigator, analyzing real Windows artifacts to uncover the exfiltration trail.
Here’s what you’ll tackle:
- Investigate Windows systems for traces of data theft
- Use tools like RegRipper and Forensic Toolkit to dig deeper
- Uncover how a simple USB can become a powerful tool for exfiltration
- Strengthen your DFIR skills with hands-on analysis
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new defensive skills to your utility kit?
Login to HTB Labs today →

new
Enterprise
Offensive
From mobile app analysis to WiFi and VoIP exploitation with a new Professional Lab
Every Professional Lab we’ve released has taken you deeper into realistic enterprise environments.
Designed by
Ippsec
, this new enterprise attack simulation covers mobile app analysis, Wi-Fi attacks, VoIP exploitation, and even offensive forensics.Wanderer
challenges red teamers to navigate unfamiliar, multi-faceted scenarios, blending exploitation with investigation — and building the adaptability needed to take on whatever comes next.- Advanced enumeration techniques
- SQL injection & filter evasion
- Web application exploitation
- Basic mobile app analysis
- Wi-Fi & Asterisk (VoIP) attacks
- Offensive forensics & lateral movement
Available on HTB Enterprise Platform, Wanderer comes with all business-exclusive features such as Restore Point, and MITRE ATT&CK mapping.
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →

improved
Labs
Academy
Enterprise
Capture The Flag
Features
Manage your HTB Account device sessions for additional security
HTB Account’s security settings have been enhanced with a new feature that allows you to control your signed-in devices.
With Device Sessions, you can:
- View all active sessions tied to your HTB Account
- Sign out instantly from any unfamiliar device
- Log out from all devices in just one click
- And change your password right from the panel for extra peace of mind
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →

improved
Capture The Flag
Features
Real-time scenario management during CTFs
Midway through your CTF event, the competition is heating up — and you realize one more scenario could take it to the next level. Now you can make it happen!
Admins and event managers can now add new scenarios during an ongoing event, with no need to pause or restart. As long as you have available scenario slots, you can adapt in real time, keeping the experience engaging and dynamic from start to finish.
P.S. Newly added scenarios are automatically marked as "new" in the Content Library for quick visibility, and players receive instant notifications when a new scenario is live.

new
improved
Academy
Enterprise
Features
Master complex topics with LaTeX support in Academy Modules
As we expand our course library into advanced topics like Artificial Intelligence, Machine Learning, Cryptography, and Quantum Computing, one challenge keeps coming up:
How do we represent complex mathematical equations with clarity and precision?
We’ve now enabled LaTeX support across all Academy Modules, making it easier than ever to display formulas, equations, and proofs the right way. Because when you're learning cutting-edge tech, formatting shouldn’t hold you back!
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Ready for your skills to do the talking at your next interview?
Head to HTB Academy and start learning today →

new
Capture The Flag
Features
Efficiently tackle CTF scenarios by copying attachment links
You can now instantly copy attachments to your clipboard and download them straight to Pwnbox — no extra sign-in needed.
This means faster access during a live CTF event, saving valuable time when every second counts.

new
Academy
Enterprise
Offensive
Learn how to identify and bypass Wi-Fi captive portals with a new course
You’ve connected to the Wi-Fi… but a captive portal stands in your way. Ever wondered how attackers get around it — and how defenders can stop them?
In our latest Academy Module, you’ll dive into the cat-and-mouse game of breaking through common network defenses. From subtle evasion to full-on exploitation, this Module gives you the skills to bypass, analyze, and ultimately secure these access points.
You’ll learn how to:
- Blend in using MAC spoofing
- Bypass restrictions with DNS tunneling
- Intercept credentials with ARP poisoning
- Exploit portals using XSS, file uploads, and more
- Hijack sessions and outsmart client-side protections
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Ready for your skills to do the talking at your next interview?
Head to HTB Academy and start learning today →

new
Labs
Enterprise
Offensive
Defensive
Attack and defend on the recent Next.js vulnerability
Enhance your exploitation and investigation skills with our new
CVE-2025-29927
scenario combo!In the first part, you’ll take on the role of an attacker in an offensive Challenge. Your goal is to emulate the actions of a threat actor: trace their path, exploit the CVE, and retrieve the flag.
Next, you’ll switch gears with our latest Sherlock, where you’ll become the investigator. You'll analyze logs across the application stack to piece together how the attack unfolded.
Learning outcomes:
- Understand how CVE-2025-29927 is exploited
- Learn to trace attacker behaviors through log analysis
- Practice hands-on skills along a threat actor's attack chain
- Build confidence in both threat emulation and incident investigation
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new skills to your utility kit?
Login to HTB Labs today →

new
Labs
Enterprise
Defensive
Step into malware analysis with a new defensive scenario
Kick off your reverse engineering journey with
TrainingDay
, a beginner-friendly defensive scenario designed to help you get hands-on with real-world malware analysis techniques.You’ll learn to:
- Break down suspicious binaries
- Understand basic malware behavior
- Practice static & dynamic analysis in a safe, guided environment
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new defensive skills to your utility kit?
Login to HTB Labs today →

Load More
→