A new approach to cybersecurity education.

RED TEAM uses immersive gameplay to teach real-world security skills and helps your team develop an attacker mindset.

This game doubles as a cyber security training game and a showcase of the capabilities of the modding tools being developed for Off Grid.

Our Partners

What is RED TEAM?

Although Off Grid: Red Team is, at its core, a video game, it was purposefully designed to provide players with hands-on cybersecurity training.

Developed in collaboration with cybersecurity professionals...

The game replicates real-world scenarios while maintaining an engaging, game-first experience.

During our initial testing phase, untrained players were able to progress using real websites and techniques, showcasing the game's authentic approach. By the end of their playthrough, they had a stronger understanding of common security risks—and how even simple precautions can significantly improve the protection of personal or professional data.

Learn the mindset of a hacker!

Go from the game...

To a real world website

https://insecur.com

Detect clues

Apply your knowledge in the field

curl https://bitbucket.org/pypa/setuptools/raw/bootstrap/ez_setup.py | sudo python

Chaining Exploits Understanding the value of combining multiple exploits to escalate privileges and increase attack impact, gaining insights into complex security breaches.

Weak Passwords Recognizing how attackers exploit weak passwords and exploring password management best practices, with a focus on implementing stronger security policies.

Directory Listing Discovery Understanding the value of directory listings in the recon stage, whether used intentionally by site authors or available through improper permissions or misconfigurations.

Robots.txt (understanding the implications of web crawlers): Exploring how improperly configured robots.txt files can expose sensitive information and learning how to configure these files securely.

Using Developer Inspector Tools Becoming proficient in using browser developer tools to inspect website source and browser objects, identify vulnerabilities, and test potential exploits in real-time.

Let the data speak for itself...

Download the report

Coming soon

Signup to the mailing list