Copy FailLatest
April 30, 2026. A kernel LPE that has lived in every major Linux distro since 2017 is now public, with a 732-byte exploit. You manage a multi-tenant Kubernetes cluster.
A playable terminal museum for the hacks, incidents, and command-line moments that shaped computing. Every system is a simulation. You sit at the prompt the way the people who lived through it did, and type your way through.
The newest reconstructions in the archive. Open one to read the briefing first.
April 30, 2026. A kernel LPE that has lived in every major Linux distro since 2017 is now public, with a 732-byte exploit. You manage a multi-tenant Kubernetes cluster.
The morning of December 4th, 2025. A critical RSC vulnerability is on the front page. Your app is on Next 15.4. You have an hour before standup.
September 8, 2025. A single phishing email gives an attacker the npm account for `chalk`, `debug`, and sixteen other packages with 2.6 billion combined weekly downloads. The malicious versions sit live for two and a half hours.
Each scenario is a self-contained reconstruction with a briefing, a fake system, and a defensive lesson.
A real terminal renders in your browser via wterm. Commands are scripted; outputs feel real because they were written that way.
Every reconstruction ends with what happened, what was simulated, and what to take back to the systems you actually own.
Every environment is fictional, sandboxed, or historically abstracted. Commands are matched against scripted responses. The filesystem you see exists only inside your tab. Network commands return a polite refusal. There are no real credentials, no real hosts, no exploit code: only the shape of the story, told in the medium it actually happened in.
EmulateHacks exists to teach how incidents look from the inside, so the next one is recognised earlier. Read the full safety note.