Exploring P2P
Attack Vectors
Visual, interactive simulations of security vulnerabilities in libp2p peer-to-peer networks. Master the mechanics of exploitation and defense.
7 ModulesLive SimulationsDefense Analysis
Simulated Attack Workflow1/6
Healthy Network
A normal libp2p network where all peers are connected through honest mesh links. The yellow victim node has multiple honest connections for routing messages and discovering peers.
Attack Articles
Select an attack to explore its interactive simulation