This application is deliberately vulnerable and exists solely for
cybersecurity education in a controlled classroom environment.
Using these techniques against real systems without authorization is illegal
under the Computer Fraud and Abuse Act (18 U.S.C. § 1030) and equivalent laws worldwide.