CTF Challenges by Category
All Skills
⭐
cybersecurity × 179
💪
ethical-hacking × 89
⭐
linux × 77
💪
network-security × 62
⭐
encryption × 54
💪
python × 45
💪
penetration-testing × 38
💪
firewall × 38
💪
sql-injection × 37
💪
phishing × 35
💪
networking × 35
💪
variables × 35
💪
data-types × 33
💪
protocols × 31
💪
vpn × 30
💪
network-protocols × 27
💪
computer-networks × 26
💪
operating-systems × 25
💪
c-programming × 25
💪
internet-protocols × 25
💪
osi-model × 24
💪
http × 24
💪
python-programming × 24
⭐
security × 24
💪
firewalls × 23
💪
malware × 23
💪
cryptography × 23
💪
control-flow × 21
💪
web-security × 21
💪
https × 21
💪
loops × 20
💪
basics × 20
💪
dns × 20
💪
web-development × 20
💪
tcp-ip × 19
💪
tcp × 19
💪
social-engineering × 18
💪
nmap × 18
💪
tools × 16
💪
control-flow-structures × 15
💪
metasploit × 15
💪
xss × 14
💪
authentication × 14
⭐
php × 13
💪
php-programming × 13
💪
secure-network-design × 13
💪
memory-management × 13
⭐
network × 13
💪
software-security × 12
💪
access-control × 12
💪
cyber-security × 12
💪
attacks × 12
💪
functions × 12
💪
ssl × 12
💪
network-scanning × 12
💪
file-permissions × 12
💪
malware-analysis × 11
💪
for-loop × 11
💪
ssh × 11
💪
wireshark × 10
💪
data-protection × 10
💪
protocol × 10
💪
file-commands × 10
💪
incident-response × 10
💪
reconnaissance × 9
💪
conditional-statements × 9
💪
privilege-escalation × 9
💪
while-loop × 9
💪
ids × 9
💪
ddos × 9
💪
ip-address × 9
💪
pointers × 9
💪
directory-commands × 9
💪
operators × 9
💪
honeypot × 9
💪
programming × 9
⭐
arrays × 9
💪
data-transmission × 8
💪
arp × 8
💪
socket-programming × 8
💪
intrusion-detection × 8
💪
break × 8
⭐
web × 7
💪
cli × 7
💪
switch × 7
💪
network-analysis × 7
💪
email × 7
💪
web-application-security × 7
💪
ports × 7
💪
vulnerability-scanning × 7
💪
data-security × 7
💪
cia-triad × 7
💪
exploit-development × 7
💪
smtp × 7
💪
cloud-security × 7
💪
cross-site-scripting × 7
💪
process-management × 6
💪
packet-analysis × 6
💪
owasp × 6
💪
ssl-tls × 6
💪
mobile-security × 6
💪
network-devices × 6
💪
linux-commands × 6
💪
udp × 6
💪
tls × 6
💪
string × 6
💪
information-security × 6
💪
windows × 6
⭐
list × 6
💪
buffer-overflow × 5
💪
icmp × 5
💪
commands × 5
💪
sandboxing × 5
💪
vulnerability × 5
💪
csrf × 5
💪
payload × 5
💪
exception-handling × 5
💪
ipsec × 5
💪
hashing × 5
💪
syntax × 5
💪
ransomware × 5
💪
attack-vectors × 5
💪
ip × 5
💪
vpns × 5
💪
internet-protocol × 5
💪
network-layer × 5
💪
content-security-policy × 5
💪
keywords × 5
💪
network-design × 5
💪
web-application × 5
💪
dhcp × 5
💪
vulnerabilities × 5
⭐
algorithms × 5
⭐
iteration × 5
💪
sql × 4
💪
ftp × 4
💪
command-line × 4
💪
programming-languages × 4
💪
risk-management × 4
💪
communication × 4
💪
security-principles × 4
💪
privacy × 4
💪
ip-addressing × 4
💪
static-analysis × 4
💪
session-management × 4
💪
basic × 4
💪
networks × 4
💪
html × 4
💪
http-headers × 4
💪
cyber-attack × 4
💪
built-in-functions × 4
💪
file-directory-commands × 4
💪
paging × 4
💪
password-cracking × 4
💪
symmetric-encryption × 4
💪
ipv6 × 4
💪
brute-force × 4
💪
port × 4
💪
addressing × 4
💪
unix × 4
💪
enumeration × 4
💪
virtual-memory × 4
💪
network-protocol × 4
💪
automation × 4
💪
constants × 4
💪
subnetting × 4
💪
object-oriented-programming × 4
💪
mitm × 4
💪
programming-language × 4
💪
ddos-attack × 4
💪
control-structures × 4
💪
if-else × 4
💪
traffic-analysis × 4
💪
continue × 3
💪
database × 3
💪
devices × 3
💪
principles × 3
💪
vulnerability-assessment × 3
💪
encryption-algorithms × 3
💪
file-ownership × 3
💪
telnet × 3
💪
css × 3
💪
arp-spoofing × 3
💪
operating-system × 3
💪
device-drivers × 3
💪
javascript × 3
💪
if-statement × 3
💪
nested-loops × 3
💪
system-monitoring × 3
💪
dos × 3
💪
network-segmentation × 3
💪
ip-addresses × 3
💪
best-practices × 3
💪
conditionals × 3
💪
concurrency × 3
💪
proxy × 3
💪
file-permission × 3
💪
file-systems × 3
💪
loop × 3
💪
tooling × 3
💪
risk-assessment × 3
💪
passwords × 3
💪
router × 3
💪
wireless-networks × 3
💪
wireless-security × 3
💪
infinite-loop × 3
💪
subnet-mask × 3
💪
vlan × 3
💪
port-scanning × 3
💪
basic-syntax × 3
💪
routing × 3
💪
methodology × 3
💪
network-tools × 3
💪
data-integrity × 3
💪
continue-statement × 3
💪
secure-coding × 3
💪
dmz × 3
💪
rootkit × 3
💪
sandbox × 3
💪
c × 3
💪
least-privilege × 3
💪
html-elements × 3
💪
botnet × 3
💪
terminology × 3
💪
network-troubleshooting × 3
💪
transport-layer × 3
💪
reverse-shell × 3
💪
system-security × 3
💪
break-statement × 3
💪
secure-communication × 3
💪
iot × 3
💪
white-hat × 3
💪
digital-certificate × 3
💪
typecasting × 3
💪
application-security × 3
💪
conditional-statement × 3
💪
mitm-attack × 3
💪
ipv4 × 3
💪
best-practice × 3
💪
pop3 × 3
💪
multi-core-systems × 3
💪
database-security × 3
💪
footprinting × 3
💪
burp-suite × 3
💪
password-security × 3
💪
data-structures × 3
💻
filtering × 3
🚩
traversal × 2
💪
vulnerability-management × 2
💪
traceroute × 2
💪
cloud-networking × 2
💪
debugging × 2
💪
bind × 2
💪
http-protocol × 2
💪
sessions × 2
💪
corporate-security × 2
💪
http2 × 2
💪
data-encryption × 2
💪
domain-names × 2
💪
nat × 2
💪
password-attack × 2
💪
intrusion-detection-system × 2
💪
power-management × 2
💪
rainbow-table × 2
💪
java × 2
💪
threat-management × 2
💪
packet-capture × 2
💪
computer-forensics × 2
💪
functional-programming × 2
💪
sockets × 2
💪
spoofing × 2
💪
aws × 2
💪
web-protocols × 2
💪
socket-function × 2
💪
development × 2
💪
troubleshooting × 2
💪
latency × 2
💪
inheritance × 2
💪
openvpn × 2
💪
stateful × 2
💪
apt × 2
💪
beginner × 2
💪
network-auditing × 2
💪
zero-day-exploit × 2
💪
socket × 2
💪
hacking-methods × 2
💪
user-privileges × 2
💪
boolean × 2
💪
if-elif-else × 2
💪
dos-attack × 2
💪
http-requests × 2
💪
ls-command × 2
💪
integer × 2
💪
microprocessors × 2
💪
remote-access × 2
💪
chmod × 2
💪
defence-in-depth × 2
💪
hardware × 2
💪
worm × 2
💪
context-switching × 2
💪
session × 2
💪
network-infrastructure × 2
💪
memory-manipulation × 2
💪
file-search × 2
💪
public-key-infrastructure × 2
💪
memory-allocation × 2
💪
responder × 2
💪
tcpip × 2
💪
requests × 2
💪
caching × 2
💪
false-positive × 2
💪
kali-linux × 2
💪
name-resolution × 2
💪
availability × 2
💪
password-hashing × 2
💪
kernel-design × 2
💪
antivirus × 2
💪
cybersecurity-tools × 2
💪
global-variable × 2
💪
databases × 2
💪
strategy × 2
💪
data-breach × 2
💪
key-management × 2
💪
microcontrollers × 2
💪
cia × 2
💪
encapsulation × 2
💪
variable × 2
💪
grep × 2
💪
ip-spoofing × 2
💪
client-side × 2
💪
csp × 2
💪
packet-sniffing × 2
💪
do-while × 2
💪
dig × 2
💪
network-scan × 2
💪
reverse-engineering × 2
💪
mac-address × 2
💪
acronyms × 2
💪
trojan × 2
💪
smb × 2
💪
dynamic-analysis × 2
💪
assessment × 2
💪
server-side × 2
💪
streaming-media × 2
💪
sftp × 2
💪
cyber-attacks × 2
💪
ttl × 2
💪
boolean-logic × 2
💪
iptables × 2
💪
semantics × 2
💪
security-assessment × 2
💪
threats × 2
💪
security-threats × 2
💪
network-monitoring × 2
💪
demand-paging × 2
💪
stateful-inspection × 2
💪
ternary-operator × 2
💪
input-validation × 2
💪
security-vulnerabilities × 2
💪
switch-statement × 2
💪
man-in-the-middle-attack × 2
💪
classes × 2
💪
fuzzing × 2
💪
network-attacks × 2
💪
security-model × 2
💪
wep × 2
💪
basic-concepts × 2
💪
heuristic-analysis × 2
💪
scanning × 2
💪
packet-filtering × 2
💪
ssh-tunneling × 2
💪
attack-methods × 2
💪
zero-day × 2
💪
fundamentals × 2
💪
python-scripting × 2
💪
network-management × 2
💪
recursion × 2
💪
internet-security × 2
💪
public-key × 2
💪
server × 2
💪
syn-flood × 2
💪
risk-mitigation × 2
💪
confidentiality × 2
💪
objective × 2
💪
networking-commands × 2
💪
network-communication × 2
💪
ips × 2
💪
mitigation-techniques × 2
💪
ping × 2
💪
attack-techniques × 2
💪
testing × 2
💪
permissions × 2
💪
parameterized-queries × 2
💪
local-area-networks × 2
💪
password-storage × 2
💪
ddos-attacks × 2
💪
tuple × 2
💪
malware-types × 2
💪
persistence × 2
💪
beginners × 2
💪
html-css × 2
💪
init-process × 2
💪
data-type × 2
💪
security-protocols × 2
💪
protection × 2
💻
array × 2
💻
sorting × 2