CTF Challenges by Category
All Skills
⭐
cybersecurity × 95
⭐
linux × 54
💪
python × 45
💪
ethical-hacking × 38
💪
variables × 32
💪
data-types × 31
💪
network-security × 24
💪
python-programming × 24
💪
c-programming × 22
⭐
encryption × 21
💪
penetration-testing × 19
💪
phishing × 19
💪
operating-systems × 18
💪
firewall × 18
💪
control-flow × 18
💪
networking × 16
💪
loops × 15
💪
control-flow-structures × 13
💪
sql-injection × 13
💪
internet-protocols × 13
💪
http × 13
💪
web-development × 12
💪
network-protocols × 11
💪
functions × 11
💪
software-security × 11
💪
malware × 11
💪
php-programming × 11
💪
dns × 11
💪
cryptography × 11
💪
vpn × 10
💪
protocols × 10
💪
file-commands × 10
💪
file-permissions × 10
💪
basics × 10
💪
secure-network-design × 10
💪
pointers × 9
💪
directory-commands × 9
💪
while-loop × 9
💪
conditional-statements × 9
💪
for-loop × 9
💪
programming × 9
💪
security × 9
⭐
arrays × 9
⭐
php × 8
💪
tcp × 8
💪
malware-analysis × 8
💪
tools × 8
💪
socket-programming × 8
💪
https × 8
💪
nmap × 8
💪
metasploit × 8
💪
tcp-ip × 8
💪
computer-networks × 8
💪
firewalls × 7
💪
cyber-security × 7
💪
ddos × 7
💪
ssl × 7
💪
xss × 7
💪
operators × 7
💪
incident-response × 7
💪
ip-address × 7
💪
cli × 7
💪
ssh × 7
💪
osi-model × 7
💪
social-engineering × 7
⭐
web × 6
💪
ids × 6
💪
intrusion-detection × 6
💪
authentication × 6
💪
web-security × 6
💪
data-security × 6
💪
attacks × 6
💪
break × 6
💪
data-protection × 6
💪
wireshark × 6
💪
process-management × 6
⭐
list × 6
💪
string × 5
💪
protocol × 5
💪
access-control × 5
💪
information-security × 5
💪
honeypot × 5
💪
memory-management × 5
💪
exception-handling × 5
💪
sandboxing × 5
💪
cloud-security × 5
💪
arp × 5
⭐
iteration × 5
💪
web-application × 4
💪
built-in-functions × 4
💪
buffer-overflow × 4
💪
file-directory-commands × 4
💪
tls × 4
💪
networks × 4
💪
html × 4
💪
exploit-development × 4
💪
object-oriented-programming × 4
💪
if-else × 4
💪
linux-commands × 4
💪
privilege-escalation × 4
💪
icmp × 4
💪
session-management × 4
💪
ransomware × 4
💪
css × 3
💪
owasp × 3
💪
device-drivers × 3
💪
mobile-security × 3
💪
nested-loops × 3
💪
network-segmentation × 3
💪
unix × 3
💪
security-principles × 3
💪
vpns × 3
💪
port × 3
💪
reconnaissance × 3
💪
file-systems × 3
💪
programming-languages × 3
💪
file-permission × 3
💪
payload × 3
💪
html-elements × 3
💪
concurrency × 3
💪
command-line × 3
💪
ipsec × 3
💪
cyber-attack × 3
💪
vulnerability × 3
💪
sql × 3
💪
continue-statement × 3
💪
multi-core-systems × 3
💪
break-statement × 3
💪
network × 3
💪
infinite-loop × 3
💪
mitm × 3
💪
cross-site-scripting × 3
💪
udp × 3
💪
vulnerabilities × 3
💪
commands × 3
💪
basic × 3
💪
loop × 3
💪
file-ownership × 3
💪
conditional-statement × 3
💪
rootkit × 3
💪
continue × 3
💪
symmetric-encryption × 3
💪
system-monitoring × 3
💪
hashing × 3
💪
static-analysis × 3
💪
windows × 3
💪
traffic-analysis × 3
💻
filtering × 3
🚩
traversal × 2
💪
ip-addressing × 2
💪
automation × 2
💪
data-transmission × 2
💪
functional-programming × 2
💪
dhcp × 2
💪
keywords × 2
💪
network-scanning × 2
💪
security-model × 2
💪
network-auditing × 2
💪
conditionals × 2
💪
mitm-attack × 2
💪
network-design × 2
💪
troubleshooting × 2
💪
semantics × 2
💪
syntax × 2
💪
server × 2
💪
microprocessors × 2
💪
methodology × 2
💪
socket-function × 2
💪
acronyms × 2
💪
ternary-operator × 2
💪
computer-forensics × 2
💪
requests × 2
💪
packet-analysis × 2
💪
objective × 2
💪
sessions × 2
💪
memory-allocation × 2
💪
boolean × 2
💪
data-structures × 2
💪
http-protocol × 2
💪
database × 2
💪
streaming-media × 2
💪
principles × 2
💪
enumeration × 2
💪
defence-in-depth × 2
💪
encryption-algorithms × 2
💪
bind × 2
💪
context-switching × 2
💪
basic-syntax × 2
💪
sockets × 2
💪
microcontrollers × 2
💪
key-management × 2
💪
variable × 2
💪
telnet × 2
💪
malware-types × 2
💪
init-process × 2
💪
password-attack × 2
💪
data-type × 2
💪
http-headers × 2
💪
tuple × 2
💪
encapsulation × 2
💪
data-breach × 2
💪
vulnerability-scanning × 2
💪
integer × 2
💪
network-protocol × 2
💪
smtp × 2
💪
permissions × 2
💪
application-security × 2
💪
subnetting × 2
💪
virtual-memory × 2
💪
false-positive × 2
💪
attack-methods × 2
💪
constants × 2
💪
power-management × 2
💪
recursion × 2
💪
attack-vectors × 2
💪
rainbow-table × 2
💪
ttl × 2
💪
file-search × 2
💪
confidentiality × 2
💪
typecasting × 2
💪
python-scripting × 2
💪
vulnerability-assessment × 2
💪
hardware × 2
💪
inheritance × 2
💪
classes × 2
💪
data-integrity × 2
💪
web-application-security × 2
💪
public-key-infrastructure × 2
💪
basic-concepts × 2
💪
mitigation-techniques × 2
💪
html-css × 2
💪
switch-statement × 2
💪
if-elif-else × 2
💪
ls-command × 2
💪
ssl-tls × 2
💪
programming-language × 2
💪
kernel-design × 2
💪
socket × 2
💪
grep × 2
💪
ddos-attack × 2
💪
wireless-networks × 2
💪
chmod × 2
💪
secure-communication × 2
💻
algorithms × 2
💻
sorting × 2
💻
array × 2