CTF Challenges by Category
All Skills
⭐
cybersecurity × 96
💪
ethical-hacking × 85
💪
c-programming × 85
⭐
linux × 56
💪
variables × 48
💪
data-types × 47
💪
loops × 39
💪
control-flow × 38
💪
git × 37
💪
gitlab × 36
💪
network-security × 35
💪
basics × 31
💪
firewall × 31
💪
phishing × 29
💪
php × 28
💪
python × 24
💪
operators × 22
💪
syntax × 22
💪
php-programming × 21
💪
encryption × 20
💪
tools × 19
💪
directory-commands × 19
💪
protocols × 18
💪
file-commands × 18
💪
object-oriented-programming × 18
⭐
css × 18
💪
control-flow-structures × 17
💪
malware × 17
💪
version-control × 16
💪
branching × 15
💪
pointers × 14
💪
penetration-testing × 13
💪
vpn × 13
💪
inheritance × 13
💪
social-engineering × 13
💪
functions × 12
💪
html-elements × 12
💪
repository-management × 12
💪
conditionals × 12
💪
cli × 12
💪
cryptography × 12
💪
switch × 11
💪
html × 11
💪
commands × 10
💪
encapsulation × 10
💪
networking × 9
💪
keywords × 9
💪
c × 9
💪
arrays × 9
💪
html-css × 9
💪
sql-injection × 8
💪
file-management × 8
💪
firewalls × 8
💪
merging × 8
💪
switch-case × 8
💪
navigation × 8
💪
for-loop × 8
⭐
security × 8
💪
access-control × 7
💪
while-loop × 7
💪
layout × 7
💪
osi-model × 7
💪
classes × 7
💪
file-directory-commands × 7
💪
web-design × 7
💪
array × 6
💪
do-while × 6
💪
web-development × 6
💪
ddos × 6
💪
oop × 6
💪
reconnaissance × 6
💪
output × 6
💪
semantics × 6
💪
fundamentals × 6
💪
python-programming × 6
💪
objects × 6
💪
control-structures × 6
💪
basic × 6
💪
constants × 6
💪
constructor × 5
💪
declaration × 5
💪
protocol × 5
💪
initialization × 5
💪
principles × 5
💪
css-properties × 5
💪
switch-statement × 5
💪
network-scanning × 5
💪
accessibility × 5
💪
decision-making × 5
💪
conditional × 5
💪
cyber-security × 5
💪
ssh × 5
💪
type-casting × 5
💪
ports × 5
💪
class × 5
💪
attacks × 5
💪
break × 5
💪
if-else × 5
💪
programming × 5
⭐
network × 5
⭐
web × 5
💪
password-cracking × 4
💪
conditional-statements × 4
💪
continue-statement × 4
💪
sql × 4
💪
polymorphism × 4
💪
web-security × 4
💪
break-statement × 4
💪
iteration × 4
💪
ternary-operator × 4
💪
memory × 4
💪
html5 × 4
💪
branches × 4
💪
dos × 4
💪
packet-analysis × 4
💪
network-attacks × 4
💪
file-io × 4
💪
merge-request × 4
💪
beginner × 4
💪
memory-management × 4
💪
file-directory × 4
💪
object-oriented × 4
💪
ids × 4
💪
privacy × 4
💪
vulnerabilities × 4
💪
footprinting × 4
💪
introspection × 4
💪
ci-cd × 4
💪
styling × 4
💪
cia-triad × 4
💪
continue × 3
💪
comments × 3
💪
standard-libraries × 3
💪
file-operations × 3
💪
concepts × 3
💪
c-standard-libraries × 3
💪
tooling × 3
💪
methods × 3
💪
selection × 3
💪
string × 3
💪
operating-systems × 3
💪
ssl × 3
💪
terminology × 3
💪
files × 3
💪
if-statement × 3
💪
staging × 3
💪
repository × 3
💪
selectors × 3
💪
constructors × 3
💪
do-while-loop × 3
💪
authentication × 3
💪
c-language × 3
💪
process-management × 3
💪
virus × 3
💪
best-practices × 3
💪
hyperlink × 3
💪
worm × 3
💪
internet-protocol × 3
💪
directories × 3
💪
foreach × 3
💪
char × 3
💪
if-else-statement × 3
💪
automation × 3
💪
images × 3
💪
directory × 3
💪
information-security × 3
💪
checkout × 3
💪
commit × 3
💪
data-protection × 3
💪
issue-tracking × 3
💪
directory-navigation × 3
💪
command-line-arguments × 3
💪
logic × 3
💪
nmap × 3
💪
loop × 3
💪
file-handling × 3
💪
responsive-design × 3
💪
stdio.h × 3
💪
collaboration × 3
💪
git-commands × 3
💪
acronyms × 2
💪
terminologies × 2
💪
null × 2
💪
cyber-attack × 2
💪
instantiation × 2
💪
branch × 2
💪
file-system × 2
💪
network-layer × 2
💪
cyber-threats × 2
💪
cia × 2
💪
nested-structures × 2
💪
math.h × 2
💪
metasploit × 2
💪
database × 2
💪
responsive × 2
💪
control-structure × 2
💪
arp-spoofing × 2
💪
testing × 2
💪
project-management × 2
💪
built-ins × 2
💪
for-loops × 2
💪
spoofing × 2
💪
tls × 2
💪
intrusion-detection-system × 2
💪
code-review × 2
💪
port-scanning × 2
💪
global-variables × 2
💪
float × 2
💪
directory-command × 2
💪
command-line × 2
💪
directory-management × 2
💪
privilege × 2
💪
dereferencing × 2
💪
security-vulnerabilities × 2
💪
operating-system × 2
💪
attack-types × 2
💪
information-gathering × 2
💪
typography × 2
💪
languages × 2
💪
resources × 2
💪
malloc × 2
💪
format-specifiers × 2
💪
stateful × 2
💪
programming-languages × 2
💪
break-command × 2
💪
owasp × 2
💪
sizeof × 2
💪
basic-concepts × 2
💪
threats × 2
💪
constant × 2
💪
naming × 2
💪
documentation × 2
💪
cyber-hygiene × 2
💪
structure × 2
💪
security-principles × 2
💪
white-hat × 2
💪
file-and-directory-commands × 2
💪
password-security × 2
💪
floating-point × 2
💪
command-line-argument × 2
💪
io × 2
💪
group-management × 2
💪
property × 2
💪
ransomware × 2
💪
programming-language × 2
💪
incident-response × 2
💪
variable-initialization × 2
💪
flexbox × 2
💪
wiki × 2
💪
pointer-arithmetic × 2
💪
dns × 2
💪
goto-statement × 2
💪
css-grid × 2
💪
casting × 2
💪
logical × 2
💪
web-structure × 2
💪
printf × 2
💪
injection-attacks × 2
💪
ddos-attack × 2
💪
remote × 2
💪
dunder-methods × 2
💪
deletion × 2
💪
css-selectors × 2
💪
git-init × 2
💪
literals × 2
💪
booleans × 2
💪
honeypot × 2
💪
computer-networks × 2
💪
conflicts × 2
💪
creation × 2
💪
instance × 2
💪
email-security × 2
💪
hacker-types × 2
💪
main-function × 2
💪
null-pointer × 2
💪
string.h × 2
💪
cyber-attacks × 2
💪
wireshark × 2
💪
email × 2
💪
data-security × 2
💪
git-branch × 2
💪
conflict-resolution × 2
💪
primary-key × 2
💪
comparison × 2
💪
gitignore × 2
💪
file-command × 2
💪
structures × 2
💪
attack-vectors × 2
💪
hacking-tools × 2
💪
data-structures × 2
💪
boolean-logic × 2
💪
optimization × 2
💪
vulnerability-assessment × 2
💪
https × 2
💪
type-juggling × 2
💪
dereference × 2
💪
integer × 2
💪
easy × 2
💪
history × 2
💪
passwords × 2
💪
vulnerability-scanning × 2
💪
post-increment × 2
💪
listing × 2