CTF Challenges by Category
All Skills
⭐
linux × 160
💪
cybersecurity × 98
💪
file-commands × 53
💪
network-security × 51
💪
directory-commands × 51
💪
penetration-testing × 41
💪
ethical-hacking × 35
💪
computer-networks × 27
💪
firewalls × 26
💪
encryption × 25
💪
firewall × 24
💪
social-engineering × 22
💪
networking × 20
💪
vpn × 18
💪
networking-commands × 18
💪
network-protocols × 17
💪
operating-systems × 15
💪
cli × 15
💪
phishing × 14
💪
protocols × 13
💪
sql-injection × 13
⭐
command-line × 13
💪
python × 12
💪
ip-address × 12
💪
security × 12
💪
file-management × 11
💪
networks × 11
💪
vulnerability-assessment × 11
💪
cryptography × 11
💪
file-directory-commands × 10
💪
file-permissions × 10
💪
vpns × 9
💪
routing × 9
💪
buffer-overflow × 9
💪
permissions × 9
💪
dns × 9
💪
ip-addressing × 8
💪
authentication × 8
💪
malware-analysis × 8
💪
vulnerability × 8
💪
bash × 8
💪
containerization × 8
💪
vulnerabilities × 8
💪
c-programming × 8
⭐
docker × 8
🚩
web × 7
💪
directory × 7
💪
file-and-directory-commands × 7
💪
tcp × 7
💪
basics × 7
💪
honeypot × 7
💪
commands × 7
💪
malware × 7
💪
programming × 7
💪
navigation × 7
💪
directories × 7
💪
network-topologies × 7
🚩
php × 6
🚩
traversal × 6
💪
intrusion-detection × 6
💪
cyber-security × 6
💪
loops × 6
💪
access-control × 6
💪
types × 6
💪
osi-model × 6
💪
troubleshooting × 5
💪
disk-usage-commands × 5
💪
file-systems × 5
💪
file-operations × 5
💪
attacks × 5
💪
cyber-attacks × 5
💪
subnetting × 5
💪
incident-response × 5
💪
privilege-escalation × 5
💪
devices × 5
💪
web-application-security × 5
💪
http × 5
💪
ddos-attack × 5
💪
wireless-networks × 5
💪
io-systems × 4
💪
ls × 4
💪
network-scanning × 4
💪
unix × 4
💪
file-io × 4
💪
computer-forensics × 4
💪
ipv4 × 4
💪
connectivity × 4
💪
web-security × 4
💪
encryption-algorithms × 4
💪
scripting × 4
💪
control-flow-structures × 4
💪
software-security × 4
💪
wireless-security × 4
💪
mv × 4
💪
man-in-the-middle × 4
💪
network × 4
💪
lan × 4
💪
tools × 4
💪
vulnerability-scanning × 4
💪
https × 4
💪
file × 4
💪
git × 4
💪
subnet-mask × 4
💪
mac-address × 4
💪
mkdir × 4
💪
automation × 3
💪
devops × 3
💪
internet × 3
💪
network-interfaces × 3
💪
virtualization × 3
💪
hardware-security × 3
💪
file-manipulation × 3
💪
mitm-attack × 3
💪
ring-topology × 3
💪
repository-management × 3
💪
firewall-types × 3
💪
file-system × 3
💪
command-line-interface × 3
💪
hacking × 3
💪
exploit × 3
💪
functions × 3
💪
electronics × 3
💪
port-scanning × 3
💪
fault-tolerance × 3
💪
rm × 3
💪
routing-table × 3
💪
zero-day-vulnerability × 3
💪
file-transfer × 3
💪
exploit-development × 3
💪
physical-security × 3
💪
basic-commands × 3
💪
cp × 3
💪
memory-management × 3
💪
web-applications × 3
💪
topology × 3
💪
router × 3
💪
remote-access × 3
💪
ping × 3
💪
ip × 3
💪
variables × 3
💪
switching × 3
💪
redundancy × 3
💪
package-management × 3
💪
python-programming × 3
💪
tcp-ip × 3
💪
data-integrity × 3
💪
reverse-engineering × 3
💪
gitlab × 3
💪
ssh × 3
💪
password-security × 3
💪
data-types × 3
💪
grep × 3
💪
arp × 3
💪
network-analysis × 3
💪
continuous-integration × 2
💪
security-assessment × 2
💪
terminology × 2
💪
ids × 2
💪
device-drivers × 2
💪
network-monitoring × 2
💪
pattern-matching × 2
💪
dockerfile × 2
💪
dhcp × 2
💪
wan × 2
💪
exploits × 2
💪
text-manipulation × 2
💪
sql-injection-attack × 2
💪
docker-compose × 2
💪
privacy × 2
💪
files × 2
💪
file-extension × 2
💪
languages × 2
💪
ipv6 × 2
💪
ethernet × 2
💪
switch × 2
💪
ftp × 2
💪
zero-day-exploit × 2
💪
systemctl × 2
💪
service-status × 2
💪
user-input × 2
💪
attack × 2
💪
network-interface × 2
💪
programming-languages × 2
💪
reverse-shell × 2
💪
renaming × 2
💪
search × 2
💪
data-structures × 2
💪
trojan × 2
💪
performance × 2
💪
database × 2
💪
shell-expansion × 2
💪
principles × 2
💪
regular-expressions × 2
💪
post-exploitation × 2
💪
packet-filtering × 2
💪
sandbox × 2
💪
bash-programming × 2
💪
domain-names × 2
💪
find-command × 2
💪
conditional-statements × 2
💪
network-attacks × 2
💪
star-topology × 2
💪
intrusion-detection-system × 2
💪
security-controls × 2
💪
web-development × 2
💪
network-devices × 2
💪
cyber-attack × 2
💪
ddos × 2
💪
brute-force-attack × 2
💪
proxy-server × 2
💪
basic-syntax × 2
💪
deployment × 2
💪
strings × 2
💪
fat32 × 2
💪
text-processing × 2
💪
traceroute × 2
💪
mv-command × 2
💪
xss × 2
💪
stateful-inspection × 2
💪
ip-addresses × 2
💪
telnet × 2
💪
password-cracking × 2
💪
data-security × 2
💪
shell-scripting × 2
💪
service-management × 2
💪
jenkins × 2
💪
password-hashing × 2
💪
cve × 2
💪
docker-registry × 2
💪
socket-programming × 2
💪
email-security × 2
💪
two-factor-authentication × 2
💪
file-directory × 2
💪
cat-command × 2
💪
file-handling × 2
💪
easy × 2
💪
network-connections × 2
💪
udp × 2
💪
cross-site-scripting × 2
💪
smtp × 2
💪
linux-commands × 2
💪
passwords × 2
💪
mesh-topology × 2
💪
listing × 2
💪
text-search × 2
💪
text-editor × 2
💪
dma × 2
💪
usage × 2
💪
local-area-networks × 2
💪
email × 2
💪
computer-security × 2
💪
zero-day × 2
💪
dynamic-analysis × 2
💪
control-flow × 2
💪
network-connectivity × 2
💪
icmp × 2
💪
nmap × 2
💪
configuration × 2
💪
database-security × 2
💪
rootkit × 2
💪
authentication-methods × 2
💪
file-search × 2
💪
network-tools × 2
💪
tcp/ip × 2
💪
symbolic-links × 2
💪
hardware × 2
💪
rmdir × 2
💪
testing-methods × 2
💪
shell × 2
💪
system-administration × 2
💪
process-management × 2
💪
creation × 2
💪
fedora × 2
💪
honeytokens × 2
💪
multi-factor × 2
💪
connections × 2
💪
directory-navigation × 2
💪
bash-scripting × 2
💪
kernel × 2
💪
cloud-security × 2
💪
symbolic-link × 2
💪
ls-command × 2
💪
disk-usage × 2
💪
dns-configuration × 2
💪
fuzzing × 2
💪
hostname × 2
💪
windows × 2
💪
antivirus × 2
💪
dos-attack × 2
💪
directory-operations × 2
💪
secure-communication × 2