🔥
10
Zeal
2
Jolt
Ninja Recruit II
10 🔥

Next: Ninja Recruit III

CTF Achievements

0

Quiz Achievements

51

Code Arena Achievements

0

Quiz Activity
Code Arena Activity
CTF Challenges
Zeal Progress
CTF Challenges by Category
All Skills
linux × 399 cybersecurity × 320 💪 ethical-hacking × 150 💪 file-commands × 123 💪 penetration-testing × 119 💪 directory-commands × 117 💪 network-security × 104 💪 firewall × 77 💪 encryption × 73 💪 phishing × 71 💪 file-permissions × 63 cryptography × 61 💪 social-engineering × 57 💪 basics × 54 💪 sql-injection × 51 💪 python × 45 💪 variables × 44 security × 42 💪 malware × 40 💪 data-types × 39 💪 protocols × 38 💪 python-programming × 36 💪 cli × 33 💪 tools × 33 💪 vpn × 30 💪 software-security × 29 💪 process-management × 28 💪 computer-networks × 27 💪 web-application-security × 27 command-line × 27 💪 networking × 26 💪 network-protocols × 25 💪 permissions × 25 💪 http × 25 💪 firewalls × 24 💪 honeypot × 24 💪 bash × 23 💪 vulnerability-assessment × 23 💪 file-management × 22 💪 vulnerabilities × 22 💪 authentication × 22 💪 programming × 22 💪 file-directory-commands × 21 💪 commands × 21 💪 exploit-development × 21 💪 cyber-attacks × 19 💪 computer-forensics × 19 💪 internet-protocols × 18 💪 buffer-overflow × 18 💪 https × 18 💪 attacks × 16 💪 file-and-directory-commands × 16 💪 web-security × 16 💪 osi-model × 16 💪 exception-handling × 16 💪 metasploit × 16 💪 vulnerability × 16 💪 cyber-security × 16 💪 dns × 15 💪 xss × 15 💪 access-control × 15 💪 operating-systems × 15 💪 networking-commands × 15 💪 ddos-attack × 15 💪 file-operations × 14 💪 linux-commands × 14 💪 scripting × 14 💪 types × 14 💪 symbolic-link × 14 💪 bash-scripting × 14 💪 directories × 13 💪 terminal-shortcuts × 13 💪 data-protection × 13 💪 loops × 13 💪 hacking × 13 💪 iot × 13 💪 web-development × 13 💪 nmap × 13 💪 bash-programming × 12 💪 terminology × 12 💪 vulnerability-scanning × 12 💪 protocol × 12 💪 hardware-security × 12 💪 side-channel-attacks × 12 💪 syntax × 12 💪 intrusion-detection × 12 💪 electronics × 12 💪 mobile-security × 12 💪 ls × 11 💪 password-cracking × 11 💪 ddos × 11 💪 find-command × 11 💪 malware-analysis × 11 💪 information-security × 11 💪 security-awareness-training × 10 💪 basic × 10 💪 directory × 10 💪 directory-creation × 10 💪 navigation × 10 💪 wireless-security × 10 💪 tcp-ip × 10 💪 ssh × 10 💪 file-search × 10 💪 tcp × 10 💪 cia-triad × 10 💪 incident-response × 10 💪 grep × 9 💪 chmod × 9 💪 directory-operations × 9 💪 wireshark × 9 💪 passwords × 9 💪 artificial-intelligence × 9 💪 principles × 9 💪 command-line-interface × 9 💪 ssl × 9 💪 linux-filesystem-hierarchy × 9 💪 security-awareness × 9 💪 exploit × 9 💪 zero-day-vulnerability × 8 💪 security-testing × 8 💪 network-scanning × 8 💪 beginner × 8 💪 ls-command × 8 💪 file-ownership × 8 💪 file × 8 💪 html × 8 💪 search × 8 💪 programming-languages × 8 💪 programming-language × 8 💪 password-security × 8 💪 git × 8 💪 comments × 8 💪 unix × 8 💪 security-assessment × 8 💪 ids × 8 💪 ip-address × 8 💪 two-factor-authentication × 8 💪 tls × 8 💪 css × 8 💪 privilege-escalation × 8 💪 least-privilege × 7 💪 reverse-shell × 7 💪 files × 7 💪 gitlab × 7 💪 symmetric-encryption × 7 💪 machine-learning × 7 💪 email-security × 7 💪 control-flow-structures × 7 💪 brute-force × 7 💪 dos × 7 💪 data-security × 7 💪 algorithm × 7 💪 directory-navigation × 7 💪 sql × 7 💪 man-in-the-middle × 7 💪 apt × 7 💪 security-principles × 7 💪 arp × 7 💪 package-management × 7 💪 find × 7 💪 symbolic-links × 7 💪 network-forensics × 7 💪 basic-commands × 7 💪 port-scanning × 6 💪 rm × 6 💪 definitions × 6 💪 antivirus × 6 💪 control-flow × 6 💪 blockchain × 6 💪 malware-types × 6 💪 communication × 6 💪 ownership × 6 💪 network-traffic × 6 💪 filesystem-hierarchy × 6 💪 cd-command × 6 💪 intrusion-detection-system × 6 💪 secure-communication × 6 💪 zero-day × 6 💪 keybindings × 6 💪 smtp × 6 💪 mv × 6 💪 network × 6 💪 brute-force-attack × 6 💪 list × 6 💪 payload × 6 💪 acronyms × 6 💪 repository-management × 6 💪 file-system × 6 💪 internet × 6 💪 wireless-networks × 6 💪 hashing × 6 💪 mkdir × 6 💪 generic-programming × 6 💪 data-encryption × 6 💪 email × 6 💪 command × 6 💪 web-applications × 6 💪 risk-management × 6 💪 text-processing × 6 💪 best-practices × 6 💪 fundamentals × 6 💪 user-management × 6 💪 while-loop × 5 💪 secure-coding × 5 💪 vpns × 5 💪 natural-language-processing × 5 💪 data × 5 💪 static-analysis × 5 💪 basic-concepts × 5 💪 spoofing × 5 💪 cyber-attack × 5 💪 automation × 5 💪 linux-filesystem × 5 💪 dhcp × 5 💪 attack-techniques × 5 💪 black-box-testing × 5 💪 network-attacks × 5 💪 semantics × 5 💪 botnet × 5 💪 mitm-attack × 5 💪 mqtt × 5 💪 remote-access × 5 💪 debian × 5 💪 exploitation × 5 💪 data-structures × 5 💪 attack × 5 💪 file-systems × 5 💪 copy × 5 💪 lists × 5 💪 exploits × 5 💪 bash-shell × 5 💪 reverse-engineering × 5 💪 advanced × 5 💪 ubuntu × 5 💪 file-handling × 5 💪 terms × 5 💪 pwd-command × 4 💪 hacker-types × 4 💪 sandbox × 4 💪 port × 4 💪 internet-security × 4 💪 file-manipulation × 4 💪 threats × 4 💪 dos-attack × 4 💪 network-analysis × 4 💪 network-topologies × 4 💪 hardware × 4 💪 subnet-mask × 4 💪 error-handling × 4 💪 algorithms × 4 💪 ports × 4 💪 file-copy × 4 💪 digital-signatures × 4 💪 operators × 4 💪 networks × 4 💪 android × 4 💪 chmod-command × 4 💪 frameworks × 4 💪 functions × 4 💪 web × 4 💪 reconnaissance × 4 💪 white-hat × 4 💪 if-statement × 4 💪 public-key × 4 💪 listing × 4 💪 delete × 4 💪 application-security × 4 💪 list-files × 4 💪 cross-site-scripting × 4 💪 chown × 4 💪 cipher × 4 💪 attack-types × 4 💪 password × 4 💪 disk-usage × 4 💪 data-integrity × 4 💪 ransomware × 4 💪 virus × 4 💪 ip × 4 💪 file-redirection × 4 💪 rsa × 4 💪 rm-command × 4 💪 threat-management × 4 💪 encryption-algorithms × 4 💪 database × 4 💪 change-directory × 4 💪 debugging × 4 💪 cyber-threats × 4 💪 group-management × 4 💪 ftp × 4 💪 grep-command × 4 💪 owasp × 4 💪 data-transmission × 4 💪 version-control × 4 💪 attackers × 4 💪 directory-listing × 4 💪 compression × 4 💪 physical-security × 4 💪 cp × 4 💪 cat-command × 4 💪 footprinting × 4 terminal × 4 💪 sensors × 3 💪 built-in-functions × 3 💪 nano × 3 💪 file-listing × 3 💪 security-controls × 3 💪 goals × 3 💪 digital-forensics × 3 💪 http-methods × 3 💪 terminal-keybindings × 3 💪 input-validation × 3 💪 languages × 3 💪 file-io × 3 💪 types-of-attacks × 3 💪 shell-customization × 3 💪 directory-deletion × 3 💪 plaintext × 3 💪 concept × 3 💪 data-recovery × 3 💪 computer-science × 3 💪 mac-address × 3 💪 security-audit × 3 💪 cybersecurity-legislation × 3 💪 rootkit × 3 💪 icmp × 3 💪 attack-vectors × 3 💪 create-directory × 3 💪 ethics × 3 💪 router × 3 💪 remote-code-execution × 3 💪 easy × 3 💪 hard × 3 💪 ciphertext × 3 💪 honey-pot × 3 💪 terminal-commands × 3 💪 system-commands × 3 💪 digital-signature × 3 💪 hash-function × 3 💪 security-auditing × 3 💪 pattern × 3 💪 switch × 3 💪 microprocessors × 3 💪 copying × 3 💪 firewall-types × 3 💪 anti-virus × 3 💪 analysis × 3 💪 output-redirection × 3 💪 examples × 3 💪 deep-learning × 3 💪 pass-statement × 3 💪 protection × 3 💪 html-css × 3 💪 shellcode × 3 💪 shebang × 3 💪 openssl × 3 💪 ssl-tls × 3 💪 countermeasures × 3 💪 file-metadata × 3 💪 system-monitoring × 3 💪 computer-security × 3 💪 cat × 3 💪 cd × 3 💪 mitm × 3 💪 scp × 3 💪 command-injection × 3 💪 directory-management × 3 💪 microcontrollers × 3 💪 packet-sniffing × 3 💪 conditional-statements × 3 💪 cia × 3 💪 user-input × 3 💪 hidden-files × 3 💪 iptables × 3 💪 web-application × 3 💪 malware-protection × 3 💪 methodology × 3 💪 data-retrieval × 3 💪 steganography × 3 💪 techniques × 3 💪 if-elif-else × 3 💪 first-step × 3 💪 sql-programming × 3 💪 network-tools × 3 💪 vim × 3 💪 system-configuration × 3 💪 environment-variables × 3 💪 snmp × 3 💪 password-hashing × 3 💪 concepts × 3 💪 ip-addresses × 3 💪 file-transfer × 3 💪 linux-tools × 3 💪 strings × 3 💪 csrf × 3 💪 post-exploitation × 3 💪 packet-analysis × 3 💪 cryptanalysis × 3 💪 unauthorized-access × 3 💪 password-management × 3 💪 ip-addressing × 3 💪 methods × 3 💪 sticky-bit × 3 💪 sorting × 3 💪 windows × 3 💪 text-editors × 3 💪 sandboxing × 3 💪 control-systems × 3 💪 man-in-the-middle-attack × 3 💪 black-box × 3 💪 control-structures × 3 💪 caesar-cipher × 3 💪 ios × 3 💪 fedora × 3 💪 cross-platform × 3 💪 timing-attack × 3 💪 recursion × 3 💪 software-development × 3 💪 c++ × 3 💪 asymmetric-encryption × 3 💪 penetration-test × 3 💪 log-files × 3 💪 routing-table × 2 💪 top-command × 2 💪 knowledge-representation × 2 💪 create × 2 💪 robotics × 2 💪 routing × 2 💪 stream-ciphers × 2 💪 procedures × 2 💪 pid × 2 💪 html-elements × 2 💪 disk-space × 2 💪 connectivity × 2 💪 file-contents × 2 💪 enumeration × 2 💪 structure × 2 💪 execute-permission × 2 💪 size × 2 💪 disk-usage-commands × 2 💪 append × 2 💪 ipv4 × 2 💪 transfer-function × 2 💪 actuators × 2 💪 red-team × 2 💪 ipv6 × 2 💪 hardware-security-module × 2 💪 xss-attack × 2 💪 ssh-tunneling × 2 💪 testing-types × 2 💪 gdpr × 2 💪 safety × 2 💪 ln-command × 2 💪 heartbleed-bug × 2 💪 view-permissions × 2 💪 sorting-algorithms × 2 💪 data-manipulation × 2 💪 rc4 × 2 💪 security-risks × 2 💪 kill-command × 2 💪 mutable × 2 💪 computer-network × 2 💪 deletion × 2 💪 planning × 2 💪 practical × 2 💪 symmetric-cryptography × 2 💪 cryptographic-attack × 2 💪 system-administration × 2 💪 shell × 2 💪 remove-directory × 2 💪 processing × 2 💪 importance × 2 💪 data-insertion × 2 💪 email-protocols × 2 💪 octal × 2 💪 dos-attacks × 2 💪 file-recovery × 2 💪 worm × 2 💪 defensive-measures × 2 💪 storage × 2 💪 unsupervised-learning × 2 💪 type-conversion × 2 💪 directory-structure × 2 💪 topology × 2 💪 forensics × 2 💪 for-loop × 2 💪 forensic-analysis × 2 💪 security-standards × 2 💪 denial-of-service × 2 💪 data-breach × 2 💪 udp × 2 💪 sqli × 2 💪 code-analysis × 2 💪 mitigation × 2 💪 keystream × 2 💪 caching × 2 💪 socket-programming × 2 💪 rsync × 2 💪 mv-command × 2 💪 syntax-and-semantics × 2 💪 shell-scripting × 2 💪 persistence × 2 💪 arch-linux × 2 💪 basic-terminology × 2 💪 response × 2 💪 tail × 2 💪 code-review × 2 💪 language × 2 💪 http-codes × 2 💪 hidden × 2 💪 cryptographic-algorithms × 2 💪 file-permission × 2 💪 boolean × 2 💪 packet-filtering × 2 💪 decryption × 2 💪 white-box × 2 💪 directory-removal × 2 💪 dictionaries × 2 💪 linux-file-system × 2 💪 processes × 2 💪 hardware-trojans × 2 💪 web-vulnerabilities × 2 💪 ln × 2 💪 text-manipulation × 2 💪 development × 2 💪 javascript × 2 💪 block-ciphers × 2 💪 wifi × 2 💪 polp × 2 💪 network-auditing × 2 💪 privacy × 2 💪 monitoring × 2 💪 collection × 2 💪 pattern-matching × 2 💪 fuzzing × 2 💪 password-protection × 2 💪 power-analysis × 2 💪 network-sniffing × 2 💪 encoding × 2 💪 session-hijacking × 2 💪 sentiment-analysis × 2 💪 validation × 2 💪 phishing-attacks × 2 💪 directory-size × 2 💪 linux-command × 2 💪 hacking-phases × 2 💪 hacking-methodology × 2 💪 database-security × 2 💪 octal-value × 2 💪 ttl × 2 💪 gitignore × 2 💪 signals × 2 💪 pop3 × 2 💪 tor × 2 💪 coap × 2 💪 neural-networks × 2 💪 subnetting × 2 💪 password-storage × 2 💪 terminal-shortcuts-and-keybindings × 2 💪 local-area-networks × 2 💪 threat-detection × 2 💪 format × 2 💪 comparison-operators × 2 💪 applications × 2 💪 services × 2 💪 real-world-scenarios × 2 💪 cia-model × 2 💪 security-attacks × 2 💪 history × 2 💪 continue-statement × 2 💪 break-statement × 2 💪 difference × 2 💪 black-hat × 2 💪 change-permissions × 2 💪 fat32 × 2 💪 supervised-learning × 2 💪 logging × 2 💪 backup × 2 💪 move × 2 💪 network-infrastructure × 2 💪 hash-functions × 2 💪 definition × 2 💪 renaming × 2 💪 network-scan × 2 💪 sftp × 2 💪 transformation × 2 💪 shell-commands × 2 💪 ps-command × 2 💪 data-format × 2 💪 security-vulnerabilities × 2 💪 tcpip × 2 💪 extension × 2 💪 network-design × 2 💪 du × 2 💪 link × 2 💪 sql-injection-attack × 2 💪 commit × 2 💪 replay-attack × 2 💪 information-gathering × 2 💪 guidelines × 2 💪 goal × 2 💪 attributes × 2 💪 network-monitoring × 2 💪 md5 × 2 💪 heuristic-analysis × 2 💪 side-channel-attack × 2 💪 rename-files × 2 💪 rmdir × 2 💪 shell-command × 2 💪 creation × 2 💪 honeytokens × 2 💪 touch-command × 2 💪 secure-connection × 2 💪 vulnerability-management × 2 💪 computer-architecture × 2 💪 devices × 2 💪 packet-sniffer × 2 💪 phases × 2 💪 cybersecurity-tools × 2 💪 root-directory × 2 💪 immutable × 2 💪 nop-sled × 2 💪 dynamic-analysis × 2 💪 object-oriented-programming × 2 💪 payloads × 2 💪 information × 2 💪 objectives × 2 💪 corporate-security × 2 💪 memory-management × 2 💪 injection-attacks × 2 💪 risk-assessment × 2 💪 emacs × 2 💪 comment × 2 💪 for-loops × 2 💪 backdoor × 2 💪 traffic-overload × 2 💪 differential-power-analysis × 2 💪 telnet × 2 💪 siem × 2 💪 dictionary × 2 💪 security-tools × 2 💪 sql-command × 2 💪 features × 2 💪 sql-syntax × 2 💪 sql-basic × 2 💪 network-devices × 2 💪 rename × 2 💪 key × 2 💪 domain-names × 2 💪 arrays × 2 💪 security-policies × 2 💪 chain-of-custody × 2 💪 white-box-testing × 2 💪 try-except × 2 💪 cp-command × 2 💪 file-deletion × 2 💪 data-privacy × 2 💪 data-transfer × 2 💪 zero-day-exploit × 2 💪 directory-permissions × 2 💪 selinux × 2 💪 recursive × 2 💪 public-key-cryptography × 2 💪 layers × 2 💪 anonymity × 2 💪 chown-command × 2 💪 file-size × 2 💪 images × 2 💪 metasploit-framework × 2 💪 executable × 2 💪 removal × 2 💪 pid-controller × 2 💪 digital-certificate × 2 💪 essentials × 2 💪 basic-sql × 2 💪 network-mapping × 2 💪 redundancy × 2 💪 time-complexity × 2 💪 multi-factor-authentication × 2 💪 traffic-monitoring × 2 💪 zigbee × 2 💪 file-rename × 2 💪 security-algorithms × 2 💪 network-layer × 2 💪 text-editor × 2 💪 syn-flood × 2 💪 private-key × 2 💪 attack-methods × 2 💪 http-headers × 2 💪 dnf × 2 💪 manipulation × 2 💪 cve × 2