CTF Challenges by Category
All Skills
⭐
linux × 399
⭐
cybersecurity × 320
💪
ethical-hacking × 150
💪
file-commands × 123
💪
penetration-testing × 119
💪
directory-commands × 117
💪
network-security × 104
💪
firewall × 77
💪
encryption × 73
💪
phishing × 71
💪
file-permissions × 63
⭐
cryptography × 61
💪
social-engineering × 57
💪
basics × 54
💪
sql-injection × 51
💪
python × 45
💪
variables × 44
⭐
security × 42
💪
malware × 40
💪
data-types × 39
💪
protocols × 38
💪
python-programming × 36
💪
cli × 33
💪
tools × 33
💪
vpn × 30
💪
software-security × 29
💪
process-management × 28
💪
computer-networks × 27
💪
web-application-security × 27
⭐
command-line × 27
💪
networking × 26
💪
network-protocols × 25
💪
permissions × 25
💪
http × 25
💪
firewalls × 24
💪
honeypot × 24
💪
bash × 23
💪
vulnerability-assessment × 23
💪
file-management × 22
💪
vulnerabilities × 22
💪
authentication × 22
💪
programming × 22
💪
file-directory-commands × 21
💪
commands × 21
💪
exploit-development × 21
💪
cyber-attacks × 19
💪
computer-forensics × 19
💪
internet-protocols × 18
💪
buffer-overflow × 18
💪
https × 18
💪
attacks × 16
💪
file-and-directory-commands × 16
💪
web-security × 16
💪
osi-model × 16
💪
exception-handling × 16
💪
metasploit × 16
💪
vulnerability × 16
💪
cyber-security × 16
💪
dns × 15
💪
xss × 15
💪
access-control × 15
💪
operating-systems × 15
💪
networking-commands × 15
💪
ddos-attack × 15
💪
file-operations × 14
💪
linux-commands × 14
💪
scripting × 14
💪
types × 14
💪
symbolic-link × 14
💪
bash-scripting × 14
💪
directories × 13
💪
terminal-shortcuts × 13
💪
data-protection × 13
💪
loops × 13
💪
hacking × 13
💪
iot × 13
💪
web-development × 13
💪
nmap × 13
💪
bash-programming × 12
💪
terminology × 12
💪
vulnerability-scanning × 12
💪
protocol × 12
💪
hardware-security × 12
💪
side-channel-attacks × 12
💪
syntax × 12
💪
intrusion-detection × 12
💪
electronics × 12
💪
mobile-security × 12
💪
ls × 11
💪
password-cracking × 11
💪
ddos × 11
💪
find-command × 11
💪
malware-analysis × 11
💪
information-security × 11
💪
security-awareness-training × 10
💪
basic × 10
💪
directory × 10
💪
directory-creation × 10
💪
navigation × 10
💪
wireless-security × 10
💪
tcp-ip × 10
💪
ssh × 10
💪
file-search × 10
💪
tcp × 10
💪
cia-triad × 10
💪
incident-response × 10
💪
grep × 9
💪
chmod × 9
💪
directory-operations × 9
💪
wireshark × 9
💪
passwords × 9
💪
artificial-intelligence × 9
💪
principles × 9
💪
command-line-interface × 9
💪
ssl × 9
💪
linux-filesystem-hierarchy × 9
💪
security-awareness × 9
💪
exploit × 9
💪
zero-day-vulnerability × 8
💪
security-testing × 8
💪
network-scanning × 8
💪
beginner × 8
💪
ls-command × 8
💪
file-ownership × 8
💪
file × 8
💪
html × 8
💪
search × 8
💪
programming-languages × 8
💪
programming-language × 8
💪
password-security × 8
💪
git × 8
💪
comments × 8
💪
unix × 8
💪
security-assessment × 8
💪
ids × 8
💪
ip-address × 8
💪
two-factor-authentication × 8
💪
tls × 8
💪
css × 8
💪
privilege-escalation × 8
💪
least-privilege × 7
💪
reverse-shell × 7
💪
files × 7
💪
gitlab × 7
💪
symmetric-encryption × 7
💪
machine-learning × 7
💪
email-security × 7
💪
control-flow-structures × 7
💪
brute-force × 7
💪
dos × 7
💪
data-security × 7
💪
algorithm × 7
💪
directory-navigation × 7
💪
sql × 7
💪
man-in-the-middle × 7
💪
apt × 7
💪
security-principles × 7
💪
arp × 7
💪
package-management × 7
💪
find × 7
💪
symbolic-links × 7
💪
network-forensics × 7
💪
basic-commands × 7
💪
port-scanning × 6
💪
rm × 6
💪
definitions × 6
💪
antivirus × 6
💪
control-flow × 6
💪
blockchain × 6
💪
malware-types × 6
💪
communication × 6
💪
ownership × 6
💪
network-traffic × 6
💪
filesystem-hierarchy × 6
💪
cd-command × 6
💪
intrusion-detection-system × 6
💪
secure-communication × 6
💪
zero-day × 6
💪
keybindings × 6
💪
smtp × 6
💪
mv × 6
💪
network × 6
💪
brute-force-attack × 6
💪
list × 6
💪
payload × 6
💪
acronyms × 6
💪
repository-management × 6
💪
file-system × 6
💪
internet × 6
💪
wireless-networks × 6
💪
hashing × 6
💪
mkdir × 6
💪
generic-programming × 6
💪
data-encryption × 6
💪
email × 6
💪
command × 6
💪
web-applications × 6
💪
risk-management × 6
💪
text-processing × 6
💪
best-practices × 6
💪
fundamentals × 6
💪
user-management × 6
💪
while-loop × 5
💪
secure-coding × 5
💪
vpns × 5
💪
natural-language-processing × 5
💪
data × 5
💪
static-analysis × 5
💪
basic-concepts × 5
💪
spoofing × 5
💪
cyber-attack × 5
💪
automation × 5
💪
linux-filesystem × 5
💪
dhcp × 5
💪
attack-techniques × 5
💪
black-box-testing × 5
💪
network-attacks × 5
💪
semantics × 5
💪
botnet × 5
💪
mitm-attack × 5
💪
mqtt × 5
💪
remote-access × 5
💪
debian × 5
💪
exploitation × 5
💪
data-structures × 5
💪
attack × 5
💪
file-systems × 5
💪
copy × 5
💪
lists × 5
💪
exploits × 5
💪
bash-shell × 5
💪
reverse-engineering × 5
💪
advanced × 5
💪
ubuntu × 5
💪
file-handling × 5
💪
terms × 5
💪
pwd-command × 4
💪
hacker-types × 4
💪
sandbox × 4
💪
port × 4
💪
internet-security × 4
💪
file-manipulation × 4
💪
threats × 4
💪
dos-attack × 4
💪
network-analysis × 4
💪
network-topologies × 4
💪
hardware × 4
💪
subnet-mask × 4
💪
error-handling × 4
💪
algorithms × 4
💪
ports × 4
💪
file-copy × 4
💪
digital-signatures × 4
💪
operators × 4
💪
networks × 4
💪
android × 4
💪
chmod-command × 4
💪
frameworks × 4
💪
functions × 4
💪
web × 4
💪
reconnaissance × 4
💪
white-hat × 4
💪
if-statement × 4
💪
public-key × 4
💪
listing × 4
💪
delete × 4
💪
application-security × 4
💪
list-files × 4
💪
cross-site-scripting × 4
💪
chown × 4
💪
cipher × 4
💪
attack-types × 4
💪
password × 4
💪
disk-usage × 4
💪
data-integrity × 4
💪
ransomware × 4
💪
virus × 4
💪
ip × 4
💪
file-redirection × 4
💪
rsa × 4
💪
rm-command × 4
💪
threat-management × 4
💪
encryption-algorithms × 4
💪
database × 4
💪
change-directory × 4
💪
debugging × 4
💪
cyber-threats × 4
💪
group-management × 4
💪
ftp × 4
💪
grep-command × 4
💪
owasp × 4
💪
data-transmission × 4
💪
version-control × 4
💪
attackers × 4
💪
directory-listing × 4
💪
compression × 4
💪
physical-security × 4
💪
cp × 4
💪
cat-command × 4
💪
footprinting × 4
⭐
terminal × 4
💪
sensors × 3
💪
built-in-functions × 3
💪
nano × 3
💪
file-listing × 3
💪
security-controls × 3
💪
goals × 3
💪
digital-forensics × 3
💪
http-methods × 3
💪
terminal-keybindings × 3
💪
input-validation × 3
💪
languages × 3
💪
file-io × 3
💪
types-of-attacks × 3
💪
shell-customization × 3
💪
directory-deletion × 3
💪
plaintext × 3
💪
concept × 3
💪
data-recovery × 3
💪
computer-science × 3
💪
mac-address × 3
💪
security-audit × 3
💪
cybersecurity-legislation × 3
💪
rootkit × 3
💪
icmp × 3
💪
attack-vectors × 3
💪
create-directory × 3
💪
ethics × 3
💪
router × 3
💪
remote-code-execution × 3
💪
easy × 3
💪
hard × 3
💪
ciphertext × 3
💪
honey-pot × 3
💪
terminal-commands × 3
💪
system-commands × 3
💪
digital-signature × 3
💪
hash-function × 3
💪
security-auditing × 3
💪
pattern × 3
💪
switch × 3
💪
microprocessors × 3
💪
copying × 3
💪
firewall-types × 3
💪
anti-virus × 3
💪
analysis × 3
💪
output-redirection × 3
💪
examples × 3
💪
deep-learning × 3
💪
pass-statement × 3
💪
protection × 3
💪
html-css × 3
💪
shellcode × 3
💪
shebang × 3
💪
openssl × 3
💪
ssl-tls × 3
💪
countermeasures × 3
💪
file-metadata × 3
💪
system-monitoring × 3
💪
computer-security × 3
💪
cat × 3
💪
cd × 3
💪
mitm × 3
💪
scp × 3
💪
command-injection × 3
💪
directory-management × 3
💪
microcontrollers × 3
💪
packet-sniffing × 3
💪
conditional-statements × 3
💪
cia × 3
💪
user-input × 3
💪
hidden-files × 3
💪
iptables × 3
💪
web-application × 3
💪
malware-protection × 3
💪
methodology × 3
💪
data-retrieval × 3
💪
steganography × 3
💪
techniques × 3
💪
if-elif-else × 3
💪
first-step × 3
💪
sql-programming × 3
💪
network-tools × 3
💪
vim × 3
💪
system-configuration × 3
💪
environment-variables × 3
💪
snmp × 3
💪
password-hashing × 3
💪
concepts × 3
💪
ip-addresses × 3
💪
file-transfer × 3
💪
linux-tools × 3
💪
strings × 3
💪
csrf × 3
💪
post-exploitation × 3
💪
packet-analysis × 3
💪
cryptanalysis × 3
💪
unauthorized-access × 3
💪
password-management × 3
💪
ip-addressing × 3
💪
methods × 3
💪
sticky-bit × 3
💪
sorting × 3
💪
windows × 3
💪
text-editors × 3
💪
sandboxing × 3
💪
control-systems × 3
💪
man-in-the-middle-attack × 3
💪
black-box × 3
💪
control-structures × 3
💪
caesar-cipher × 3
💪
ios × 3
💪
fedora × 3
💪
cross-platform × 3
💪
timing-attack × 3
💪
recursion × 3
💪
software-development × 3
💪
c++ × 3
💪
asymmetric-encryption × 3
💪
penetration-test × 3
💪
log-files × 3
💪
routing-table × 2
💪
top-command × 2
💪
knowledge-representation × 2
💪
create × 2
💪
robotics × 2
💪
routing × 2
💪
stream-ciphers × 2
💪
procedures × 2
💪
pid × 2
💪
html-elements × 2
💪
disk-space × 2
💪
connectivity × 2
💪
file-contents × 2
💪
enumeration × 2
💪
structure × 2
💪
execute-permission × 2
💪
size × 2
💪
disk-usage-commands × 2
💪
append × 2
💪
ipv4 × 2
💪
transfer-function × 2
💪
actuators × 2
💪
red-team × 2
💪
ipv6 × 2
💪
hardware-security-module × 2
💪
xss-attack × 2
💪
ssh-tunneling × 2
💪
testing-types × 2
💪
gdpr × 2
💪
safety × 2
💪
ln-command × 2
💪
heartbleed-bug × 2
💪
view-permissions × 2
💪
sorting-algorithms × 2
💪
data-manipulation × 2
💪
rc4 × 2
💪
security-risks × 2
💪
kill-command × 2
💪
mutable × 2
💪
computer-network × 2
💪
deletion × 2
💪
planning × 2
💪
practical × 2
💪
symmetric-cryptography × 2
💪
cryptographic-attack × 2
💪
system-administration × 2
💪
shell × 2
💪
remove-directory × 2
💪
processing × 2
💪
importance × 2
💪
data-insertion × 2
💪
email-protocols × 2
💪
octal × 2
💪
dos-attacks × 2
💪
file-recovery × 2
💪
worm × 2
💪
defensive-measures × 2
💪
storage × 2
💪
unsupervised-learning × 2
💪
type-conversion × 2
💪
directory-structure × 2
💪
topology × 2
💪
forensics × 2
💪
for-loop × 2
💪
forensic-analysis × 2
💪
security-standards × 2
💪
denial-of-service × 2
💪
data-breach × 2
💪
udp × 2
💪
sqli × 2
💪
code-analysis × 2
💪
mitigation × 2
💪
keystream × 2
💪
caching × 2
💪
socket-programming × 2
💪
rsync × 2
💪
mv-command × 2
💪
syntax-and-semantics × 2
💪
shell-scripting × 2
💪
persistence × 2
💪
arch-linux × 2
💪
basic-terminology × 2
💪
response × 2
💪
tail × 2
💪
code-review × 2
💪
language × 2
💪
http-codes × 2
💪
hidden × 2
💪
cryptographic-algorithms × 2
💪
file-permission × 2
💪
boolean × 2
💪
packet-filtering × 2
💪
decryption × 2
💪
white-box × 2
💪
directory-removal × 2
💪
dictionaries × 2
💪
linux-file-system × 2
💪
processes × 2
💪
hardware-trojans × 2
💪
web-vulnerabilities × 2
💪
ln × 2
💪
text-manipulation × 2
💪
development × 2
💪
javascript × 2
💪
block-ciphers × 2
💪
wifi × 2
💪
polp × 2
💪
network-auditing × 2
💪
privacy × 2
💪
monitoring × 2
💪
collection × 2
💪
pattern-matching × 2
💪
fuzzing × 2
💪
password-protection × 2
💪
power-analysis × 2
💪
network-sniffing × 2
💪
encoding × 2
💪
session-hijacking × 2
💪
sentiment-analysis × 2
💪
validation × 2
💪
phishing-attacks × 2
💪
directory-size × 2
💪
linux-command × 2
💪
hacking-phases × 2
💪
hacking-methodology × 2
💪
database-security × 2
💪
octal-value × 2
💪
ttl × 2
💪
gitignore × 2
💪
signals × 2
💪
pop3 × 2
💪
tor × 2
💪
coap × 2
💪
neural-networks × 2
💪
subnetting × 2
💪
password-storage × 2
💪
terminal-shortcuts-and-keybindings × 2
💪
local-area-networks × 2
💪
threat-detection × 2
💪
format × 2
💪
comparison-operators × 2
💪
applications × 2
💪
services × 2
💪
real-world-scenarios × 2
💪
cia-model × 2
💪
security-attacks × 2
💪
history × 2
💪
continue-statement × 2
💪
break-statement × 2
💪
difference × 2
💪
black-hat × 2
💪
change-permissions × 2
💪
fat32 × 2
💪
supervised-learning × 2
💪
logging × 2
💪
backup × 2
💪
move × 2
💪
network-infrastructure × 2
💪
hash-functions × 2
💪
definition × 2
💪
renaming × 2
💪
network-scan × 2
💪
sftp × 2
💪
transformation × 2
💪
shell-commands × 2
💪
ps-command × 2
💪
data-format × 2
💪
security-vulnerabilities × 2
💪
tcpip × 2
💪
extension × 2
💪
network-design × 2
💪
du × 2
💪
link × 2
💪
sql-injection-attack × 2
💪
commit × 2
💪
replay-attack × 2
💪
information-gathering × 2
💪
guidelines × 2
💪
goal × 2
💪
attributes × 2
💪
network-monitoring × 2
💪
md5 × 2
💪
heuristic-analysis × 2
💪
side-channel-attack × 2
💪
rename-files × 2
💪
rmdir × 2
💪
shell-command × 2
💪
creation × 2
💪
honeytokens × 2
💪
touch-command × 2
💪
secure-connection × 2
💪
vulnerability-management × 2
💪
computer-architecture × 2
💪
devices × 2
💪
packet-sniffer × 2
💪
phases × 2
💪
cybersecurity-tools × 2
💪
root-directory × 2
💪
immutable × 2
💪
nop-sled × 2
💪
dynamic-analysis × 2
💪
object-oriented-programming × 2
💪
payloads × 2
💪
information × 2
💪
objectives × 2
💪
corporate-security × 2
💪
memory-management × 2
💪
injection-attacks × 2
💪
risk-assessment × 2
💪
emacs × 2
💪
comment × 2
💪
for-loops × 2
💪
backdoor × 2
💪
traffic-overload × 2
💪
differential-power-analysis × 2
💪
telnet × 2
💪
siem × 2
💪
dictionary × 2
💪
security-tools × 2
💪
sql-command × 2
💪
features × 2
💪
sql-syntax × 2
💪
sql-basic × 2
💪
network-devices × 2
💪
rename × 2
💪
key × 2
💪
domain-names × 2
💪
arrays × 2
💪
security-policies × 2
💪
chain-of-custody × 2
💪
white-box-testing × 2
💪
try-except × 2
💪
cp-command × 2
💪
file-deletion × 2
💪
data-privacy × 2
💪
data-transfer × 2
💪
zero-day-exploit × 2
💪
directory-permissions × 2
💪
selinux × 2
💪
recursive × 2
💪
public-key-cryptography × 2
💪
layers × 2
💪
anonymity × 2
💪
chown-command × 2
💪
file-size × 2
💪
images × 2
💪
metasploit-framework × 2
💪
executable × 2
💪
removal × 2
💪
pid-controller × 2
💪
digital-certificate × 2
💪
essentials × 2
💪
basic-sql × 2
💪
network-mapping × 2
💪
redundancy × 2
💪
time-complexity × 2
💪
multi-factor-authentication × 2
💪
traffic-monitoring × 2
💪
zigbee × 2
💪
file-rename × 2
💪
security-algorithms × 2
💪
network-layer × 2
💪
text-editor × 2
💪
syn-flood × 2
💪
private-key × 2
💪
attack-methods × 2
💪
http-headers × 2
💪
dnf × 2
💪
manipulation × 2
💪
cve × 2