CTF Challenges by Category
All Skills
⭐
linux × 275
💪
file-commands × 90
💪
cybersecurity × 85
💪
directory-commands × 78
💪
protocols × 44
💪
network-security × 42
💪
c-programming × 40
💪
computer-networks × 39
💪
cli × 39
💪
ethical-hacking × 38
💪
operating-systems × 37
💪
web-development × 35
💪
encryption × 33
💪
iot × 33
💪
osi-model × 30
💪
python × 30
⭐
security × 30
💪
networking × 28
💪
firewalls × 27
💪
process-management × 26
💪
firewall × 26
💪
file-permissions × 26
💪
git × 26
💪
vpn × 25
💪
file-management × 25
💪
devops × 24
💪
navigation × 23
💪
sql-injection × 23
💪
basics × 23
💪
commands × 20
💪
loops × 20
💪
mqtt × 19
💪
file-directory-commands × 19
💪
file-operations × 19
💪
control-flow × 18
💪
authentication × 18
💪
gitlab × 17
💪
penetration-testing × 17
💪
permissions × 16
💪
data-structures × 16
⭐
network × 15
💪
tcp × 14
💪
css × 14
💪
nmap × 14
💪
social-engineering × 13
💪
tools × 13
💪
ls-command × 13
💪
programming × 13
💪
performance × 13
💪
web-security × 13
💪
internet-protocols × 13
💪
phishing × 13
💪
http × 13
💪
microcontrollers × 12
💪
web-application-security × 12
💪
version-control × 12
💪
unix × 12
💪
microprocessors × 12
💪
xss × 12
💪
access-control × 12
💪
https × 12
⭐
arrays × 12
⭐
algorithms × 12
💪
html × 11
💪
network-topologies × 11
💪
dns × 11
💪
find-command × 11
💪
cryptography × 11
💪
file-system × 11
💪
continuous-integration × 11
💪
javascript × 11
💪
docker × 11
💪
iot-protocols × 11
💪
variables × 11
💪
directory-management × 11
💪
metasploit × 11
💪
directory-navigation × 10
💪
memory-management × 10
💪
listing × 10
💪
data-types × 10
💪
routing × 10
💪
network-layer × 10
💪
protocol × 10
💪
linux-commands × 10
💪
syntax × 10
💪
monitoring × 10
💪
iot-security × 10
💪
network-protocols × 10
💪
directories × 9
💪
basic × 9
💪
file-search × 9
💪
hidden-files × 9
💪
tcp-ip × 9
💪
signals × 9
💪
coap × 9
💪
automation × 9
⭐
scheduling × 9
💪
generic-programming × 8
💪
cyber-security × 8
💪
csrf × 8
💪
jenkins × 8
💪
internet-of-things × 8
💪
wireshark × 8
💪
vpns × 8
💪
router × 8
💪
grep × 8
💪
error-handling × 8
💪
directory × 8
💪
directory-operations × 8
💪
kubernetes × 8
💪
disk-usage × 8
💪
file-manipulation × 8
💪
ip-addressing × 7
💪
ipv6 × 7
💪
intrusion-detection × 7
💪
file-creation × 7
💪
malware × 7
💪
socket-programming × 7
💪
functions × 7
💪
chmod × 7
💪
edge-computing × 7
💪
communication × 7
💪
kernel × 7
💪
mv-command × 7
💪
subnetting × 7
💪
exploit-development × 7
💪
ssh × 7
💪
network-topology × 6
💪
networks × 6
💪
vulnerability-scanning × 6
💪
memory × 6
💪
arp × 6
💪
sorting × 6
💪
best-practices × 6
💪
packet-analysis × 6
💪
command-line × 6
💪
power-management × 6
💪
cloud × 6
💪
efficiency × 6
💪
directory-creation × 6
💪
benefits × 6
💪
ipv4 × 6
💪
incident-response × 6
💪
udp × 6
💪
shell-scripting × 6
💪
file-copy × 6
💪
ports × 6
💪
switch × 6
💪
privacy × 6
💪
cd-command × 6
💪
network-architecture × 6
💪
ethernet × 6
💪
software-security × 6
💪
principles × 6
💪
control-flow-structures × 6
💪
secure-network-design × 6
💪
java × 6
💪
integration × 6
💪
c++ × 6
💪
star-topology × 6
💪
fundamentals × 6
💪
pipeline × 6
💪
ip-address × 6
💪
backend × 6
⭐
optimization × 6
⭐
shell × 6
💪
attacks × 5
💪
configuration × 5
💪
machine-learning × 5
💪
ci-cd × 5
💪
command × 5
💪
containerization × 5
💪
tls × 5
💪
rest × 5
💪
network-analysis × 5
💪
ipsec × 5
💪
branching × 5
💪
troubleshooting × 5
💪
database × 5
💪
sql × 5
💪
icmp × 5
💪
device-management × 5
💪
ftp × 5
💪
history × 5
💪
operators × 5
💪
lan × 5
💪
bash × 5
💪
vulnerabilities × 5
💪
api × 5
💪
file-listing × 5
💪
python-programming × 5
💪
integrity × 5
💪
ls × 5
💪
vlan × 5
💪
mac-address × 5
💪
repository-management × 5
💪
deployment × 5
💪
ln-command × 5
💪
directory-command × 5
💪
passwords × 5
💪
for-loop × 5
💪
iot-gateway × 5
💪
system-calls × 5
💪
embedded-systems × 5
💪
wireless-communication × 5
💪
reconnaissance × 5
💪
directory-removal × 5
💪
mkdir × 5
💪
artificial-intelligence × 5
💪
node.js × 5
💪
sed × 5
💪
windows × 5
💪
cdn × 5
💪
zigbee × 5
💪
ids × 5
💪
network-scanning × 5
💪
pointers × 5
💪
mesh-topology × 5
💪
content-security-policy × 5
💪
iot-devices × 4
💪
http-headers × 4
💪
rm-command × 4
💪
file-systems × 4
💪
network-devices × 4
💪
hardware × 4
💪
switching × 4
💪
data-transmission × 4
💪
configuration-management × 4
💪
lists × 4
💪
file-transfer × 4
💪
file-command × 4
💪
real-time-systems × 4
💪
procfs × 4
💪
microcontroller × 4
💪
time-complexity × 4
💪
infrastructure-as-code × 4
💪
forensics × 4
💪
data-processing × 4
💪
cpu × 4
💪
responsive-design × 4
💪
packet-filtering × 4
💪
file-and-directory-commands × 4
💪
images × 4
💪
directory-listing × 4
💪
http-methods × 4
💪
dhcp × 4
💪
log-analysis × 4
💪
accessibility × 4
💪
transport-layer × 4
💪
switch-case × 4
💪
break-statement × 4
💪
move × 4
💪
containers × 4
💪
data-security × 4
💪
structures × 4
💪
symbolic-link × 4
💪
mv × 4
💪
cleanup × 4
💪
creation × 4
💪
ai × 4
💪
file-moving × 4
💪
network-traffic × 4
💪
synchronization × 4
💪
network-segmentation × 4
💪
buffer-overflow × 4
💪
design × 4
💪
iot-communication × 4
💪
engineering × 4
💪
cloud-networking × 4
💪
html5 × 4
💪
interrupts × 4
💪
password-security × 4
💪
control-structures × 4
💪
keybindings × 4
💪
search × 4
💪
yaml × 4
💪
firmware × 4
💪
network-forensics × 4
💪
cp-command × 4
💪
text-manipulation × 4
💪
bus-topology × 4
💪
natural-language-processing × 4
💪
virtualization × 4
💪
network-troubleshooting × 4
💪
selectors × 4
💪
priority × 4
💪
architecture × 4
💪
publish-subscribe × 4
💪
complexity × 4
💪
templates × 4
💪
files × 4
💪
kernel-design × 3
💪
availability × 3
💪
api-development × 3
💪
round-robin × 3
💪
raspberry-pi × 3
💪
file-processing × 3
💪
load-balancing × 3
💪
wireless-networks × 3
💪
pwd × 3
💪
hyperlinks × 3
💪
linked-lists × 3
💪
hashing × 3
💪
concurrency × 3
💪
standards × 3
💪
device-drivers × 3
💪
data-transfer × 3
💪
performance-optimization × 3
💪
containment × 3
💪
owasp × 3
💪
graphql × 3
💪
vulnerability × 3
💪
gitlab-ci × 3
💪
dds × 3
💪
malware-analysis × 3
💪
devices × 3
💪
captcha × 3
💪
grep-command × 3
💪
infrastructure × 3
💪
head × 3
💪
database-security × 3
💪
honeypot × 3
💪
ruby-on-rails × 3
💪
iot-platforms × 3
💪
terraform × 3
💪
user-management × 3
💪
find × 3
💪
basic-commands × 3
💪
secure-communication × 3
💪
recursion × 3
💪
io-systems × 3
💪
fuzzy-logic × 3
💪
ping × 3
💪
data-management × 3
💪
terminology × 3
💪
network-monitoring × 3
💪
orchestration × 3
💪
dynamic-allocation × 3
💪
ddos × 3
💪
addressing × 3
💪
hash-tables × 3
💪
network-scan × 3
💪
do-while × 3
💪
iteration × 3
💪
current-directory × 3
💪
nodejs × 3
💪
cloud-computing × 3
💪
awk × 3
💪
sftp × 3
💪
server-side × 3
💪
privilege-escalation × 3
💪
blockchain × 3
💪
iptables × 3
💪
while-loop × 3
💪
lifecycle × 3
💪
django × 3
💪
styling × 3
💪
gateway × 3
💪
chown × 3
💪
search-commands × 3
💪
shortcuts × 3
💪
ip × 3
💪
lpwan × 3
💪
deletion × 3
💪
file-movement × 3
💪
components × 3
💪
front-end × 3
💪
industrial-automation × 3
💪
data-protection × 3
💪
iaas × 3
💪
command-line-interface × 3
💪
ssl-tls × 3
💪
aws × 3
💪
nested-loops × 3
💪
development × 3
💪
free × 3
💪
resource-management × 3
💪
malloc × 3
💪
smart-home × 3
💪
system-monitoring × 3
💪
conditionals × 3
💪
hardware-security × 3
💪
scalability × 3
💪
network-automation × 3
💪
scripting × 3
💪
file-ownership × 3
💪
rsync × 3
💪
hash-table × 3
💪
mqtt-protocol × 3
💪
routers × 3
💪
arp-spoofing × 3
💪
packet-capture × 3
💪
backup × 3
💪
task-scheduling × 3
💪
arduino × 3
💪
advantages × 3
💪
linux-command-line × 3
💪
top × 3
💪
smtp × 3
💪
data-format × 3
💪
security-assessment × 3
💪
stateful-inspection × 3
💪
do-while-loop × 3
💪
switch-statement × 3
💪
network-tools × 3
💪
methodology × 3
💪
internet-protocol × 3
💪
conditional-statements × 3
💪
redirection × 3
💪
decision-making × 3
💪
least-privilege × 3
💪
ps × 3
💪
name-resolution × 2
💪
generic-functions × 2
💪
create-directory × 2
💪
calloc × 2
💪
network-routing × 2
💪
wireless-security × 2
💪
searching × 2
💪
wildcards × 2
💪
segmentation × 2
💪
csp × 2
💪
count × 2
💪
ip-spoofing × 2
💪
client-side × 2
💪
microcontroller-architecture × 2
💪
dos-attack × 2
💪
static-analysis × 2
💪
c-language × 2
💪
payload × 2
💪
context-switching × 2
💪
practical × 2
💪
features × 2
💪
remote-access × 2
💪
evidence × 2
💪
real-time-operating-systems × 2
💪
attack-vectors × 2
💪
move-file × 2
💪
client-server × 2
💪
file-navigation × 2
💪
shell-command × 2
💪
web-standards × 2
💪
list-commands × 2
💪
short-range × 2
💪
algorithm × 2
💪
arraylist × 2
💪
sandboxing × 2
💪
siem × 2
💪
linux-tools × 2
💪
rename × 2
💪
scaling × 2
💪
http-protocol × 2
💪
bind × 2
💪
compression × 2
💪
telnet × 2
💪
package-management × 2
💪
regular-expressions × 2
💪
cloud-service-model × 2
💪
compiler × 2
💪
change-directory × 2
💪
bios × 2
💪
hybrid-topology × 2
💪
git-branch × 2
💪
jwt × 2
💪
constrained-devices × 2
💪
hardware-management × 2
💪
data-communication × 2
💪
ownership × 2
💪
scp × 2
💪
hypervisor × 2
💪
security-auditing × 2
💪
asynchronous × 2
💪
programming-language × 2
💪
web-engineering × 2
💪
embedded-c × 2
💪
init-process × 2
💪
bash-scripting × 2
💪
options × 2
💪
io-redirection × 2
💪
comparison × 2
💪
if-else × 2
💪
cp × 2
💪
text-processing × 2
💪
chmod-command × 2
💪
stacks × 2
💪
structure × 2
💪
heap × 2
💪
basic-operations × 2
💪
bandwidth × 2
💪
merge × 2
💪
array × 2
💪
disk-usage-commands × 2
💪
distributed-systems × 2
💪
syn-flood × 2
💪
internet-security × 2
💪
dns-lookup × 2
💪
build × 2
💪
memory-types × 2
💪
data-fetching × 2
💪
optimisation × 2
💪
best-practice × 2
💪
ips × 2
💪
file-move × 2
💪
networking-commands × 2
💪
lora × 2
💪
amqp × 2
💪
data-manipulation × 2
💪
reverse-shell × 2
💪
generics × 2
💪
container-orchestration × 2
💪
loop-control × 2
💪
web-browser × 2
💪
mkdir-command × 2
💪
man-in-the-middle-attack × 2
💪
supervised-learning × 2
💪
investigation × 2
💪
git-init × 2
💪
adc × 2
💪
visibility × 2
💪
sensors × 2
💪
basic-concepts × 2
💪
routing-table × 2
💪
load-factor × 2
💪
responsive × 2
💪
output × 2
💪
ssl × 2
💪
shell-commands × 2
💪
cabling × 2
💪
shell-builtin × 2
💪
rootkit × 2
💪
secure-coding × 2
💪
exit-status × 2
💪
symmetric-encryption × 2
💪
mutex × 2
💪
packet-routing × 2
💪
terminal × 2
💪
z-index × 2
💪
snort × 2
💪
sandbox × 2
💪
computer-vision × 2
💪
network-load-balancing × 2
💪
provisioning × 2
💪
kali-linux × 2
💪
risk-assessment × 2
💪
tooling × 2
💪
easy × 2
💪
file-and-directory × 2
💪
file-directory × 2
💪
network-layers × 2
💪
job-scheduling × 2
💪
bash-programming × 2
💪
regex × 2
💪
cyber-attack × 2
💪
node-red × 2
💪
cidr × 2
💪
paging × 2
💪
subnet-mask × 2
💪
real-time-applications × 2
💪
computer-network × 2
💪
network-hardware × 2
💪
reliability × 2
💪
c# × 2
💪
aws-iot × 2
💪
file-permission × 2
💪
data × 2
💪
loop × 2
💪
ransomware × 2
💪
processes × 2
💪
sql-programming × 2
💪
detection × 2
💪
risks × 2
💪
file × 2
💪
collision × 2
💪
arrays-lists × 2
💪
file-count × 2
💪
hacking × 2
💪
attack-prevention × 2
💪
network-virtualization × 2
💪
packet-loss × 2
💪
idempotency × 2
💪
touch-command × 2
💪
app-development × 2
💪
terminal-shortcuts × 2
💪
stateful × 2
💪
dos × 2
💪
openvpn × 2
💪
latency × 2
💪
fault-tolerance × 2
💪
tar-command × 2
💪
linux-filesystem × 2
💪
system-files × 2
💪
layout × 2
💪
vulnerability-assessment × 2
💪
frontend × 2
💪
lateral-movement × 2
💪
process-priority × 2
💪
nat × 2
💪
ring-topology × 2
💪
data-encryption × 2
💪
initialization × 2
💪
system-monitoring-tools × 2
💪
types × 2
💪
password-storage × 2
💪
pop3 × 2
💪
flags × 2
💪
cloud-security × 2
💪
neural-networks × 2
💪
persistence × 2
💪
cross-site-scripting × 2
💪
real-time × 2
💪
ddos-attacks × 2
💪
visualisation × 2
💪
php × 2
💪
traffic-analysis × 2
💪
file-handling × 2
💪
protection × 2
💪
smart-contract × 2
💪
virtual-memory × 2
💪
symbolic-links × 2
💪
intrusion-prevention × 2
💪
iiot × 2
💪
iot-connectivity × 2
💪
process-monitoring × 2
💪
server × 2
💪
nlp × 2
💪
policy × 2
💪
pointer-arithmetic × 2
💪
threats × 2
💪
wan × 2
💪
brute-force × 2
💪
network-design × 2
💪
threads × 2
💪
prevention × 2
💪
update × 2
💪
pwm × 2
💪
path × 2
💪
continuous-deployment × 2
💪
xmpp × 2
💪
tcpdump × 2
💪
process × 2
💪
linked-list × 2
💪
real-world × 2
💪
shellcode × 2
💪
process-tree × 2
💪
techniques × 2
💪
system-security × 2
💪
ble × 2
💪
documentation × 2
💪
branch × 2
💪
list-files × 2
💪
packet-sniffing × 2
💪
port-scanning × 2
💪
application × 2
💪
sticky-session × 2
💪
dmz × 2
💪
data-integrity × 2
💪
authorization × 2
💪
ota × 2
💪
encrypted-communication × 2
💪
du × 2
💪
c × 2
💪
scheduler × 2
💪
mongodb × 2
💪
computer-hardware × 2
💪
process-control × 2
💻
string-manipulation × 2
💻
dynamic-programming × 2
💻
strings × 2
💻
substring × 2