🔥
30,079
Zeal
8,365
Jolt
Cyber Knight III
30079 🔥

Next: Cyber Knight IV

CTF Achievements

2

Quiz Achievements

93

Code Arena Achievements

26

Quiz Activity
Code Arena Activity
CTF Challenges
Zeal Progress
CTF Challenges by Category
All Skills
linux × 275 💪 file-commands × 90 💪 cybersecurity × 85 💪 directory-commands × 78 💪 protocols × 44 💪 network-security × 42 💪 c-programming × 40 💪 computer-networks × 39 💪 cli × 39 💪 ethical-hacking × 38 💪 operating-systems × 37 💪 web-development × 35 💪 encryption × 33 💪 iot × 33 💪 osi-model × 30 💪 python × 30 security × 30 💪 networking × 28 💪 firewalls × 27 💪 process-management × 26 💪 firewall × 26 💪 file-permissions × 26 💪 git × 26 💪 vpn × 25 💪 file-management × 25 💪 devops × 24 💪 navigation × 23 💪 sql-injection × 23 💪 basics × 23 💪 commands × 20 💪 loops × 20 💪 mqtt × 19 💪 file-directory-commands × 19 💪 file-operations × 19 💪 control-flow × 18 💪 authentication × 18 💪 gitlab × 17 💪 penetration-testing × 17 💪 permissions × 16 💪 data-structures × 16 network × 15 💪 tcp × 14 💪 css × 14 💪 nmap × 14 💪 social-engineering × 13 💪 tools × 13 💪 ls-command × 13 💪 programming × 13 💪 performance × 13 💪 web-security × 13 💪 internet-protocols × 13 💪 phishing × 13 💪 http × 13 💪 microcontrollers × 12 💪 web-application-security × 12 💪 version-control × 12 💪 unix × 12 💪 microprocessors × 12 💪 xss × 12 💪 access-control × 12 💪 https × 12 arrays × 12 algorithms × 12 💪 html × 11 💪 network-topologies × 11 💪 dns × 11 💪 find-command × 11 💪 cryptography × 11 💪 file-system × 11 💪 continuous-integration × 11 💪 javascript × 11 💪 docker × 11 💪 iot-protocols × 11 💪 variables × 11 💪 directory-management × 11 💪 metasploit × 11 💪 directory-navigation × 10 💪 memory-management × 10 💪 listing × 10 💪 data-types × 10 💪 routing × 10 💪 network-layer × 10 💪 protocol × 10 💪 linux-commands × 10 💪 syntax × 10 💪 monitoring × 10 💪 iot-security × 10 💪 network-protocols × 10 💪 directories × 9 💪 basic × 9 💪 file-search × 9 💪 hidden-files × 9 💪 tcp-ip × 9 💪 signals × 9 💪 coap × 9 💪 automation × 9 scheduling × 9 💪 generic-programming × 8 💪 cyber-security × 8 💪 csrf × 8 💪 jenkins × 8 💪 internet-of-things × 8 💪 wireshark × 8 💪 vpns × 8 💪 router × 8 💪 grep × 8 💪 error-handling × 8 💪 directory × 8 💪 directory-operations × 8 💪 kubernetes × 8 💪 disk-usage × 8 💪 file-manipulation × 8 💪 ip-addressing × 7 💪 ipv6 × 7 💪 intrusion-detection × 7 💪 file-creation × 7 💪 malware × 7 💪 socket-programming × 7 💪 functions × 7 💪 chmod × 7 💪 edge-computing × 7 💪 communication × 7 💪 kernel × 7 💪 mv-command × 7 💪 subnetting × 7 💪 exploit-development × 7 💪 ssh × 7 💪 network-topology × 6 💪 networks × 6 💪 vulnerability-scanning × 6 💪 memory × 6 💪 arp × 6 💪 sorting × 6 💪 best-practices × 6 💪 packet-analysis × 6 💪 command-line × 6 💪 power-management × 6 💪 cloud × 6 💪 efficiency × 6 💪 directory-creation × 6 💪 benefits × 6 💪 ipv4 × 6 💪 incident-response × 6 💪 udp × 6 💪 shell-scripting × 6 💪 file-copy × 6 💪 ports × 6 💪 switch × 6 💪 privacy × 6 💪 cd-command × 6 💪 network-architecture × 6 💪 ethernet × 6 💪 software-security × 6 💪 principles × 6 💪 control-flow-structures × 6 💪 secure-network-design × 6 💪 java × 6 💪 integration × 6 💪 c++ × 6 💪 star-topology × 6 💪 fundamentals × 6 💪 pipeline × 6 💪 ip-address × 6 💪 backend × 6 optimization × 6 shell × 6 💪 attacks × 5 💪 configuration × 5 💪 machine-learning × 5 💪 ci-cd × 5 💪 command × 5 💪 containerization × 5 💪 tls × 5 💪 rest × 5 💪 network-analysis × 5 💪 ipsec × 5 💪 branching × 5 💪 troubleshooting × 5 💪 database × 5 💪 sql × 5 💪 icmp × 5 💪 device-management × 5 💪 ftp × 5 💪 history × 5 💪 operators × 5 💪 lan × 5 💪 bash × 5 💪 vulnerabilities × 5 💪 api × 5 💪 file-listing × 5 💪 python-programming × 5 💪 integrity × 5 💪 ls × 5 💪 vlan × 5 💪 mac-address × 5 💪 repository-management × 5 💪 deployment × 5 💪 ln-command × 5 💪 directory-command × 5 💪 passwords × 5 💪 for-loop × 5 💪 iot-gateway × 5 💪 system-calls × 5 💪 embedded-systems × 5 💪 wireless-communication × 5 💪 reconnaissance × 5 💪 directory-removal × 5 💪 mkdir × 5 💪 artificial-intelligence × 5 💪 node.js × 5 💪 sed × 5 💪 windows × 5 💪 cdn × 5 💪 zigbee × 5 💪 ids × 5 💪 network-scanning × 5 💪 pointers × 5 💪 mesh-topology × 5 💪 content-security-policy × 5 💪 iot-devices × 4 💪 http-headers × 4 💪 rm-command × 4 💪 file-systems × 4 💪 network-devices × 4 💪 hardware × 4 💪 switching × 4 💪 data-transmission × 4 💪 configuration-management × 4 💪 lists × 4 💪 file-transfer × 4 💪 file-command × 4 💪 real-time-systems × 4 💪 procfs × 4 💪 microcontroller × 4 💪 time-complexity × 4 💪 infrastructure-as-code × 4 💪 forensics × 4 💪 data-processing × 4 💪 cpu × 4 💪 responsive-design × 4 💪 packet-filtering × 4 💪 file-and-directory-commands × 4 💪 images × 4 💪 directory-listing × 4 💪 http-methods × 4 💪 dhcp × 4 💪 log-analysis × 4 💪 accessibility × 4 💪 transport-layer × 4 💪 switch-case × 4 💪 break-statement × 4 💪 move × 4 💪 containers × 4 💪 data-security × 4 💪 structures × 4 💪 symbolic-link × 4 💪 mv × 4 💪 cleanup × 4 💪 creation × 4 💪 ai × 4 💪 file-moving × 4 💪 network-traffic × 4 💪 synchronization × 4 💪 network-segmentation × 4 💪 buffer-overflow × 4 💪 design × 4 💪 iot-communication × 4 💪 engineering × 4 💪 cloud-networking × 4 💪 html5 × 4 💪 interrupts × 4 💪 password-security × 4 💪 control-structures × 4 💪 keybindings × 4 💪 search × 4 💪 yaml × 4 💪 firmware × 4 💪 network-forensics × 4 💪 cp-command × 4 💪 text-manipulation × 4 💪 bus-topology × 4 💪 natural-language-processing × 4 💪 virtualization × 4 💪 network-troubleshooting × 4 💪 selectors × 4 💪 priority × 4 💪 architecture × 4 💪 publish-subscribe × 4 💪 complexity × 4 💪 templates × 4 💪 files × 4 💪 kernel-design × 3 💪 availability × 3 💪 api-development × 3 💪 round-robin × 3 💪 raspberry-pi × 3 💪 file-processing × 3 💪 load-balancing × 3 💪 wireless-networks × 3 💪 pwd × 3 💪 hyperlinks × 3 💪 linked-lists × 3 💪 hashing × 3 💪 concurrency × 3 💪 standards × 3 💪 device-drivers × 3 💪 data-transfer × 3 💪 performance-optimization × 3 💪 containment × 3 💪 owasp × 3 💪 graphql × 3 💪 vulnerability × 3 💪 gitlab-ci × 3 💪 dds × 3 💪 malware-analysis × 3 💪 devices × 3 💪 captcha × 3 💪 grep-command × 3 💪 infrastructure × 3 💪 head × 3 💪 database-security × 3 💪 honeypot × 3 💪 ruby-on-rails × 3 💪 iot-platforms × 3 💪 terraform × 3 💪 user-management × 3 💪 find × 3 💪 basic-commands × 3 💪 secure-communication × 3 💪 recursion × 3 💪 io-systems × 3 💪 fuzzy-logic × 3 💪 ping × 3 💪 data-management × 3 💪 terminology × 3 💪 network-monitoring × 3 💪 orchestration × 3 💪 dynamic-allocation × 3 💪 ddos × 3 💪 addressing × 3 💪 hash-tables × 3 💪 network-scan × 3 💪 do-while × 3 💪 iteration × 3 💪 current-directory × 3 💪 nodejs × 3 💪 cloud-computing × 3 💪 awk × 3 💪 sftp × 3 💪 server-side × 3 💪 privilege-escalation × 3 💪 blockchain × 3 💪 iptables × 3 💪 while-loop × 3 💪 lifecycle × 3 💪 django × 3 💪 styling × 3 💪 gateway × 3 💪 chown × 3 💪 search-commands × 3 💪 shortcuts × 3 💪 ip × 3 💪 lpwan × 3 💪 deletion × 3 💪 file-movement × 3 💪 components × 3 💪 front-end × 3 💪 industrial-automation × 3 💪 data-protection × 3 💪 iaas × 3 💪 command-line-interface × 3 💪 ssl-tls × 3 💪 aws × 3 💪 nested-loops × 3 💪 development × 3 💪 free × 3 💪 resource-management × 3 💪 malloc × 3 💪 smart-home × 3 💪 system-monitoring × 3 💪 conditionals × 3 💪 hardware-security × 3 💪 scalability × 3 💪 network-automation × 3 💪 scripting × 3 💪 file-ownership × 3 💪 rsync × 3 💪 hash-table × 3 💪 mqtt-protocol × 3 💪 routers × 3 💪 arp-spoofing × 3 💪 packet-capture × 3 💪 backup × 3 💪 task-scheduling × 3 💪 arduino × 3 💪 advantages × 3 💪 linux-command-line × 3 💪 top × 3 💪 smtp × 3 💪 data-format × 3 💪 security-assessment × 3 💪 stateful-inspection × 3 💪 do-while-loop × 3 💪 switch-statement × 3 💪 network-tools × 3 💪 methodology × 3 💪 internet-protocol × 3 💪 conditional-statements × 3 💪 redirection × 3 💪 decision-making × 3 💪 least-privilege × 3 💪 ps × 3 💪 name-resolution × 2 💪 generic-functions × 2 💪 create-directory × 2 💪 calloc × 2 💪 network-routing × 2 💪 wireless-security × 2 💪 searching × 2 💪 wildcards × 2 💪 segmentation × 2 💪 csp × 2 💪 count × 2 💪 ip-spoofing × 2 💪 client-side × 2 💪 microcontroller-architecture × 2 💪 dos-attack × 2 💪 static-analysis × 2 💪 c-language × 2 💪 payload × 2 💪 context-switching × 2 💪 practical × 2 💪 features × 2 💪 remote-access × 2 💪 evidence × 2 💪 real-time-operating-systems × 2 💪 attack-vectors × 2 💪 move-file × 2 💪 client-server × 2 💪 file-navigation × 2 💪 shell-command × 2 💪 web-standards × 2 💪 list-commands × 2 💪 short-range × 2 💪 algorithm × 2 💪 arraylist × 2 💪 sandboxing × 2 💪 siem × 2 💪 linux-tools × 2 💪 rename × 2 💪 scaling × 2 💪 http-protocol × 2 💪 bind × 2 💪 compression × 2 💪 telnet × 2 💪 package-management × 2 💪 regular-expressions × 2 💪 cloud-service-model × 2 💪 compiler × 2 💪 change-directory × 2 💪 bios × 2 💪 hybrid-topology × 2 💪 git-branch × 2 💪 jwt × 2 💪 constrained-devices × 2 💪 hardware-management × 2 💪 data-communication × 2 💪 ownership × 2 💪 scp × 2 💪 hypervisor × 2 💪 security-auditing × 2 💪 asynchronous × 2 💪 programming-language × 2 💪 web-engineering × 2 💪 embedded-c × 2 💪 init-process × 2 💪 bash-scripting × 2 💪 options × 2 💪 io-redirection × 2 💪 comparison × 2 💪 if-else × 2 💪 cp × 2 💪 text-processing × 2 💪 chmod-command × 2 💪 stacks × 2 💪 structure × 2 💪 heap × 2 💪 basic-operations × 2 💪 bandwidth × 2 💪 merge × 2 💪 array × 2 💪 disk-usage-commands × 2 💪 distributed-systems × 2 💪 syn-flood × 2 💪 internet-security × 2 💪 dns-lookup × 2 💪 build × 2 💪 memory-types × 2 💪 data-fetching × 2 💪 optimisation × 2 💪 best-practice × 2 💪 ips × 2 💪 file-move × 2 💪 networking-commands × 2 💪 lora × 2 💪 amqp × 2 💪 data-manipulation × 2 💪 reverse-shell × 2 💪 generics × 2 💪 container-orchestration × 2 💪 loop-control × 2 💪 web-browser × 2 💪 mkdir-command × 2 💪 man-in-the-middle-attack × 2 💪 supervised-learning × 2 💪 investigation × 2 💪 git-init × 2 💪 adc × 2 💪 visibility × 2 💪 sensors × 2 💪 basic-concepts × 2 💪 routing-table × 2 💪 load-factor × 2 💪 responsive × 2 💪 output × 2 💪 ssl × 2 💪 shell-commands × 2 💪 cabling × 2 💪 shell-builtin × 2 💪 rootkit × 2 💪 secure-coding × 2 💪 exit-status × 2 💪 symmetric-encryption × 2 💪 mutex × 2 💪 packet-routing × 2 💪 terminal × 2 💪 z-index × 2 💪 snort × 2 💪 sandbox × 2 💪 computer-vision × 2 💪 network-load-balancing × 2 💪 provisioning × 2 💪 kali-linux × 2 💪 risk-assessment × 2 💪 tooling × 2 💪 easy × 2 💪 file-and-directory × 2 💪 file-directory × 2 💪 network-layers × 2 💪 job-scheduling × 2 💪 bash-programming × 2 💪 regex × 2 💪 cyber-attack × 2 💪 node-red × 2 💪 cidr × 2 💪 paging × 2 💪 subnet-mask × 2 💪 real-time-applications × 2 💪 computer-network × 2 💪 network-hardware × 2 💪 reliability × 2 💪 c# × 2 💪 aws-iot × 2 💪 file-permission × 2 💪 data × 2 💪 loop × 2 💪 ransomware × 2 💪 processes × 2 💪 sql-programming × 2 💪 detection × 2 💪 risks × 2 💪 file × 2 💪 collision × 2 💪 arrays-lists × 2 💪 file-count × 2 💪 hacking × 2 💪 attack-prevention × 2 💪 network-virtualization × 2 💪 packet-loss × 2 💪 idempotency × 2 💪 touch-command × 2 💪 app-development × 2 💪 terminal-shortcuts × 2 💪 stateful × 2 💪 dos × 2 💪 openvpn × 2 💪 latency × 2 💪 fault-tolerance × 2 💪 tar-command × 2 💪 linux-filesystem × 2 💪 system-files × 2 💪 layout × 2 💪 vulnerability-assessment × 2 💪 frontend × 2 💪 lateral-movement × 2 💪 process-priority × 2 💪 nat × 2 💪 ring-topology × 2 💪 data-encryption × 2 💪 initialization × 2 💪 system-monitoring-tools × 2 💪 types × 2 💪 password-storage × 2 💪 pop3 × 2 💪 flags × 2 💪 cloud-security × 2 💪 neural-networks × 2 💪 persistence × 2 💪 cross-site-scripting × 2 💪 real-time × 2 💪 ddos-attacks × 2 💪 visualisation × 2 💪 php × 2 💪 traffic-analysis × 2 💪 file-handling × 2 💪 protection × 2 💪 smart-contract × 2 💪 virtual-memory × 2 💪 symbolic-links × 2 💪 intrusion-prevention × 2 💪 iiot × 2 💪 iot-connectivity × 2 💪 process-monitoring × 2 💪 server × 2 💪 nlp × 2 💪 policy × 2 💪 pointer-arithmetic × 2 💪 threats × 2 💪 wan × 2 💪 brute-force × 2 💪 network-design × 2 💪 threads × 2 💪 prevention × 2 💪 update × 2 💪 pwm × 2 💪 path × 2 💪 continuous-deployment × 2 💪 xmpp × 2 💪 tcpdump × 2 💪 process × 2 💪 linked-list × 2 💪 real-world × 2 💪 shellcode × 2 💪 process-tree × 2 💪 techniques × 2 💪 system-security × 2 💪 ble × 2 💪 documentation × 2 💪 branch × 2 💪 list-files × 2 💪 packet-sniffing × 2 💪 port-scanning × 2 💪 application × 2 💪 sticky-session × 2 💪 dmz × 2 💪 data-integrity × 2 💪 authorization × 2 💪 ota × 2 💪 encrypted-communication × 2 💪 du × 2 💪 c × 2 💪 scheduler × 2 💪 mongodb × 2 💪 computer-hardware × 2 💪 process-control × 2 💻 string-manipulation × 2 💻 dynamic-programming × 2 💻 strings × 2 💻 substring × 2