CTF Challenges by Category
All Skills
⭐
linux × 90
💪
cybersecurity × 39
💪
file-commands × 34
💪
directory-commands × 32
💪
network-security × 29
💪
ethical-hacking × 25
💪
penetration-testing × 21
⭐
encryption × 15
💪
firewalls × 15
🚩
web × 12
💪
social-engineering × 12
💪
security × 10
💪
firewall × 10
💪
sql-injection × 9
💪
permissions × 8
💪
vulnerability-assessment × 8
💪
cli × 8
💪
web-application-security × 8
💪
file-permissions × 7
💪
ddos-attack × 7
💪
file-management × 7
🚩
traversal × 6
🚩
php × 6
💪
process-management × 6
💪
file-and-directory-commands × 6
💪
vpn × 6
💪
ls × 6
💪
vulnerability × 6
💪
command-line × 6
💪
zero-day × 5
💪
file × 5
💪
honeypot × 5
💪
directories × 5
💪
grep × 5
💪
symbolic-links × 5
💪
directory × 5
💪
rm × 5
💪
commands × 4
💪
environment-variables × 4
💪
easy × 4
💪
cryptography × 4
💪
wireless-networks × 4
💪
file-search × 4
💪
mkdir × 4
💪
file-system × 4
💪
intrusion-detection × 4
💪
shell-customization × 4
💪
mitm-attack × 4
💪
network-traffic × 4
💪
mv × 4
💪
python × 4
💪
phishing × 4
💪
malware-analysis × 4
💪
scripting × 4
💪
malware × 3
💪
listing × 3
💪
networking × 3
💪
types × 3
💪
linux-filesystem-hierarchy × 3
💪
bash × 3
💪
cross-site-scripting × 3
💪
vulnerabilities × 3
💪
navigation × 3
💪
osi-model × 3
💪
dmz × 3
💪
file-io × 3
💪
copy × 3
💪
hacking × 3
💪
input-validation × 3
💪
security-assessment × 3
💪
ids × 3
💪
aliases × 3
💪
buffer-overflow × 3
💪
man-in-the-middle × 3
💪
regular-expressions × 3
💪
exploit × 3
💪
file-operations × 3
🚩
medium × 2
💪
linux-commands × 2
💪
signals × 2
💪
components × 2
💪
network-layer × 2
💪
assessment × 2
💪
privilege-escalation × 2
💪
detection × 2
💪
scheduling × 2
💪
attack-techniques × 2
💪
cat × 2
💪
bashrc × 2
💪
ips × 2
💪
attacks × 2
💪
security-attacks × 2
💪
log-files × 2
💪
prompt × 2
💪
physical-security × 2
💪
scp × 2
💪
cp × 2
💪
command × 2
💪
user-management × 2
💪
memory-management × 2
💪
symbolic-link × 2
💪
directory-creation × 2
💪
concept × 2
💪
techniques × 2
💪
deletion × 2
💪
secure-communication × 2
💪
advanced × 2
💪
deception × 2
💪
programming × 2
💪
c-programming × 2
💪
system-administration × 2
💪
creation × 2
💪
password-security × 2
💪
find × 2
💪
honeytokens × 2
💪
cron × 2
💪
process-monitoring × 2
💪
vpns × 2
💪
ln × 2
💪
unauthorized-access × 2
💪
authentication × 2
💪
security-vulnerabilities × 2
💪
red-team × 2
💪
cybersecurity-strategy × 2
💪
automation × 2
💪
pattern-matching × 2
💪
text-manipulation × 2
💪
security-testing × 2
💪
files × 2
💪
monitoring × 2
💪
port-scanning × 2
💪
traffic-filtering × 2
💪
text-processing × 2
💪
file-directory-commands × 2
💪
password-cracking × 2
💪
shell-scripting × 2
💪
prevention × 2
💪
ownership × 2
💪
renaming × 2
💪
protocols × 2
💪
web-security × 2
💪
find-command × 2
💪
evasion × 2
💪
cryptographic-algorithms × 2
💪
intrusion-detection-system × 2
💻
algorithms × 2