CTF Challenges by Category
All Skills
⭐
linux × 224
💪
file-commands × 90
💪
directory-commands × 84
💪
file-directory-commands × 40
💪
cli × 39
💪
cybersecurity × 26
💪
security × 26
💪
kubernetes × 16
💪
network-security × 16
💪
encryption × 15
💪
navigation × 15
💪
process-management × 15
⭐
docker × 15
💪
directory-navigation × 14
💪
file-permissions × 13
💪
containerization × 13
💪
iot × 13
💪
permissions × 13
💪
file-operations × 12
💪
performance × 11
💪
commands × 11
💪
file-management × 11
💪
devops × 11
💪
vpn × 10
💪
machine-learning × 10
💪
mqtt × 9
💪
ls-command × 9
💪
firewalls × 9
💪
automation × 9
💪
ethical-hacking × 8
💪
cd-command × 8
💪
networking × 8
💪
directories × 8
💪
web-development × 8
💪
ci-cd × 8
💪
troubleshooting × 7
💪
authentication × 7
💪
find × 7
💪
jenkins × 7
💪
monitoring × 7
💪
protocols × 6
💪
operating-systems × 6
💪
file-and-directory-commands × 6
💪
real-time × 6
💪
pwd-command × 6
💪
accessibility × 6
💪
docker-compose × 6
💪
disk-usage × 6
💪
chmod × 6
💪
cyber-security × 6
💪
microservices × 6
💪
incident-response × 6
💪
firewall × 5
💪
directory-management × 5
💪
dockerfile × 5
💪
neural-networks × 5
💪
backup × 5
💪
ls × 5
💪
web-security × 5
💪
caching × 5
💪
http × 5
💪
cryptography × 5
💪
listing × 5
💪
mkdir-command × 5
💪
file-system × 5
💪
basics × 5
💪
aws × 5
💪
chown × 5
💪
debugging × 5
💪
computer-networks × 5
💪
find-command × 5
💪
edge-computing × 5
💪
algorithm × 5
💪
osi-model × 5
💪
advanced × 4
💪
honeypot × 4
💪
anomaly-detection × 4
💪
bash × 4
💪
penetration-testing × 4
💪
rsync × 4
💪
network-traffic × 4
💪
pipeline × 4
💪
nginx × 4
💪
zero-day-vulnerability × 4
💪
remote-access × 4
💪
files × 4
💪
network-layer × 4
💪
file-search × 4
💪
malware-analysis × 4
💪
directory-command × 4
💪
file-creation × 4
💪
protocol × 4
💪
rm-command × 4
💪
artificial-intelligence × 4
💪
directory-creation × 4
💪
data-protection × 4
💪
directory-operations × 4
💪
css × 4
💪
file-directory × 4
💪
continuous-integration × 4
💪
deep-learning × 4
💪
frontend × 3
💪
mv-command × 3
💪
sentiment-analysis × 3
💪
nodejs × 3
💪
network-performance × 3
💪
coap × 3
💪
network × 3
💪
deployment × 3
💪
routing × 3
💪
ip-addressing × 3
💪
hardware-security × 3
💪
service-worker × 3
💪
infrastructure-as-code × 3
💪
ansible × 3
💪
ci/cd × 3
💪
python × 3
💪
rm × 3
💪
iot-connectivity × 3
💪
api-security × 3
💪
actuators × 3
💪
natural-language-processing × 3
💪
ids × 3
💪
spi × 3
💪
social-engineering × 3
💪
basic-commands × 3
💪
internet × 3
💪
scaling × 3
💪
reliability × 3
💪
signals × 3
💪
agriculture × 3
💪
pwa × 3
💪
file-command × 3
💪
zero-downtime × 3
💪
basic × 3
💪
embedded-systems × 3
💪
embedded × 3
💪
stm32 × 3
💪
intrusion-detection × 3
💪
hard × 3
💪
buffer-overflow × 3
💪
directory-removal × 3
💪
configuration-management × 3
💪
vulnerability × 3
💪
supervised-learning × 3
💪
access-control × 3
💪
docker-swarm × 3
💪
microcontrollers × 3
💪
file-manipulation × 3
💪
change-directory × 3
💪
secure-communication × 3
💪
file-deletion × 3
💪
system-monitoring × 3
💪
xss × 3
💪
scheduling × 3
💪
sql-injection × 3
💪
exploit × 3
💪
command-line × 3
💪
grep × 3
💪
csp × 3
💪
directory × 3
💪
ddos-attack × 3
💪
ubuntu × 3
💪
reinforcement-learning × 3
💪
touch-command × 3
💪
latency × 3
💪
synchronization × 3
💪
vulnerability-assessment × 2
💪
responsive-design × 2
💪
real-time-os × 2
💪
web-performance × 2
💪
real-time-communication × 2
💪
database × 2
💪
vulnerability-management × 2
💪
malware × 2
💪
debian × 2
💪
disk-usage-commands × 2
💪
firmware × 2
💪
forensics × 2
💪
remove × 2
💪
unsupervised-learning × 2
💪
distributed-systems × 2
💪
corporate-security × 2
💪
internet-of-things × 2
💪
cloud-security × 2
💪
css3 × 2
💪
trusted-computing × 2
💪
du × 2
💪
tpm × 2
💪
cryptanalysis × 2
💪
variance × 2
💪
data-loss-prevention × 2
💪
log-analysis × 2
💪
sensors × 2
💪
testing × 2
💪
chef × 2
💪
file-listing × 2
💪
performance-monitoring × 2
💪
deep-packet-inspection × 2
💪
iot-applications × 2
💪
terraform × 2
💪
resource-hints × 2
💪
paths × 2
💪
techniques × 2
💪
freertos × 2
💪
cleanup × 2
💪
ota × 2
💪
ipv6 × 2
💪
metasploit × 2
💪
arm-cortex × 2
💪
linux-commands × 2
💪
file-monitoring × 2
💪
hmac × 2
💪
hidden-files × 2
💪
soc × 2
💪
sandbox × 2
💪
error-handling × 2
💪
kill-command × 2
💪
feature-engineering × 2
💪
spa × 2
💪
dimensionality-reduction × 2
💪
hashing × 2
💪
data-retrieval × 2
💪
vulnerability-scanning × 2
💪
logs × 2
💪
containers × 2
💪
xargs × 2
💪
path × 2
💪
data-processing × 2
💪
aes × 2
💪
healthcare × 2
💪
smart-city × 2
💪
vpns × 2
💪
ssh × 2
💪
process-state × 2
💪
data-integrity × 2
💪
continuous-deployment × 2
💪
semantic-html × 2
💪
volumes × 2
💪
unix × 2
💪
quality-assurance × 2
💪
current-directory × 2
💪
file-navigation × 2
💪
calibration × 2
💪
linguistics × 2
💪
switching × 2
💪
software-development × 2
💪
workbox × 2
💪
energy-efficiency × 2
💪
create-directory × 2
💪
awk × 2
💪
rendering × 2
💪
move × 2
💪
http-headers × 2
💪
touch × 2
💪
privilege-escalation × 2
💪
electronics × 2
💪
creation × 2
💪
overfitting × 2
💪
sql-injection-attack × 2
💪
optimization × 2
💪
data-breach × 2
💪
wcag × 2
💪
delete-directory × 2
💪
file-movement × 2
💪
least-privilege × 2
💪
algorithms × 2
💪
shell-scripting × 2
💪
rmdir-command × 2
💪
microprocessors × 2
💪
data-leakage × 2
💪
measured-boot × 2
💪
data-transfer × 2
💪
zero-trust × 2
💪
mv × 2
💪
precision × 2
💪
command-line-interface × 2
💪
http2 × 2
💪
rest × 2
💪
aria × 2
💪
tracing × 2
💪
apt × 2
💪
terminal-commands × 2
💪
oauth × 2
💪
rtos × 2
💪
symbolic-links × 2
💪
resource-management × 2
💪
make-directory × 2
💪
zigbee × 2
💪
data-algorithms × 2
💪
smtp × 2
💪
idempotency × 2
💪
performance-optimization × 2
💪
zombie-processes × 2
💪
basic-operations × 2
💪
html5 × 2
💪
centos × 2
💪
phishing × 2
💪
shell-script × 2
💪
policy × 2
💪
privacy × 2
💪
power-management × 2
💪
memory-management × 2
💪
cd × 2
💪
graphql × 2
💪
scalability × 2
💪
io-redirection × 2
💪
cyber-defense × 2
💪
file-handling × 2
💪
mobile-security × 2
💪
server-security × 2
💪
continuous-delivery × 2
💪
cloud × 2
💪
predictive-maintenance × 2
💪
iot-security × 2
💪
ethernet × 2
💪
javascript × 2
💪
best-practices × 2
💪
html-css × 2
💪
named-entity-recognition × 2
💪
network-analysis × 2
💪
symbolic-link × 2
💪
firmware-updates × 2
💪
mkdir × 2