CTF Challenges by Category
All Skills
💪
cybersecurity × 58
⭐
linux × 39
💪
network-security × 37
💪
firewalls × 23
💪
encryption × 20
💪
security × 18
💪
computer-networks × 14
💪
firewall × 14
💪
ethical-hacking × 13
💪
vpn × 13
💪
html × 12
💪
penetration-testing × 12
💪
social-engineering × 11
💪
file-commands × 10
💪
phishing × 10
💪
network-protocols × 10
💪
html-css × 9
💪
basics × 8
💪
vpns × 8
💪
authentication × 8
💪
css × 8
💪
sql × 8
💪
process-management × 7
💪
osi-model × 7
💪
iot-security × 7
💪
directory-commands × 7
💪
access-control × 7
💪
passwords × 6
💪
cryptography × 6
💪
vulnerability-assessment × 6
💪
hardware-security × 6
💪
security-awareness × 6
💪
protocols × 6
💪
web-development × 6
💪
html-elements × 6
💪
sql-injection × 5
💪
networking × 5
💪
machine-learning × 5
💪
network-topologies × 5
💪
iot × 5
💪
ddos-attack × 5
💪
programming × 5
💪
best-practices × 5
💪
communication × 5
💪
database × 5
💪
web-security × 5
💪
electronics × 5
💪
smtp × 4
💪
malware × 4
💪
permissions × 4
💪
algorithms × 4
💪
incident-response × 4
💪
remote-access × 4
💪
risk-assessment × 4
💪
file-permissions × 4
💪
email-security × 4
💪
vulnerabilities × 4
💪
secure-communication × 4
💪
mqtt × 4
💪
sql-programming × 4
💪
database-management × 4
💪
c-programming × 4
💪
web-application-security × 4
💪
syntax × 4
💪
cyber-security × 4
💪
attributes × 4
💪
pointers × 4
💪
wireless-security × 4
💪
protocol × 4
💪
data-structures × 4
💪
malware-analysis × 4
💪
components × 3
💪
coap × 3
💪
neural-networks × 3
💪
network-layer × 3
💪
application-security × 3
💪
https × 3
💪
secure-network-design × 3
💪
dynamic-analysis × 3
💪
email × 3
💪
iot-protocols × 3
💪
internet-protocols × 3
💪
multi-factor-authentication × 3
💪
nmap × 3
💪
attack-vectors × 3
💪
metasploit × 3
💪
attacks × 3
💪
data-types × 3
💪
http × 3
💪
wireless-networks × 3
💪
ssh × 3
💪
password-security × 3
💪
dmz × 3
💪
process-monitoring × 3
💪
cloud × 3
💪
ip-addressing × 3
💪
intrusion-detection × 3
💪
mobile-security × 3
💪
privacy × 3
💪
brute-force-attack × 3
💪
network × 3
💪
security-awareness-training × 3
💪
c × 3
💪
apt × 3
💪
command-line × 3
💪
styling × 2
💪
pentesting × 2
💪
technology × 2
💪
mesh-topology × 2
💪
delete × 2
💪
packet-capturing × 2
💪
cyber-attacks × 2
💪
risk-mitigation × 2
💪
local-area-networks × 2
💪
syn-flood × 2
💪
router × 2
💪
external-file × 2
💪
iaas × 2
💪
iot-connectivity × 2
💪
types × 2
💪
computer-vision × 2
💪
software-development × 2
💪
unsupervised-learning × 2
💪
operators × 2
💪
strategy × 2
💪
defense-in-depth × 2
💪
mitm × 2
💪
snmp × 2
💪
dimensionality-reduction × 2
💪
reinforcement-learning × 2
💪
cloud-security × 2
💪
symbolic-link × 2
💪
man-in-the-middle-attack × 2
💪
static-analysis × 2
💪
css-selectors × 2
💪
antivirus × 2
💪
network-analysis × 2
💪
password-protection × 2
💪
dns × 2
💪
ddl × 2
💪
activation-function × 2
💪
residual-risk × 2
💪
variables × 2
💪
network-performance × 2
💪
devices × 2
💪
redundancy × 2
💪
switching × 2
💪
secure-boot × 2
💪
phishing-attacks × 2
💪
firmware-updates × 2
💪
reverse-engineering × 2
💪
system-administration × 2
💪
ransomware × 2
💪
firewall-rules × 2
💪
security-protocols × 2
💪
session-hijacking × 2
💪
tcp-ip × 2
💪
find × 2
💪
ring-topology × 2
💪
risks × 2
💪
user-roles × 2
💪
file-and-directory-commands × 2
💪
ftp × 2
💪
file-io × 2
💪
copying × 2
💪
lora × 2
💪
data-management × 2
💪
unauthorized-access × 2
💪
arrays × 2
💪
firewall-types × 2
💪
hacking × 2
💪
data-analysis × 2
💪
tcp × 2
💪
packet-capture × 2
💪
internet-of-things × 2
💪
memory-allocation × 2
💪
paas × 2
💪
update × 2
💪
data-transmission × 2
💪
communication-protocol × 2
💪
threats × 2
💪
network-scanning × 2
💪
operating-systems × 2
💪
natural-language-processing × 2
💪
mitm-attack × 2
💪
vlan × 2
💪
routing × 2
💪
infrastructure × 2
💪
fault-tolerance × 2
💪
traffic-filtering × 2
💪
buffer-overflow × 2
💪
supervised-learning × 2
💪
risk-management × 2
💪
file-directory-commands × 2
💪
deployment-models × 2
💪
zero-day-vulnerability × 2
💪
tls × 2
💪
stateful-inspection × 2
💪
file-transfer × 2
💪
traffic-overload × 2
💪
data-security × 2
💪
password-cracking × 2
💪
position × 2
💪
network-topology × 2
💪
artificial-intelligence × 2
💪
ownership × 2
💪
performance × 2
💪
network-attacks × 2
💪
functions × 2
💪
network-devices × 2