CTF Challenges
Test your hacking skills against real-world scenarios. Solve challenges, earn points, unlock rewards.
Misc Trivia
Answer the security trivia questions correctly to reveal the flag. Knowledge is power.
OSINT Google Dorking
Use OSINT techniques to find the flag hidden in public records. The target left digital breadcrumbs everywhere.
Caesar Cipher Crack
Decrypt the intercepted message. The flag is encrypted with a classic Caesar cipher. Frequency analysis is your friend.
SQL Injection Basics
Find the hidden admin panel and extract the flag using SQL injection. The login form is vulnerable to classic authentication bypass.
Hidden in Plain Sight
Extract the secret message hidden inside the image file. Not everything is what it seems.
Memory Forensics 101
Analyze the memory dump to find the credentials left by the attacker. Tools like Volatility will help.
Reverse the Binary
Decompile the provided binary and find the hardcoded flag. Strip away the obfuscation layers.
Advanced SQLi - Blind
The search endpoint is vulnerable to blind SQL injection. Extract the flag from the secret_flags table using boolean-based techniques.
RCE Chain Elite
Chain multiple vulnerabilities to achieve Remote Code Execution. Start with the file upload, bypass the WAF, and read /flag.txt.