Boost Your Skills with CTF   S t a r t - L e a r n i n g →

What is Capture The Flag (CTF)?

Welcome to CTF Cybersecurity, the ultimate platform for ethical hacking enthusiasts, cybersecurity professionals, and beginners looking to sharpen their Our platform provides real-world security challenges to help you learn, practice, and compete in a dynamic, gamified environment. Whether you're a beginner exploring cybersecurity concepts or an expert looking to test your skills, our Capture The Flag challenges cater to all levels.

Latest Modules

Unlock your potential, earn points, and compete with the best in the ultimate CTF adventure!

Introduction to Pentesting
Pentesting Fundamentals
Pentesting Fundamentals

Learn the important ethics and methodologies behind every pentest. ...

View
Principles of Security
Principles of Security

Learn the principles of information security that secures data and protects syst...

View
Authentication
Enumeration & Brute Force
Enumeration & Brute Force

Enumerate and brute force authentication mechanisms. ...

View
Advance Enumeration
Advance Enumeration

Enumeration is the process o...

View
Introduction to Cyber Security
Offensive Security Intro
Offensive Security Intro

Understand what is offensive and defensive security, and learn about careers ava...

View
Defensive Security Intro
Defensive Security Intro

Introducing defensive securi...

View
General Cyber Security
General Cyber Security

Cyber security is the practice of protecting systems, networks, and data from cy...

View
OSINT
OSINT
OSINT

OSINT (Open-Source Intelligence) in cybersecurity involves collecting and analyz...

View
The Case of Happy Hacker
The Case of Happy Hacker

Happy Hacker BX1, a tech genius with a Robinhood spirit, exploited vulnerabiliti...

View
 NORDLYS Lost Love
NORDLYS Lost Love

After breaking up with the l...

View
Python
Basic python - L1
Basic python - L1

Python is a high-level, interpreted programming language designed to be easy to ...

View
Basic python - L2
Basic python - L2

Python is a high-level, interpreted programming language designed to be easy to ...

View
Basic Python - L3
Basic Python - L3

Python is a high-level, interpreted programming language designed to be easy to ...

View
Web Pentesting
Web Pentesting
Web Pentesting

Web application pen testing helps identify real-world attacks that could succeed...

View
IDOR (Insecure Direct Object Reference)
IDOR (Insecure Direct Object Reference)

Insecure Direct Object Reference (IDOR) is a security vulnerability where an att...

View
SSRF (Server Side Request Forgery)
SSRF (Server Side Request Forgery)

SSRF (Server Side Request Forgery) is a vulnerability where an attacker manipula...

View
IoT(Internet of Things)
IoT(Internet of Things)
IoT(Internet of Things)

IoT, or Internet of Things, refers to the collective network of connected device...

View
IoT Spy Device
IoT Spy Device

IoT, or Internet of Things, refers to the collective network of connected device...

View
IoT Smart Mirror case
IoT Smart Mirror case

IoT, or Internet of Things, refers to the collective network of connected device...

View
The Cipher Conspiracy
The Cipher Conspiracy
The Cipher Conspiracy

The Cipher Conspiracy refers to a covert operation involving encrypted messages,...

View
Cipher Chase
Cipher Chase

Cipher Chase is an exhilarating puzzle-solving game where players decode cryptic...

View
Red team Fundamentals
Red Team Fundamentals
Red Team Fundamentals

Learn about the basics of a red engagement, the main components and stakeholders...

View
Red Team Engagements - L1
Red Team Engagements - L1

Learn the steps and procedures of a red team engagement, including planning, fra...

View
Red Team Threat Intel
Red Team Threat Intel

Apply threat intelligence to red team engagements and adversary emulation. ...

View
Red Team Engagements - L2
Red Team Engagements - L2

Learn the steps and procedures of a red team engagement, including planning, fra...

View
Nmap
Nmap
Nmap

Nmap (Network Mapper) is an open-source tool used for network discovery and secu...

View
Nmap test
Nmap test

Nmap (Network Mapper) is a powerful and widely used open-source tool for network...

View
Mobile Pentesting
Mobile Pentesting
Mobile Pentesting

Mobile penetration testing (pentesting) is the process of assessing the security...

View
Mobile Pentesting - L1
Mobile Pentesting - L1

Mobile penetration testing (pentesting) is the process of assessing the security...

View
Android Security
Android Security

Android security encompasses a range of measures to protect devices, apps, and u...

View
IOT pentesting
IOT pentesting

IoT penetration testing is a security assessment process that identifies vulnera...

View
Mobile Pentesting - L2
Mobile Pentesting - L2

Mobile penetration testing (pentesting) is the process of assessing the security...

View
Android Arsenal
Android Arsenal

Android Arsenal is a vast directory of Android libraries, tools, and resources, ...

View
Powershell Security
PowerShell: A Beginner’s Guide
PowerShell: A Beginner’s Guide

PowerShell security focuses on protecting systems from misuse, threats, and cybe...

View
Powershell Empire (C2)
Powershell Empire (C2)

PowerShell Empire (often called just "Empire") is a post-exploitation framework ...

View
IT Audit
Compliance
Compliance

Compliance ensures an organi...

View
ISO
ISO

The International Organization for Standardization (ISO) is an independent, non-...

View
NIST
NIST

The National Institute of Standards and Technology (NIST) is a U.S. federal agen...

View
Linux
Linux
Linux

Linux is an open-source operating system known for its security, stability, and ...

View
Linux - L1
Linux - L1

Linux is an open-source operating system known for its security, stability, and ...

View
Cloud Security
AWS Associate & Security L-1
AWS Associate & Security L-1

AWS Associate certifications validate foundational to intermediate cloud experti...

View
AWS Associate & Security L-2
AWS Associate & Security L-2

AWS Associate certifications validate foundational to intermediate cloud experti...

View

How To Play!

01
Sign Up

Create an account CTF Craw to get started.

02
Choose a Challenge

Dive into a variety of challenges across different difficulty levels.

03
Solve and Earn Points

Each challenge you solve earns you points. The more challenges you solve

04
Compete

Compete individually or as part of a team. Form alliances, share knowledge

05
Track Your Progress

Stay updated with real-time leaderboards to see how you compare to other competitors.

Admin Panel