Problems

Welcome to the Quantum Authentication System! This advanced system uses quantum-inspired cryptography with AES-CBC encryption …

Web Expert 250 0

One day, N fishermen (1 < N < 60) went fishing, and they caught X …

Coding Expert 200 0

In how many ways can one white and one black knight be placed on a …

Coding Hard 120 1

A web challenge that hides the flag on the server filesystem. The application exposes a …

Web Hard 110 2

You have intercepted a data line from an embedded device. The device communicates using a …

Hardware Hard 100 1

A small C program reads user input into a fixed-size buffer. There's a hidden win() …

Binary Exploitation (Pwn) Hard 100 0

A scrambled string was processed through several hidden transformation layers. Using the provided broken script, …

Cryptography Hard 100 0

You are given a single image file named mysterious_landscape.png. Inspect it carefully and retrieve the …

Steganography Medium 80 0

You have intercepted a mysterious diagnostic interface exposed by a PS‑MicroX SoC development board. The …

Forensics Medium 80 0

We encrypted a secret flag with a custom keystream XOR. The keystream is generated by …

Cryptography Medium 75 0

You are given a single standalone executable. When run, it prompts for a password. If …

Reverse Engineering Medium 75 0

DOCUMENT CODE: BR-79/RED/CONFIDENTIAL CLASSIFICATION: LEVEL 4 — UNAUTHORIZED POSSESSION IS A CRIME On October 12, …

Hardware Medium 75 0

You are given two matrices A and B, your task is to calculate the sum …

Coding Medium 70 0

A friendly program wants to greet you… but its goodbye might say more than it …

Reverse Engineering Easy 60 3

You found a small program guarding a gate. When run, the program prompts: Enter the …

Reverse Engineering Easy 60 0

You are logged in as a guest, but there’s a special “admin dashboard.” The website …

Web Medium 55 1

The login form says: “SQL Injection is blocked!” But is it really? Find a way …

Web Medium 55 2

There is something hidden inside this image.

Steganography Medium 50 1

A small company reported suspicious activity on a development web service. The dev deployed a …

Forensics Easy 50 2

Provided is a compiled binary that prompts for a password. Reverse the binary to find …

Reverse Engineering Medium 50 1

You stand before a digital door that will only open for someone who knows the …

Reverse Engineering Medium 50 0

Find the full license plate number of the green bus that was traveling in the …

OSINT Easy 40 4

In the critical days leading up to a major cybersecurity competition, the development team at …

Forensics Easy 40 1

A flag was encrypted with a single-byte XOR and saved as hex. Recover the flag. …

Cryptography Easy 35 1

Can you solve question by using TCP connection

Coding Easy 30 1

An image containing a secret message (the flag) was encrypted using AES-128 in ECB mode. …

Cryptography Easy 30 0

The website only shows a “Coming soon” page. But real CTF players know how to …

Web Easy 30 2

Your teammate accidentally uploaded the wrong file to the server. He claims: “The flag is …

Misc / Programming Easy 30 2

A user goes by shadowfox92 across the web. Use open sources (GitHub, social media, pastebins) …

OSINT Easy 20 1

You intercepted a short message: EgdqatbHiprz{WTAAD_LDGAS} ProblemStack{******}

Cryptography Easy 20 2