Problems

Welcome to the Quantum Authentication System! This advanced system uses quantum-inspired cryptography with AES-CBC encryption …

Web Expert 250 0

One day, N fishermen (1 < N < 60) went fishing, and they caught X …

Coding Expert 200 2

A navigation simulator controls an autonomous car that endlessly travels between two points: A and …

Web Hard 150 0

In how many ways can one white and one black knight be placed on a …

Coding Hard 120 3

A web challenge that hides the flag on the server filesystem. The application exposes a …

Web Hard 110 5

You have intercepted a data line from an embedded device. The device communicates using a …

Hardware Hard 100 1

A small C program reads user input into a fixed-size buffer. There's a hidden win() …

Binary Exploitation (Pwn) Hard 100 1

A scrambled string was processed through several hidden transformation layers. Using the provided broken script, …

Cryptography Hard 100 0

You are given a single image file named mysterious_landscape.png. Inspect it carefully and retrieve the …

Steganography Medium 80 1

You have intercepted a mysterious diagnostic interface exposed by a PS‑MicroX SoC development board. The …

Forensics Medium 80 0

We encrypted a secret flag with a custom keystream XOR. The keystream is generated by …

Cryptography Medium 75 0

You are given a single standalone executable. When run, it prompts for a password. If …

Reverse Engineering Medium 75 0

DOCUMENT CODE: BR-79/RED/CONFIDENTIAL CLASSIFICATION: LEVEL 4 — UNAUTHORIZED POSSESSION IS A CRIME On October 12, …

Hardware Medium 75 0

You are given two matrices A and B, your task is to calculate the sum …

Coding Medium 70 0

A friendly program wants to greet you… but its goodbye might say more than it …

Reverse Engineering Easy 60 5

A simple echo service is running on the server. The program takes your input and …

Binary Exploitation (Pwn) Medium 60 1

You found a small program guarding a gate. When run, the program prompts: Enter the …

Reverse Engineering Easy 60 0

You are logged in as a guest, but there’s a special “admin dashboard.” The website …

Web Medium 55 4

The login form says: “SQL Injection is blocked!” But is it really? Find a way …

Web Medium 55 4

You found a seemingly blank image on an old forum post titled "Locked Notes". The …

Steganography Medium 55 1

There is something hidden inside this image.

Steganography Medium 50 2

A small company reported suspicious activity on a development web service. The dev deployed a …

Forensics Easy 50 6

Provided is a compiled binary that prompts for a password. Reverse the binary to find …

Reverse Engineering Medium 50 2

You stand before a digital door that will only open for someone who knows the …

Reverse Engineering Medium 50 2

Find the full license plate number of the green bus that was traveling in the …

OSINT Easy 40 6

In the critical days leading up to a major cybersecurity competition, the development team at …

Forensics Easy 40 3

A flag was encrypted with a single-byte XOR and saved as hex. Recover the flag. …

Cryptography Easy 35 3

Can you solve question by using TCP connection

Coding Easy 30 3

An image containing a secret message (the flag) was encrypted using AES-128 in ECB mode. …

Cryptography Easy 30 2

The website only shows a “Coming soon” page. But real CTF players know how to …

Web Easy 30 5