Capture The Flag
Challenge yourself in our competitive cybersecurity events
Next CTF Event
Competition Activities
Secure Your System
Harden your infrastructure, patch vulnerabilities, and implement defensive measures to protect against incoming attacks
Hack Other Teams
Find and exploit vulnerabilities in competing teams' systems to gain access and capture flags
Perform Vulnerability Research
Discover new attack vectors, analyze systems for weaknesses, and develop custom exploits
Practice Incident Response
Detect attacks, analyze indicators of compromise, and respond to security incidents in real-time
Install Persistence
Maintain access to compromised systems through backdoors, scheduled tasks, and stealth techniques
Past CTF Highlights
Competition Rules & Guidelines
Fair Play
- No attacking CTF infrastructure
- No sharing flags between teams
- No brute forcing the submission system
- Report any issues to admins immediately
Team Formation
- No team size limits
- Solo participants welcome
- One account per team member
- No account sharing allowed
Scoring
- +10 Points/tick for Uptime
- -5 Points/tick for Downtime
- Points for stealing enemy flags
- -100 Points for Redeployment
Prepare for CTF
New to CTF competitions? Here are resources to help you get started and improve your skills.
Practice Platforms
Learning Resources
Essential Tools
Ready to Test Your Skills?
Join our next CTF competition and compete against security enthusiasts from around the world.