> _weekly-CTF
Weekly cybersecurity challenges for individual hackers.
Prove your skills. Climb the ranks. Capture the flag.
New challenges weekly
Individual competition
Global leaderboard
root@weekly-ctf ~
$cat /etc/flag.txt
cat: /etc/flag.txt: Permission denied
$./exploit.py --target=weekly-ctf
[*] Connecting to target...
[*] Exploiting vulnerability...
[+] Shell obtained!
[+] FLAG: flag{w3lc0m3_t0_w33kly_ctf}
Challenge Categories
Choose Your Domain
Web exploitation or binary pwning - master the art of hacking in your preferred domain
12challenges
Web
XSS, SQLi, SSRF, SSTI, JWT attacks, and modern web exploitation techniques
Start Hacking
8challenges
Pwn
Buffer overflows, format strings, ROP chains, heap exploitation, and kernel pwning
Start Hacking
10challenges
Cryptography
Classical ciphers, RSA, AES, elliptic curves, and cryptographic protocols
Start Hacking
15challenges
Reverse Engineer
Binary analysis, decompilation, debugging, and malware analysis
Start Hacking
6challenges
Forensics
Memory forensics, disk imaging, network traffic analysis, and steganography
Start Hacking
9challenges
Misc
Scripting, OSINT, hardware, and various unconventional challenges
Start Hacking