DEF CON CTF Archive Logo

DEF CON CTF Archive

0
Free
Visit Website

A live, playable archive of DEF CON CTF challenges. Challenges are not particularly malicious or dangerous, but they are vulnerable by design. Containers isolate them, but it's up to you to play safely. Containers isolate them, but it's up to you to play safely. We're archiving more challenges and appreciate issue reports and suggestions. Just be mindful that running the CTF is tough and has priority. General archive FAQ If you ran a cool CTF and want to give a shot at archiving your challenges, ping us at team@oooverflow.io Start here!

FEATURES

ALTERNATIVES

Practical security handbook for .NET developers.

Linux-based operating system intentionally vulnerable for cybersecurity practice.

A comprehensive guide to Python 3 syntax, features, and resources in a single image.

INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.

A workshop offering resources for local privilege escalation on Windows and Linux systems.

Learn how hackers find security vulnerabilities, exploit web applications, and how to defend against these attacks.

Cybersecurity training platform with courses, certifications, and study guides.

A vulnerable web application for learning about web application vulnerabilities and writing secure code.

PINNED