Loading...

A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
A live, playable archive of DEF CON CTF challenges. Challenges are not particularly malicious or dangerous, but they are vulnerable by design. Containers isolate them, but it's up to you to play safely. Containers isolate them, but it's up to you to play safely. We're archiving more challenges and appreciate issue reports and suggestions. Just be mindful that running the CTF is tough and has priority. General archive FAQ If you ran a cool CTF and want to give a shot at archiving your challenges, ping us at team@oooverflow.io Start here!
Common questions about DEF CON CTF Archive including features, pricing, alternatives, and user reviews.
DEF CON CTF Archive is A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.. It is a Security Operations solution designed to help security teams with CTF.
Enterprise platform for cybersecurity workforce training via hands-on labs & CTFs.
Enterprise platform for cybersecurity team training, labs, and skill gap assessment.
Hands-on red team training platform with labs, cyber ranges, and CTF assessments.
Get strategic cybersecurity insights in your inbox