CTF Cheatsheet
Your comprehensive guide to Capture The Flag competitions. Learn the fundamentals, master techniques, and level up your cybersecurity skills.
Explore Categories
Web Exploitation
Learn about XSS, SQL injection, CSRF, and other web vulnerabilities
Binary Exploitation
Master buffer overflows, ROP chains, and memory corruption attacks
Reverse Engineering
Analyze and understand compiled programs and malware
Cryptography
Break ciphers, understand encryption, and cryptographic protocols
Forensics
Investigate disk images, memory dumps, and digital evidence
OSINT
Open Source Intelligence gathering and reconnaissance techniques
Steganography
Find hidden messages in images, audio, and other media
Network Security
Packet analysis, network protocols, and traffic inspection
Mobile Security
Android and iOS application security testing
Miscellaneous
Various CTF challenges that don't fit other categories
Getting Started
New to CTF competitions? Start with these foundational categories: