Offical URL: https://g.co/ctf

Annual Capture The Flag hosted by the Google Security Team.

CTF events

NameWeight
Google Capture The Flag 202074.07
Google Capture The Flag 2019 (Finals)37.00
Google Capture The Flag 2019 (Quals)96.34
Google Capture The Flag 2018 (Finals)25.00
Google Capture The Flag 2018 (Quals)66.31
Google Capture The Flag 2017 (Finals)25.00
Google Capture The Flag 2017 (Quals)21.99
Google Capture The Flag 201621.99
Related tags: web pwn xss x86 php trivia bin crypto stego rop sqli hacking forensics android perl python scripting pcap xor des sha1 cuda rsa penetration testing z3 elf bruteforce wifi cracking c++ reverse engineering forensic logic unicode javascript programming c debugging engineering security aes arm java js .net haskell go vm exploitation misc otp pwnable re mobile sql exploit stegano ppc admin steganography sandwiches secure-coding things math sandbox obfuscated dex coding nothing networking ruby prng injection http penetration malware shell cracking pentest msf bash packet analysis programing objective-c ios algorithms windows format-string ai stuff network c64 collision dnspy guessing social engineering carving asm html game linux all recon wireshark googling looking_confused problem solving analysis lfi easy pyjail barcode image assembly miscellaneous filesystem mitm css caesar malware analysis csrf sleeping rev optimization software engineering irc scans computers ctf shellcode analysis slacking kernel pil kali linux beginner aes-ctr hardware basic language wordpress meepwn rawsec pkcs utf-16be frida assembler fibonacci embedded hailstone volatility cubeing csp rubik joe angular hash radare2 time gaming network security jail bof race-condition bufferoverflow bb84 binaryexploitation pwning it writinglinuxsecuritymodule oshardening sympy hardwaresecurity forensic+crypto beer remote command execution pivoting buffer overflows node flask machine learning api hooking opencv baby google shellcode protobuf overflow pwntools wiener decompile ciphertexts rsa-crypto retro number theory fermat gdb dos rbash quantum cookies keygening apk aes-cbc png reversing reverse_engineering verilog use-after-free strimming edges cutting grass compiler strings nc 2017 tcp i2c midi server switches docker ansible aws #stego usb md5 puzzles vulnerability pytho operations passive recon idea firensic microsoft access microsoft publisher rust crytography ciphers anti-debugging memory angr captcha parsing session pdf patching modding encoding coppersmith token sbox rekall rce lcg twitter heap-overflow xml module nobigdeal sniff russian python3 crc c googlectf cryptography lll pickle adb bleichenbacher delphi imagemagick padding-oracle hash-length-extension fractions pkcs1.5 homework reverse caploader xmldecoder compression automatization cesar hibernate hql serialize zip seccomp heap lockpicking binary objdump hackingforglory proxy blackberry ptrace cookie cpu dynelf formatstring read sniffing lattice template-injection symbolic oracle lsb chrome crytography-rsa header lsb-oracle lsb-stego dsp circuit ntfs 8-bit atari logic-analyzer cssinjection com msdos fst ecdh curve25519 birthday fallthrough hooking smali native davies-meyer mmap braille keylogger commodore64 jni prg anti-debug lfsr crc64 recaptcha selfinjection tcache cache general_skills 800 webexp skills general welcome drm mitigation info-leak youtube keys modular-arithmetic oob iot xxe reverse-engineering 2019 boolean rng qkd getfattr code-golf np-complete 8051 enter space soikeo pattern bongda jualobataborsi obataborsiampuh obatcytotecasli jualobataborsiasli pow upx cryptojs artificialintelligence dna loopover qunatum images _libc_start_main