Capture The Flag Platform
Hack. Learn. Dominate.
The legendary wargame platformis back. Crack boxes. Escalate privileges. Capture flags. Climb the board. We're rebuilding from the ground up — harder, faster, meaner.
Deploy vulnerable machines in our isolated cloud environment. Each box is purpose-built with real attack surfaces — no synthetic CTF fluff.
Scan, probe, exploit. Use your own tools. Burp, nmap, metasploit, or raw shell — whatever gets you in. We don't care how.
User shell is just the beginning. Pivot, escalate, capture the root flag. The box isn't yours until you're root.
Submit your flag hash. Earn points. Climb the global leaderboard. Write a writeup. Teach others. Repeat.
A poorly configured reverse proxy exposes internal services. Find the hidden endpoints.
A custom binary with a suspicious SUID bit. Reverse it, exploit it, own the system.
A simulated enterprise AD environment. Kerberoast, enumerate, and find the path to domain admin.
Classic login bypass to full database dump. Warm up your sqlmap fingers.
Exploit a race condition in a custom kernel module to escape a restricted user namespace.
Eight services. Zero hints. One flag. Community record: 72 hours. Good luck.
| # | Handle | Country | Roots | Score |
|---|---|---|---|---|
Dedicated VMs per user. No shared environments. Your shell is your shell only.
WireGuard-based VPN. Low latency. One-click .conf download. Works everywhere.
Form 2–4 person squads. Shared flags, combined scores. Compete in team leagues.
Real-time score updates. Dynamic point scaling. Blood bonuses for first solves.
Community writeups unlock after solve. Learn the intended path — or the unintended one.
Live solve alerts, leaderboard commands, and team notifications piped to your server.