17 challenges Attacks against bad implementations of well-known cryptosystems, poorly designed algorithms, side-channels...
3 challenges Digital investigations: dump analysis, data recovery, malware analysis
6 challenges Hax that doesn't fit anywhere else, mostly because it's not HTTP!
44 challenges Binary exploitation on user programs and against the kernel: from basic buffer overflows to advanced ROP and heap exploits.
9 challenges Reverse Engineering of binaries and bypass anti-RE techniques
17 challenges Attacks against Web applications, for both client-side and server-side vulnerabilities
Search by tag:
Some challenges require skills in more than one category.
The tag mechanism allows you to search in other categories — including virtual categories — for challenges that require the skills that you want to practice.
You can search challenges by tag using the select box below, or just browse them all here.