A very special thank you to Abhiram Kumar for curating this list! Be sure to check out his educational CTF on GitHub, MemLabs.
Title | Type | Scope | Updated | Creator |
---|---|---|---|---|
BelkaCTF #6: Bogus Bill | CTF | iOS | 2024 | Belkasoft |
Advanced APT Emulation Labs | Challenge | Various | 2024 | XINTRA |
DFIR Labs | Challenge | Various | 2024 | The DFIR Report |
Magnet Virtual Summit 2024 Capture The Flag | CTF | iOS, Android | 2024 | Magnet Forensics |
Dragos Capture The Flag 2023 | CTF | Various | 2023 | Dragos |
Huntress Capture The Flag 2023 | CTF | Various | 2023 | Huntress |
Cellebrite CTF 2023 | CTF | iOS, Android | 2023 | Cellebrite |
Magnet Forensics CTFs 2018-2022 | Multiple CTFs | Windows, Android, iOS, Chromebook, Linux, MacOS | 2022 | Magnet Forensics |
Cellebrite 2022 Round Up | CTF Walkthrough | iOS, Android, and Windows | 2022 | Cellebrite |
GrabThePhisher | CTF | Phishing | 2022 | CyberDefenders |
PARTY GIRL—MISSING | CTF | Windows | 2022 | Belkasoft |
2020 Defenit CTF - Tangential Cipher | Challenge | Disk | 2020 | Defenit |
2020 Defenit CTF - USB2 | Challenge | Windows Registry, Amcache | 2020 | Defenit |
DF Challenge 2020 - I can't remember my password | Challenge | Disk | 2020 | Korea Institute of Information Security & Cryptology |
HackThisSite | Challenge | Various | 2020 | HackThisSite |
HackTM CTF Quals 2020 - Find My Pass | Challenge | Memory | 2020 | Legacy |
HackTM CTF Quals 2020 - RR | Challenge | Disk | 2020 | Legacy |
HackTM CTF Quals 2020 - Strange PCAP | Challenge | Network Traffic Analysis | 2020 | Legacy |
HECF Blog - Sunday Funday | Challenge | Various | 2020 | David Cowen |
InCTF Internationals 2020 - Investigation | Challenge | Memory | 2020 | Abhiram Kumar |
InCTF Internationals 2020 - Investigation Continues | Challenge | Memory | 2020 | Abhiram Kumar |
InCTF Internationals 2020 - LOGarithm | Challenge | Memory | 2020 | Abhiram Kumar |
InCTF Internationals 2020 - Lookout Foxy | Challenge | Disk | 2020 | B Nihith |
zer0pts CTF 2020 - Locked KitKat | Challenge | Android Pattern Lock Cracking | 2020 | Zer0pts |
13Cubed Mini-Memory CTF | CTF | Memory | 2020 | Richard Davis |
DEF CON CTF Archive | CTF | All CTF categories | 2020 | Order of Overflow |
DFA & CCSC Joint Spring 2020 CTF | CTF | Windows & iOS Forensics | 2020 | Champlain College Digital Forensics Association |
Google Capture The Flag Contest Archive | CTF | All CTF categories | 2020 | Google CTF Organisers |
HackTheBox | CTF | Various | 2020 | Various |
Magent Virtual Summit 2020 CTF - Memory | CTF | Various | 2020 | Jack Farley, Garrett Mahoney, Jordan Kimball and Jessica Hyde |
Magnet Virtual Summit 2020 CTF | CTF | Various | 2020 | Jack Farley, Garrett Mahoney, Jordan Kimball and Jessica Hyde |
Magnet Virtual Summit 2020 CTF - Android | CTF | Various | 2020 | Jack Farley, Garrett Mahoney, Jordan Kimball and Jessica Hyde |
Magnet Virtual Summit 2020 CTF - Egg Hunt | CTF | Various | 2020 | Jack Farley, Garrett Mahoney, Jordan Kimball and Jessica Hyde |
Magnet Virtual Summit 2020 CTF - iOS | CTF | Various | 2020 | Jack Farley, Garrett Mahoney, Jordan Kimball and Jessica Hyde |
MemLabs | CTF | Memory | 2020 | Abhiram Kumar |
Root Me CTF | CTF | All CTF categories | 2020 | Root-Me |
Honeypot Repository | Training | Honeypots | 2020 | 0xsha |
AceBear Security Contest 2019 - Incident Response | Challenge | Memory | 2019 | chung96vn |
BSidesSF 2019 CTF - goodluks3 | Challenge | Memory, Disk | 2019 | BSidesSF |
Chaos Communication Camp - Flag Converter (Part 1,2,3) | Challenge | Memory | 2019 | ALLES! |
CTFZone Quals 2019 - In the Shadows | Challenge | NTFS | 2019 | BIZone |
FireEye FLARE-On Challenge 2019 | Challenge | Reverse Engineering | 2019 | FireEye |
Foxton Forensics Cyber Challenge - November 2019 | Challenge | Browser Forensics | 2019 | Foxton Forensics |
Google Capture The Flag 2019 - Home Computer | Challenge | NTFS | 2019 | Google CTF |
hxp 36C3 CTF - tracer | Challenge | Strace Output Analysis | 2019 | hxp |
Malware Traffic Analysis Exercises | Challenge | Network Traffic Analysis | 2019 | Brad Duncan |
MalwareTech Exploit Challenges | Challenge | Windows Exploitation | 2019 | Marcus Hutchins |
MalwareTech Reversing Challenges | Challenge | Reverse Engineering | 2019 | Marcus Hutchins |
PICO CTF 2019 - c0rrupt | Challenge | Corrupted File Recovery | 2019 | PICO CTF |
Pwn2Win CTF 2019 - Cloud Admin | Challenge | Memory | 2019 | Epic Leet Team |
SANS HolidayHack 2018 Lessonized | Challenge | Miscellaneous | 2019 | John York |
Securinets CTF Quals 2019 - Rare to Win | Challenge | Memory | 2019 | bibiwars |
Champlain Digital Forensics Association Fall 2019 CTF | CTF | Various | 2019 | Champlain College Digital Forensics Association |
CSAW 2019 Finals | CTF | All CTF categories | 2019 | OSIRIS Lab, NYU Tandon |
CSAW 2019 Quals | CTF | All CTF categories | 2019 | OSIRIS Lab, NYU Tandon |
Defcon DFIR CTF 2019 | CTF | Digital Forensics | 2019 | https://twitter.com/champdfa||Champlain College Digital Forensics Association |
SANS Holiday Hack 2019 | CTF | Various | 2019 | SANS |
Computer Forensic Reference Data Sets (CFReDS) - Mobile | Research | Mobile Forensics | 2019 | J Lyle |
CSAW CTF Qualification Round 2018 - whyOS | Challenge | iOS App Log Analysis | 2018 | CSAW CTF Organizers |
DFRWS 2018 Challenge | Challenge | IoT Forensics | 2018 | Francesco Servida, Eoghan Casey |
FireEye FLARE-On Challenge 2018 | Challenge | Reverse Engineering | 2018 | FireEye |
Hacking Case | Challenge | Windows Forensics | 2018 | J Lyle |
HackOver CTF 2018 - Unbreak My Start | Challenge | Corrupted File Recovery | 2018 | Cyclopropenylidene |
Real World CTF 2018 Quals - ccls fringe | Challenge | CCLS Cache Analysis | 2018 | Chaitin Tech |
SANS HolidayHack 2017 Lessonized | Challenge | Miscellaneous | 2018 | John York |
Timisoara CTF 2018 Quals - Neurosurgery | Challenge | Memory | 2018 | Timisoara CTF |
CSAW 2018 Finals | CTF | All CTF categories | 2018 | OSIRIS Lab, NYU Tandon |
CSAW 2018 Quals | CTF | All CTF categories | 2018 | OSIRIS Lab, NYU Tandon |
SANS Holiday Hack 2018 | CTF | Various | 2018 | SANS |
Publicly Available PCAP files | Resource | Network Traffic Analysis | 2018 | Netresec |
DFRWS 2017 Challenge | Challenge | IoT Forensics | 2017 | Joshua James & Eoghan Casey |
FireEye FLARE-On Challenge 2017 | Challenge | Reverse Engineering | 2017 | FireEye |
CSAW 2017 Finals | CTF | All CTF categories | 2017 | OSIRIS Lab, NYU Tandon |
CSAW 2017 Quals | CTF | All CTF categories | 2017 | OSIRIS Lab, NYU Tandon |
CTF Resources | CTF | CTF Miscellaneous | 2017 | Amanpreet Singh |
SANS Holiday Hack 2017 | CTF | Various | 2017 | SANS |
Deleted File Recovery Images | Research | Data Recovery | 2017 | J Lyle |
DFRWS 2016 Challenge | Challenge | SDN Forensics | 2016 | DFRWS |
FireEye FLARE-On Challenge 2016 | Challenge | Reverse Engineering | 2016 | FireEye |
Practice NTDS.dit File Overview | Challenge | Password Cracking | 2016 | Didier Stevens |
SANS DFIR Challenge - Ann's Aurora | Challenge | Network Traffic Analysis | 2016 | Sherri Davidoff, Eric Fulton, and Jonathan Ham |
CSAW 2016 Finals | CTF | All CTF categories | 2016 | OSIRIS Lab, NYU Tandon |
CSAW 2016 Quals | CTF | All CTF categories | 2016 | OSIRIS Lab, NYU Tandon |
RingZer0 Team Online CTF | CTF | All CTF categories | 2016 | Ringzer0 team |
SANS Holiday Hack 2016 | CTF | Various | 2016 | SANS |
DFRWS 2015 Challenge | Challenge | 2015 | Dr. Golden G. Richard III | |
DFRWS 2015 Rodeo Challenge | Challenge | Malware | 2015 | Dr. Golden G. Richard III |
FireEye FLARE-On Challenge 2015 | Challenge | Reverse Engineering | 2015 | FireEye |
Packet Analysis Practice | Challenge | Network Traffic Analysis | 2015 | Jake Williams |
Ransomware & Entropy | Challenge | Malware | 2015 | Didier Stevens |
SANS DFIR Monterey 2015 | Challenge | Network Traffic Analysis | 2015 | SANS |
Boston Key Party 2015 | CTF | Crypto, Exploitation & Reversing | 2015 | BostonKeyParty |
CSAW 2015 Finals | CTF | All CTF categories | 2015 | OSIRIS Lab, NYU Tandon |
CSAW 2015 Quals | CTF | All CTF categories | 2015 | OSIRIS Lab, NYU Tandon |
SANS Holiday Hack 2015 | CTF | Various | 2015 | SANS |
ForGe Forensic test image generator | Research | Test Image Generator | 2015 | Hannu Visti |
Malware Dynamic Analysis | Training | Malware Analysis | 2015 | Veronica Kovah |
Practical Malware Analysis Chapter 1 Lab Attempt | Tutorial | Reverse Engineering | 2015 | Andy Marks |
Practical Malware Analysis Chapter 3 Lab Attempt | Tutorial | Reverse Engineering | 2015 | Andy Marks |
FireEye FLARE-On Challenge 2014 | Challenge | Reverse Engineering | 2014 | FireEye |
Spy Hunter Holiday Challenge 2014 | Challenge | Network Traffic Analysis | 2014 | Jordan |
CSAW 2014 Finals | CTF | All CTF categories | 2014 | OSIRIS Lab, NYU Tandon |
CSAW 2014 Quals | CTF | All CTF categories | 2014 | OSIRIS Lab, NYU Tandon |
SANS Holiday Hack 2014 | CTF | Various | 2014 | SANS |
Digital Forensics Security Treasure Hunt | Challenge | Practice | 2013 | Department of Defense Cyber Crime Center (DC3) |
Jack Crook Forensic Challenge 2 | Challenge | Memory & Network Traffic Analysis | 2013 | Jack Crook |
SANS Memory Challenge 2013 | Challenge | Memory | 2013 | SANS |
CSAW 2013 Finals | CTF | All CTF categories | 2013 | OSIRIS Lab, NYU Tandon |
CSAW 2013 Quals | CTF | All CTF categories | 2013 | OSIRIS Lab, NYU Tandon |
SANS Holiday Hack 2013 | CTF | Various | 2013 | SANS |
SANS Holiday Hack 2012 | CTF | Various | 2012 | SANS |
Defeating LinCrackme3 with radare2 | Tutorial | Reverse Engineering | 2012 | Julien Voisin |
Malware Analysis Tutorials: A Reverse Engineering Approach | Tutorial | Reverse Engineering | 2012 | Dr. Xiang Fu |
Challenge #1 - Web Server Case | Challenge | Windows Forensics | 2011 | Ali Hadi |
Challenge #2 - User Policy Violation Case | Challenge | Windows Forensics | 2011 | Ali Hadi |
Challenge #3 - Mystery Hacked System | Challenge | Windows Forensics | 2011 | Ali Hadi |
Challenge #4 - Launching Attacks from Alternate Data Streams | Challenge | Windows Forensics | 2011 | Ali Hadi |
LMG Network Forensics Puzzle Contests | Challenge | Network Traffic Analysis | 2011 | LMG Security |
SANS Holiday Hack 2011 | CTF | Various | 2011 | SANS |
Dougee's Comparison Samples on Windows XP | Research | Memory | 2011 | Unknown |
Lance Mueller Forensic Practical Exercise #3 | Challenge | USB | 2010 | Lance Mueller |
Lance Mueller Forensic Practical Exercise #4 | Challenge | Disk | 2010 | Lance Mueller |
CoreLAN Team | Tutorial | Win32 Shellcoding | 2010 | Corelan Team |
Lance Mueller Forensic Practical Exercise #1 | Challenge | Disk and Network Traffic Analysis | 2008 | Lance Mueller |
Lance Mueller Forensic Practical Exercise #2 | Challenge | Disk | 2008 | Lance Mueller |
DFRWS 2007 Challenge | Challenge | File Forensics | 2007 | Brian Carrier, Eoghan Casey, Wietse Venema |
Unicode String Searching - Russian Text | Challenge | Russian string search in Unicode | 2007 | J Lyle |
DFRWS 2005 Rodeo Challenge | Challenge | Insider Threat | 2005 | Dr. Golden G. Richard III |
ISCFCE Sample Practical Exercise | Challenge | Insider Threat | 2004 | The International Society of Forensic Computer Examiners |
FRA Challenges | Challenge | Various | FRA | |
Reverse Engineering Challenges | Challenge | Reverse Engineering | Dennis Yurichev | |
Forensic Challenges by Aman Hardikar | Challenge resource | Various | Aman Hardikar | |
HackingLab | CTF | Various | Hacking Lab | |
CTF 101 | CTF Resource | All CTF categories | OSIRIS Lab, NYU Tandon | |
Basic Mac Image | Research | Mac Forensics | J Lyle | |
Data Leakage Case | Research | Insider Threat | J Lyle | |
Moyix's Fuzzy Hidden Process Sample on Windows XP SP3 | Research | Memory | ||
ComputerSecurityStudent | Tutorial | Memory | ||
Deconstructing an ELF File | Tutorial | Reverse Engineering | Manohar Vanga |
Walkthroughs