$ nmap -sV target$ sqlmap -u "http://?id=1" --batch$ python3 exploit.py$ gobuster dir -u http://target -w wordlist.txt$ ffuf -u https://t/FUZZ -w words.txt$ hashcat -m 1000 hashes.txt dict.txt$ dig target.com ANY +short$ curl -s https://api/ping
[ MAXIM.CTF ]
ctf://homectf://categoriesctf://events[ ← Home ]

Categories

All CTF challenges, grouped by category across events.

AI / Machine Learning

1 challenge • 365 points

ctf://category/ai-machine-learning

Crypto

1 challenge • 100 points

ctf://category/crypto

Forensics

2 challenges • 600 points

ctf://category/forensics

Misc

2 challenges • 600 points

ctf://category/misc

OSINT

1 challenge • 460 points

ctf://category/osint