picoCTF Solutions
PostsToolsPathsEvents

Challenge Library

347 step-by-step writeups with commands, explanations, and flags spanning every event from 2019 through 2026.

picoCTF 2026

  • Binary DigitsForensics
  • bytemancy 0General Skills
  • bytemancy 1General Skills
  • MultiCodeGeneral Skills
  • MY GITGeneral Skills
  • Old SessionsWeb Exploitation
  • Password ProfilerGeneral Skills
  • Piece by PieceGeneral Skills
  • ping-cmdGeneral Skills
  • Printer SharesGeneral Skills
  • QuizploitBinary Exploitation
  • Shared SecretsCryptography
  • StegoRSACryptography
  • SUDO MAKE ME A SANDWICHGeneral Skills
  • UndoGeneral Skills
  • ABSOLUTE NANOGeneral Skills
  • Access_ControlBlockchain
  • Autorev 1Reverse Engineering
  • Black Cobra PepperCryptography
  • Bypass MeReverse Engineering
  • bytemancy 2General Skills
  • bytemancy 3General Skills
  • ClusterRSACryptography
  • Credential StuffingWeb Exploitation
  • cryptomazeCryptography
  • DISKO 4Forensics
  • Echo Escape 1Binary Exploitation
  • Echo Escape 2Binary Exploitation
  • Failure FailureGeneral Skills
  • Fool the LockoutWeb Exploitation
  • Forensics Git 0Forensics
  • Forensics Git 1Forensics
  • Forensics Git 2Forensics
  • GatekeeperReverse Engineering
  • HashgateWeb Exploitation
  • Hidden Cipher 1Reverse Engineering
  • Hidden Cipher 2Reverse Engineering
  • KSECRETSGeneral Skills
  • No FAWeb Exploitation
  • North-SouthWeb Exploitation
  • Not TRUeCryptography
  • offset-cycleBinary Exploitation
  • Related MessagesCryptography
  • Rogue TowerForensics
  • Secret BoxWeb Exploitation
  • Secure Password DatabaseReverse Engineering
  • shift registersCryptography
  • Silent StreamReverse Engineering
  • Small TroubleCryptography
  • Smart_OverflowBlockchain
  • Sql Map1Web Exploitation
  • tea-cashBinary Exploitation
  • The Add/On TrapReverse Engineering
  • Timeline 0Forensics
  • Timeline 1Forensics
  • Timestamped SecretsCryptography
  • Binary Instrumentation 3Reverse Engineering
  • Binary Instrumentation 4Reverse Engineering
  • Front_RunningBlockchain
  • Heap HavocBinary Exploitation
  • JITFPReverse Engineering
  • MSS_ADVANCE RevengeCryptography
  • offset-cycleV2Binary Exploitation
  • ORDER ORDERWeb Exploitation
  • paper-2Web Exploitation
  • Pizza RouterBinary Exploitation
  • Printer Shares 2General Skills
  • Printer Shares 3General Skills
  • ReentranceBlockchain
  • Secure Dot ProductCryptography

picoCTF 2025

  • Cookie Monster Secret RecipeWeb Exploitation
  • EVEN RSA CAN BE BROKEN???Cryptography
  • FANTASY CTFGeneral Skills
  • Flag HuntersReverse Engineering
  • hashcrackCryptography
  • head-dumpWeb Exploitation
  • n0s4n1ty 1Web Exploitation
  • Ph4nt0m 1ntrud3rForensics
  • PIE TIMEBinary Exploitation
  • REDForensics
  • Rust fixme 1General Skills
  • Rust fixme 2General Skills
  • Rust fixme 3General Skills
  • SSTI1Web Exploitation
  • 3v@lWeb Exploitation
  • Apriti sesamoWeb Exploitation
  • Binary Instrumentation 1Reverse Engineering
  • Binary Instrumentation 2Reverse Engineering
  • Bitlocker-1Forensics
  • Bitlocker-2Forensics
  • ChronohackReverse Engineering
  • Event-ViewingForensics
  • flags are stepicForensics
  • hash-only-1Binary Exploitation
  • hash-only-2Binary Exploitation
  • PachinkoWeb Exploitation
  • perplexedReverse Engineering
  • Quantum ScramblerReverse Engineering
  • SSTI2Web Exploitation
  • Tap into HashReverse Engineering
  • WebSockFishWeb Exploitation
  • YaraRules0x100General Skills

picoCTF 2024

  • Binary SearchGeneral Skills
  • binhexaGeneral Skills
  • Blame GameGeneral Skills
  • BookmarkletWeb Exploitation
  • CanYouSeeForensics
  • Collaborative DevelopmentGeneral Skills
  • Commitment IssuesGeneral Skills
  • endiannessGeneral Skills
  • format string 0Binary Exploitation
  • heap 0Binary Exploitation
  • interencdecCryptography
  • IntroToBurpWeb Exploitation
  • Scan SurpriseForensics
  • Secret of the PolyglotForensics
  • Super SSHGeneral Skills
  • Time MachineGeneral Skills
  • UnminifyWeb Exploitation
  • VerifyForensics
  • WebDecodeWeb Exploitation
  • Blast from the pastForensics
  • C3Cryptography
  • Classic Crackme 0x100Reverse Engineering
  • Custom encryptionCryptography
  • Dear DiaryForensics
  • dont-you-love-bannersGeneral Skills
  • endianness-v2Forensics
  • FactCheckReverse Engineering
  • format string 1Binary Exploitation
  • format string 2Binary Exploitation
  • heap 1Binary Exploitation
  • heap 2Binary Exploitation
  • heap 3Binary Exploitation
  • Mob psychoForensics
  • No Sql InjectionWeb Exploitation
  • packerReverse Engineering
  • rsa_oracleCryptography
  • SansAlphaGeneral Skills
  • TricksterWeb Exploitation
  • weirdSnakeReverse Engineering
  • WinAntiDbg0x100Reverse Engineering

picoCTF 2023

  • repetitionsGeneral Skills
  • babygame01Binary Exploitation
  • chronoGeneral Skills
  • FindAndOpenForensics
  • findmeWeb Exploitation
  • hidemeForensics
  • HideToSeeCryptography
  • MatchTheRegexWeb Exploitation
  • More SQLiWeb Exploitation
  • MSBForensics
  • PcapPoisoningForensics
  • PermissionsGeneral Skills
  • ReadMyCertCryptography
  • Ready Gladiator 0Reverse Engineering
  • Ready Gladiator 1Reverse Engineering
  • Ready Gladiator 2Reverse Engineering
  • ReverseReverse Engineering
  • rotationCryptography
  • Safe Opener 2Reverse Engineering
  • SOAPWeb Exploitation
  • SpecialGeneral Skills
  • SpecialerGeneral Skills
  • timerReverse Engineering
  • two-sumBinary Exploitation
  • uselessGeneral Skills
  • UnforgottenBitsForensics

picoCTF 2022

  • IncludesWeb Exploitation
  • Inspect HTMLWeb Exploitation
  • Local AuthorityWeb Exploitation
  • basic-mod1Cryptography
  • basic-mod2Cryptography
  • bloat.pyReverse Engineering
  • credstuffCryptography
  • CVE-XXXX-XXXXBinary Exploitation
  • EavesdropForensics
  • Enhance!Forensics
  • File typesForensics
  • file-run1Reverse Engineering
  • file-run2Reverse Engineering
  • Forbidden PathsWeb Exploitation
  • Fresh JavaReverse Engineering
  • GDB Test DriveReverse Engineering
  • Lookey hereForensics
  • morse-codeCryptography
  • Operation OniForensics
  • Operation OrchidForensics
  • Packets PrimerForensics
  • patchme.pyReverse Engineering
  • Power CookieWeb Exploitation
  • rail-fenceCryptography
  • Redaction gone wrongForensics
  • Roboto SansWeb Exploitation
  • Safe OpenerReverse Engineering
  • Search sourceWeb Exploitation
  • SecretsWeb Exploitation
  • Sleuthkit ApprenticeForensics
  • Sleuthkit IntroForensics
  • SQL DirectWeb Exploitation
  • St3g0Forensics
  • substitution0Cryptography
  • substitution1Cryptography
  • substitution2Cryptography
  • Torrent AnalyzeForensics
  • transposition-trialCryptography
  • unpackme.pyReverse Engineering
  • VigenereCryptography
  • SideChannelForensics

picoCTF 2021

  • CookiesWeb Exploitation
  • GET aHEADWeb Exploitation
  • InformationForensics
  • Magikarp Ground MissionGeneral Skills
  • Mod 26Cryptography
  • Nice netcat...General Skills
  • Obedient CatGeneral Skills
  • Scavenger HuntWeb Exploitation
  • Static ain't always noiseGeneral Skills
  • Tab, Tab, AttackGeneral Skills
  • TransformationReverse Engineering
  • Wave a FlagGeneral Skills
  • ARMssembly 0Reverse Engineering
  • ARMssembly 1Reverse Engineering
  • crackme-pyReverse Engineering
  • Dachshund AttacksCryptography
  • Disk, disk, sleuth!Forensics
  • Disk, disk, sleuth! IIForensics
  • Easy PeasyCryptography
  • It is my BirthdayWeb Exploitation
  • keygenme-pyReverse Engineering
  • MacroHard WeakEdgeForensics
  • Matryoshka dollForensics
  • Mind your Ps and QsCryptography
  • Mini RSACryptography
  • Most CookiesWeb Exploitation
  • New CaesarCryptography
  • No Padding, No ProblemCryptography
  • PixelatedCryptography
  • Python WranglingGeneral Skills
  • ShopReverse Engineering
  • Some Assembly Required 1Web Exploitation
  • speeds and feedsReverse Engineering
  • StonksBinary Exploitation
  • Super SerialWeb Exploitation
  • Trivial Flag Transfer ProtocolForensics
  • tunn3l v1s10nForensics
  • Who are you?Web Exploitation
  • Wireshark doo dooo do doo...Forensics
  • ARMssembly 2Reverse Engineering
  • Cache Me OutsideBinary Exploitation
  • Play NiceCryptography
  • Unsubscriptions Are FreeBinary Exploitation

picoCTF 2020 Mini-Competition

  • Guessing Game 1Binary Exploitation
  • Pitter, Patter, PlattersForensics
  • Web GauntletWeb Exploitation
  • Guessing Game 2Binary Exploitation
  • OTP ImplementationReverse Engineering

picoCTF 2019

  • 13Cryptography
  • 2WarmGeneral Skills
  • BasesGeneral Skills
  • First GrepGeneral Skills
  • Glory of the GardenForensics
  • Insp3ct0rWeb Exploitation
  • Lets Warm UpGeneral Skills
  • logonWeb Exploitation
  • strings itGeneral Skills
  • The NumbersCryptography
  • vault-door-trainingReverse Engineering
  • Warmed UpGeneral Skills
  • what's a net cat?General Skills
  • where are the robotsWeb Exploitation
  • caesarCryptography
  • Easy1Cryptography
  • extensionsForensics
  • flag_shopGeneral Skills
  • Irish-Name-Repo 1Web Exploitation
  • la cifra deCryptography
  • mus1cGeneral Skills
  • plumbingGeneral Skills
  • shark on wire 1Forensics
  • So MetaForensics
  • TappingCryptography
  • vault-door-1Reverse Engineering
  • vault-door-3Reverse Engineering
  • What Lies WithinForensics
  • whats-the-differenceGeneral Skills
  • where-is-the-fileGeneral Skills
  • miniRSACryptography

Beginner picoMini 2022

  • CodebookGeneral Skills
  • convertme.pyGeneral Skills
  • fixme1.pyGeneral Skills
  • fixme2.pyGeneral Skills
  • Glitch CatGeneral Skills
  • HashingJobAppGeneral Skills
  • ncmeGeneral Skills
  • PW Crack 1General Skills
  • PW Crack 2General Skills
  • runme.pyGeneral Skills
  • PW Crack 3General Skills
  • PW Crack 4General Skills
  • PW Crack 5General Skills
  • SerpentineGeneral Skills

picoMini by CMU-Africa

  • Corrupted fileForensics
  • Crack the Gate 1Web Exploitation
  • Flag in FlameForensics
  • Hidden in plainsightForensics
  • Log HuntGeneral Skills
  • Riddle RegistryForensics
  • byp4ss3dWeb Exploitation
  • Crack the Gate 2Web Exploitation
  • Crack the PowerCryptography
  • Input Injection 1Binary Exploitation
  • Input Injection 2Binary Exploitation
  • M1n10n'5_53cr37Reverse Engineering
  • Pico BankReverse Engineering

picoMini by redpwn

  • advanced-potion-makingForensics
  • caasWeb Exploitation
  • clutter-overflowBinary Exploitation
  • loginWeb Exploitation
  • spelling-quizCryptography
  • not cryptoReverse Engineering
  • notepadWeb Exploitation
  • scrambled-bytesForensics
  • triple-secureCryptography
  • XtraORdinaryCryptography

picoGym Exclusive

  • Big ZipGeneral Skills
  • DISKO 1Forensics
  • First FindGeneral Skills
  • ASCII FTWReverse Engineering
  • ASCII NumbersGeneral Skills
  • Bit-O-Asm-1Reverse Engineering
  • Bit-O-Asm-2Reverse Engineering
  • Bit-O-Asm-3Reverse Engineering
  • Bit-O-Asm-4Reverse Engineering
  • DISKO 2Forensics
  • DISKO 3Forensics
  • GDB baby step 1Reverse Engineering
  • GDB baby step 2Reverse Engineering
  • GDB baby step 3Reverse Engineering
  • GDB baby step 4Reverse Engineering
  • JAuthWeb Exploitation
  • Local TargetBinary Exploitation
  • Picker IReverse Engineering
  • Picker IIReverse Engineering
  • Picker IIIReverse Engineering
  • Picker IVBinary Exploitation
  • WPA-ing OutForensics

© 2026 picoCTF Solutions

Send feedback