Guided Paths
Learn by Doing
Structured learning paths that guide you through picoCTF challenges by topic. Build real skills in forensics, reverse engineering, web exploitation, cryptography, and binary exploitation.
6 paths · 80 curated challenges
Forensics5 steps
Digital Forensics
Uncover hidden data from files, images, and network captures.
15 challenges
Reverse Engineering5 steps
Reverse Engineering
Read, understand, and defeat compiled programs without source code.
16 challenges
Web Exploitation5 steps
Web Exploitation
Find and exploit vulnerabilities in web applications.
17 challenges
Cryptography4 steps
Cryptography
Break ciphers, crack hashes, and attack cryptographic protocols.
12 challenges
Binary Exploitation3 steps
Binary Exploitation
Corrupt memory and hijack program execution at the lowest level.
9 challenges
General Skills4 steps
General Skills
Master the Linux command line, git, and core CTF fundamentals.
11 challenges