Learn by Doing

Structured learning paths that guide you through picoCTF challenges by topic. Build real skills in forensics, reverse engineering, web exploitation, cryptography, and binary exploitation.

6 paths · 80 curated challenges

Forensics

Digital Forensics

Uncover hidden data from files, images, and network captures.

15 challenges
Reverse Engineering

Reverse Engineering

Read, understand, and defeat compiled programs without source code.

16 challenges
Web Exploitation

Web Exploitation

Find and exploit vulnerabilities in web applications.

17 challenges
Cryptography

Cryptography

Break ciphers, crack hashes, and attack cryptographic protocols.

12 challenges
Binary Exploitation

Binary Exploitation

Corrupt memory and hijack program execution at the lowest level.

9 challenges
General Skills

General Skills

Master the Linux command line, git, and core CTF fundamentals.

11 challenges