CTF starts in
64D 10H 32M 24S

Saturday, July 4, 2026 · 8:00 a.m. (UTC -5)
Welcome to the
Fluid Attacks CTF
24 hours. One mission:
Prove you can outmatch everyone in LATAM at detecting and exploiting vulnerabilities.


Philosophy
Pillars

Individual CTF

Focus on AppSec

Exclusive for Latin America and the Caribbean
Data
Global statistics

1,028
Applications received

885
Unique applications received

339
Active hackers

17
Countries with active hackers

165
Active companies

85
Active universities

40
Challenges deployed


Accumulated rankings
Hall of fame
Overall
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
cvargas
12205
2
caverav
9390
3
R00tbr4ck3r
6910
4
f69
5925
5
Urck
5785
6
zHydra7
5730
7
EK1L
5440
8
FisMatHack
4975
9
mystpeac
4680
10
Bozwkd
4375
Overall
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
cvargas
12205
2
caverav
9390
3
R00tbr4ck3r
6910
4
f69
5925
5
Urck
5785
6
zHydra7
5730
7
EK1L
5440
8
FisMatHack
4975
9
mystpeac
4680
10
Bozwkd
4375
Overall
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
cvargas
12205
2
caverav
9390
3
R00tbr4ck3r
6910
4
f69
5925
5
Urck
5785
6
zHydra7
5730
7
EK1L
5440
8
FisMatHack
4975
9
mystpeac
4680
10
Bozwkd
4375
Past Editions
Explore past CTF editions
Access rankings, players, and challenges




Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.





