CTF starts in

64D 10H 32M 24S

Saturday, July 4, 2026 · 8:00 a.m. (UTC -5)

Welcome to the
Fluid Attacks CTF

24 hours. One mission:

Prove you can outmatch everyone in LATAM at detecting and exploiting vulnerabilities.

Philosophy

Pillars

Individual CTF

Focus on AppSec

Exclusive for Latin America and the Caribbean

Data

Global statistics

1,028

Applications received

885

Unique applications received

339

Active hackers

17

Countries with active hackers

165

Active companies

85

Active universities

40

Challenges deployed

Woman
Woman

Accumulated rankings

Hall of fame

Overall

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

cvargas

12205

2

caverav

9390

3

R00tbr4ck3r

6910

4

f69

5925

5

Urck

5785

6

zHydra7

5730

7

EK1L

5440

8

FisMatHack

4975

9

mystpeac

4680

10

Bozwkd

4375

Overall

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

cvargas

12205

2

caverav

9390

3

R00tbr4ck3r

6910

4

f69

5925

5

Urck

5785

6

zHydra7

5730

7

EK1L

5440

8

FisMatHack

4975

9

mystpeac

4680

10

Bozwkd

4375

Overall

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

cvargas

12205

2

caverav

9390

3

R00tbr4ck3r

6910

4

f69

5925

5

Urck

5785

6

zHydra7

5730

7

EK1L

5440

8

FisMatHack

4975

9

mystpeac

4680

10

Bozwkd

4375

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Get an AI summary of Fluid Attacks

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.