CTF Edition 2025-1
CTF
Edition
2025-1
CTF
Edition 2025-1

General data

October 11,
8:00 a.m. (UTC - 5)

Duration:
24 hours

Modality:
individual

Prize:
$1,000

Active players:
73

Number of challenges:
20

Prize:
$1,000

Active players:
73

Number of challenges:
20


Challenge categories


Web


Crypto


AI


Pwn


Reversing
Participation stats


31
Number of companies with active players


20
Number of universities with active players


11
Number of countries with active players


1
(Blind firewall, Pwn category)
Number of challenges without solutions


cvargas
Winner of the edition
Rankings (top 10)
Individual
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
cvargas
6765
2
R00tbr4ck3r
5800
3
caverav
5320
4
Bozwkd
4375
5
FisMatHack
4375
6
Urck
3970
7
hakku
3920
8
K0m4h
3630
9
pirrandi
3595
10
Ghoul
3595
Individual
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
cvargas
6765
2
R00tbr4ck3r
5800
3
caverav
5320
4
Bozwkd
4375
5
FisMatHack
4375
6
Urck
3970
7
hakku
3920
8
K0m4h
3630
9
pirrandi
3595
10
Ghoul
3595
Individual
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
cvargas
6765
2
R00tbr4ck3r
5800
3
caverav
5320
4
Bozwkd
4375
5
FisMatHack
4375
6
Urck
3970
7
hakku
3920
8
K0m4h
3630
9
pirrandi
3595
10
Ghoul
3595

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.





