CTF Edition 2025-1

CTF
Edition
2025-1

CTF
Edition 2025-1

RANKING TOP 10 • RANKING TOP 10 • RANKING TOP 10 •

General data

October 11,
8:00 a.m. (UTC - 5)

Duration:
24 hours

Modality:
individual

Prize:
$1,000

Active players:
73

Number of challenges:
20

Prize:
$1,000

Active players:
73

Number of challenges:
20

Challenge categories

Web

Crypto

AI

Pwn

Reversing

Participation stats

31

Number of companies with active players

20

Number of universities with active players

11

Number of countries with active players

1

(Blind firewall, Pwn category)

Number of challenges without solutions

cvargas

Winner of the edition

Rankings (top 10)

Individual

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

cvargas

6765

2

R00tbr4ck3r

5800

3

caverav

5320

4

Bozwkd

4375

5

FisMatHack

4375

6

Urck

3970

7

hakku

3920

8

K0m4h

3630

9

pirrandi

3595

10

Ghoul

3595

Individual

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

cvargas

6765

2

R00tbr4ck3r

5800

3

caverav

5320

4

Bozwkd

4375

5

FisMatHack

4375

6

Urck

3970

7

hakku

3920

8

K0m4h

3630

9

pirrandi

3595

10

Ghoul

3595

Individual

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

cvargas

6765

2

R00tbr4ck3r

5800

3

caverav

5320

4

Bozwkd

4375

5

FisMatHack

4375

6

Urck

3970

7

hakku

3920

8

K0m4h

3630

9

pirrandi

3595

10

Ghoul

3595

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Get an AI summary of Fluid Attacks

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.