CTF Edition 2026-1
CTF
Edition
2026-1

General data

January 24,
8:00 a.m. (UTC - 5)

Duration:
24 hours

Modality:
individual

Prize:
$1,000

Active players:
299

Number of challenges:
20

Prize:
$1,000

Active players:
299

Number of challenges:
20


Challenge categories


Web


Forensics


Crypto


Pwn


Reversing


Coding


AI
Participation stats


153
Number of companies with active players


73
Number of universities with active players


17
Number of countries with active players


2
Crack the vault, AI category
Bathmophobia, Crypto category
Number of challenges without solutions


f69
Winner of the edition
Rankings (top 10)
Individual
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
f69
5925
2
cvargas
5440
3
EK1L
5440
4
caverav
4070
5
p0mb3r0
4045
6
s4yhii
3530
7
xchg2pwn
3085
8
skadrock
2635
9
waid
2450
10
LS
2395
Individual
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
f69
5925
2
cvargas
5440
3
EK1L
5440
4
caverav
4070
5
p0mb3r0
4045
6
s4yhii
3530
7
xchg2pwn
3085
8
skadrock
2635
9
waid
2450
10
LS
2395
Individual
By country
By cybersecurity companies
By non-cybersecurity companies
By university
Position
Username
Points
1
f69
5925
2
cvargas
5440
3
EK1L
5440
4
caverav
4070
5
p0mb3r0
4045
6
s4yhii
3530
7
xchg2pwn
3085
8
skadrock
2635
9
waid
2450
10
LS
2395

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Products
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.





