CTF Edition 2026-1

CTF
Edition
2026-1

RANKING TOP 10 • RANKING TOP 10 • RANKING TOP 10 •

General data

January 24,
8:00 a.m. (UTC - 5)

Duration:
24 hours

Modality:
individual

Prize:
$1,000

Active players:
299

Number of challenges:
20

Prize:
$1,000

Active players:
299

Number of challenges:
20

Challenge categories

Web

Forensics

Crypto

Pwn

Reversing

Coding

AI

Participation stats

153

Number of companies with active players

73

Number of universities with active players

17

Number of countries with active players

2

  • Crack the vault, AI category

  • Bathmophobia, Crypto category

Number of challenges without solutions

f69

Winner of the edition

Rankings (top 10)

Individual

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

f69

5925

2

cvargas

5440

3

EK1L

5440

4

caverav

4070

5

p0mb3r0

4045

6

s4yhii

3530

7

xchg2pwn

3085

8

skadrock

2635

9

waid

2450

10

LS

2395

Individual

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

f69

5925

2

cvargas

5440

3

EK1L

5440

4

caverav

4070

5

p0mb3r0

4045

6

s4yhii

3530

7

xchg2pwn

3085

8

skadrock

2635

9

waid

2450

10

LS

2395

Individual

By country

By cybersecurity companies

By non-cybersecurity companies

By university

Position

Username

Points

1

f69

5925

2

cvargas

5440

3

EK1L

5440

4

caverav

4070

5

p0mb3r0

4045

6

s4yhii

3530

7

xchg2pwn

3085

8

skadrock

2635

9

waid

2450

10

LS

2395

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Get an AI summary of Fluid Attacks

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.