Welcome to CSEM
CTF Platform
Test your cybersecurity skills, compete with others, and learn in a hands-on environment. Join our community of security enthusiasts!
95
Active Challenges
1276
Total Users
49
Learning Modules
What Our Users Say
Join thousands of security professionals and enthusiasts who have enhanced their skills with our platform
m3h6u6
India
"The forensics challenges were my favorite part. Really well-designed and engaging!"
Charlie001
India
"Web challenges were tricky. I'm looking forward to seeing the write-ups to learn more."
lkyc137
Switzerland
"The forensic challenges were fun."
Trusted by students at




Events
View All Events
Blue Arena
🔵 Blue Arena – The Ultimate Forensics Battleground Step into the Blue Arena, a high-stakes digit…
August 29, 2025 6 p.m. - August 31, 2025 6 p.m.

Cyber Arena
🕵️♂️ Cyber Arena CTF 2025 by CSEM
Get ready for Cyber Arena CTF, a t…
July 05, 2025 6 p.m. - July 06, 2025 6 p.m.
Active Challenges
Whispers in traffic
hardA mysterious .zip file has been found, buried inside the chaotic noise of network traffic. Can you find what’s hidden beneath the layers of audio whispers and distracting noise? You are given a .pcap file that contains several kinds of traffic: ICMP, DNS, HTTP... maybe even something more. Will you be able to uncover the whispers and reveal the secret?
chronoANT
hardIn the quiet logs of an internal security tool, something peculiar surfaced — a short capture of routine network traffic. Nothing obviously malicious: just pings, some HTTP chatter, and a handful of anomalies. The analyst reviewing it noted one odd thing: a pattern… too regular to be random, too quiet to be noticed at first glance. Some say the ChronoAnt — a mythical agent of the underground — leaves trails in patterns not seen, but felt. Perhaps you’ll see what others missed. The flag is there. Somewhere between the noise and the silence.
Rockstar
mediumThe Rockstar has left traces of his legacy scattered across formats and fragments — a story told in silence, glitches, lyrics, and lost memories.
Obelisk of B: Forbidden Cipher
hardof a custom cipher. The flag is not printed, not stored in plaintext, and cannot be extracted through direct execution. Your objective is to reverse-engineer the .b source file, understand the internal logic, and recover the hidden flag. The challenge requires a deep understanding of the language semantics, control flow analysis, and cipher reconstruction. Execution of the program will not assist in flag recovery — successful solving will depend entirely on code analysis and manual or scripted deobfuscation.