Home - CSEM CTF Platform

Welcome to CSEM
CTF Platform

Test your cybersecurity skills, compete with others, and learn in a hands-on environment. Join our community of security enthusiasts!

Trusted by professionals from around the world
India Germany United States Nepal China France Japan Russia Indonesia Algeria Switzerland Albania

95

Active Challenges

1276

Total Users

49

Learning Modules

What Our Users Say

Join thousands of security professionals and enthusiasts who have enhanced their skills with our platform

m3h6u6

India

"The forensics challenges were my favorite part. Really well-designed and engaging!"

Charlie001

India

"Web challenges were tricky. I'm looking forward to seeing the write-ups to learn more."

lkyc137

Switzerland

"The forensic challenges were fun."

Trusted by students at

Partner Logo Partner Logo Partner Logo Partner Logo
Blue Arena

Blue Arena

🔵 Blue Arena – The Ultimate Forensics Battleground Step into the Blue Arena, a high-stakes digit…

August 29, 2025 6 p.m. - August 31, 2025 6 p.m.

Cyber Arena

Cyber Arena

🕵️‍♂️ Cyber Arena CTF 2025 by CSEM

Get ready for Cyber Arena CTF, a t…

July 05, 2025 6 p.m. - July 06, 2025 6 p.m.

View Past Event

Active Challenges

Data transmission

easy

Control Message Protocol

60 pts | 0:10:00
View Challenge

Whispers in traffic

hard

A mysterious .zip file has been found, buried inside the chaotic noise of network traffic. Can you find what’s hidden beneath the layers of audio whispers and distracting noise? You are given a .pcap file that contains several kinds of traffic: ICMP, DNS, HTTP... maybe even something more. Will you be able to uncover the whispers and reveal the secret?

100 pts | 0:10:00
View Challenge

chronoANT

hard

In the quiet logs of an internal security tool, something peculiar surfaced — a short capture of routine network traffic. Nothing obviously malicious: just pings, some HTTP chatter, and a handful of anomalies. The analyst reviewing it noted one odd thing: a pattern… too regular to be random, too quiet to be noticed at first glance. Some say the ChronoAnt — a mythical agent of the underground — leaves trails in patterns not seen, but felt. Perhaps you’ll see what others missed. The flag is there. Somewhere between the noise and the silence.

100 pts | 0:10:00
View Challenge

Rockstar

medium

The Rockstar has left traces of his legacy scattered across formats and fragments — a story told in silence, glitches, lyrics, and lost memories.

70 pts | 0:10:00
View Challenge

Obelisk of B: Forbidden Cipher

hard

of a custom cipher. The flag is not printed, not stored in plaintext, and cannot be extracted through direct execution. Your objective is to reverse-engineer the .b source file, understand the internal logic, and recover the hidden flag. The challenge requires a deep understanding of the language semantics, control flow analysis, and cipher reconstruction. Execution of the program will not assist in flag recovery — successful solving will depend entirely on code analysis and manual or scripted deobfuscation.

100 pts | 0:10:00
View Challenge

Web4all

medium

Crack the web

50 pts | 0:10:00
View Challenge

Learning Paths

AI Pentesting Top 10 Vulnerability Practical Learning

Web Application Pen Testing basic to Intermediate Learning Path

Basic of Smart Contact Security

Cryptography Basic Learning Path

Cryptography Intermediate Learning Path