Challenges

200pt
This service provides JSON encoding.
https://json.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://json.canhack.me/tester
300pt
This service provides convert BBCode to HTML.
https://bbcode.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://bbcode.canhack.me/tester
This service provides convert text to uppercase.
https://uppercase.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://uppercase.canhack.me/tester
300pt
This service provides Caesar cipher.
https://caesar.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://caesar.canhack.me/tester
This service provides convert text to uppercase.
https://uppercase2.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://uppercase2.canhack.me/tester
This service provides convert text to lowercase.
https://lowercase.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://lowercase.canhack.me/tester
This service provides redirection to URL.
https://redirect.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://redirect.canhack.me/tester
This service provides redirection to URL.
https://redirect2.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://redirect2.canhack.me/tester
400pt
This service provides website proxy.
https://proxy.canhack.me/
400pt
This service provides read the file.
https://cat.canhack.me/

This challenge was published in the Layer7 CTF 2018.
Sign in as admin, if you can.
The service was developed with Node.js and MongoDB.
The intended solution of this challenge is a vulnerability that is frequently found in these environments.
It's simpler than it looks, so give it a try!
https://signinme.canhack.me/

This challenge was published in the Power Of XX CTF 2018 Finals.
This service provides search plaintext for MD5 hashes.
You can use wildcard characters such as the asterisk (*) and question mark (?).
https://md5table.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://md5table.canhack.me/tester
This service provides redirection to URL.
https://redirect3.canhack.me/

If you find a vulnerability, capture the flag via the URL below.
https://redirect3.canhack.me/tester
Currently opened 14 challenges.