PwnTillDawn Logo

PwnTillDawn is a concept developed by wizlynx group to bring fun to cyber security by gamifying the process of penetration testing and allowing people to learn & exercise their offensive skills. Our hope with PwnTillDawn is to inspire new generations to join our Cyber Security field, which greatly lacks needed talent.

PwnTillDawn’s original format (as we now call it PwnTillDawn Original) is an onsite computer penetration testing competition organized by wizlynx group, which is purely oriented around offensive security. During the Capture the Flag (CTF) event, participants evolve within a network comprised of many machines representing real life vulnerabilities witnessed by wizlynx group through real-life advanced penetration tests.

The PwnTillDawn Original CTF series challenges contestants to break into as many machines as possible, using a succession of weaknesses and vulnerabilities within a twelve-hour window. Upon the compromise of a machine, contestants will have to collect flags awarding a certain amount of points. At the end of the contest, the cyber warrior with the most points wins!

With the goal to reach even more people and allow them to not only learn but also have fun in a safe environment, wizlynx group decided to create PwnTillDawn Online Battlefield. This 100% online version allows anybody to practice their offensive security & penetration testing skills by discovering and exploiting vulnerabilities in various machines and hosts located in our penetration testing lab—anytime, anywhere.

But that’s not all! wizlynx group is regularly organizing insane 24H (or even 48H)/Non-Stop online competitions known as PwnTillDawn Online Battlefield Competitions where 50+ challengers from all over the world compete. Check the "Upcoming CTFs" section below to register for future competitions.

Register for FREE to

PwnTillDawn Online Battlefield

Start practicing today!

Our Key Differentiators

Fun but Realistic Machines

Our network is composed from machines with real-life vulnerabilities witnessed by wizlynx group through advanced penetration tests

Exotic Touch

PwnTillDawn not only includes systems you would typically find in a normal network, but we also incorporate emerging technologies such as IoT devices

More Than Just One Box!

Like in real-life, you will find in our network machines with dependencies and links to other machines

Preparing You for The Real-Life

In real life, not everything can be hacked… That’s why our network incorporates hosts that not necessarily contains known and publicly available vulnerabilities

Upcoming CTFs

Stay tuned for the next events to be announced!

PwnTillDawn Code of Conduct

  • No cooperation between participants: Sharing of keys or giving hints is considered cheating – don’t do it!
  • No attacking the infrastructure: Found a bug or vulnerability? Notify the organizers immediately.
  • No sabotaging others: Interfering with other participants' progress is strictly prohibited.
  • No brute forcing: Do not brute force challenge flags or keys on the scoring site.
  • No DoS attacks: Denial-of-service against the CTF platform or any challenge is forbidden.

Prohibited Tools & Techniques:

  • Spoofing (IP, ARP, DNS, NBNS, etc.)
  • Commercial tools or services (e.g., Metasploit Pro, Burp Pro)
  • Automatic exploitation tools (e.g., db_autopwn, browser_autopwn, SQLmap, SQLninja)
  • Mass vulnerability scanners (e.g., Nessus, NeXpose, OpenVAS, Canvas, Core Impact, SAINT)