present day… present time.
Espilon CTF
IoT · OT · Hardware · ESP
> presentation()
Espilon CTF is a 100% cybersecurity competition focused on Hardware, IoT and OT.
Forget classic CTFs. Here, we flash firmwares, sniff buses, compromise industrial protocols and reverse embedded systems. If you have ever plugged in a JTAG or captured a radio signal, you are in the right place.
Firmware, UART, SPI, I2C, JTAG, radio, BLE...
Modbus, MQTT, CoAP, realistic SCADA scenarios
Some challenges require your own ESP32
Reproduced from real audits and pentests
> format_competition()
Online Qualifications
Two weeks to solve firmware challenges, hardware interfaces, IoT networks and industrial protocols. Solo format: each player tackles the challenges individually.
On-site Finals
The best teams compete on-site on a unique real-world inspired scenario: analysis, compromise, pivot and system understanding. One single final flag.
> required_hardware()
You must own your own ESP32 to participate in challenges from this category. Without hardware, these challenges will be inaccessible.
What you will do with the ESP32
> challenge_categories()
> who_is_it_for()
Whether you are a curious beginner or an embedded security expert, Espilon CTF offers challenges for all levels — with a real hardware focus.
Learning security? Perfect to discover hardware hacking and IoT in a CTF context.
Scenarios from real audits: firmware, SCADA, industrial protocols. Real-world stuff.
Already own a soldering iron and a logic analyzer? These challenges are made for you.
Mix skills: web, reverse, hardware, crypto. The multi-skill approach is key.
> sponsors()
Interested in sponsoring Espilon CTF?
eun0us@proton.meno matter where you go… everyone is connected.