diff --git a/CactusCon/CovidScammers/CovidScammers.md b/CactusCon/CovidScammers/CovidScammers.md
new file mode 100644
index 0000000..635d6c9
--- /dev/null
+++ b/CactusCon/CovidScammers/CovidScammers.md
@@ -0,0 +1,12 @@
+# CactusConCTF
+
+## CovidScammers
+
+### Free Flag
+
+
+
+Run strings on the binary
+
+
+
diff --git a/CactusCon/Cracking/Easy Crack 1.md b/CactusCon/Cracking/Easy Crack 1.md
new file mode 100644
index 0000000..6bc593d
--- /dev/null
+++ b/CactusCon/Cracking/Easy Crack 1.md
@@ -0,0 +1,51 @@
+# CactusCon9 CTF
+
+## Cracking
+
+### Easy Crack 2
+
+
+
+
+
+
+
+`Bonnie48`
+
+
+### Easy Crack 3
+
+
+
+
+
+This was the flag
+
+### Easy Crack 4
+
+
+
+
+
+
+
+As we can see from `Name That Hash` site that it is a sha-256 crypt hash
+
+
+
+`tandc4eva`
+
+### Easy Crack 5
+
+
+
+
+
+
+
+
+
+`kuako`
+
+
+
diff --git a/CactusCon/Cracking/hash1.txt b/CactusCon/Cracking/hash1.txt
new file mode 100644
index 0000000..1ea23bd
--- /dev/null
+++ b/CactusCon/Cracking/hash1.txt
@@ -0,0 +1 @@
+Stacy:$2b$12$x1iqs/FYe9VlqS906vfyI.hdHd./HyQfc1NCnsvt5vPbrPKG9t64C
diff --git a/CactusCon/Cracking/hash2.txt b/CactusCon/Cracking/hash2.txt
new file mode 100644
index 0000000..d13cd04
--- /dev/null
+++ b/CactusCon/Cracking/hash2.txt
@@ -0,0 +1 @@
+$1$MpIh$j3h8gwlvA0Y0YLzvjqoQ6/
diff --git a/CactusCon/Cracking/hash4.txt b/CactusCon/Cracking/hash4.txt
new file mode 100644
index 0000000..6c54b6d
--- /dev/null
+++ b/CactusCon/Cracking/hash4.txt
@@ -0,0 +1 @@
+Kevin:$5$4NOqdM6ItdQF7OEL$16001uwuKXXL8TzZ/n/Qs6VbgYD20PJ/YjOI98aUcAC
diff --git a/CactusCon/Cracking/hash5.txt b/CactusCon/Cracking/hash5.txt
new file mode 100644
index 0000000..11d127a
--- /dev/null
+++ b/CactusCon/Cracking/hash5.txt
@@ -0,0 +1 @@
+$1$1ccO$zX5YkiNuwKypRpMJ29mU20
diff --git a/CactusCon/Trainer/Trainer.md b/CactusCon/Trainer/Trainer.md
new file mode 100644
index 0000000..2bc1a62
--- /dev/null
+++ b/CactusCon/Trainer/Trainer.md
@@ -0,0 +1,179 @@
+# Trainer
+
+## Level 1
+
+
+
+SSH with the username `level0` and password `level0`
+
+
+
+
+
+## Level 2
+
+
+
+Switch user to level1 with the password you found
+
+
+
+
+
+`943430e07fd566bc96aa05fca3c96e48`
+
+
+## Level 3
+
+
+
+
+
+
+
+`2cadca6148093c403d82396252b8c4db`
+
+
+## Level 4
+
+
+
+
+
+## Level 5
+
+
+
+## Level 6
+
+
+
+
+
+## Level 7
+
+
+
+
+
+## Level 8
+
+
+
+
+
+
+
+## Level 9
+
+
+
+
+
+
+
+Run strings on the binary
+
+
+
+## Level 10
+
+
+
+
+
+## Level 11
+
+
+
+
+
+`192`
+
+## Level 12
+
+
+
+
+
+
+
+## Level 13
+
+
+
+
+
+We can see `mysecret` has a SUID bit
+
+
+
+`f4736e1eb28b1d9055c5f5d58a49b5a6`
+
+## Level 14
+
+
+
+
+
+`0ea027e3835aa87a4a47465321c5fe75`
+
+## Level 15
+
+
+
+
+
+Since kernel version is `4.19.0-12` password is `4.19`
+
+## Level 16
+
+
+
+
+
+Linux Distro is `Debian` so this will be our password
+
+## Level 17
+
+
+
+Aliases are saved in `.bashrc`
+
+
+
+## Level 18
+
+
+
+
+
+
+
+## Level 19
+
+
+
+
+
+
+
+## Level 20
+
+
+
+
+
+Here we can see id_rsa key for user `level20`
+
+
+
+## Level 21
+
+
+
+## Level 22
+
+
+
+
\ No newline at end of file