
Know Your Enemy: A Fundamental Guide to Cybersecurity
Uncover how attacks happen — and how you can protect yourself in the digital world.
Zoom

$Current status: Breaking codes, patching vulnerabilities, and capturing flags.// A1S{root_access_granted}
Join us for live CTF workshops, red team webinars, and community gatherings.

Uncover how attacks happen — and how you can protect yourself in the digital world.
Zoom
We are planning something exciting. Check back soon!
We are planning something exciting. Check back soon!
Injection attacks, XSS, and server-side vulnerability analysis.
Breaking ciphers, analyzing algorithms, and blockchain security.
Memory dump analysis, steganography, and packet tracing.
Binary disassembly, malware analysis, and patch development.
Here is a list of our achievements!

We didn't bring home the trophy this time, but standing on that stage taught us exactly what we need to work on. We'll be back stronger. (P.S. The accomodated food is way too good)

It was one of our loudest moments. We were all focused on finding the last flag and the instant our ranking appeared, we were excited for the thought of being out of town for the finals B)

This goes to show that Overthinking is the best strategy when it comes to CTF

An opportunity that inspired most of us. One of our team member, Brylle Olaivar became a wildcard and placed 2nd against some of the best teams in the country.

Surrounded by the best teams in the country, we may not have reached the top this time, but making it to the finals was a huge milestone for us.

170 teams, and somehow we made Top 5. This was the moment we looked at each other and realized: 'Wait, we can actually do this.'