Home Resources
TAMUctf Logo

TAMUctf

03.20 17:00 CDT

Time Until TAMUctf

00

Days
:

00

Hours
:

00

Minutes
:

00

Seconds

Hack. Compete. Learn. Repeat.

Since 2017:

300+

Challenges

9

Events Hosted

10000+

Participants

What is a CTF?

A Capture The Flag (CTF) competition is a cybersecurity challenge where participants solve puzzles and hacking scenarios to uncover hidden "flags"—unique pieces of text that earn them points. It's a hands-on way to build cybersecurity skills while having fun!

Types of Challenges in a CTF:

  • 🔐 Cryptography - Cracking encrypted messages and solving ciphers.
  • 🔍 Reverse Engineering - Understanding how programs work by dissecting them.
  • 💥 Binary Exploitation - Identifying and using software vulnerabilities.
  • 🌐 Web Exploitation - Manipulating web applications to find weaknesses.
  • 🕵️ Forensics - Analyzing digital evidence to uncover hidden data.

Why TAMUctf?

TAMUctf is a student-built CTF competition designed to challenge and engage students of all skill levels. Whether you're a beginner or an experienced hacker, you'll find exciting challenges with just enough guidance to keep you learning without feeling lost.

No experience? No problem! Jump in, explore, and have fun hacking! 🚀

Sponsors

Hudson River Trading

HRT is first and foremost a math and technology company. We are engineers and researchers working as one team to solve difficult problems, and trading millions of shares a day on the world's financial markets.

Binary Ninja

Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform built by reverse engineers, for reverse engineers. Developed with a focus on delivering a high-quality API for automation and a clean and usable GUI, Binary Ninja is in active use by malware analysts, vulnerability researchers, and software developers worldwide. Decompile software built for many common architectures on Windows, macOS, and Linux for a single price, or try out one of our limited (but free!) versions.

Hex-Rays

IDA is the leading tool for binary analysis, trusted by top cybersecurity teams for reverse engineering and malware defense. Simplify complex binaries and boost your security processes with its advanced analysis features.

Zellic

Zellic specializes in securing emerging technologies. Developers, founders, and investors trust our security assessments to ship quickly, confidently, and without critical vulnerabilities. With our background in real-world offensive security research, we find what others miss.

OtterSec

Security audits that protect blockchain ideas. We work with leading teams across multiple blockchains to provide a holistic and collaborative approach to security.

You made it to the end!
here's a flag ⛳️:

gigem{welcome!}