Home Resources
TAMUctf Logo

TAMUctf

03.20 17:00 CDT

00

Days
:

00

Hours
:

00

Minutes
:

00

Seconds

Hack. Compete. Learn. Repeat.

Since 2017:

317

Challenges

11

Events Hosted

9000+

Participants

What is a CTF?

A Capture The Flag (CTF) competition is a cybersecurity challenge where participants solve puzzles and hacking scenarios to uncover hidden "flags"—unique pieces of text that earn them points. It's a hands-on way to build cybersecurity skills while having fun!

Types of Challenges in a CTF:

  • 🔐 Cryptography - Cracking encrypted messages and solving ciphers.
  • 🔍 Reverse Engineering - Understanding how programs work by dissecting them.
  • 💥 Binary Exploitation - Identifying and using software vulnerabilities.
  • 🌐 Web Exploitation - Manipulating web applications to find weaknesses.
  • 🕵️ Forensics - Analyzing digital evidence to uncover hidden data.

Why TAMUctf?

TAMUctf is a student-built CTF competition designed to challenge and engage students of all skill levels. Whether you're a beginner or an experienced hacker, you'll find exciting challenges with just enough guidance to keep you learning without feeling lost.

No experience? No problem! Jump in, explore, and have fun hacking! 🚀

Sponsors

Binary Ninja

Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform built by reverse engineers, for reverse engineers. Developed with a focus on delivering a high-quality API for automation and a clean and usable GUI, Binary Ninja is in active use by malware analysts, vulnerability researchers, and software developers worldwide. Decompile software built for many common architectures on Windows, macOS, and Linux for a single price, or try out one of our limited (but free!) versions.

You made it to the end!
here's a flag ⛳️:

gigem{welcome!}