CTF COMPETITIONS

Where we test our skills against the world's best

Join us on our journey through the world's most challenging cybersecurity competitions. We compete, learn, and dominate in Capture The Flag events across the globe.

What is CTF?

πŸ”

Capture The Flag

CTF competitions are cybersecurity contests where participants solve security challenges to find hidden flags. These challenges test skills in cryptography, reverse engineering, web exploitation, forensics, and binary exploitation.

βš”οΈ

Attack & Defense

In this format, teams must both protect their own vulnerable services and attack opponents' services. It's a dynamic, real-time battle that requires both offensive and defensive skills.

🏁

Jeopardy Style

Teams solve standalone challenges across various categories. Each solved challenge earns points, and the team with the highest score wins. This format tests diverse cybersecurity skills.

Our Achievements

Past Competitions
Upcoming Events
March 2025

DEF CON CTF Qualifiers

Ranked 30th globally out of 500+ teams. Solved all web exploitation challenges and placed top 3 in cryptography.

November 2024

HackTheBox University CTF: Binary Badlands

Competed in the Ynov Diamond-sponsored event, tackling advanced binary exploitation, reverse engineering, and memory corruption challenges. Secured a top-tier position among global university teams.

March 2025

TryHackMe Hackfinity Battle CTF

Ranked #73 globally out of thousands of participants. Earned 300 points by completing 14 complex security challenges, showcasing expertise in penetration testing and offensive security techniques.

July 2025

CyberTeq CTF at KNUST

Team Cyclone clinched 1st place in the competition, outperforming top teams like Π‘ΡƒΡ…ΠΎΠ³ΠΎ, 9ightt, meltdown, 3RROR. Demonstrated excellence in Jeopardy Style CTFs

πŸ“…

CyberTeq CTF Finals

Ghana, | August - October, 2025

All the winners from university campuses across Ghana will meet for the final showdown of who's team is the best

OUR TOOLS

Powerful cybersecurity solutions developed in-house

We create cutting-edge security tools that help us dominate competitions and protect our clients. Explore our open-source projects and custom solutions.

Our Cybersecurity Arsenal

All Tools
Offensive
Defensive
Forensics
πŸŒͺ️

Titan Randsomeware

TITAN is a simulated ransomware program written in Java for educational and research purposes. It demonstrates key aspects of ransomware behavior such as file discovery, encryption, OS targeting, and a fullscreen graphical warning interface, mimicking real-world ransomware attacks in a safe environment.

  • 🧠 OS Detection (Windows, Linux, Mac, Android, ChromeOS)
  • πŸ”Scans user directories for common sensitive file types
  • πŸ” AES-style file encryption & simulated decryption (via CryptoUtils)
  • 🧾 Hardcoded encryption key: Optimus_Was_here
πŸ›‘οΈ

Ghost Chat

πŸ’» Professional & Cybersecurity-Focused Lightweight encrypted terminal messenger built on cryptcat, designed for secure peer-to-peer communication and red team operations.

  • πŸ” Secure terminal-based communication
  • 🌐 Peer-to-peer encrypted messaging
  • 🧠 Educational, cybersec, and red team use cases
  • πŸ•³οΈ Darknet-inspired deployments