This hackathons is only open to students. Double check the event page for more information as this may mean only those from a particular university/country are eligible.
Event Type
in person
46
Participants
4
Est. Projects
Organizers
Alex Johnson
alex@example.org
Jamie Rivera
jamie@example.org
Sam Chen
sam@example.org
Quality Score
Quality Score
72/100
High confidence
Organiser16/20
Event Maturity14/20
Sponsors18/25
Participants12/20
About The Event:
CTF is a high-intensity cybersecurity competition where participants solve technical challenges inspired by real-world security scenarios.
Participants must crack codes, discover vulnerabilities, and solve digital puzzles to capture hidden flags.
Each flag represents a secret code that earns points and moves teams higher on the leaderboard.
The event encourages logical thinking, problem-solving, and hands-on cybersecurity learning.
What Is Capture The Flag (CTF):
Capture the Flag is a global cybersecurity competition format used to train ethical hackers, security researchers, and digital defenders.
Participants solve challenges across multiple cybersecurity domains.
Every solved challenge reveals a hidden flag.
Flags follow the format: COGNOISE{your_flag_here}.
Challenge Categories:
Participants will solve challenges from the following domains:
Web Security – Identifying vulnerabilities in web applications
Cryptography – Breaking ciphers and decoding encrypted messages
Digital Forensics – Investigating files and recovering hidden evidence
OSINT – Using open-source intelligence to gather information and trace digital clues
Event Format:
Team-based competition with 2 – 4 members per team
Automated judging through the competition platform
Experienced judges will supervise and assist during the competition
A live leaderboard will update scores in real time
Scoring System:
Easy Challenges – 10 points
Medium Challenges – 20 points
Prizes & Recognition:
Total Prize Pool: ₹5,100
Participation certificates will be provided to all participants
Eligibility:
Open to students from all colleges and disciplines
Teams must consist of 2 – 4 members
Rules:
Challenges must be solved independently by the participating team
External help from non-participants is not allowed
Internet research is permitted
Participants must not attack or disrupt the competition platform
Sharing flags between teams is strictly prohibited
Fair play and ethical conduct are mandatory
Any rule violation may result in immediate disqualification.
Why Participate:
Gain practical exposure to cybersecurity concepts
Build skills in ethical hacking, cryptography, and digital forensics
Compete and collaborate with cybersecurity enthusiasts
Explore cybersecurity as a potential career path
Assemble your team, sharpen your problem-solving skills, and get ready to capture the flag.