PhaseQ
We are the ones who knock on locked doors — and pick them open.
// Who We Are
PhaseQ is a competitive Capture The Flag (CTF) team built on one principle: never stop learning. We are a group of security researchers, hackers, and engineers who live at the intersection of curiosity and technical excellence.
From binary exploitation and reverse engineering to web application attacks and cryptography — we dive deep into every challenge, document our methods, and share our findings with the community.
Whether it's a 24-hour CTF sprint or a months-long research project, PhaseQ shows up prepared, hungry, and ready to break things.
// Specializations
Binary Exploitation
Stack overflows, heap exploitation, ROP chains, and kernel-level vulnerabilities.
Web Security
SQL injection, XSS, SSRF, deserialization, and modern web app attack chains.
Reverse Engineering
Malware analysis, obfuscated binaries, firmware reversing, and anti-debug bypass.
Cryptography
Breaking weak implementations, side-channel attacks, and cryptographic protocol analysis.
OSINT
Open-source intelligence gathering, digital footprint analysis, and social engineering.
Forensics
Memory forensics, network capture analysis, steganography, and disk imaging.
// Our Philosophy
"Security is not a product, it's a process — and we are obsessed with that process."
Every challenge we solve, every writeup we publish, and every tool we build serves one mission: advancing the collective knowledge of the security community. We believe in open collaboration, responsible disclosure, and sharing techniques that make everyone safer.
We compete. We research. We teach. We are PhaseQ.