// ABOUT US

PhaseQ

We are the ones who knock on locked doors — and pick them open.

// Who We Are

PhaseQ is a competitive Capture The Flag (CTF) team built on one principle: never stop learning. We are a group of security researchers, hackers, and engineers who live at the intersection of curiosity and technical excellence.

From binary exploitation and reverse engineering to web application attacks and cryptography — we dive deep into every challenge, document our methods, and share our findings with the community.

Whether it's a 24-hour CTF sprint or a months-long research project, PhaseQ shows up prepared, hungry, and ready to break things.

team_info.sh
$ cat team.json
{
  "name": "PhaseQ",
  "type": "CTF Team",
  "focus": "offensive security",
  "motto": "Break. Learn. Repeat.",
  "status": "actively competing"
}

// Specializations

Binary Exploitation

Stack overflows, heap exploitation, ROP chains, and kernel-level vulnerabilities.

🌐

Web Security

SQL injection, XSS, SSRF, deserialization, and modern web app attack chains.

🔍

Reverse Engineering

Malware analysis, obfuscated binaries, firmware reversing, and anti-debug bypass.

🔐

Cryptography

Breaking weak implementations, side-channel attacks, and cryptographic protocol analysis.

🕵️

OSINT

Open-source intelligence gathering, digital footprint analysis, and social engineering.

🔬

Forensics

Memory forensics, network capture analysis, steganography, and disk imaging.

// Our Philosophy

"Security is not a product, it's a process — and we are obsessed with that process."

Every challenge we solve, every writeup we publish, and every tool we build serves one mission: advancing the collective knowledge of the security community. We believe in open collaboration, responsible disclosure, and sharing techniques that make everyone safer.

We compete. We research. We teach. We are PhaseQ.