Hacker Games Developers

CTF MAKERS

Do you need high-quality CTF challenges at all levels?

Hello friend

We are here to create challenges, exactly as you want, Your challenges are in the hands of specialists, where the industry, improvement, evaluation, innovation, testing, and then reach you safely..

Here we are not just makers, we will Organize your competition events from  ZERO TO HERO from the digital site to the actual site.

With us , your competitors will feel the full excitement and adrenaline!
 

OUR services

  
Icon of a small store with a red striped awning and an open door.

Sell CTF Challenges

 

Red and white checkered flag waving on a pole against a gray background.

Organize CTF Events

Half gear icon transforming into circuit lines with red dots at the end, representing technological integration.

 CTF Trainings & Workshops

Logo with text 'Escape Room Zone' and figure exiting door.

Life Hackers Simulation

our events

Silhouette holding flag on mountain with CYCTF event details on red binary background.
Online

CYCTF jo

Discord
Jordan University of Science & Technology
Welcome message for ZUJCTF platform with logo and social media icons for Twitter and GitHub.
On-site

ZUJCTF

Platform
Al-Zaytoonah University of Jordan
Web page for Armython 2024 International Cyber Competition with countdown timer and event dates.
On-site

ARMYTH0N

Website
Jordan Design and Development Bureau
Page promoting a platform for improving cybersecurity skills with a pixel art figure holding a flag.
Online

ceybarani

Website
Affiliated with ceybarani company

Worked With

categories

Icon depicting a fishing hook coming out of an envelope, symbolizing email phishing.

Phishing

Illustration of a stylized bug inside a target symbol, indicating debugging or software testing.

malware

Stylized red and white fingerprint icon on a transparent background.

Forensics

Illustration of a graphics card, featuring red circuit designs and components on a white background.

hardware

Red icon of a globe with a padlock symbol, representing internet security.

Web

Simplified illustration of a quadcopter drone with four propellers and a central body.

drone

Abstract design of two intertwined fish in red and white.

reverse

Illustration of a key next to an open padlock on a white background.

Crypto

Stylized icon of an atom with a red binary code 0110 in the center.

Binary

Red command line terminal icon with a greater-than sign and underscore on a white background.

machines

Red skull icon displayed on a smartphone screen, indicating a security threat or malware.

mobile

White icon of a person wearing a face mask within a focusing frame on a gray background.

OSINT

challenges pricings

for pricing, we offer customized pricing based on the client's needs and requirements. We can discuss this further during our meeting, but if you answer this question we can give you an expected price.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

This website uses cookies, see Policy Page