CH0WN3RS
Elite Cybersecurity Team
We are the digital guardians, the code breakers, the system architects. Join us in the relentless pursuit of cybersecurity excellence.
Powered by CTFtime
Ch0wn3rs is a professional competitive CTF team, we are moved by mastering the art of cybersecurity through intense competition. We are a tight-knit group of passionate individuals who thrive on solving complex security challenges under pressure. Our journey is defined by a commitment to excellence in the world of Capture The Flag (CTF) competitions and cybersecurity research.
Recent Competitions
What We Offer
CTF Competitions
Regular Capture The Flag events to sharpen your skills and compete with the best minds in cybersecurity.
Community & Events
Join our active community, participate in meetups, conferences, and networking events with fellow security enthusiasts.
Guidance
New members receive guidance, feedback, and practical tips from experienced teammates to steadily improve their CTF abilities.
CTF Platform
Access our custom CTF platform with challenges ranging from beginner to advanced levels, available 24/7.
Skills
Crypto
We focus on cryptographic systems by attacking weak randomness, analyzing classical and modern constructions, and breaking implementations under real CTF constraints.
Web
Our web playbook centers on input-driven vulnerabilities, parser abuse, and application logic weaknesses that reliably show up in offensive web challenges.
Forensic
We recover traces from filesystems, packets, documents, and operating system artifacts to rebuild timelines and surface the evidence hidden in challenge data.
Adversarial ML
We work on machine learning model evasion and LLM misuse by probing model behavior, crafting adversarial inputs, and exploiting prompt-handling weaknesses.
We focus on cryptographic systems by attacking weak randomness, analyzing classical and modern constructions, and breaking implementations under real CTF constraints.
Our web playbook centers on input-driven vulnerabilities, parser abuse, and application logic weaknesses that reliably show up in offensive web challenges.
We recover traces from filesystems, packets, documents, and operating system artifacts to rebuild timelines and surface the evidence hidden in challenge data.
We work on machine learning model evasion and LLM misuse by probing model behavior, crafting adversarial inputs, and exploiting prompt-handling weaknesses.
Connect With Us
Join our community and stay updated with the latest news, events, and challenges
LinkedIn
Follow us for professional updates
Instagram
See our latest activities and events
Discord
Join our active community chat
CTFtime
Check our rankings and CTF history