-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
1 lines (1 loc) · 6.87 KB
/
index.html
1
<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>idekCTF 2024</title><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="mobile-web-app-capable" content="yes"><meta name="apple-mobile-web-app-capable" content="yes"><link rel="shortcut icon" href="https://ctf.idek.team/assets/logo.png"><meta name="title" content="idekCTF 2024"><meta name="description" content="Welcome to the third edition of idekCTF!"><meta property="og:type" content="website"><meta property="og:title" content="idekCTF 2024"><meta property="og:image" content="https://ctf.idek.team/assets/2024.png"><meta property="og:description" content="Welcome to the third edition of idekCTF!"><meta property="og:url" content="https://ctf.idek.team"><meta name="twitter:card" content="summary_large_image"><meta name="twitter:title" content="idekCTF 2024"><meta name="twitter:description" content="Welcome to the third edition of idekCTF!"><meta name="twitter:image" content="https://ctf.idek.team/assets/2024.png"><meta name="twitter:url" content="https://ctf.idek.team"><link rel="canonical" href="https://ctf.idek.team"><meta name="theme-color" content="#111111"><meta name="rctf-config" content="{"meta":{"description":"Welcome to the third edition of idekCTF!","imageUrl":"https://ctf.idek.team/assets/2024.png"},"homeContent":"<img src=\"https://ctf.idek.team/assets/2024.png\" style=\"max-width: 45%;\" class=\"u-center\" />\n## Welcome to idekCTF 2024!\nWelcome to the third edition of idekCTF, a “capture-the-flag” or CTF competition\n\nidekCTF is an information security competition organized by the idek team and is aimed towards students and CTF veterans alike. It will cover the standard Jeopardy-style CTF topics (binary exploitation, reverse engineering, cryptography, and web exploitation).\n\nFor more information and announcements, please join our [Discord server](https://discord.gg/c7w4gKMnAX).\n<action-button href=\"/register\">\n <span>Register Now</span>\n <svg viewBox=\"4 4 16 16\"><path fill=\"#ffffff\" d=\"M16.01 11H4v2h12.01v3L20 12l-3.99-4z\"></path></svg>\n</action-button>\n<timer></timer>\n\n## Prizes\n* 1st: $1,500 + 5x 1 Year HTB VIP+\n* 2nd: $1,000 + 5x 6 Months HTB VIP+\n* 3rd: $500 + 5x 1 Month HTB VIP+\n* 4th: $250\n\n## Sponsors\nThank you to our amazing sponsors who made this event possible!\n\n<sponsors></sponsors>\n","sponsors":[{"Name":"Google Cloud","icon":"https://ctf.idek.team/assets/gcp.png","description":"Infrastructure sponsored by g.co/cloud"},{"Name":"Security Innovation","icon":"https://ctf.idek.team/assets/si.png","description":"Security Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on our services and training solutions to secure software wherever it runs. Our training solutions combine interactive modules, scenario-based labs, and hands-on cyber ranges to build skills that stick. Visit [securityinnovation.com](https://securityinnovation.com) to learn how we can help you launch a best-in-class security program.\n"},{"Name":"Zellic","icon":"https://ctf.idek.team/assets/zellic.png","description":"Zellic is a security research firm. We hire top CTF talent to solve the world's most critical security problems. We specialize in ZKPs, cryptography, web app security, smart contracts, and blockchain L1/L2s. Before Zellic, we previously founded perfect blue, the #1 CTF team in 2020 and 2021.\n\nAs part of a comprehensive compensation package, we offer competitive salaries and benefits. You're a good fit for Zellic if you have extensive real-world experience in vulnerability research (VR) / binary exploitation, reverse engineering (RE), cryptography, or web security.\n\nTo learn more about Zellic, check out our blog: https://zellic.io/blog/the-auditooor-grindset\n\nWork at Zellic: [[email protected]](mailto:[email protected]) | [zellic.io/careers](https://zellic.io/careers) | @gf&#x5f;256\n\nMeet the Founders: Stephen: @gf&#x5f;256, Jazzy: @ret2jazzy (Twitter) | @jazzyzellic (Discord)\n"},{"Name":"Trend Micro","icon":"https://ctf.idek.team/assets/tm.png","description":"Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects 500,000+ organizations and 250+ million individuals across clouds, networks, devices, and endpoints.\n\nAs a leader in cloud and enterprise cybersecurity, our platform delivers central visibility for better, faster detection and response and a powerful range of advanced threat defense techniques optimized for environments, like AWS, Microsoft, and Google.\n"},{"Name":"HackTheBox","icon":"https://ctf.idek.team/assets/htb.png","description":"HTB is the leading Cybersecurity Performance Center for advanced frontline teams to aspiring security professionals & students. Start driving peak cyber performance.\n"}],"ctfName":"idekCTF 2024","divisions":{"open":"Open"},"origin":"https://ctf.idek.team","startTime":1723852800000,"endTime":1724025600000,"emailEnabled":true,"userMembers":true,"faviconUrl":"https://ctf.idek.team/assets/logo.png"}"><link href="/bundle.e5140.css" rel="stylesheet"></head><body><script type="__PREACT_CLI_DATA__">%7B%22preRenderData%22:%7B%22url%22:%22/%22%7D%7D</script><script nomodule>!function(){var e=document,t=e.createElement("script");if(!("noModule"in t)&&"onbeforeload"in t){var n=!1;e.addEventListener("beforeload",function(e){if(e.target===t)n=!0;else if(!e.target.hasAttribute("nomodule")||!n)return;e.preventDefault()},!0),t.type="module",t.src=".",e.head.appendChild(t),t.remove()}}();</script><script crossorigin="anonymous" src="/bundle.ae9b3.esm.js" type="module"></script><script nomodule src="/polyfills.2430a.js"></script><script nomodule defer="defer" src="/bundle.927d0.js"></script></body></html>