eCTF – Embedded Capture the Flag
2024 Spring Semester Competition opens January 13 and closes April 11. Award Ceremony at MITRE on April 18
The eCTF is unique in two major ways. First, the focus is on securing embedded systems, which present an entirely new set of challenges and security issues that are not currently covered by traditional “online” CTFs. Second, this event balances offense and defense by including a significant secure-design phase in addition to an attack phase. This competition will help you develop practical skills that can be applied securing critical systems, such as medical devices, smart grids, IoT devices, and mobile devices.
Become part of FIU’s team – Our teams since 2020 have competed in eCTF.
Register at: 2025 MITRE Embedded Capture the Flag (eCTF) competition.
NCAE Cyber Games
Welcome to the home of the National Centers of Academic Excellence in Cybersecurity (NCAE-C) national competition! NCAE Cyber Games is dedicated to inspiring college students to enter the exciting (and sometimes profitable!) realm of cyber competitions. Cyber competitions are a valuable addition to any college student’s resume, but they can be intimidating for first-timers. NCAE Cyber Games is creating a new style of collegiate cybersecurity competition, one for college students who have never competed before where they can learn about cyber competitions in an environment focused on teamwork, building confidence, and growing your skills! If you’ve ever wondered how hackathons and cyber competitions work and wanted to try it out for yourself, you’re in the right place!
Visit: https://www.ncaecybergames.org
Google CTF challenge, available year-round.
Capture the Flag (CTF) Competition
Internal Event Competition
Capture the Flag (CTF) Competition
When is the competition?
Taking place at the end of spring A upon completion of EEL 4806.
About the competition
Hacking isn’t like the movies, where you’re facing off a hacker in real-time. Truth be told, security jobs in real life consist of auditing, finding vulnerabilities, patching, and repeating. To keep sharp, many security professionals enter the Capture the Flag (CTF) competition.
FIU students who complete EEL 4806 – Ethical Hacking – will enter the CTF competition to strengthen their problem-solving skills, sharpen the hacking techniques they learned and gain critical hands-on practice.
How does the competition work?
CTF competitions are like an outdoor game, except over a network or online. Students will be divided into teams. One team will attempt to locate and capture the opposing’s team flag while protecting their own from other teams. In this competition, the flag can be a piece of code, hardware or a malicious file.
Fall 2025
The CTF 2025 event was designed to test the student’s ability to undertake various challenges associated with cybersecurity in order to accumulate points linked to differently weighted tasks and challenges. The CTF is conducted every semester and encouraged for students completing the courses related to cybersecurity, Ethical Hacking, Malware Analysis and Digital Forensics. The first competition took place in the fall 2019.
Malware Competition
The top four malware projects developed as part of the Fall 2022 Malware Competition are highlighted below. The information contained in these malware projects are solely for the purpose of education, any use for any other purpose, the authors cannot be held responsible for users actions and activities.
Fall 2022
Project 16: Host Hijacking Malware
Project 9: Annoying Eater via Notepad
Project 8: Remote Administration Tool
Project 4: “expIorer.exe” – A keylogger
Hacking Competition
The top five video tutorials in demonstrating a hack and its countermeasures as part of the competition are highlighted below. The information contained in these malware projects are solely for the purpose of education, any use for any other purpose, the authors cannot be held responsible for users actions and activities.
Fall 2023
#1 Spectra
#2 Tegra
#3 Keylogger
#4 Maltego
#5 MitM Wifi Pineapple
Fall 2022
#1 Evil Twin
# 2 Android Hack
#3 Code Injection
#4 Network Sniffing
#5 Social Engineering