Hudson River Trading
HRT is first and foremost a math and technology company. We are engineers and researchers working as one team to solve difficult problems, and trading millions of shares a day on the world's financial markets.
Challenges
Events Hosted
Participants
A Capture The Flag (CTF) competition is a cybersecurity challenge where participants solve puzzles and hacking scenarios to uncover hidden "flags"—unique pieces of text that earn them points. It's a hands-on way to build cybersecurity skills while having fun!
TAMUctf is a student-built CTF competition designed to challenge and engage students of all skill levels. Whether you're a beginner or an experienced hacker, you'll find exciting challenges with just enough guidance to keep you learning without feeling lost.
No experience? No problem! Jump in, explore, and have fun hacking! 🚀
HRT is first and foremost a math and technology company. We are engineers and researchers working as one team to solve difficult problems, and trading millions of shares a day on the world's financial markets.
Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform built by reverse engineers, for reverse engineers. Developed with a focus on delivering a high-quality API for automation and a clean and usable GUI, Binary Ninja is in active use by malware analysts, vulnerability researchers, and software developers worldwide.
IDA is the leading tool for binary analysis, trusted by top cybersecurity teams for reverse engineering and malware defense. Simplify complex binaries and boost your security processes with its advanced analysis features.
Zellic specializes in securing emerging technologies. Developers, founders, and investors trust our security assessments to ship quickly, confidently, and without critical vulnerabilities. With our background in real-world offensive security research, we find what others miss.
Security audits that protect blockchain ideas. We work with leading teams across multiple blockchains to provide a holistic and collaborative approach to security.
We provide the virtualization solution that empowers Texas A&M students, faculty, and researchers to move from concept to execution in a secure, scalable, and fully virtualized environment.
The Texas A&M Cybersecurity Club was founded on a spirit of generosity and mentorship for students interested in cybersecurity. Many of us found our start because someone took the time to help us, and we're proud to keep that tradition going by giving back to others in the same way.
You made it to the end!
here's a flag ⛳️:
gigem{welcome!}