











































































































































































.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)


.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

.png)
.png)
.png)

[ Operation Milestones ]
Talks + training + mock CTF
Online jeopardy round
On-site competition
[ Expert Speakers ]

Program Manager


Senior Security Analyst


Head of Mobile Security


Security Engineer


Product Security Engineer


Senior Security Engineer


Security Researcher




Security Researcher


Reverse Engineer and Antibot Bypass Specialist


Security Consultant


Security Engineer



> A dormant deep-orbit system has resumed transmission. Unidentified protocols, unauthorized access attempts, and system anomalies have been detected across critical digital infrastructure.
> In response, Amrita InCTF 2026 has been activated as a national-level operation to recruit, train, and evaluate cyber defence personnel capable of analysing advanced threats, decoding unfamiliar systems, and securing sensitive digital assets under real-world conditions.













© Amrita InCTF 2026
Conducted by Amrita Vishwa Vidyapeetham
Organized with team bi0s
