0x47 0x53 0x4F 0xDE 0xAD 0xBE 0xEF 0x00 0xFF flag{welcome}
48 65 6C 6C 6F 57 6F 72 6C 64 0x00FF9D 0xFF root@grimsec
sys.exit(0) import pwn exploit.run() shell→root
Ranked #2 Thailand · Top 1000 Global

GrimSec OPERATIONS

"ctf is easy, right?"

Elite Capture The Flag team from Thailand. We dissect, reverse, and exploit — because no system is truly secure.

View CTFtime Meet the Team
Scroll
Pwn Reverse Engineering Web Exploitation Cryptography Forensics OSINT Mobile RE Active Directory Steganography Blockchain Network Pwn Reverse Engineering Web Exploitation Cryptography Forensics OSINT Mobile RE Active Directory Steganography Blockchain Network
🇹🇭 #2 Thailand Rank
🌐 Top 1K Global Rank
⚔️ 6 Operatives
🧠 12+ Skill Domains
The Operatives

Our Team

Six specialists. Every domain covered. No challenge left unsolved.

V
Vxmp ★ Leader
Exploit Developer | Vxmpi_.
Pwn Reverse Engineering Active Directory
G
Grim
RE & Web Specialist | grim3
Reverse Engineering Web Exploitation
S
Slatt
Mobile & Intel Analyst | nongmoon
Mobile RE OSINT
G
Garfield
Forensic Investigator | pl3633
Forensics OSINT
B
B1ueSh3ll
Web & Crypto Expert | rapurin_op
Web Exploitation Cryptography
B
Ballth24
All-Domain Operator | ballth24
RE Pwn Stego Crypto Web Network Blockchain
System Access

Terminal

grimsec@ops — zsh
Connect

Get In Touch

Want to challenge us, collaborate, or just talk security? Reach out.

🏴
CTFtime
GrimSec Ops
💬
Discord
vxmpi_
🇹🇭 #2 Thailand