0x47 0x53 0x4F 0xDE 0xAD 0xBE 0xEF 0x00 0xFF flag{welcome}
48 65 6C 6C 6F 57 6F 72 6C 64 0x00FF9D 0xFF root@grimsec
sys.exit(0) import pwn exploit.run() shell→root
Ranked #2 Thailand · Top 300 Global

GrimSec OPERATIONS

"ctf is easy, right?"

Elite Capture The Flag team from Thailand. We dissect, reverse, and exploit — because no system is truly secure.

View CTFtime Meet the Team
Scroll
Pwn Reverse Engineering Web Exploitation Cryptography Forensics OSINT Mobile RE Active Directory Steganography Blockchain Network Pwn Reverse Engineering Web Exploitation Cryptography Forensics OSINT Mobile RE Active Directory Steganography Blockchain Network
🇹🇭#2Thailand Rank
🌐Top 300Global Rank
⚔️6Operatives
🧠12+Skill Domains
The Operatives

Our Team

Six specialists. Every domain covered. No challenge left unsolved.

V
Vxmp ★ Leader
Exploit Developer
Vxmpi_. Copy
Pwn Reverse Engineering Active Directory Cryptography
View Profile
G
Grim
RE & Web Specialist
[REDACTED] Copy
Reverse Engineering Web Exploitation
View Profile
S
Slatt
Mobile & Intel Analyst
nongmoon Copy
Mobile RE OSINT
View Profile
G
Garfield
Forensic Investigator
pl3633 Copy
OSINT
View Profile
B
B1ueSh3ll
Web & Forensic Expert
rapurin_op Copy
Web Exploitation Network Forensics
View Profile
B
Ballth24
All-Domain Operator
ballth24 Copy
RE Pwn Stego Crypto Web Network Blockchain
View Profile
System Access

Terminal

grimsec@ops — zsh
Connect

Get In Touch

Want to challenge us, collaborate, or just talk security? Reach out.

🏴
CTFtime
GrimSec Ops
💬
Discord
vxmpi_
🇹🇭 #2 Thailand