\n\n\n\n\n# Welcome to UMDCTF 2025!\n\n Register Now\n\n\n
Prizes
\nOpen division
\n\n- 1st place: $1200 + 1 Binary Ninja Personal License
\n- 2nd place: $800 + 1 Binary Ninja Personal License
\n- 3rd place: $400
\n- 4th place: $200
\n
\nStudent division
\n\n- 1st place: $750 + 1 Binary Ninja Personal License
\n- 2nd place: $500 + 1 Binary Ninja Personal License
\n- 3rd place: $250 + 1 Binary Ninja Personal License
\n
\nWe are also offering $150 in writeup prizes, plus 1 Binary Ninja Personal License for the best writeup using Binary Ninja.
\nThe top US-based team will also receive a special mystery prize... 👀
\n\n## Sponsors\n","sponsors":[{"name":"Trail of Bits","icon":"https://static.umdctf.io/ToB_Logo_Black.jpg","description":"Trail of Bits helps secure the world's most targeted organizations and products. We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.\n"},{"name":"Zellic","icon":"https://static.umdctf.io/RGB_zellic-logo-primary-dark.svg","description":"Zellic is a security research firm. We hire top CTF talent to solve the world's most critical security problems. Before Zellic, we founded perfect blue, the #1 CTF team in 2020 and 2021. We hire internationally, and we look for people experienced in vulnerability research (VR) / binary exploitation, reverse engineering (RE), cryptography, or web security. To learn more about Zellic, check out our blog below:\n\nBlog\n"},{"name":"OtterSec","icon":"https://static.umdctf.io/osec-black-logo-icon.svg","description":"OtterSec secures critical blockchain infrastructure — from custom compilers to novel virtual machines, we review a wide range of difficult targets. Our team consists largely of CTF players that enjoy solving hard problems. If that sounds like you, please apply through our careers page.\n"},{"name":"ZTC","icon":"https://static.umdctf.io/ztc_logo.jpg","description":"ZTC specializes in the design and development of digital forensics tools. Established in 2004, the company focuses on creating new and innovative solutions to meet the unique needs of each of our customers. We develop widely deployed and highly regarded digital forensic tools. Few companies can match our experience and expertise when it comes to creating customized digital forensics software. Our tools process petabytes of data, and reveal billions of data points for our customers.\n"},{"name":"Vector35","icon":"https://static.umdctf.io/black-and-white-png.png","description":"Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform built by reverse engineers, for reverse engineers. Binary Ninja is actively used by malware analysts, vulnerability researchers, and software developers worldwide.\n"},{"name":"Google Cloud","icon":"https://static.umdctf.io/google-cloud.png","description":"Infra sponsored by goo.gle/ctfsponsorship\n"}],"ctfName":"UMDCTF 2025","divisions":{"open":"Open","student":"Student"},"origin":"https://umdctf.io","startTime":1745618400000,"endTime":1745791200000,"faviconUrl":"https://redpwn.storage.googleapis.com/branding/rctf-favicon.ico","emailEnabled":true,"userMembers":true}">