We’re an offensive security team exploring the limits of digital systems through CTFs, exploit research & adversary simulation. We build tools and share knowledge to strengthen cyber resilience.
AchievementsHidden Investigations began as a small group of cybersecurity enthusiasts driven by curiosity and a shared passion for offensive security. Founded by Sakibul Ali Khan, the team started its journey in 2022, initially competing in Capture The Flag (CTF) events and quickly gaining recognition for its sharp technical skills and teamwork.
What started as a competitive team has grown into a collective of researchers, programmers, and bug hunters who are deeply committed to understanding and securing the digital world. We come from diverse academic and technical backgrounds, but we share the same mindset: always question, always explore, always improve.
At our core, we are problem solvers. We thrive in high-pressure scenarios, whether during timed CTF competitions or real-world adversary simulations. Every member brings unique strengths to the table, and collaboration is our greatest tool. We invest heavily in knowledge sharing, peer learning, and constant upskilling—not just to improve ourselves, but to uplift the community around us.
At Hidden Investigations, our mission is to uncover hidden security threats, understand the mindset of real-world adversaries, and contribute to a safer digital environment through offensive security practices. We aim to bridge the gap between theory and application by engaging in Capture The Flag (CTF) competitions, vulnerability research, adversary simulation, and open-source tool development.
We believe that hands-on exploration, responsible disclosure, and knowledge sharing are essential to strengthening cybersecurity. Our work is driven by curiosity, technical precision, and a commitment to continuous learning. Through collaboration and innovation, we strive to support the global security community and inspire the next generation of cybersecurity professionals.
We bridge offensive testing with practical, real-world defense to advance security.
Competitive roots shape our rigor, teamwork, and calm execution under pressure.
We build and share tools the community can use, extend, and learn from.
Evidence-based findings with reproducible PoCs and coordinated disclosure.
Reports that map directly to actions—prioritized risks and practical remediation.
Feedback, mentorship, and continuous learning by default.
Cross-disciplinary work across Web/AppSec, RE, OSINT, Crypto, and DFIR.
Active locally and globally through competitions, education, and open resources.
Lawful research and careful handling of sensitive data—trust by design.