We are


Cryptonite

Who are We?


Cryptonite is the official Cybersecurity & Ethical Hacking Student Project of Manipal Institute of Technology, MAHE, Manipal. Our major areas of focus include exploring cutting-edge exploits, reverse-engineering everyday tools, analyzing encryption schemes, and diving into hardware hacking, all while mastering the latest techniques in both hardware and software security through CTFs and research. Our major flagship events include Cryptober and niteCTF, both of which aim to unite the brightest minds in cybersecurity to compete, collaborate, and innovate.


Our Subsystems


Artificial Intelligence

AI is crucial in cybersecurity for detecting threat, analyzing patterns, and predicting attacks. AI is also important to develop stronger, more robust defense strategies against evolving cyber threats.

Attack / Defense

Patch vulnerabilities, breach systems, and dominate in the offence and defence battlefield.

Binary Exploitation

Binary Exploitation is like an treasure hunt for vulnerabilities in a program and bending them to do things it isn't supposed to do.

Cryptography

Cryptography is the study of securing communication and information through encoding and encryption techniques, ensuring privacy, data integrity, authentication, and preventing unauthorised access.

Forensics

Computer forensics is a field of cybersecurity that uses investigation techniques to help identify, collect, and store evidence from electronic devices, retrieval and recovery of data, steganography and more.

Hardware

Cryptonite Hardware Subsystem specialises in offensive security, exploiting electronic systems by reversing firmware, fault attacks, and custom tool development to exploit, then enhance embedded system security.

Network Security

Explore hands-on projects like hacking routers, building mesh networks, and creating secure communication systems. Join us to dive into building cutting edge solutions at the forefront of network security.

Research

Interdisciplinary research spanning AI for advanced cybersecurity, networking protocols, and testing hardware resilience.

Reverse Engineering

It is the task of deconstructing software to extract information from it. Reverse engineering helps to make a system robust hence ensuring that a system doesn’t have any significant security flaws and protects it from hackers and spyware.

Web Exploitation

Web exploitation is being in a virtual shopping mall, but instead of buying things, you're sneaking into the backroom, figuring out how to change the prices, and taking control of the entire building's security system—all without anyone noticing.

Design & Management

We coordinate the working of the different subsystems of the team. We handle the finance, sponsorship and publicity with regards to all events held by the team, along with handling the Social media handles and the design and graphics.


CTF Stats

We are currently ranked among the top 0.02% of teams globally and #4 nationally. We emerged as the winners of BITSCTF’24, organized by BITS Goa, and secured the 1st position at ShunyaCTF’24. We also earned the 2nd position at the RVCE × IITB × YCF CTF’24, jointly organized by RVCE, Bangalore and IIT Bombay. Additionally, we achieved 9th place in India during CSAW’22, which led to our qualification for the World CSAW’22 Finals.

Member Achievements

Board Members

Prashant K

Team Leader

Ansh Goyal

Team Manager

Yogesh Rane

Forensics Head

Gurmann Singh Ajmani

AI Head

Yvsr Akash

Attack Defence Head

Nishant Gunda

Binary Exploitation Head

Tanmay Saxena

Cryptography Head

Rohan Khandelwal

Network Security Head

Uday O

Reverse Engineering Head

Avanish Money Srivats

Research Head

Rupak Banerjee

Web Exploitation Head