Integrated Hawkers

We won't stop Chasing

Ambitious CTF Team | Security Researchers | Persistent Hackers

80+ CTFs Participated
4+ Onsite Qualifies
8+ Team Members

About Us

We are Integrated Hawkers, a passionate team of cybersecurity enthusiasts dedicated to mastering the art of Capture The Flag competitions.

Our team specializes in:

  • Web Exploitation
  • Reverse Engineering
  • Cryptography
  • Binary Exploitation
  • Forensics
  • Misc
  • Networking
  • OSINT
  • Threat Intelligence
  • Operating System
class IntegratedHawkers:
  def __init__(self):
    self.mission = "We hunt for fun, not for Flex"
    self.status = "Active"

  def compete(self):
    return "Victory"

Creation History

Team's Journey Begins

In April 20, 2024 , InferiorAK who was passionate in Cybersecurity founded his own CTF team named "Integrated Hawkers" with a vision to create a powerhouse team that could tackle any challenge thrown their way. At first it was a team of solo player, InferiorAK all by his own and participated in various CTFs to gain experience and knowledge. In a few months, he managed to gather like-minded individuals who shared his passion and drive. But only a few Persistent ones stayed long enough to build the core team after a year later.

Gist behind the Name

"Integrated Hawkers" represents our philosophy - like "Integrated" refers the unity of hackers accross the team. And "Hawkers" is the distorted version so called "Hackers" in Communities.

Growing Stronger

Over the months, we refined our methodologies, established practice routines, and developed internal tools. Each competition taught us valuable lessons, and each team member grew exponentially in their domain.

Today & Beyond

Now recognized as one of the premier CTF teams, Integrated Hawkers continues to push boundaries. We've participated in 80+ competitions both National & International, and built a reputation for excellence. But we're just getting started - our journey continues as we aim for international recognition and inspire the next generation of security researchers.
Though, we still havent won any awards but In Sha Allah we will be on the screen very soon. Cz, now the team is on it's flow.

By The Numbers

2024 Year Founded
80+ CTFs Participated
5+ Active Members

"Compete with yourself rather than comparing with others"

- InferiorAK

Our Services

At Integrated Hawkers, we offer professional cybersecurity services to help organizations strengthen their security posture and protect against modern threats.

CTF Hosting

🎯 CTF Hosting & Challenge Development

We specialize in hosting professional Capture The Flag (CTF) competitions and developing custom security challenges for educational institutions, corporations, and cybersecurity events. Our team creates engaging, realistic scenarios that test participants' skills across multiple domains.

CTF Hosting Services Include:

  • ✓ Complete CTF Platform Setup & Management
  • ✓ Custom Challenge Development (Web, Binary, Crypto, Forensics, etc.)
  • ✓ Infrastructure Deployment & Scaling
  • ✓ Real-time Monitoring & Support During Events
  • ✓ Scoreboard & Leaderboard Management
  • ✓ Post-Event Analysis & Writeup Generation
  • ✓ Training Workshops for Participants
  • ✓ Customized Difficulty Levels for All Skill Ranges

Whether you're organizing a university competition, corporate security training, or a large-scale international CTF event, we provide end-to-end solutions that create memorable and educational experiences for participants.

Penetration Testing

🔴 Penetration Testing

Our expert red team conducts comprehensive penetration testing to identify vulnerabilities in your systems before malicious actors can exploit them. We simulate real-world attack scenarios to assess your organization's security defenses.

Our Penetration Testing Services Include:

  • ✓ Web Application Penetration Testing
  • ✓ Network Infrastructure Security Assessment
  • ✓ Mobile Application Security Testing
  • ✓ API Security Testing
  • ✓ Wireless Network Security Assessment
  • ✓ Social Engineering & Phishing Simulations
  • ✓ Comprehensive Vulnerability Reports
  • ✓ Remediation Guidance & Support

We follow industry-standard methodologies like OWASP, PTES, and NIST to ensure thorough testing and provide actionable recommendations to enhance your security posture.

🔵 Security Operation Center (SOC)

Our Security Operations Center provides 24/7 monitoring and incident response services to protect your organization from cyber threats. We use advanced threat detection tools and experienced analysts to identify and respond to security incidents in real-time.

SOC Services We Provide:

  • ✓ 24/7 Security Monitoring & Threat Detection
  • ✓ Incident Response & Management
  • ✓ SIEM Implementation & Management
  • ✓ Log Collection & Analysis
  • ✓ Threat Intelligence Integration
  • ✓ Security Event Correlation & Analysis
  • ✓ Malware Analysis & Forensics
  • ✓ Compliance Monitoring & Reporting

Our SOC team leverages cutting-edge security tools and threat intelligence to detect anomalies, investigate suspicious activities, and respond to incidents swiftly to minimize potential damage to your organization.

Security Operation Center
Secure Development

💻 Secure Development & System Administration

We help organizations build security into their development lifecycle and maintain robust server infrastructure. Our team provides secure coding practices, DevSecOps implementation, and comprehensive system administration services.

Development & Infrastructure Services:

  • ✓ Secure Code Review & Static Analysis
  • ✓ DevSecOps Pipeline Integration
  • ✓ Security Training for Developers
  • ✓ Server Configuration & Hardening
  • ✓ Linux/Windows System Administration
  • ✓ Cloud Infrastructure Security (AWS, Azure, GCP)
  • ✓ Docker & Kubernetes Security
  • ✓ CI/CD Pipeline Security Implementation

From secure coding practices to hardened server configurations, we ensure your applications and infrastructure are built with security as a foundation, reducing vulnerabilities from the ground up.

Our Active Team

InferiorAK
👑 Leader

InferiorAK

Md. Taseen

Forensics, OSINT & Backdoor

System Admin OSINT Miscellaneous Networking Threat Intelligence

InferiorAK

Love to play with data hiding techniques, and retrieve hidden information. I'm a Gray Hat minded enthusiast. Also love to work with backdoors, web shells, and analyzing malware behavior besides exploiting mango people. Have an attraction to playing with human psychology as well.

🛠️ System Admin
🔍 Steganography
🌐 OSINT
📁 Forensics
🛜 Networking
🎯 Threat Intel
🧩 Misc
💻 Operating Systems
MD Shorif Ahammed

siuxsa

MD Shorif Ahammed

Web Exploitation Expert

Web Exploitation Security

MD Shorif Ahammed

Expert web penetration tester who excels at finding and exploiting vulnerabilities in web applications. Master of SQL injection, XSS, CSRF, and advanced web security techniques.

🌐 Web Exploitation
💉 SQL Injection
🔒 XSS & CSRF
🛡️ WAF Bypass
🔓 Authentication Bypass
Mahdi Hosen Ruan

B1u3_Gho5t

Mahdi Hosen Ruan

Crypto & Reverse Expert

Cryptography Reverse Eng. OSINT

Mahdi Hosen Ruan

Cryptography genius and reverse engineering specialist. Breaks complex encryption schemes and dissects binaries to understand their inner workings. Also skilled in OSINT operations.

🔐 Cryptography
🔄 Reverse Engineering
🔍 OSINT
🧮 Mathematical Cryptanalysis
🛠️ Binary Analysis
MD Golam Rabbani

Bani

MD Golam Rabbani

Binary & Pwn Specialist

Reverse Eng. Web Pwn

Golam Rabbani

Binary exploitation master with deep expertise in reverse engineering and pwn challenges. Combines web exploitation skills with low-level system understanding to dominate CTF competitions.

🔧 Reverse Engineering
🌐 Web Exploitation
💥 Binary Pwn
🔩 Buffer Overflow
🎯 Exploit Development
MD. Tonmoy Hossain Jifat

Rudy

MD. Tonmoy Hossain Jifat

Web & AI Specialist

Web Database Realtime System OS Linux Docker

MD. Tonmoy Hossain Jifat

Hi, I'm Jifat — a developer and security researcher who loves exploring how systems work from the ground up. I enjoy building full-stack web applications using Django, React, and PostgreSQL, and I'm always experimenting with automation, DevOps, and real-time communication tools. Beyond development, I have a strong interest in cybersecurity, especially in understanding and defending against modern web vulnerabilities. My goal is to combine secure engineering and system design to build reliable, efficient, and safe software.

🌐 Web Development
🗄️ Database Systems
⚡ Realtime Systems
💻 Operating Systems
🐳 Docker

Achievements

Team Formation

20 Apr 2024

Integrated Hawkers officially established by InferiorAK

RCSC Club - Resurrection CTF 2025

03 Oct 2025 - Club CTF

1st Place

Players: InferiorAK & B1u3_Gho5t

🎓 Inter University CTFs

BUP CTF 2025

25 Sept 2024 - Final

18th Place (Onsite)

20 Sept 2025 - Preli

18th Place

Players: InferiorAK, B1u3_Gho5t, Jifat & Rifat

EWU NRF CTF 2024

09 Nov 2024 - Final

28th Place (Onsite)

23 Oct 2024 - Preli

10th Place

Players: InferiorAK & Mehedi Hasan

🏆 National CTFs

DIU CyberCon CTF 2025

25 Oct 2025 - Final

13th Place (Onsite)

18 Oct 2025 - Preli

13th Place

Players: InferiorAK, siuxsa, B1u3_Gho5t & Golam Rabbani

MIST Cyber Drill 2025

16 May 2025 - Final

17th Place (Onsite)

12 May 2025 - Preli

11th Place

Players: InferiorAK, siuxsa, RootHarpy & Mehedi Hasan

Phoenix Summit CTF 2025

10 May 2025 - Final

18th Place

Players: InferiorAK, siuxsa, RootHarpy, Mehedi Hasan & Rafi Ibrahim

🌍 International CTFs

Brunner CTF 2025

22 Aug 2025

138th / 1158 Place

Players: InferiorAK (Solo)

BDSec CTF 2025

20 July 2025

35th / 642 Place

Players: InferiorAK, siuxsa, white_devil, Mehedi & rafiibrahim8

ECTF 2025

20 Jan 2025

62nd / 536 Place

Players: InferiorAK (Solo)

Codefest CTF 2025

25 Jan 2025

91st / 486 Place

Players: InferiorAK (Solo)

KnightCTF 2025

20 Jan 2025

91st / 759 Place

Players: InferiorAK & Mehedi Hasan

Get In Touch