HACKअस्त्र
Cybersecurity from Passion to Profession
//ABOUTHACKअस्त्र
root@hackastra:~$cat overview.txt
# MISSION: HACKअस्त्र 2026
# STATUS: ACTIVE
# CLASSIFICATION: PUBLIC
Hackअस्त्र 2026 is Nepal's premier national-level cybersecurity event — a convergence of ethical hackers, security researchers, developers, and curious minds under one roof.
Through intense CTF challenges, expert-led panel discussions, cutting-edge speaker sessions, and a groundbreaking project expo, we push the boundaries of digital defense and foster the next generation of cybersecurity talent.
root@hackastra:~$echo $MISSION_GOAL
"Break barriers. Build defenses. Shape the future of cybersecurity."
Capture The Flag
Multi-domain CTF challenges spanning web exploitation, cryptography, forensics, reverse engineering, and OSINT.
Speaker Sessions
Industry leaders and security researchers sharing insights on emerging threats and cutting-edge defense strategies.
Panel Discussions
Expert panels debating the future of cybersecurity policy, AI security, and digital defense in South Asia.
Project Expo
Showcase innovative projects — from security tools to web apps, AI models, and beyond — to the community and industry leaders.
//PRIZEPOOL
2ND_PLACE
1ST_PLACE
3RD_PLACE
Certifications securely provided by APISec University & Altered Security
//EVENTTIMELINE
CTF Qualifiers
The mission begins with a nationwide online qualifier round. All registered teams compete in multi-domain CTF challenges. Only the Top 12 teams advance to the Grand Finale.
Grand Finale CTF — Phase 1
The Top 12 qualified teams begin the finale online. Advanced challenges drop with a live leaderboard as teams race through the night.
Grand Finale CTF — Phase 2
The final CTF round resumes on-site at Herald College. Teams battle head-to-head to claim the ultimate crown.
Project Expo
Teams and individuals showcase innovative projects across all domains — security tools, web apps, AI/ML, hardware, and more — to industry experts and the broader community.
Speaker Sessions & Panels
Industry leaders and security researchers take the stage with technical talks and expert panel discussions on emerging threats, AI security, and the future of cyber defense in South Asia.
Closing Ceremony
Prize distribution, recognition of speakers and volunteers, event merchandise, networking, and celebration of a mission accomplished.
//CTFTRACKS
Web Exploitation
SQLi, XSS, SSRF, authentication bypasses, and server-side vulnerabilities. Break into real-world web architectures.
Cryptography
RSA, AES, custom ciphers, hash collisions. Crack codes, break encryption, and recover secrets from the void.
Digital Forensics
Memory dumps, disk images, packet captures, steganography. Trace attacker footprints through digital artifacts.
Reverse Engineering
Disassemble binaries, analyze malware, defeat anti-debugging. Deconstruct programs to reveal hidden secrets.
OSINT
Open Source Intelligence gathering. Digital footprints, social engineering recon, geolocation. Connect the dots.
Miscellaneous
Expect the unexpected. Unconventional challenges that test creativity, lateral thinking, and hacker intuition.
//GUESTPANELISTS

Ananda Dhakal

Nirmal Dahal

Chiranjibi Adhikari
//EVENTMETRICS
//PARTNERS &SPONSORS
Operational Hub
Certification Authority
Corporate Benefactors
//GETINVOLVED
Register for CTF
Form a team of 2–5 and compete in multi-domain CTF challenges. Top 12 qualify for the on-site Grand Finale.
Attend the Event
Be part of the audience — speaker sessions, panels, expo, closing ceremony, and more.
Become a Speaker
Share your expertise on cybersecurity, AI, cloud, or emerging tech with 500+ attendees.
Showcase Your Project
Present your project at the expo — security tools, web apps, AI/ML, hardware, or anything innovative.




