1st Edition of Cyberlympics Qualification: 30 - 31 May 2025
Finals: 12 June 2025

Kenya's #1 Hacking Competition

Cyberlympics Kenya 2025

The 1st in-person hacking / Capture-The-Flag competition is designed to address the cybersecurity skills gap and digital divide that persists in Kenya, while helping Kenya grow its status as Silicon Savannah.

Cyberlympics Kenya is an online cyber-security and cyber-defense competition.

It pits teams from Kenya in a 24-hour intense hands-on real-life based scenarios and hands-on virtual labs that cover a series of challenges in areas such as:

    • Offensive Cyber Warfare
    • Digital Forensics
    • Cyber Defense
    • Cryptography
    • Web Application Exploitation
    • System Exploitation
    • Malware Analysis
    • Reverse Engineering
    • Cryptography
    • Programming

The competition starts with a pre-qualification round where only the best teams get selected to compete during the 24-hour Final battle. Teams consist of Minimum 2 and Maximum 4 players.

Prizes

1st Place

Professional Internship and Certificate for each Player

This prize includes a professional internship for each team member,  merchandise and a complimentary ticket to attend the 6th edition of Africa Cyber Defense Forum 2025

2nd Place

Merchandise and Certificate for Each Player

Merchandise and a complimentary ticket to attend the 6th edition of Africa Cyber Defense Forum 2025

3rd Place

Complimentary Ticket for ACDF 2025 and Certificate for Each Player

A complimentary ticket to attend the 6th edition of Africa Cyber Defense Forum 2025

National Research Fund (NRF)
CompTIA
enovise
Threatseal

Register for Cyberlympics Kenya 2025

Registration for Cyberlympics Kenya 2025 has 🛑 closed. Get in touch with us on secretariat@africacyberdefenseforum.com

Our Mission

Our mission is to bridge the cyber security skills gap in Africa through capacity building. We hope that the competition shall not only act as a platform to discover the cyber security talents in Africa, but it can as well be an opportunity to develop the next generation of Africa cyber security warriors and professionals to help fight the global threat of cybercrime.

Fields Covered

  • ^Ethical hacking and penetration testing
  • ^Incident response and computer forensics
  • ^Programming
  • ^Cryptography
  • ^Reverse Engineering
  • ^Networking

Target Participants

  • ^Students
  • ^Street smart freelancers
  • ^Active information security professionals
  • ^Law enforcement personnel
  • ^CTF hobbyists

newsletter icon

Eligibility Criteria, Rules, and Regulations

  • Must be Over 18 years of Age
  • A citizen of Kenya
  • Participants must have applied to participate before the deadline and have received a confirmation of being selected for the prequalification and for the final stages
  • Registering twice (e.g., using multiple email addresses) to participate in the event is prohibited
  • If a participant is found at any time to not meet the above requirements, she/he would not be eligible for participating in the final and/or winning prizes

group_of_people icon

Ethics

You participate in this competition as an ethical hacker and, although you might use some of the same tools used by the bad guys, there are some activities that you should not engage with. In particular, the following activities are prohibited:

  • Any activities or actions that would interfere, obstruct, or disturb other teams, participants, and event organizers
  • Spying on other teams, participants, and event organizers
  • Providing hints, clues, or answers to participants other than your own team members
  • Seeking or receiving hints, clues, or answers from participants other than your own team members – a hint or a clue provided by event organizers to all participants would be acceptable
  • Participating in multiple teams
  • Any attacks on networks and systems
  • In a nutshell: have fun and try not to cheat!

If the event organizers find any prohibited activities, they have the right to deduct points or disqualify a team. Same penalties would be applied even if event organizers find any prohibited activities before and after the competition.

Share This