// core disciplines
c.w.f is organized around three interconnected domains of adversarial knowledge and countermeasures.
Network penetration testing, vulnerability research, CTF write-ups, malware analysis, defensive operations, and cryptographic protocols. The full offensive and defensive spectrum.
Social engineering, influence operations, psychological profiling, behavioral analysis, and counter-intelligence. Understanding how decisions are shaped — and how to recognize when yours are being shaped for you.
Hardware reverse engineering, firmware extraction, embedded system exploitation, RF signal analysis, and device repurposing. If it runs on silicon, it can be understood — and rebuilt.
C.W.F was built on a single principle: the free exchange of technical knowledge makes everyone safer. Read our founding declaration.
Read the Manifesto →