I’m putting together a new Jeopardy-style Capture-the-Flag event aimed squarely at seasoned competitors. I need a full suite of original, high-difficulty tasks across three pillars—Cryptography, Reverse Engineering, and Web Exploitation. Each challenge must include a clear flag format, an authoritative write-up explaining the intended solve path, and any auxiliary files, binaries, or dockerised services needed for local testing. What I’ll count as a complete delivery: • 3-5 Cryptography puzzles featuring modern primitives or clever protocol flaws, each solvable without brute-forcing. • 3-5 Reverse Engineering binaries (Linux or Windows PE) that showcase obfuscation, unusual calling conventions, or anti-debug tricks. • 3-5 Web Exploitation scenarios running in lightweight containers, demonstrating complex logic bugs or chained vulnerabilities rather than basic SQLi/XSS. Acceptance criteria 1. Every challenge must be winnable within a reasonable time by an advanced player, and impossible to script-crack with trivial automation. 2. All files compile or deploy cleanly on Ubuntu 20.04 (gcc/clang, Python3, Node or PHP 8 as appropriate). 3. Flags follow the format CTF{…} and are unique across all tasks. 4. Write-ups prove the intended exploit path and highlight potential unintended solves. I’ll test each container or binary in an isolated VM; payment milestones release once a category passes review. If you have existing private challenges that have never been publicly used, I’m open to adaptations provided they meet the above bar for originality.