The largest cybersecurity competition for young women in the Middle East, SHEHacks aims to raise awareness about information security and empower participants through skill-building opportunities and real-world experience.
Unlock Your Potential in Cybersecurity with SHEHacks: Experience Real-World Challenges, Win Prizes, and Discover Job Opportunities.

Following the success of the groundbreaking 2024 SHEHacks competition, Green Circle is proud to launch the second edition of SHEHacks in 2025. The first cybersecurity competition in the Middle East dedicated to empowering women. Building on the momentum of our previous initiatives and the remarkable achievements of last year’s participants, SHEHacks 2025 continues our mission to cultivate and elevate female talent in the cybersecurity field.

This initiative is designed to inspire young women who are passionate about cyber and information security by providing real-world challenges, professional development, and direct pathways to employment. Through this competition, we aim to equip the next generation of female cybersecurity professionals with the technical skills, confidence, and career opportunities they need to thrive in this vital industry.

Meet Our Patron

The Honorable Harry Verweij
Dutch Ambassador in Amman

We are honored to once again have Harry Verweij, the Netherlands Ambassador to Jordan, as the patron of SHEHacks. His continued support underscores the importance of empowering young women in cybersecurity and highlights the international commitment to gender inclusion in the tech sector. Ambassador Verweij’s dedication to innovation and youth development aligns closely with our mission to inspire and advance the next generation of female cybersecurity professionals, creating meaningful opportunities for women in Jordan and beyond.

About SHEHacks
SHEHacks is a competition designed to empower young women and foster gender diversity in the field of cybersecurity. Inspired by Capture the Flag (CTF) competitions, participants engage in solving security-related challenges to uncover hidden data, known as "flags." The competition is designed to test and enhance participants’ skills in key cybersecurity domains, including Cryptography, Reverse Engineering, Web Application Security, Digital Forensics, Open Source Intelligence (OSINT), and Miscellaneous challenges that encourage creative problem-solving and critical thinking.
SHEHacks, Aim To
Encourage young women to pursue careers in cybersecurity.
Provide hands-on experience and specialized training.
Enhance problem-solving and technical skills.
To create a network of young women in tech for ongoing support and collaboration.
To facilitate career opportunities and professional development.
Eligibility

SHEHacks is open to young women who are currently enrolled in universities or colleges, regardless of their field of study or academic level. Participants should be passionate about cybersecurity and motivated to expand their knowledge through hands-on challenges and real-world problem-solving. The competition welcomes students from both inside and outside Jordan who are eager to learn, collaborate, and take their first steps toward a career in the cybersecurity field.

Competition Challenges
Encryption

Participants will learn and apply encryption principles, identify and exploit weaknesses in flawed implementations, and enhance their skills in data security. The challenge aims to deepen their understanding of protecting sensitive information using various encryption techniques.

Web Exploitation/ Penetration

Websites all around the world are programmed using various programming languages. While there are specific vulnerabilities in each programming language that the developer should be aware of, there are issues fundamental to the internet that can show up regardless of the chosen language or framework.

Binary Exploitation

In this challenge players will be asked to find a vulnerability (Binaries, or executables) in the program and exploit it to gain control of a shell in order to modify the program's functions.

Reverse Engineering

In this challenge the players will be required to take a compiled (machine code, bytecode) program and convert it back into a more human readable format. Very often the goal of a reverse engineering challenge is to understand the functionality of a given program such that you can identify deeper issues.

Get to know the Organizer

Green Circle for Cyber solutions (GRCICO) is a Jordanian company, founded in 2017 by Mohammad Al-Khudari, specialized in cyber security. Green Circle is an innovative and professional organization that partners with top product vendors and partners with the aim to provide the market with the most efficient solutions in handling and managing any related topic to cyber security.

Green Circle team consists of many technical professionals and engineers with in depth experience and knowledge in the majors of cyber or information security, Risk Management, Compliance, SOC management and so on.

 

We are looking forward to hearing from you to apply to our competition and be apart of it, and hope the competition will provide you with the needed professional growth while also ensuring you are having fun, doing the things you are passionate about

Good Luck to you all, and may the best win