List of Talks presented by Creators ( Villages, Communities, Vendors, etc)
One page Creator Talks Long List with Descriptions
“Do not obey in advance”: Cybersecurity in the Fight Against Techno-Authoritarianism Creator Talks Info |
“Robo Duck” Architecture Creator Talks Info |
“Secure AI” is 20 years old Creator Talks Info |
[Virtual] National Service Panel – CTU,BIC,MCPA Creator Talks Info |
#ReclaimTech – A community movement Creator Talks Info |
0 to Infra in 100 Days: A Nix Speedrun Creator Talks Info |
1 year of GenAI JailBreaks by 0din Creator Talks Info |
10 Lessons from the Frontlines of AI Vishing: From Zero to (Almost) Hero Creator Talks Info |
10 Years of IoT Village: Insights in the World of IoT Creator Talks Info |
12th CPV Program Committee Chitchat at the garden Creator Talks Info |
2025 Authentication Survival Guide Creator Talks Info |
6 Simple Rules for Building a Better SkyNet: AI-Powered War Planning Creator Talks Info |
7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built Creator Talks Info |
A Brief History of the Knox Box Creator Talks Info |
A Recipe for Distrust: Regularty Failure with Ballot Marking Marking Devices – Unreadable Images and Multiple Records of Each Voter’s Choices Creator Talks Info |
A Tale of Weeds and Roses: Propagating the Right Data Protection Agreements with Vendors Creator Talks Info |
A Wake-Up Call in Telecom Security: The SK Telecom Case Creator Talks Info |
Abusing the Rules: Detect and Defend Against Business Logic Attacks in APIs Creator Talks Info |
Access Control Done Right the First Time Creator Talks Info |
Access Denied: How Students Can Enforce Their Disability Rights in Education Creator Talks Info |
Aceleradores criptográficos basados en dispositivos reconfigurables (ESP) Creator Talks Info |
Adversarial mindset, thinking like an attacker is no longer optional Creator Talks Info |
Adversaries at War: Tactics, technologies, and lessons from modern battlefields Creator Talks Info |
Adversary Village kick-off keynote panel Creator Talks Info |
AI in OT Should be Cheaper Than in IT Creator Talks Info |
AI Red Teaming as an Evaluation Process Creator Talks Info |
AI Red Teaming for Everyone Creator Talks Info |
AI vs. the APTs: Using LLMs to discover malware and undisclosed vulnerabilities Creator Talks Info |
Airborne WiFi – Rouge Waves in the Sky Creator Talks Info |
Airport Security! – S01 E008 – Breaking into your baggage Creator Talks Info |
All You Need Is a Fuzzing Brain: A Retrospective Creator Talks Info |
All your keyboards are belong to us! Creator Talks Info |
Alternative Entry Points Creator Talks Info |
Amplifying Phishing Attacks with Generative AI (POR-ESP) Creator Talks Info |
An update from the LLM scaling laws frontier Creator Talks Info |
Anatomy of a Crypto Scam Creator Talks Info |
Anotomy of Telecom Malware Creator Talks Info |
Antenna Building: Make Your Own LoRa Yagi and VHF Foxhunt Loop Workshop Creator Talks Info |
Applying DevSecOps Lessons to MLSecOps Creator Talks Info |
ARTIPHISHELL Intelligence Creator Talks Info |
Assembly Alchemy: From Opcodes to Exploits Creator Talks Info |
Assessing the Capabilities Gap Between Foundation Models and Cybersecurity Experts: Benchmarks, Safeguards, and Policy Creator Talks Info |
At the World’s End: Quantum Resource Estimation Creator Talks Info |
Audit This: Breaking Down Bias in the Cyber Stack Creator Talks Info |
Auths Gone Wild: When ‘Authenticated’ Means Anyone Creator Talks Info |
Autoformatting with Nix in Neovim Creator Talks Info |
Autonomous System Demo Creator Talks Info |
Autonomous Video Hunter: AI Agents for Real-Time OSINT Creator Talks Info |
AzDevRecon – Azure DevOps Enumeration Tool Creator Talks Info |
Back to Basics: Building Resilient Cyber Defenses Creator Talks Info |
Badgelife Panel: Lessons from Years of Do’s, Don’ts, and Last-Minute Saves Creator Talks Info |
BadVR: Signals Everywhere a collaboration with XR Village Creator Talks Info |
Banxhil y la autopsia a un RAT modular en Java (ESP) Creator Talks Info |
Bare Metal Reverse Engineering Creator Talks Info |
Behind the Badge: How We Used and Abused Hardware (again) to Create the AV Badge for DC33 Creator Talks Info |
Behind The Dashboard – (Lack Of) Automotive Privacy Creator Talks Info |
Better AppSec through better DevEx Creator Talks Info |
Beyond Assistants: Securing Agentic AI Systems and Multi-Agent Workflows in High-Stakes Environments Creator Talks Info |
Beyond CTFs: Evaluating AI Cyber capabilities in Real-World Environments Creator Talks Info |
Beyond the Stack: How External Failures Impact Payments Security Creator Talks Info |
Beyond Vibe Coding: Building Reliable AI AppSec Tools Creator Talks Info |
Beyond Watermarks: What Security’s Past Can Teach Us About Sythetic Content’s Future Creator Talks Info |
Bio-Cryptography is the Game-Genie in a post quantum dystopia Creator Talks Info |
BIPOC of Queercon Creator Talks Info |
Biting into the forbidden fruit: how the EU’s Digital Markets Act breaks open walled gardens Creator Talks Info |
Blind Trailer Shouting (Car Hacker’s Version) Creator Talks Info |
Blue Team Careers: Battle the Job Market and Get Hired (A BTV Interactive Panel) Creator Talks Info |
Blue Team Village Closing Remarks Creator Talks Info |
Blue Team Village Robs a Bank Creator Talks Info |
Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors Creator Talks Info |
Boarding the VSAT: Real-World Exploits, Testbed Validation, and Policy Gaps in Maritime Connectivity Creator Talks Info |
Braving the Storm-2372: The Tempest Decoded Creator Talks Info |
Brazil’s aPIXcalypse – How real time payments turned Brazilian threat scenario into a nightmare Creator Talks Info |
Break Systems, Not Promises: I promised to do a keynote at DEF CON Creator Talks Info |
Breaking In: Real Paths Into Cybersecurity from Hackers, Humans, and Hiring Pros Creator Talks Info |
Breaking Secure Boot: Exploiting GRUB2’s Forgotten Attack Surface (and other bootloaders) Creator Talks Info |
Breaking the Black Box: Why Testing Generative AI Is Full Spectrum Creator Talks Info |
Breaking the Chain: Advanced Offensive Strategies in the Software Supply Chain Creator Talks Info |
Breaking the CI/CD Chain: Security Risks in GitHub Actions Creator Talks Info |
Buckle Up, Buttercup – Our Experience Competing in AIxCC Creator Talks Info |
Bug Bounty Village CTF Walkthrough Creator Talks Info |
Bug Bounty Workshop Creator Talks Info |
Build your own OS Creator Talks Info |
Building an accessible cyber conference Creator Talks Info |
Building Local Knowledge Graphs for OSINT: Bypassing Rate Limits and Maintaining OPSEC Creator Talks Info |
Building the Cross-Cloud Kill Chain: A DE’s Playbook for AWS, Azure & GCP Detections Creator Talks Info |
Burning, trashing, spacecraft crashing: a collection of vulnerabilities that will end your space mission Creator Talks Info |
Byte-Sized Basics: A Beginner’s Guide to x86 Assembly Creator Talks Info |
Call a Vendor? How MSPs/MSSPs Do (and Don’t) Help High-Risk Communities Creator Talks Info |
Car Hacking Village Capture the Flag (CTF) – Results Announcement Creator Talks Info |
Carding is Dead, Long Live Carding: How MaaS is fueling NFC relay attacks Creator Talks Info |
CARVER Vulnerability Analysis and the U.S. Voting System Creator Talks Info |
Chained Exploits: The Silent Takeover Creator Talks Info |
Challenges and Lessons from the AIxCC Journey: A Perspective from 42-b3yond-6ug Creator Talks Info |
Cheat Code for Hacking on T-Mobile: From Inside the TMO BBP Perspective Creator Talks Info |
Chelonia: End-to-End Encryption For Every App Creator Talks Info |
China’s Health Sector Ambitions and Information Needs: Implications for U.S. Health Care Cyber Defense Creator Talks Info |
Classical Problems with Quantum Cryptography Creator Talks Info |
Cloned Vishing: A case study Creator Talks Info |
Cloud Village Closing Creator Talks Info |
Cloud Village Opening Creator Talks Info |
Coating your PCBs Creator Talks Info |
Cognito, Ergo Some Extra Permissions Creator Talks Info |
Command and KubeCTL: Kubernetes Security for Pentesters and Defenders Creator Talks Info |
Common Cause NY and The Black Insitute’s Legal Challenge to the ExpressVote XL’s use of barcodes to record votes Creator Talks Info |
Common Threads Creator Talks Info |
Common Threads Creator Talks Info |
Compromising Threat Actor Communications Creator Talks Info |
Connected Car Attack Surface Mapping: OSINT Techniques for Automotive Threat Intelligence Creator Talks Info |
Context Aware Anomaly Detection in Automotive CAN Without Decoding Creator Talks Info |
Contextualizing alerts & logs at scale without queries or LLMs (opensource) Creator Talks Info |
Countering Forensics Software by Baiting Them Creator Talks Info |
Cracking Chaos: Making, Using, and Breaking PRNGs Creator Talks Info |
Creating a Ham Radio IP Network with AREDN Software Creator Talks Info |
Creating a Virtual Ship Environment Optimized for Cybersecurity Use Creator Talks Info |
Crises Precipitate Change, Tools for Success Creator Talks Info |
Critically Neglected: Cybersecurity for buildings Creator Talks Info |
Cross-Site WebSocket Hijacking in 2025: Exploitation, Evolution, and Mitigation Creator Talks Info |
Crossing the Line: Advanced Techniques to Breach the OT DMZ Creator Talks Info |
Crypto Privacy Village: Closing Remarks Creator Talks Info |
Crypto Privacy Village: Welcome Creator Talks Info |
Cryptocurrency Opening Keynote Creator Talks Info |
Cryptography is hard: Breaking the DoNex ransomware Creator Talks Info |
CTF 101 Creator Talks Info |
CTI-Agent: Automated battlecards from CTI reports Creator Talks Info |
Cultivating the Adversarial Mindset, Offensive Cyber security and the Power of Security Communities Creator Talks Info |
CVE Crisis: State of the Vulnerability Disclosure Landscape Creator Talks Info |
Cyber 101 Talk Creator Talks Info |
Cyber Gamechangers: Women Who Lead, Secure, and Inspire Creator Talks Info |
Cyber Policy 101: Packets Hit Politics Creator Talks Info |
Cyber Threat Intelligence 101: From Foundations to AI‑Driven Defense Creator Talks Info |
Cybersecurity Career Fireside Chat: Offensive Security Creator Talks Info |
Cybersecurity in Latin America: The Untold Stories of Resilience & Innovation Creator Talks Info |
Cypherpunk Java with Nix Creator Talks Info |
Dark Capabilities: When Tech Companies Become Threat Actors Creator Talks Info |
Darknet-NG: Mesh Communications with your Community Creator Talks Info |
DCGVR Opening Statement Creator Talks Info |
DCNext Gen Closing Ceremonies Creator Talks Info |
DDoS: The Next Generation Creator Talks Info |
Dead Reckoning: Hijacking Marine Autopilots Creator Talks Info |
Deceit by Design: Exploiting the Lies CPUs Tell During Execution Creator Talks Info |
Deconstructing Malware Lineage with Graph Neural Networks Creator Talks Info |
Deepfake Image and Video Detection Creator Talks Info |
DEF CON Groups (DCGs): Keeping the Signal Alive All Year Long Creator Talks Info |
Defense Against The Dark Arcs: Teaching kids to create magic Creator Talks Info |
Deploying Deception in Depth for ICS Creator Talks Info |
Desktop Applications: Yes, We Still Exist in the Era of AI!!! Creator Talks Info |
Digging Deeper: Reflections on the TRBR and EVEREST Studies on behalf of the California and Ohio Secretaires of State Creator Talks Info |
Digital Casualties: Documenting Cyber-Induced Patient Harm in Modern Healthcare Creator Talks Info |
Digital First Responders: Fixing Patient Safety Gaps with Smart Tech & AI Creator Talks Info |
Digital Forensics 101: Investigating Compromised Machines Creator Talks Info |
Disclosure Encounters of a New Kind: Building the CVE Program of the Future Creator Talks Info |
Discord OSINT: An Empathic Banana and a Data Scraper Walk into a Search Bar Creator Talks Info |
Do Scammers dream of electric Phish? Lessons learned from deploying AI-driven phishing ops Creator Talks Info |
Doing toolchains declaratively Creator Talks Info |
Domain Fronting in 2025: a retro analysis Creator Talks Info |
Dominion ICX Touchscreen; Simple Hacks and Daunting Recoveries Creator Talks Info |
Don’t trust Rufus, he’s a mole – introducing KIEMPossible Creator Talks Info |
Don’t Cry Wolf: Evidence-based assessments of ICS Threats Creator Talks Info |
Don’t Just Trust Always Verify – A Review of Post-Election Audits in Swing States in the 2024 Elections Creator Talks Info |
Doom and Gloom Answer Your SOC Questions Creator Talks Info |
Doors, Cameras, and Mantraps: OH MY! Creator Talks Info |
Dory, Is That You? The AI Travel Agent with Short-Term Memory Loss Creator Talks Info |
Drain and Approval Attacks Creator Talks Info |
Driver Abuse: Evasión de Antivirus mediante un Driver legítimo (ESP) Creator Talks Info |
Driving Tech Forward: A Fireside Chat with Perri Adams and Alexei Bulazel Creator Talks Info |
Ducking Gatekeepers, Becoming Game Changers: From Asking Permission to Full Ownership Creator Talks Info |
EduQ: A DIY Self-Education Platform for Hackers to Break, Build, and Experiment with Quantum-Secured Networks Creator Talks Info |
Elevators 101 Creator Talks Info |
Enshittification: It’s Over 9000 Creator Talks Info |
enumeraite: AI assisted web attack surface enumeration Creator Talks Info |
Escaping the Privacy Sandbox with Client-Side Deanonymization Attacks Creator Talks Info |
Estrategias de Ciberengaño: ¿Donde está mi honeypot? (POR) Creator Talks Info |
Evidence Based Elections and Software Independence Creator Talks Info |
Evolution of telecommunication attacks and future trends – a vendor perspective Creator Talks Info |
Examining Access Control Vulnerabilities in GraphQL – A Feeld Case Study Creator Talks Info |
Exploitable In The Wild CVE Appears! But Should We Fix Them All? Creator Talks Info |
Exploiting Expectations: A Beginner’s Guide to Buffer Overflows Creator Talks Info |
Exploiting the Off-chain ecosystem in Web 3 Bug Bounty Creator Talks Info |
Exploring The Possibilities of Azure Fabric Abuses Creator Talks Info |
Exposing Infosec Frauds and Foreign Agents Behind Mercenary Spyware Disinformation Creator Talks Info |
Families of Queercon Creator Talks Info |
Fear vs. Physics: Diagnosing Grid Chaos Creator Talks Info |
Fighting the Digital Blockade: A View from Taiwan Creator Talks Info |
Fingerprinting Maritime NMEA2000 Networks Creator Talks Info |
Fingerprinting Maritime NMEA2000 Networks Creator Talks Info |
Fireside Chat – Lessons for the younger me. Creator Talks Info |
Firmware Decryption: For, and By, the Cryptographically Illiterate Creator Talks Info |
Flipping Locks – Remote Badge Cloning with the Flipper Zero and More Creator Talks Info |
Forging Strong Cyber Communities in Uncertain Times Creator Talks Info |
Format Fu: The Way of the Percent Sign Creator Talks Info |
From adversarial to aligned, redefining purple teaming for maximum impact Creator Talks Info |
From Cheat Engine to GPT: AI Hacks So Good, You’ll Get Banned IRL Creator Talks Info |
From Dare to Discovery: How OSINT and Modern Recon Techniques Uncovered a Global VPN Infrastructure Creator Talks Info |
From Data Security to Discovery: How ARPA-H is Using AI to Transform Health Care in America Creator Talks Info |
From One-Shot Red Teams to Continuous AI Security: Building Scalable Evaluation with Inspect Cyber Creator Talks Info |
From Prompt to Pwn: Un viaje por el OWASP Top 10 para LLMs (ESP) Creator Talks Info |
From Pwn to Plan: Turning Physical Exploits Into Upgrades Creator Talks Info |
From Solo Nix to Team Infrastructure: Deploying NixOS with Clan Creator Talks Info |
From Tests to Targets: Expanding DAST with Selenium & ZAProxy Creator Talks Info |
From the Other Side: Bug Bounty Platforms on Triage Challenges and Solutions Creator Talks Info |
From Wake Island to the War Room: A Black Cyber Leader’s Path to Purpose Creator Talks Info |
Full Court Press: How Basketball Officiating Shaped a Cybersecurity Career Creator Talks Info |
Full Disclosure, Full Color: Badge-making story of this year’s BBV badge Creator Talks Info |
Fundamentals of Election Technology Security Creator Talks Info |
Game Hacking 101 Creator Talks Info |
Geopolitical Cyber Topic Survey Results Panel Creator Talks Info |
Getting Caught in Offensive Security Creator Talks Info |
Getting into CTF Creator Talks Info |
Getting to Top 250 on HtB with Nix and LLMs Creator Talks Info |
Global DCGs: Chaos, Connection, and Community – The 2025 State of the Hack Creator Talks Info |
Go Malware Meets IoT: Challenges, Blind Spots, and Botnets Creator Talks Info |
Going from Breadboard to PCB with KiCAD Creator Talks Info |
Gold Bug: Puzzle Panel with Friends Creator Talks Info |
Gold Bug: Welcome Creator Talks Info |
Grandoreiro & friends: brazilian banking trojans tour outside Latin America Creator Talks Info |
Growing Red Team Village: What We’ve Learned Building an Offensive Security Community Creator Talks Info |
Hack Our Shirt Creator Talks Info |
Hack the Code (of Practice): Protecting Responsible Hackers Creator Talks Info |
Hacker vs. Triage: Inside the Bug Bounty Battleground Creator Talks Info |
Hackers Welcome: How One Government Agency Got It Right Creator Talks Info |
Hacking a head unit with malicious PNG Creator Talks Info |
Hacking Back to School: How states, hackers, and civil society can support K-12 cybersecurity when federal support wavers Creator Talks Info |
Hacking Context for Auto Root Cause and Attack Flow Discovery Creator Talks Info |
Hacking Hotel Locks; The Saflok Vulnerabilities Expanded Creator Talks Info |
Hacking phones for Linux: Introduction to postmarketOS Creator Talks Info |
Hacking Reality: HoloConnect AI and the Rise of Offline Holograms in Medical Devices Creator Talks Info |
Hacking Space to Defend It: Generating IoBs with SPARTA Creator Talks Info |
Hacking the Edge: Real-World ESI Injection Exploits Creator Talks Info |
Hacking the Final Frontier: Offensive Security in Aerospace and Satellite Systems (ESP) Creator Talks Info |
Hacking the First Amendment: A press photographer’s perspective on Red Teaming scenarios Creator Talks Info |
Hacking the Nautical Rules of the Road: Turn Left for Global Pwnage Creator Talks Info |
HAM RADIO VS. OPPRESSION – HOW THE AIRWAVES DEFY CENSORSHIP Creator Talks Info |
Handcuffs for beginners Creator Talks Info |
Hard Hat Brigade Creations Q&A Creator Talks Info |
Hard Hat Brigade Organizer Panel Creator Talks Info |
Here and Now: Exploiting the Human Layer at the Right Moment Creator Talks Info |
Hijacking AI Agents with ChatML Role Injection Creator Talks Info |
History and Significance of the Top to Bottom Review (TTBR) and the Post Election Audit Standars Working Group (PEASWG) Creator Talks Info |
Hooks and Hooks: How AI Is Revolutionizing Both Phishing Attacks and Our Defenses Creator Talks Info |
How AI + Hardware can Transforming Point-of-Care Workflows Creator Talks Info |
How API flaws led to admin access to over 1,000 USA dealers and control over your car Creator Talks Info |
How Computers Kill People: Marine Systems Creator Talks Info |
How Extra Features In Contactless Payments Break Security And What We Can Do About it. Creator Talks Info |
How Ham Radio supported 911 25 years Creator Talks Info |
How Not to IoT: Lessons in Security Failures Creator Talks Info |
How NOT to Perform Covert Entry Assessments by WeHackPeople.com Creator Talks Info |
How the DMCA Security Research Exemption Affects Election Security Research Creator Talks Info |
How to Become One of Them: Deep Cover Operations in Cybercriminal Communities Creator Talks Info |
How We Protect Cat Memes from DDoS Creator Talks Info |
How zkVMS and zkTLS Transform Exploit Markets Creator Talks Info |
Hull Integrity: Applying MOSAICS to Naval Mission Systems Creator Talks Info |
Human factors and safety critical aspects of man-machine interfaces Creator Talks Info |
Hung out to dry: Airing the dirty laundry of stored value washing cards Creator Talks Info |
Hunting Advanced Mobile Vulnerabilities with AI Creator Talks Info |
Hypervisor Hangover: Persistence Mechanisms on ESXi Creator Talks Info |
I Can’t RE (and You Can Too!) Creator Talks Info |
Identity Crisis: The Unmanaged World of Azure Managed Identities Creator Talks Info |
Illuminating the Dark Corners of AI: Extracting Private Data from AI Models and Vector Embeddings Creator Talks Info |
Implementing AI in Security Teams: Lessons from the Trenches Creator Talks Info |
Impossible Until It Isn’t: DARPA, Disruption, and the Future of Cyber Creator Talks Info |
Incident Response 101: What Happens After the Hack? Creator Talks Info |
InfoSecMap: El nexo global de eventos y comunidades de InfoSec Creator Talks Info |
Inside the Shadows: Tracking RaaS Groups and Evolving Cyber Threats Creator Talks Info |
Intro to Common Industrial Protocol Exploitation Creator Talks Info |
Intro to Lockpicking Creator Talks Info |
Intro to Physical Security Bypass Creator Talks Info |
Intro to Quantum Sensing Creator Talks Info |
Intro to village Creator Talks Info |
Introduction of Loong Community & Financial Identity crime (deepfake) regulation of diferetn jurisdictions Creator Talks Info |
Investigating Foreign Tech from Online Retailers Creator Talks Info |
Is End-to-End-Verifiability an Internet Voting Magic Bullet? A Perspective for Policymakers Creator Talks Info |
Is it Safe Yet? A Discussion on the Fundamental Security Profile of Internet Voting and its Use Today Creator Talks Info |
It Came From Space Creator Talks Info |
It’s Not Safe Yet Creator Talks Info |
KeePass, weaponized Creator Talks Info |
KEYNOTE: Attack Surface in Motion: Why Today’s Threats Don’t Knock First Creator Talks Info |
Keynote: Attacking AI Creator Talks Info |
La Villa – Opening Seremony 0din Presentation Creator Talks Info |
Laser Fault Injection Creator Talks Info |
Latin America: The perfect ransomware playground (ESP) Creator Talks Info |
Latinas en Cyber Creator Talks Info |
Layer-2 Liberation: Weird & Wonderful Things Your AP Never Dreamed Of Creator Talks Info |
Learn Nix the Fun Way Creator Talks Info |
Legal Entity-Driven Reconnaissance with OWASP Amass: Enhancing Bottom-Up Discovery Using RDAP Creator Talks Info |
Let AI Auto-Generate Neural-ASR Rules for OT-specific Attacks via NLP Approach Creator Talks Info |
Letthemin: Facilitating High-Value Purple Teams Using an Assumed Compromise Approach Creator Talks Info |
Lightning Talks and Unconference Creator Talks Info |
Lightning Talks and Unconference Creator Talks Info |
Living off the Graph: Module-less Azure Recon & Exploitation via PowerShell Creator Talks Info |
Locked Down, Not Locked Out: How I Escaped Your Secure Operator Workstation Creator Talks Info |
Magical Hacks Creator Talks Info |
Magnets, how do they work? Creator Talks Info |
Making Dirty Pictures – The Issue with DICOM Creator Talks Info |
Making Of The Arcanum Gospel Book Badge Creator Talks Info |
Making SAOs for Fun and No Profit Creator Talks Info |
Malware In 5G Core Creator Talks Info |
Malware in the gist: How malicious packages on npm bypass existing security tools Creator Talks Info |
Malware Matryoshka: Nested Obfuscation Techniques Creator Talks Info |
Mapping the Shadow War – From Estonia to Ukraine Creator Talks Info |
MassLogger: The Infostealer That Knows Your Passwords Better Than You Do (ESP) Creator Talks Info |
Master Keying: privilege escalation on your key ring Creator Talks Info |
Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android Creator Talks Info |
May the Least Privilege Be With You: Exposing the Dark Side of Azure Service Principal Permissions Creator Talks Info |
Maybe A Few Hydra Failures Creator Talks Info |
Maybe A Few Hydra Failures Creator Talks Info |
McJump Box: Leveraging Free Corporate WiFi and 802.11AH for Unattributable Fun and Profit Creator Talks Info |
Memory Attacks in a Stateless World Creator Talks Info |
Mesh Network Sidecars for NixOS Services Creator Talks Info |
Meshtastic Command & Control Creator Talks Info |
Meshtastic Command & Control Creator Talks Info |
Meshtastic Under the Microscope: From Chirps to Chat Creator Talks Info |
Meshtastic: Mesh Networking Made Easy with LoRa and ESP32 Creator Talks Info |
MFT2: More Fungible Threats Creator Talks Info |
MHV CTF – Closing and Awards Creator Talks Info |
MHV CTF 101 Creator Talks Info |
MHV CTF Recap – Daily Creator Talks Info |
MHV Overview 101 Creator Talks Info |
Mind vs. Machine: Finding the Sweet Spot in Modern Red Teaming Creator Talks Info |
Misaligned: AI Jailbreaking Panel Creator Talks Info |
MITRE eCTF: 10 Years of the Embedded Capture the Flag Creator Talks Info |
Mobile Pentest Survival Guide Reloaded (ESP) Creator Talks Info |
Modern defenses, ancient problems! Why adversaries can still break cyber defenses Creator Talks Info |
Modern Odometer Manipulation Creator Talks Info |
Modern warfare and nation state sponsored cyber threat actors Creator Talks Info |
Money for Nothing: Med Tech SBIR Grants are Easier than You Thought Creator Talks Info |
Moonlight Defender – Purple Teaming in Space! Creator Talks Info |
Naomi Brockwell Saves Us From the Internet Again! Creator Talks Info |
Navigating the Invisible Creator Talks Info |
Network tokens Creator Talks Info |
Networking 101 Creator Talks Info |
Never enough about cameras – The firmware encryption keys hidden under the rug Creator Talks Info |
Nix Vegas Opening Ceremony Creator Talks Info |
Nix Vegas Unconference Creator Talks Info |
No Brain No Gain Creator Talks Info |
No IP, No Problem: Exfiltrating Data Behind IAP Creator Talks Info |
No Radios, No Problem: Hacking WiFi in a Virtual World Creator Talks Info |
No Server, No Cry: the Ups and Downs of Building a Scalable Security Serverless Platform Creator Talks Info |
No Spook Leaves Randomness to Chance Creator Talks Info |
NO-HAVOC today, NO-HAVOC tomorrow Creator Talks Info |
Non-Binary at Queercon Creator Talks Info |
North Korea’s Fur Shop: Poaching for Otters, Beavers, Ferrets and Capybaras Creator Talks Info |
NOVA: The Prompt Pattern Matching Creator Talks Info |
O2 Case Study Creator Talks Info |
Oblivious computation, from theory to practice Creator Talks Info |
Of Stochastic Parrots and Deterministic Predators: Decision-Making in Adversarial Automation Creator Talks Info |
Off-Grid Datarunning in Oppresive Regimes: Sneakernet and Pirate Box Creator Talks Info |
Old SOC, new tricks: An immersive AI/ML workshop for effective tool adoption Creator Talks Info |
One Modem to Brick Them All: Exploiting Vulnerabilities in the EV Charging Communication Creator Talks Info |
Open Source Cellular Test Beds for the EFF Rayhunter Creator Talks Info |
OpenVPN: the long journey from user to kernel space Creator Talks Info |
Operational Twilight: APTs, OT, and the geopolitics of a dying climate Creator Talks Info |
Orchestrating the Reasoners Creator Talks Info |
OSINT 101 Creator Talks Info |
OSINT Against the Machine: Fighting AI-Generated Disinformation Creator Talks Info |
OSINT Enabled Ghost Mode: Counter-Surveillance for Everyday People Like Us Creator Talks Info |
OSINT Signals Pop Quiz! Creator Talks Info |
OT Network Segmentation Planning, Implementation, and Validation Creator Talks Info |
Painting with Ransomware Creator Talks Info |
Panel Discussion – The State of OSINT in 2025: The technical Arms Race Creator Talks Info |
Panel Discussion Bug Bounty Creator Talks Info |
Panelizing PCBs: It’s Exciting I Swear Creator Talks Info |
Parser Goes Rogue: Tree-Sitter’s Hidden Superpowers Creator Talks Info |
Passing the Torch: Mentoring and Protecting Our Students in Education Spaces Creator Talks Info |
Passive and Active Attacks on TPMS Systems Creator Talks Info |
Passkeys in payments Creator Talks Info |
Pentester Blueprint Creator Talks Info |
PentestGPT: El Arte de Hackear con Palabras (ESP) Creator Talks Info |
Pentesting AI – Hacking the GPTs (ESP) Creator Talks Info |
People as the Payload: OSINT Tactics for Identity Tracing, Social Graphing, and Executive Recon Creator Talks Info |
Petty Proteins: When Molecules Go Rogue — And Why Cyberbiosecurity Needs You Creator Talks Info |
PhishOps like an APT: Simulando Adversarios para el Acceso Inicial (ESP) Creator Talks Info |
Pick Up Your Feelings: The Effects of Bias and Subjectivity in Threat Assessments and Cybersecurity Creator Talks Info |
Pirates of the North Sea Creator Talks Info |
Plain TXT, Malicious Context: Uncovering DNS Malware Creator Talks Info |
Plug and Prey: Scanning and Scoring Browser Extensions Creator Talks Info |
Plug at Your Own Risk: End-to-End Security Analysis for Third-Party IoT Integrations Creator Talks Info |
Plugins Gone Rogue: Attacking Developer Environments Creator Talks Info |
Plumbing The Plumber: A Playbook for Integration Servers Creator Talks Info |
PolyCon Creator Talks Info |
Post-Quantum Panic: When Will the Cracking Begin, and Can We Detect it? Creator Talks Info |
Pre-Identifying DNS Wildcards: A New Standard of Care Creator Talks Info |
Predator Mode: Threat Hunting from First Hunts to Final Bosses Creator Talks Info |
Pretty Good Pivot: Examining the PGP Key Pair Creation Habits of Dark Net Vendors Creator Talks Info |
Privacy Accelerationism: Fighting for the Future of Privacy Creator Talks Info |
Privacy is Dead: The Threat of Criminal PII Search Panels (ESP-POR) Creator Talks Info |
Privacy on a Shoestring: Crypto Challenges in Local Government Creator Talks Info |
Private, Private, Private: Access Everywhere Creator Talks Info |
Professionally Dangerous: Ask the Experts in Vulnerability Research Creator Talks Info |
Project Obsidian: Defending the Kill Chain, Building a Cloud-Native CTF for Blue Teamers Creator Talks Info |
Prompt. Scan. Exploit: AI’s Journey Through Zero-Days and a Thousand Bugs Creator Talks Info |
Protect Your Privacy Online and on the Streets with EFF Tools Creator Talks Info |
Protecting Election Researchers Globally: Legal Gaps and Lessons from the Global South Creator Talks Info |
Pwn My Ride: Jailbreaking Cars with CarPlay Creator Talks Info |
QRAMM: The Cryptographic Migration to a Post-Quantum World Creator Talks Info |
Quantum Authentication Protocol Creator Talks Info |
Quantum Computing Intro Creator Talks Info |
Quantum Modular Whiteboxes: Join the Stack Hack Creator Talks Info |
Quantum Security: An overview with worked examples Creator Talks Info |
Quantum-Resistant Healthcare Creator Talks Info |
Qubit Crosstalk Attacks in Cloud-Based Quantum Computers Creator Talks Info |
Queercon Bibliophiles and CinemaGeeks Creator Talks Info |
Queercon Locals Creator Talks Info |
Queercon Volunteer Training Creator Talks Info |
Queercord Tech-Talk Channel Creator Talks Info |
Quickstart for a Breach! When Official Installations Expose Your K8 and Your Cloud Creator Talks Info |
Quiet Confidence: An Introvert’s Journey to Technical Public Speaking Creator Talks Info |
r/DIY: How Do We Build Our Own Code Scanning Platform? Creator Talks Info |
Race Against the Machine Creator Talks Info |
Rayhunter Internals Creator Talks Info |
RBAC Atlas: Mapping Real-World Kubernetes Permissions and Exposing Risky Projects Creator Talks Info |
Real life hacker stories (that can’t be recorded!) Creator Talks Info |
Rebuild The World: Access to secure software dependency management everywhere with Nix Creator Talks Info |
Reconfigurable HSMs: Future-Proofing Hardware Security Against Evolving Threats Creator Talks Info |
Red Alerts and Blue Oceans: Incident Response from a Sysadmin’s War Room in Maritime Ops Creator Talks Info |
Red Russians: How Russian APT groups closely follow offensive security research Creator Talks Info |
Red Teaming AI: How to Stress-Test LLM-Integrated Apps Like an Attacker Creator Talks Info |
Red teaming fraud prevention systems with GenAI Creator Talks Info |
Red Teaming Space: Hacking the Final Frontier Creator Talks Info |
Red-for-Blue: Fortifying Applications through Actionable Red-Teaming Creator Talks Info |
Referral Beware, Your Rewards Are Mine Creator Talks Info |
Regex For Hackers Creator Talks Info |
Reproduce This Build: How we built the Nix Badge Creator Talks Info |
Resilient and Reconfigurable Maritime Comms. Creator Talks Info |
Restless Guests: From Subscription to Backdoor Intruder Creator Talks Info |
Retos de Offensive Security en LATAM Creator Talks Info |
Reverse Engineering Marine Engines: How to make powerboats do your bidding Creator Talks Info |
Right to Repair: The Latest Creator Talks Info |
Risk and payments across the ecosystem Creator Talks Info |
Risk Limiting Audits: What They Are and What They Aren’t Creator Talks Info |
Robin: The Archaeologist of the Dark Web – Because Manual Dark Web OSINT is So Last Season Creator Talks Info |
Rooting a Hikvision Camera via Firmware Modification Creator Talks Info |
Rooting the Rootless: Kernel Tactics to Nullify RASP Protections Creator Talks Info |
Roundtable Cyber JV Creator Talks Info |
Running a Software Defined Radio Capture the Flag using challengectl Creator Talks Info |
Rust/C Interop & Multiplatform Creator Talks Info |
Safeguarding the Industrial Frontier: OT SOC & Incident Response Creator Talks Info |
Salt Tyfoon APT Creator Talks Info |
Satellite Networks Under Siege: Cybersecurity Challenges of Targeted DDoS Attacks Creator Talks Info |
Scaling Bug Hunting in Open Source Software Creator Talks Info |
Scamming the Scammers: Weaponizing Open Source Against Pig Butchering and Organized Crime Creator Talks Info |
Secret Life of an Automationist: Engineering the Hunt Creator Talks Info |
Secure Code Is Critical Infrastructure: Hacking Policy for the Public Good Creator Talks Info |
Secure SDLC Roundtable: Scratch The Duct Tape Creator Talks Info |
Securing Intelligence: How hackers are breaking modern AI systems … and how bug bounty programs can keep up Creator Talks Info |
Securing the 5G Core Service-Based Architecture Creator Talks Info |
Security Research: OpenAI’s reflections and direction Creator Talks Info |
Sh*t Show Triage: An Honest Panel on Incident Response Creator Talks Info |
Silent Sabotage: How Nation-State Hackers Turn Human Error into Catastrophic Failures Creator Talks Info |
SkyHijack: Breaking Trust in the Satellite Chain) Creator Talks Info |
Smart Bus Smart Hacking: From Free WiFi to Total Control Creator Talks Info |
Smart Devices, Dumb Resets? Testing Firmware Persistence in Commercial IoT Creator Talks Info |
Smashing the Sandbox: Inside DBatLoader’s Unique Evasion Techniques Creator Talks Info |
SMS from No Where Creator Talks Info |
So What The Heck Is This Radio Stuff Anyway? Creator Talks Info |
So you want to make a badge? Badge Creation 101, from SAO to full #badgelife Creator Talks Info |
Social Engineering Community Village Greeting and 2025 Badge Overview Creator Talks Info |
Sometimes you find bugs, sometimes bugs find you Creator Talks Info |
Source to Scale: Using Nix to Deploy Secure, Self-Hosted Data Lakehouses Creator Talks Info |
Spotter – Universal Kubernetes Security Engine Creator Talks Info |
SquarePhish 2.0 – Turning QR Codes into Entra ID Primary Refresh Tokens Creator Talks Info |
SSH Honeypots and Walkthrough Workshops: A History Creator Talks Info |
State of (Absolute) AppSec Creator Talks Info |
State of Open Source in the Federal Government Creator Talks Info |
State of the Evals: Lessons from U.S. CAISI’s Evaluations of Cyber Capabilities and Security in AI Models Creator Talks Info |
State of the Pops: Mapping the Digital Waters Creator Talks Info |
Sticky Privacy: Stickering Re-Identification & Manufacturing Stickers Creator Talks Info |
Storytellers: Ethical Hackers in the Digital Spotlight Creator Talks Info |
Supply Chain Mismanagement: How to embarrass yourself on your first project Creator Talks Info |
Surviving the Dataclysm: Resistance through Resilience Creator Talks Info |
Sweet Deception: Deploying Honeypots and Honey Tokens in Microsoft 365 Creator Talks Info |
T-Minus 24 Hours: From Source to Spaceflight in a Single Day Creator Talks Info |
Tactical Flipper Zero: You Have 1 Hour and No Other Equipment Creator Talks Info |
Take all my money – penetrating ATMs Creator Talks Info |
Takes All Kinds: Building Onramps for Emergency Web Archiving in Ukraine and Beyond Creator Talks Info |
Teaching Your Reverse Proxy to Think: Fingerprint-Based Bot Blocking & Dynamic Deception Creator Talks Info |
Team Atlanta’s Takeaways from DARPA’s AIxCC Creator Talks Info |
Telecom Village Inugration Creator Talks Info |
TencentGoat: An Intentionally Vulnerable Tencent Cloud Environment Creator Talks Info |
Terminal Tactics for Beginners: A Hacker’s Guide to Command Line Mastery Creator Talks Info |
Testing 1, 2, 3 Testing: Automatically Finding and Fixing Software Vulnerabilities at Scale and Speed Creator Talks Info |
Testing Trust Relationships: Breaking Network Boundaries Creator Talks Info |
The “Fortress Island” of Voting System Physical Security Creator Talks Info |
The African Cybercrime Economy: Inside the Playbooks of Digital Hustlers Creator Talks Info |
The AppSec Poverty Line: Minimal Viable Security Creator Talks Info |
The AppSec Program I Regret Building Creator Talks Info |
The Ars0n Framework V2 Beta Creator Talks Info |
The Art of Creating Vulnerable Machines Creator Talks Info |
The Beauty of Reversing Swift Malware Creator Talks Info |
The Challenge with Designing Challenging Challenges Creator Talks Info |
The challenges of Sub-dermal Payments Creator Talks Info |
The CMS.gov OSPO One Year Later: Launching the Agency’s First Bug Bounty! Creator Talks Info |
The Cookie Heist: How Cybercriminals Are Outsmarting Chrome’s Latest Defenses Creator Talks Info |
The cost of deepfakes: expanding on the implications of generated and manipulated media Creator Talks Info |
The creation of the Malmongotchi badge Creator Talks Info |
The CVE – Hunters Project: From Curiosity to Impact Creator Talks Info |
The Death of XSS? Browser Security Features that Eliminate Bug Classes Creator Talks Info |
The depths that marketers will plummet to Creator Talks Info |
The Devil Wears Headsets Creator Talks Info |
The Hidden Path to Root: Shadow Resources, Roles, and AWS Service Exploits Creator Talks Info |
The Human Vulnerability: Social Engineering in a Hyper Connected World Creator Talks Info |
The Human’s Guide to Understanding AIxCC Creator Talks Info |
The Importance of State Certification Programs for Election Technology; Uncovering and Remediating Compliance Issues Creator Talks Info |
The Missing Link: Draytek’s New RCEs Complete the Chain Creator Talks Info |
The Nexus of Security for Quantum Systems: Spy Qubits and beyond Creator Talks Info |
The Path Towards Self-Defending Systems Creator Talks Info |
The Power(Point) Glove Creator Talks Info |
The Price of Progress: Ethical Cybersecurity in Tech-Driven Communities Creator Talks Info |
The Prompt is Lava: Architecting Secure Boundaries for LLM Integrations with Google Workspace. Creator Talks Info |
The Quantum Shift: Practical Post-Quantum Risk: Algorithms, Infrastructure, and Transition Creator Talks Info |
The Small Packet of Bits That Can Save (or Destabilize) a City Creator Talks Info |
The Things know What You Did Last Session Creator Talks Info |
The Truth, The whole Truth and Nothing but the Truth about Cybersecurity Creator Talks Info |
The Worst ICS/OT Love Story Ever Told Creator Talks Info |
The Year of the Bounty Desktop: Bugs from Binaries Creator Talks Info |
There and Back Again: Discovering OT devices across protocol gateways Creator Talks Info |
Thermostats Gone Wild: Gaining Domain Admim from an Unsecured HVAC System 🚨 (ESP) Creator Talks Info |
They deployed Health AI on us. We’re bringing the rights & red teams. Creator Talks Info |
Third-Party Access Granted: A Postmortem on Student Privacy and the Exploit That’s Still in Production Creator Talks Info |
Threat Dynamics on the Seas Creator Talks Info |
Threat Hunting 101: Beyond the Alerts Creator Talks Info |
Threat Modelling at Scale: Breaking Down Cloud Complexity Creator Talks Info |
Timeline Analysis in Timesketch with Sec-Gemini Creator Talks Info |
To Pay or Not to Pay? The Battle Between Bug Bounty & Vulnerability Disclosure Programs Creator Talks Info |
TotalTest 2.Oh!: Unleashing a Testing Program to Break Smarter, Measure Better, and Fund Your Fixes Creator Talks Info |
Tracking 300k+ drives: What we’ve learned after 13 years Creator Talks Info |
Traditional Pentest Meets AI: New Challenges in Android Security Creator Talks Info |
Train How We Fight: Finding CVEs to Enhance Competition Skills Creator Talks Info |
Trans in Tech Creator Talks Info |
Transforming Identity Protection: Innovating with AI and Attack Paths Creator Talks Info |
Tunnel Snipers Creator Talks Info |
Tunnelpocalypse Creator Talks Info |
Uncovering and Combating Brazil’s Largest Financial APT: A Journey of Collaborative Intelligence (POR) Creator Talks Info |
Uncovering Hidden Threats: The Risks of Dangling Issuers in Federated Credentials Creator Talks Info |
Unleashing the Cookie Monster: How we removed all the trackers and cookies Creator Talks Info |
Unnamed Talk at Quantum Village Creator Talks Info |
Unpacking Go Malware: Challenges, EDR Blind Spots, and Real-World Cases (ESP) Creator Talks Info |
Untitled Talk by Elie Burzstein Creator Talks Info |
Unveiling IoT Vulnerabilities: From Backdoors to Bureaucracy Creator Talks Info |
Unveiling the shadows: Digital Forensics evidence in AI-Driven CyberCrime Creator Talks Info |
Up and Down Technique: Exposing Hidden Data from RAG Systems Creator Talks Info |
Using SELinux and Podman to secure local Model Context Protocol resources Creator Talks Info |
Using Stardew Valley mods as a C2 and infostealer Creator Talks Info |
VDP in Aviation – How it shouldn’t be done! Creator Talks Info |
Veilid la revoluçion : Your data is yours to own Creator Talks Info |
Vibe Coding: Security Crisis or Opportunity Creator Talks Info |
Vibe School: Making dumb devices smart with AI Creator Talks Info |
Voices from the Frontlines: Managing Bug Bounties at Scale Creator Talks Info |
Voices of the Industry: A Fireside Chat with Payment Leaders Creator Talks Info |
VRP @ Google — a look inside a large self-hosted VRP Creator Talks Info |
Wap Droper Case Study Creator Talks Info |
Warflying in a Cessna – Part II – Upping Our Game Creator Talks Info |
We Know What You Did (in Azure) Last Summer Creator Talks Info |
Weaponizing SageMaker AI: Real-World Offense in Machine Learning Platforms Creator Talks Info |
Weaponizing SSM: Practical Exploits and Hardening Techniques for AWS. Creator Talks Info |
Welcome / Badge & Swag Pick Up Creator Talks Info |
Welcome to the Symposium/Introductions Creator Talks Info |
What Game Hackers teach us about Offensive Security and Red Teaming Creator Talks Info |
What is Dead May Never Die: The Immortality of SDK Bugs Creator Talks Info |
What’s new in amateur radio digital modes? Creator Talks Info |
What’s Really in the Box? The Case for Hardware Provenance and HBOMs Creator Talks Info |
When boot vectors turn into attack vectors: Overcoming RP2350’s secure boot chain with fault injection Creator Talks Info |
When Insiders Become the Threat: Details on the Past and Ongoing Multistate Plot by Trump Allies to Obtain Proprietary Voting Software and How it Impacts Election Security Creator Talks Info |
When the Paper Trail Leads Nowhere, by Design; the Los Angeles County VSAP Voting System Creator Talks Info |
Whitehats Secret Weapon: OWASP Creator Talks Info |
whoAMI: Discovering and exploiting a large-scale AMI name confusion attack Creator Talks Info |
Women of Queercon Creator Talks Info |
Work Smarter, Pivot Faster: Threat Intelligence Workflows that Scale Creator Talks Info |
You Can Mix but You Can’t Hide: Uncovering Node Behaviors in Nym Network Creator Talks Info |
You Might Be A Wardriver If… Creator Talks Info |
Your Cyber Career Creator Talks Info |
Your First Conference Talk Creator Talks Info |
Your First CVE Creator Talks Info |
Your Passkey is Weak: Phishing the Unphishable Creator Talks Info |
Your Static Tools Are Cute – My AI Ripped ZebLoader Apart Creator Talks Info |
Z80 Badge Talk Creator Talks Info |