Creator Workshops Table

List of Workshops presented by Creators ( Villages, Communities, etc)

One page  Creator Workshops Long List with Descriptions

101 Labs: Firmware and Software exploitation
Creator Workshop Info
101 Labs: Hardware Lab
Creator Workshop Info
A Taste of Chrome V8 Exploitation
Creator Workshop Info
ACUPRESSURE FOR VITALITY
Creator Workshop Info
Adversary Intel Lab: Build Your First Threat Emulation Plan
Creator Workshop Info
AI-Powered Web Applications: A New Era in Security – Live Technical Demo
Creator Workshop Info
AML Cryptocurrency Compliance
Creator Workshop Info
AN EXPERIENTIAL JOURNEY THROUGH THE 7 CHAKRAS
Creator Workshop Info
Applied Cryptocurrency Hardware
Creator Workshop Info
AppSec in the Shadows: Adversarial Tradecraft in App and API Defenses
Creator Workshop Info
Ask a Hiring Manager with Cory Wolff
Creator Workshop Info
Ask a Hiring Manager with Peter Hefley
Creator Workshop Info
Ask a Hiring Manager with Troy Fridley
Creator Workshop Info
Ask a Hiring Manger with Doug Mooney
Creator Workshop Info
Backdoors and Breaches (ESP-ENG)
Creator Workshop Info
Be The Threat!
Creator Workshop Info
Becoming a Caido Power User
Creator Workshop Info
Beyond the Hype: Leveraging MITRE ATT&CK for a Hands-On, Practical Assessment with Caldera
Creator Workshop Info
BIC Village “B.I.C. Pick” DEF CON 33 Badge Walkthrough
Creator Workshop Info
Binary exploitation basics
Creator Workshop Info
Biohacking Device Lab
Creator Workshop Info
Breaking the Backbone: SS7 and GTPdoor Malware Exploits
Creator Workshop Info
Breaking the Rules: WAF Bypass
Creator Workshop Info
Bridge to Nowhere Good: When Azure Relay becomes a Red Teamer’s highway
Creator Workshop Info
BT hacking
Creator Workshop Info
Building Better Security Champions: A Hands-On Program Design Workshop
Creator Workshop Info
Building Your First Windows Malware Loader
Creator Workshop Info
Bypassing Security Mechanisms Using Application Patching and Code Instrumentation
Creator Workshop Info
Card testing workshop
Creator Workshop Info
Ciphers & Cryptography – From Simple to Secure (Bradán Lane)
Creator Workshop Info
Como recuperar dados de um dispositivo movel destruido (POR)
Creator Workshop Info
Container Escapes 101
Creator Workshop Info
Context & Cringe: Bringing Privacy into Threat Modeling
Creator Workshop Info
Cracking the Vault: Runtime API Testing in MDM-Locked Apps
Creator Workshop Info
Creating an AI Agent to Hack a Web Application
Creator Workshop Info
Crisis en La Villa: Simulación de Respuesta a Incidentes (ESP-ENG)
Creator Workshop Info
Cryptocurrency Enforcement Actions
Creator Workshop Info
Cryptocurrency Nodes and Relays
Creator Workshop Info
CYBERCLAW (CYBERsecurity Card-based Learning And Wargaming)
Creator Workshop Info
Cyberjutsu Path to a Digital Martial Art
Creator Workshop Info
Don the Mantle: Red Team Campaign Planning and Execution with MITRE ATT&CK
Creator Workshop Info
Don’t be LLaMe – The basics of attacking LLMs in your Red Team exercises
Creator Workshop Info
EDR in the Ether: Detecting Malware Where the Mobile Network Breathes
Creator Workshop Info
EFF/Hackers.town RayHunter build clinic
Creator Workshop Info
ELEMENTAL MOVING MEDITATION
Creator Workshop Info
Emulating Embedded Devices
Creator Workshop Info
EncryptedClientHelloWorld: TLSv1.3 ECH As A Covert C2 Channel
Creator Workshop Info
Evolution and History of Drain and Approval Attacks
Creator Workshop Info
Following Threat Actors’ Rhythm — to Give Them More Blues
Creator Workshop Info
Frida for reverse engineering payment applications
Creator Workshop Info
From Code to Control: Embedded System Design vs. Traditional Software Design
Creator Workshop Info
From Component to Compromised: XSS via React createElement
Creator Workshop Info
From Intel to Emulation: Turning Threat Actor Trends into Defensive Muscle
Creator Workshop Info
From Prey to Playbook: Learning about victim behavior from infostealer logs
Creator Workshop Info
From USB to C2
Creator Workshop Info
Getting started in Malware Analysis with Ghidra
Creator Workshop Info
Go Hack Yourself: API Hacking for Beginners
Creator Workshop Info
GPON & Discovery
Creator Workshop Info
Hack the Clock: Automating CVE Exploit searches to save time, money, and not get bored.
Creator Workshop Info
Hack Your Career with JHaddix
Creator Workshop Info
Hackable.sol – Do you know how to hack smart contracts?
Creator Workshop Info
Hacking Custody and Exchanges
Creator Workshop Info
Hacking the Graph: Advanced Target Discovery with OWASP Amass
Creator Workshop Info
Hardware Hacking: Glitching Lab
Creator Workshop Info
Hybrid Attack
Creator Workshop Info
Ingenieria inversa en dispositivos (inalámbricos) (ESP)
Creator Workshop Info
Intersection of the security and cryptographic architecture
Creator Workshop Info
Intro to Ciphers [Mini Workshop/Talk]
Creator Workshop Info
Intro to Python – breakin’ it down
Creator Workshop Info
Introducing OWASP Amass v5.0
Creator Workshop Info
Introduction to Operationalizing & Using C2 (w/ some AI)
Creator Workshop Info
Just a TIP: DIY Your First Threat and Adversary Intelligence Platform
Creator Workshop Info
Legally Dubious Incident Response Tabletop
Creator Workshop Info
Let’s Break Enigma!
Creator Workshop Info
Let’s Lose the Shock-Mystery of Linux – A Pain-free Intro
Creator Workshop Info
Level UP OSINT
Creator Workshop Info
Leveraging AI and MCP Servers for Automated External Attack Surface Testing
Creator Workshop Info
Mac Malware Analysis
Creator Workshop Info
MalSIM: Building
Creator Workshop Info
Malware and Monsters
Creator Workshop Info
Malware Attack in PDFs: An Adversary Real Attack Analysis
Creator Workshop Info
Malware Exploitation in PDFs: A Red Team Perspective
Creator Workshop Info
Mastering Frontend Security: A Hands-On Workshop to Engineer XSS-Proof Web Applications
Creator Workshop Info
Matter Playground
Creator Workshop Info
MHV Badge 101
Creator Workshop Info
MITRE iCaldera: Purple Teaming in the Future
Creator Workshop Info
ModuleOverride – Changing a Tyre Whilst Driving
Creator Workshop Info
Morning meditation
Creator Workshop Info
Morning meditation
Creator Workshop Info
Morning meditation
Creator Workshop Info
Nuclei: Beyond The Basic Templates
Creator Workshop Info
Oblivious Access to Blockchains
Creator Workshop Info
Old Tactics, New Weapons: Abusing Modern Software Stacks for Reliable Shell Access
Creator Workshop Info
ONI: Shadow Surveillance via VOLTE malware
Creator Workshop Info
Operation Europa Crisis: A Tabletop Simulation
Creator Workshop Info
OSINT for Hackers
Creator Workshop Info
PLC Hacking 101
Creator Workshop Info
Public Speaking for Nervous Hackers
Creator Workshop Info
RE for the Rest of Us: An Introduction to Reverse Engineering
Creator Workshop Info
Red Teaming Financial Defenses
Creator Workshop Info
Red Teaming Kubernetes: From App-Level CVEs to Full Cluster Takeover
Creator Workshop Info
Redteam Infrastructure Vibez Edition
Creator Workshop Info
Reverse Engineering Modern Websites – Practical Decomposition for Security Analysis
Creator Workshop Info
RLA Demo and Workshop
Creator Workshop Info
Secure Compute Module and Microcontroller Workshop
Creator Workshop Info
Self Custodial Wallet Use
Creator Workshop Info
SIMjitsu: Art of Silent Exploits
Creator Workshop Info
Stealing Browser Cookies: Bypassing the newest Chrome security measures
Creator Workshop Info
StealthToken: Exploiting Identity Providers the Serverless Way
Creator Workshop Info
Surfing through the Stream: Advanced HTTP Desync exploitation in the wild
Creator Workshop Info
Taiwan Digital Blockade Lite: Wargame
Creator Workshop Info
Tales from the NIST AI Pen Test Challenge – AI Pen Testing 101
Creator Workshop Info
Testing Environment Setup and Local Storage Enumeration
Creator Workshop Info
Using Evil Human Digital Twins for Fun and Profit
Creator Workshop Info
Voting Systems Lab
Creator Workshop Info
Weaponizing Kestrel: Red Team Tradecraft for Hunting
Creator Workshop Info
Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking
Creator Workshop Info