List of Workshops presented by Creators ( Villages, Communities, etc)
One page Creator Workshops Long List with Descriptions
101 Labs: Firmware and Software exploitation Creator Workshop Info |
101 Labs: Hardware Lab Creator Workshop Info |
A Taste of Chrome V8 Exploitation Creator Workshop Info |
ACUPRESSURE FOR VITALITY Creator Workshop Info |
Adversary Intel Lab: Build Your First Threat Emulation Plan Creator Workshop Info |
AI-Powered Web Applications: A New Era in Security – Live Technical Demo Creator Workshop Info |
AML Cryptocurrency Compliance Creator Workshop Info |
AN EXPERIENTIAL JOURNEY THROUGH THE 7 CHAKRAS Creator Workshop Info |
Applied Cryptocurrency Hardware Creator Workshop Info |
AppSec in the Shadows: Adversarial Tradecraft in App and API Defenses Creator Workshop Info |
Ask a Hiring Manager with Cory Wolff Creator Workshop Info |
Ask a Hiring Manager with Peter Hefley Creator Workshop Info |
Ask a Hiring Manager with Troy Fridley Creator Workshop Info |
Ask a Hiring Manger with Doug Mooney Creator Workshop Info |
Backdoors and Breaches (ESP-ENG) Creator Workshop Info |
Be The Threat! Creator Workshop Info |
Becoming a Caido Power User Creator Workshop Info |
Beyond the Hype: Leveraging MITRE ATT&CK for a Hands-On, Practical Assessment with Caldera Creator Workshop Info |
BIC Village “B.I.C. Pick” DEF CON 33 Badge Walkthrough Creator Workshop Info |
Binary exploitation basics Creator Workshop Info |
Biohacking Device Lab Creator Workshop Info |
Breaking the Backbone: SS7 and GTPdoor Malware Exploits Creator Workshop Info |
Breaking the Rules: WAF Bypass Creator Workshop Info |
Bridge to Nowhere Good: When Azure Relay becomes a Red Teamer’s highway Creator Workshop Info |
BT hacking Creator Workshop Info |
Building Better Security Champions: A Hands-On Program Design Workshop Creator Workshop Info |
Building Your First Windows Malware Loader Creator Workshop Info |
Bypassing Security Mechanisms Using Application Patching and Code Instrumentation Creator Workshop Info |
Card testing workshop Creator Workshop Info |
Ciphers & Cryptography – From Simple to Secure (Bradán Lane) Creator Workshop Info |
Como recuperar dados de um dispositivo movel destruido (POR) Creator Workshop Info |
Container Escapes 101 Creator Workshop Info |
Context & Cringe: Bringing Privacy into Threat Modeling Creator Workshop Info |
Cracking the Vault: Runtime API Testing in MDM-Locked Apps Creator Workshop Info |
Creating an AI Agent to Hack a Web Application Creator Workshop Info |
Crisis en La Villa: Simulación de Respuesta a Incidentes (ESP-ENG) Creator Workshop Info |
Cryptocurrency Enforcement Actions Creator Workshop Info |
Cryptocurrency Nodes and Relays Creator Workshop Info |
CYBERCLAW (CYBERsecurity Card-based Learning And Wargaming) Creator Workshop Info |
Cyberjutsu Path to a Digital Martial Art Creator Workshop Info |
Don the Mantle: Red Team Campaign Planning and Execution with MITRE ATT&CK Creator Workshop Info |
Don’t be LLaMe – The basics of attacking LLMs in your Red Team exercises Creator Workshop Info |
EDR in the Ether: Detecting Malware Where the Mobile Network Breathes Creator Workshop Info |
EFF/Hackers.town RayHunter build clinic Creator Workshop Info |
ELEMENTAL MOVING MEDITATION Creator Workshop Info |
Emulating Embedded Devices Creator Workshop Info |
EncryptedClientHelloWorld: TLSv1.3 ECH As A Covert C2 Channel Creator Workshop Info |
Evolution and History of Drain and Approval Attacks Creator Workshop Info |
Following Threat Actors’ Rhythm — to Give Them More Blues Creator Workshop Info |
Frida for reverse engineering payment applications Creator Workshop Info |
From Code to Control: Embedded System Design vs. Traditional Software Design Creator Workshop Info |
From Component to Compromised: XSS via React createElement Creator Workshop Info |
From Intel to Emulation: Turning Threat Actor Trends into Defensive Muscle Creator Workshop Info |
From Prey to Playbook: Learning about victim behavior from infostealer logs Creator Workshop Info |
From USB to C2 Creator Workshop Info |
Getting started in Malware Analysis with Ghidra Creator Workshop Info |
Go Hack Yourself: API Hacking for Beginners Creator Workshop Info |
GPON & Discovery Creator Workshop Info |
Hack the Clock: Automating CVE Exploit searches to save time, money, and not get bored. Creator Workshop Info |
Hack Your Career with JHaddix Creator Workshop Info |
Hackable.sol – Do you know how to hack smart contracts? Creator Workshop Info |
Hacking Custody and Exchanges Creator Workshop Info |
Hacking the Graph: Advanced Target Discovery with OWASP Amass Creator Workshop Info |
Hardware Hacking: Glitching Lab Creator Workshop Info |
Hybrid Attack Creator Workshop Info |
Ingenieria inversa en dispositivos (inalámbricos) (ESP) Creator Workshop Info |
Intersection of the security and cryptographic architecture Creator Workshop Info |
Intro to Ciphers [Mini Workshop/Talk] Creator Workshop Info |
Intro to Python – breakin’ it down Creator Workshop Info |
Introducing OWASP Amass v5.0 Creator Workshop Info |
Introduction to Operationalizing & Using C2 (w/ some AI) Creator Workshop Info |
Just a TIP: DIY Your First Threat and Adversary Intelligence Platform Creator Workshop Info |
Legally Dubious Incident Response Tabletop Creator Workshop Info |
Let’s Break Enigma! Creator Workshop Info |
Let’s Lose the Shock-Mystery of Linux – A Pain-free Intro Creator Workshop Info |
Level UP OSINT Creator Workshop Info |
Leveraging AI and MCP Servers for Automated External Attack Surface Testing Creator Workshop Info |
Mac Malware Analysis Creator Workshop Info |
MalSIM: Building Creator Workshop Info |
Malware and Monsters Creator Workshop Info |
Malware Attack in PDFs: An Adversary Real Attack Analysis Creator Workshop Info |
Malware Exploitation in PDFs: A Red Team Perspective Creator Workshop Info |
Mastering Frontend Security: A Hands-On Workshop to Engineer XSS-Proof Web Applications Creator Workshop Info |
Matter Playground Creator Workshop Info |
MHV Badge 101 Creator Workshop Info |
MITRE iCaldera: Purple Teaming in the Future Creator Workshop Info |
ModuleOverride – Changing a Tyre Whilst Driving Creator Workshop Info |
Morning meditation Creator Workshop Info |
Morning meditation Creator Workshop Info |
Morning meditation Creator Workshop Info |
Nuclei: Beyond The Basic Templates Creator Workshop Info |
Oblivious Access to Blockchains Creator Workshop Info |
Old Tactics, New Weapons: Abusing Modern Software Stacks for Reliable Shell Access Creator Workshop Info |
ONI: Shadow Surveillance via VOLTE malware Creator Workshop Info |
Operation Europa Crisis: A Tabletop Simulation Creator Workshop Info |
OSINT for Hackers Creator Workshop Info |
PLC Hacking 101 Creator Workshop Info |
Public Speaking for Nervous Hackers Creator Workshop Info |
RE for the Rest of Us: An Introduction to Reverse Engineering Creator Workshop Info |
Red Teaming Financial Defenses Creator Workshop Info |
Red Teaming Kubernetes: From App-Level CVEs to Full Cluster Takeover Creator Workshop Info |
Redteam Infrastructure Vibez Edition Creator Workshop Info |
Reverse Engineering Modern Websites – Practical Decomposition for Security Analysis Creator Workshop Info |
RLA Demo and Workshop Creator Workshop Info |
Secure Compute Module and Microcontroller Workshop Creator Workshop Info |
Self Custodial Wallet Use Creator Workshop Info |
SIMjitsu: Art of Silent Exploits Creator Workshop Info |
Stealing Browser Cookies: Bypassing the newest Chrome security measures Creator Workshop Info |
StealthToken: Exploiting Identity Providers the Serverless Way Creator Workshop Info |
Surfing through the Stream: Advanced HTTP Desync exploitation in the wild Creator Workshop Info |
Taiwan Digital Blockade Lite: Wargame Creator Workshop Info |
Tales from the NIST AI Pen Test Challenge – AI Pen Testing 101 Creator Workshop Info |
Testing Environment Setup and Local Storage Enumeration Creator Workshop Info |
Using Evil Human Digital Twins for Fun and Profit Creator Workshop Info |
Voting Systems Lab Creator Workshop Info |
Weaponizing Kestrel: Red Team Tradecraft for Hunting Creator Workshop Info |
Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking Creator Workshop Info |