List of Workshops presented by Creators ( Villages, Communities, etc)
One page Creator Workshops Long List with Descriptions
|
101 Labs: Firmware and Software exploitation Creator Workshop Info |
|
101 Labs: Hardware Lab Creator Workshop Info |
|
A Taste of Chrome V8 Exploitation Creator Workshop Info |
|
ACUPRESSURE FOR VITALITY Creator Workshop Info |
|
Adversary Intel Lab: Build Your First Threat Emulation Plan Creator Workshop Info |
|
AI-Powered Web Applications: A New Era in Security – Live Technical Demo Creator Workshop Info |
|
AML Cryptocurrency Compliance Creator Workshop Info |
|
AN EXPERIENTIAL JOURNEY THROUGH THE 7 CHAKRAS Creator Workshop Info |
|
Applied Cryptocurrency Hardware Creator Workshop Info |
|
AppSec in the Shadows: Adversarial Tradecraft in App and API Defenses Creator Workshop Info |
|
Ask a Hiring Manager with Cory Wolff Creator Workshop Info |
|
Ask a Hiring Manager with Peter Hefley Creator Workshop Info |
|
Ask a Hiring Manager with Troy Fridley Creator Workshop Info |
|
Ask a Hiring Manger with Doug Mooney Creator Workshop Info |
|
Backdoors and Breaches (ESP-ENG) Creator Workshop Info |
|
Be The Threat! Creator Workshop Info |
|
Becoming a Caido Power User Creator Workshop Info |
|
Beyond the Hype: Leveraging MITRE ATT&CK for a Hands-On, Practical Assessment with Caldera Creator Workshop Info |
|
BIC Village “B.I.C. Pick” DEF CON 33 Badge Walkthrough Creator Workshop Info |
|
Binary exploitation basics Creator Workshop Info |
|
Biohacking Device Lab Creator Workshop Info |
|
Breaking the Backbone: SS7 and GTPdoor Malware Exploits Creator Workshop Info |
|
Breaking the Rules: WAF Bypass Creator Workshop Info |
|
Bridge to Nowhere Good: When Azure Relay becomes a Red Teamer’s highway Creator Workshop Info |
|
BT hacking Creator Workshop Info |
|
Building Better Security Champions: A Hands-On Program Design Workshop Creator Workshop Info |
|
Building Your First Windows Malware Loader Creator Workshop Info |
|
Bypassing Security Mechanisms Using Application Patching and Code Instrumentation Creator Workshop Info |
|
Card testing workshop Creator Workshop Info |
|
Ciphers & Cryptography – From Simple to Secure (Bradán Lane) Creator Workshop Info |
|
Como recuperar dados de um dispositivo movel destruido (POR) Creator Workshop Info |
|
Container Escapes 101 Creator Workshop Info |
|
Context & Cringe: Bringing Privacy into Threat Modeling Creator Workshop Info |
|
Cracking the Vault: Runtime API Testing in MDM-Locked Apps Creator Workshop Info |
|
Creating an AI Agent to Hack a Web Application Creator Workshop Info |
|
Crisis en La Villa: Simulación de Respuesta a Incidentes (ESP-ENG) Creator Workshop Info |
|
Cryptocurrency Enforcement Actions Creator Workshop Info |
|
Cryptocurrency Nodes and Relays Creator Workshop Info |
|
CYBERCLAW (CYBERsecurity Card-based Learning And Wargaming) Creator Workshop Info |
|
Cyberjutsu Path to a Digital Martial Art Creator Workshop Info |
|
Don the Mantle: Red Team Campaign Planning and Execution with MITRE ATT&CK Creator Workshop Info |
|
Don’t be LLaMe – The basics of attacking LLMs in your Red Team exercises Creator Workshop Info |
|
EDR in the Ether: Detecting Malware Where the Mobile Network Breathes Creator Workshop Info |
|
EFF/Hackers.town RayHunter build clinic Creator Workshop Info |
|
ELEMENTAL MOVING MEDITATION Creator Workshop Info |
|
Emulating Embedded Devices Creator Workshop Info |
|
EncryptedClientHelloWorld: TLSv1.3 ECH As A Covert C2 Channel Creator Workshop Info |
|
Evolution and History of Drain and Approval Attacks Creator Workshop Info |
|
Following Threat Actors’ Rhythm — to Give Them More Blues Creator Workshop Info |
|
Frida for reverse engineering payment applications Creator Workshop Info |
|
From Code to Control: Embedded System Design vs. Traditional Software Design Creator Workshop Info |
|
From Component to Compromised: XSS via React createElement Creator Workshop Info |
|
From Intel to Emulation: Turning Threat Actor Trends into Defensive Muscle Creator Workshop Info |
|
From Prey to Playbook: Learning about victim behavior from infostealer logs Creator Workshop Info |
|
From USB to C2 Creator Workshop Info |
|
Getting started in Malware Analysis with Ghidra Creator Workshop Info |
|
Go Hack Yourself: API Hacking for Beginners Creator Workshop Info |
|
GPON & Discovery Creator Workshop Info |
|
Hack the Clock: Automating CVE Exploit searches to save time, money, and not get bored. Creator Workshop Info |
|
Hack Your Career with JHaddix Creator Workshop Info |
|
Hackable.sol – Do you know how to hack smart contracts? Creator Workshop Info |
|
Hacking Custody and Exchanges Creator Workshop Info |
|
Hacking the Graph: Advanced Target Discovery with OWASP Amass Creator Workshop Info |
|
Hardware Hacking: Glitching Lab Creator Workshop Info |
|
Hybrid Attack Creator Workshop Info |
|
ICS Fundamentals Creator Workshop Info |
|
Ingenieria inversa en dispositivos (inalámbricos) (ESP) Creator Workshop Info |
|
Intersection of the security and cryptographic architecture [Workshop] Creator Workshop Info |
|
Intro to Ciphers [Mini Workshop/Talk] Creator Workshop Info |
|
Intro to Python – breakin’ it down Creator Workshop Info |
|
Introducing OWASP Amass v5.0 Creator Workshop Info |
|
Introduction to Operationalizing & Using C2 (w/ some AI) Creator Workshop Info |
|
Just a TIP: DIY Your First Threat and Adversary Intelligence Platform Creator Workshop Info |
|
Legally Dubious Incident Response Tabletop Creator Workshop Info |
|
Let’s Break Enigma! Creator Workshop Info |
|
Let’s Lose the Shock-Mystery of Linux – A Pain-free Intro Creator Workshop Info |
|
Level UP OSINT Creator Workshop Info |
|
Leveraging AI and MCP Servers for Automated External Attack Surface Testing Creator Workshop Info |
|
Mac Malware Analysis Creator Workshop Info |
|
MalSIM: Building Creator Workshop Info |
|
Malware and Monsters Creator Workshop Info |
|
Malware Attack in PDFs: An Adversary Real Attack Analysis Creator Workshop Info |
|
Malware Exploitation in PDFs: A Red Team Perspective Creator Workshop Info |
|
Mastering Frontend Security: A Hands-On Workshop to Engineer XSS-Proof Web Applications Creator Workshop Info |
|
Matter Playground Creator Workshop Info |
|
MHV Badge 101 Creator Workshop Info |
|
MITRE iCaldera: Purple Teaming in the Future Creator Workshop Info |
|
ModuleOverride – Changing a Tyre Whilst Driving Creator Workshop Info |
|
Morning meditation Creator Workshop Info |
|
Morning meditation Creator Workshop Info |
|
Morning meditation Creator Workshop Info |
|
Nuclei: Beyond The Basic Templates Creator Workshop Info |
|
Oblivious Access to Blockchains Creator Workshop Info |
|
Old Tactics, New Weapons: Abusing Modern Software Stacks for Reliable Shell Access Creator Workshop Info |
|
ONI: Shadow Surveillance via VOLTE malware Creator Workshop Info |
|
Operation Europa Crisis: A Tabletop Simulation Creator Workshop Info |
|
OSINT for Hackers Creator Workshop Info |
|
Play with Matter and Board the IoTrain! Creator Workshop Info |
|
PLC Hacking 101 Creator Workshop Info |
|
Public Speaking for Nervous Hackers Creator Workshop Info |
|
RE for the Rest of Us: An Introduction to Reverse Engineering Creator Workshop Info |
|
Red Teaming Financial Defenses Creator Workshop Info |
|
Red Teaming Kubernetes: From App-Level CVEs to Full Cluster Takeover Creator Workshop Info |
|
Redteam Infrastructure Vibez Edition Creator Workshop Info |
|
Reverse Engineering Modern Websites – Practical Decomposition for Security Analysis Creator Workshop Info |
|
RLA Demo and Workshop Creator Workshop Info |
|
Secure Compute Module and Microcontroller Workshop Creator Workshop Info |
|
Self Custodial Wallet Use Creator Workshop Info |
|
SIMjitsu: Art of Silent Exploits Creator Workshop Info |
|
Stealing Browser Cookies: Bypassing the newest Chrome security measures Creator Workshop Info |
|
StealthToken: Exploiting Identity Providers the Serverless Way Creator Workshop Info |
|
Surfing through the Stream: Advanced HTTP Desync exploitation in the wild Creator Workshop Info |
|
Taiwan Digital Blockade Lite: Wargame Creator Workshop Info |
|
Tales from the NIST AI Pen Test Challenge – AI Pen Testing 101 Creator Workshop Info |
|
Testing Environment Setup and Local Storage Enumeration Creator Workshop Info |
|
Using Evil Human Digital Twins for Fun and Profit Creator Workshop Info |
|
Voting Systems Lab Creator Workshop Info |
|
Weaponizing Kestrel: Red Team Tradecraft for Hunting Creator Workshop Info |
|
Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking Creator Workshop Info |