The ONE!
One Schedule to Rule them All!
Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 33.
It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings no longer include epub and mobi formats and instead now include html, csv, PDF, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use.
The intent is still to be a resource to answer the question at the end of an hour of "What's next?"
As a general rule I do not include:
- Off-site events
- Blatent vender pitch events
- Nonspecific timed events. Unfortunately this means the contests aren't on the regular schedule.
- DEF CON events are emphasized, so BSides Las Vegas and BlackHat tend to not show up
Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links and a Infoboot data feed. There is much more going on at DEF CON than what is listed here.
Check out the Guides/Tips/FAQs links if you're new to Las Vegas.
Notable suggestions are:
- Bring comfortable shoes, you'll be doing a lot more walking than you expect
- Bring a water bottle to keep hydrated
- Beware of going out doors, there's nothing like LV sun and heat
- Everything in Las Vegas is a longer walk than you think
- Relax, don't try to see everything, you'll never be able to!
- Have FUN!
And finally, this is only as good as the ideas and information used to generate it.
I welcome your constructive suggestions and comments. Please send them to qumqats@outel.org
Have a good time at DEF CON 33!
Index of DEF CON 33 Activities
Maps List
Maps Browser
Detailed Village Info
Villages Table
Hour by Hour list of happenings, start at the top, or go to a specific day.
Schedule
- Thursday
- Friday
- Saturday
- Sunday
Sorted list of all the Speakers Names linked to their talk's description.
Speaker List
Sorted list of all the Talk's titles linked to the talk description.
Talk Title List
Talk lists for each Village, start at the alphabetic top, or go to a specific Village.
Village Talk List
ADV - AIV - ASV - BBV - BHV - CHV - CON - CPV - CRE - DCG - DCT - DCW - DDV - DL - ESV - GHV - HHV - HRV - ICSV - IOTV - MHV - MISC - MWV - PAYV - PGE - PHV - PLV - PSV - QTV - RTV - SEV - TELV - TRN
Descriptions and Info for all the talks.
Talk Descriptions
Contests Table
Contests
Demolabs Table
Demolabs
Workshops Table
Workshops
Paid Trainings Table
Paid Trainings
Parties, Gatherings, and Events Table
Parties Gatherings Events
DEF CON 33 Vendors
Vendors
DEF CON 33 Exhibitors
Exhibitors
DEF CON 33 Communities
Communities
The latest news from defcon.org
DEF CON News
The answer to your questsions about DEF CON overall.
DEF CON FAQ
DEF CON .org Links
Combined Schedule Sources
Interesting Links
Guides/Tips/FAQs
Maps List
Overview of the area around DEF CON 33
Click on image to view full size

LVCCW Full map of Level 1
Click on image to view full size

LVCCW map of North portion of Level 1
Click on image to view full size

LVCCW map of South portion of Level 1
Click on image to view full size

LVCCW map of South Lobby and Registration/HDA of Level 1
Click on image to view full size

LVCCW map of Hall 1 of Level 1
Click on image to view full size

LVCCW map of Hall 2 of Level 1
Click on image to view full size

LVCCW map of Hall 3 of Level 1
Click on image to view full size

LVCCW map of Hall 4 of Level 1
Click on image to view full size

LVCCW Full map of Level 2
Click on image to view full size

LVCCW map of North portion of Level 2
Click on image to view full size

LVCCW map of West portion of Level 2
Click on image to view full size

LVCCW map of East portion of Level 2
Click on image to view full size

LVCCW Full map of Level 3
Click on image to view full size

LVCCW map of North portion of Level 3
Click on image to view full size

LVCCW map of North portion of Level 3
Click on image to view full size

Workshops location - Springhill Suites
Click on image to view full size

Paid Training location - Sahara
Click on image to view full size

Map Browser
LV Strip Overview - Closeup - Sahara - Springhill
L1_Full - L1_North - L1_South
L1_RegHDA - L1_Hall1 - L1_Hall2 - L1_Hall3 - L1_Hall4
L2_Full - L2_North - L2_West - L2_East
L3_Full - L3_North - L3_South
PDF of LVCCW DEF CON 33 map - full rez, best for zooming in
Las Vegas Convention Center - Virtual Tour
Detailed Village Info
ADV Village: Talk List
Home Page: https://adversaryvillage.org
DC Village Page: #orga_40719
Location: LVCCWest-Level1-Hall2-W702 - Map
Social Media Links:
TW @AdversaryVillag
https://defcon.social/@AdversaryVillage
YT https://youtube.com/AdversaryVillage
DC http://adversaryvillage.org/discord
TI @AdversaryVillage
FB @AdversaryVillage
LI @adversaryvillage

Adversary Village is a community initiative which primarily focuses on adversary simulation/emulation, purple teaming, and adversary tradecraft. The village covers offensive operations, threat/APT/ransomware simulation, breach and adversarial attack simulation, supply chain security, adversary tactics, research on nation-state-sponsored threat-actors, adversary intelligence, adversarial mindset, philosophy, and hacker survival skills.
The goal of the Adversary Village is to build an open security community for the researchers and organizations, who are putting together new means, methodologies towards the simulation-emulation of adversary tactics and collaboration.
Subsequent to feedback from past editions, Adversary Village shall focus on hosting hands-on deep technical workshops, live demonstrations, panel discussions and a ton of other hands-on activities on adversarial attack simulation/emulation, offensive tradecraft to engage and educate the community.
Adversary Village would have the following hands-on activities for this year at DEF CON;
Adversary simulator and purple teaming hands-on booth
Adversary Simulator booth is a volunteer assisted activity, which has hands-on adversary emulation plans and exercises specific to a wide variety of threat-actors; these are meant to provide the participants with a better understanding of adversarial attack emulation. The booth will be hosting a simulated environment meant to recreate enterprise infrastructure, operational technology environment, which serves targets for various attack simulations.
The hands-on simulator booth also hosts an activity, which would need the participants to generate their own adversary emulation plans to assess the efficacy of the defense systems based on publicly available cyber threat intelligence.
Choose-your-own-Adversary-Adventure Tabletop Game
Adversary adventure is a story-scenario based, interactive, cyber war-gaming, choose-your-own adventure model interactive game. This is a gamified version of table-top exercises which is presented to the participants as they can choose to play as an attacker, post exploitation OR a Defender who is defending against an attacker group-threat actor OR even play as a CISO who is dealing with an adversarial situation such as a ransomware incident.
Hands-on deep technical workshops
Adversary Village will feature a limited number of deep technical workshops focused on advanced adversary tradecraft and techniques.
Hands-on guided breach and offensive attack simulation exercises
This area will feature guided attack simulation exercises for participants to engage with. There will be a few scenario-focused activities, "Breach-the-Hospital", "Breach-the-Office", “Breach-the-Bank” etc., visually represented by modular-brick-LEGO sets. A simulated cyber range will be available for each scenario, providing an exact replica of an enterprise production environment. We will provide a detailed walkthrough of the attack scenarios, including Tools-Techniques-and-Procedures, commands and how-to guides, demonstrating how to attack and breach the target environment.
This exercise will give participants a clear understanding of how threat actors infiltrate corporate environments.
Adversary Wars CTF
Adversary Village will be hosting "Adversary Wars CTF", where the participants will have to pose as adversaries and replicate adversarial actions against each element of a “target” organization. Adversary Wars would have real world challenge scenarios and challenges, where the participants can perform various attacks and learn new TTPs. To visualize the CTF environment, the contest area will feature a miniature model of the city made using interlocking-plastic-bricks. The breached components will be physically marked in the city model as the CTF progresses.
There will be prizes, complimentary hoodies (yes, the iconic adversary village hoodies), free t-shirts, cool stickers, village coins, badges, and various other swags.
Links: Mastodon (defcon.social) -
https://defcon.social/@AdversaryVillage
Website -
https://adversaryvillage.org/
Return to Index
AIV Village: Talk List
Home Page: https://aivillage.org/
DC Village Page: #orga_40718
DC Discord Chan: https://discord.com/channels/708208267699945503/732733090568339536
Location: LVCCWest-Level3-W314-W316 - Map
Social Media Links:
TW @aivillage_dc
TI @aivillage
YT link
DC https://discord.com/invite/GX5fhfT

Join us at the AI Village for interactive demonstrations at the intersection of AI and security. We’ve got something new this year with a full purple team demonstration from the AI Cyber League.
For the third Generative Red Team we are going to “red team” the evaluations that establish a model’s performance. We are bringing several model systems built to do different tasks each with their own model card. These model cards will define uses and restrictions the model creators want and determine what we mean by “trust” when it comes to fuzzier concepts like “can write good Rust” and “doesn’t help you hack”. This model card will be built off of open source evaluations that prove and establish how effective the model is. We will be paying bounties for findings against the evaluations that the model cards used to make their claims.
Following the success of last year's real-time deepfake demonstrations, we're taking things to the next level. This year, we're showcasing five different deepfake systems across a spectrum of computational requirements – from high-end professional setups to consumer-grade hardware that's becoming increasingly accessible. You can see how detections we have will break down as compute per dollar keeps improving.
Links: Website -
https://aivillage.org/
Return to Index
AIxCC Village: Talk List
Home Page: https://aicyberchallenge.com/
Sched Page: https://aicyberchallenge.com/
DC Village Page: #orga_40722
Location: LVCCWest-Level1-Hall1-W404 - Map
Social Media Links:
TW @DARPA

The AIxCC Finals will unfold at DEF CON 33 in August 2025. The top seven teams who qualified during Semifinals will compete for a grand prize of $4 million.
The AIxCC Final Competition will introduce new challenge repositories and vulnerabilities, encouraging teams to improve upon their current CRS implementations and push forward their systems' capabilities in terms of robustness, scale, and real-world impact.
Links: Website -
https://aicyberchallenge.com/
Return to Index
APV Village: Talk List
Home Page: https://www.appsecvillage.com/
DC Village Page: #orga_40721
DC Discord Chan: https://discord.com/channels/708208267699945503/790973922949726228
Location: LVCCWest-Level1-Hall2-W604 - Map
Social Media Links:
TW @AppSec_Village
LI @appsecvillage
YT https://www.youtube.com/c/AppSecVillage
DC https://discord.gg/5XY8qYXd7R

Come immerse yourself in everything the world of application security has to offer. Whether you are a red, blue, or purple teamer, come learn from the best of the best to exploit software vulnerabilities and secure software. Software is everywhere, and Application Security vulnerabilities are lurking around every corner, making the software attack surface attractive for abuse. If you are just an AppSec n00b or launch deserialization attacks for fun and profit, you will find something to tickle your interest at the AppSec Village.
Software runs the world. Everything from IoT, medical devices, the power grid, smart cars, and voting apps - all have software behind them. Such a variety of topics will be reflected in our cadre of guest speakers representing all backgrounds and walks of life.
AppSec Village welcomes all travelers to choose from talks and workshops by expert community members, an all-AppSec-focused CTF, contests that challenge your mind and your skillz, and more. Bring your thirst for knowledge and passion for breaking things, and your visit to AppSec Village will be thrilling!
Links: Mastodon (@AppSecVillage@defcon.social) -
https://defcon.social/@AppSecVillage
Website -
https://www.appsecvillage.com/
Return to Index
ASV Village: Talk List
Home Page: https://aerospacevillage.org/
DC Village Page: #orga_40720
DC Discord Chan: https://discord.com/channels/708208267699945503/732393044363444264
Location: LVCCWest-Level1-Hall2-W503 - Map
Social Media Links:
TW @secureaerospace
LI @aerospace-village
TW @hack_a_sat
DC https://discord.gg/gV4EWuk
YT https://www.youtube.com/c/AerospaceVillage
https://defcon.social/@aerospacevillage

The aviation and space industries, security researchers, and the public share a common goal: safe, reliable, and trustworthy aviation and space operations. For too long, negative perceptions and fractured trust on all sides have held back collaboration between the aviation, space, and security researcher communities that has advanced safety, reliability, and security of other industries. As the traditional domains of aviation safety and cybersecurity increasingly overlap, more effective collaboration between stakeholders ensures we will be safer, sooner, together.
Through the Aerospace Village, the security research community invites industry leaders, researchers and academia interested in aviation and space security, safety, and resilience to attend, understand, collaborate together to achieve our common goals. Empathy and understanding build common ground, while acts and words likely to increase division between these two communities undermine these efforts. The Aerospace Village welcomes those who seek to improve aviation and space security, safety, and resilience through positive, productive collaboration among all ecosystem stakeholders.
Our Goal
The Aerospace Village is a volunteer team of hackers, pilots, and policy advisors who come from the public and private sectors. We believe the flying public deserves safe, reliable, and trustworthy air travel which is highly dependent on secure aviation and space operations.
Links: Website -
https://www.aerospacevillage.org/
Mastodon (@aerospacevillage@defcon.social) -
https://defcon.social/@aerospacevillage
Return to Index
BBV Village: Talk List
Home Page: https://bugbountydefcon.com/
DC Village Page: #orga_40726
Location: LVCCWest-Level3-W326 - Map
Social Media Links:
TW @BugBountyDEFCON
YT https://www.youtube.com/BountyTalks
TW @arl_rose
TW @infinitelogins
YT https://www.youtube.com/infinitelogins

The global bug bounty community has witnessed exponential growth, with thousands of members actively engaged in the field. This thriving ecosystem now represents a legitimate and sought-after profession for hackers and cybersecurity specialists. After a big success and great feedback during the first ever Bug Bounty Village during DEFCON 32, We want to be part of DEFCON 33 and keep celebrating the bug bounty community, where hunters, learners, and enthusiasts can converge, interact with top-tier hackers, attend insightful workshops, talks, and immerse themselves in hands-on activities.
With over 20 workshops, panels and talks, the Bug Bounty Village at DEFCON 32 was a huge success. The room was completely full of hackers at all times, Some of the best bug bounty hunters in the community were part of our village to share knowledge, create content, teach others, and also, to make new friends. With waiting lines of over 100 people waiting to get in for some of our workshops, we have demonstrated that there is a huge interest in Bug Bounty to remain as a specific village at DEFCON, and have that special place in the biggest hacker conference in the world, where the Bug Bounty community can connect, grow and help others become the future of Bug Bounty.
Links: Website -
https://www.bugbountydefcon.com/
Return to Index
BHV Village: Talk List
Home Page: https://www.villageb.io/
DC Village Page: #orga_40723
DC Discord Chan: https://discord.com/channels/708208267699945503/735273390528528415
Location: LVCCWest-Level1-Hall2-W606 - Map
Social Media Links:
TW @dc_bhv
LI @biohacking-village
YT http://youtube.com/biohackingvillage
TI @biohackingvillage
DC https://discord.gg/Q8ubDb5
IG @biohacking_village
link

At the Biohacking Village, attendees can expect an immersive, hands-on experience at the intersection of cybersecurity, healthcare, and medical technology, offering opportunities to learn, explore, and collaborate on some of the most pressing challenges in the industry.
What Attendees Can Learn at the Biohacking Village:
- Medical Device Security: Understand how medical devices work, the cybersecurity vulnerabilities they face, and the critical importance of securing these devices for patient safety and national security. Participate in hands-on demonstrations, such as penetration testing on virtualized devices, learning real-world techniques for identifying and addressing vulnerabilities.
- Critical Infrastructure Resilience: Explore the intersection of healthcare and critical infrastructure, including how hospitals and medical systems rely on interconnected technologies. Learn about best practices for securing healthcare networks, including strategies to mitigate ransomware attacks and manage incident response.
- Collaboration and Ecosystem Development: Discover how to work effectively with manufacturers, regulators, researchers, and practitioners to build secure and innovative healthcare technologies. Engage in discussions about fostering trust, transparency, and accountability within the cybersecurity and healthcare communities.
- New Technologies in Healthcare: Get hands-on with cutting-edge innovations, such as AI-driven medical devices, digital twins, and IoT-enabled healthcare systems. Learn about emerging regulatory requirements, including those surrounding AI, cybersecurity, and the EU Cyber Resilience Act (CRA).
- Ethical Hacking and Vulnerability Disclosure: Delve into the principles of responsible disclosure and how ethical hackers contribute to securing patient safety. Understand the legal and ethical considerations of hacking medical devices, guided by frameworks like the Hippocratic Oath for Hackers.
- Policy and Regulatory Insights: Gain insights into the latest global regulations, standards, and metrics impacting medical technology, such as FDA guidelines, GDPR, NIS2, and more. Participate in workshops and panels with experts discussing policy advocacy and global harmonization of cybersecurity standards.
- Tabletop Exercises and CTFs (Capture the Flags): Engage in interactive tabletop exercises designed to simulate real-world scenarios, from ransomware incidents to critical system failures, promoting teamwork and problem-solving. Compete in cybersecurity challenges and CTFs to test your skills in securing medical and healthcare IT systems.
- Networking and Community Building: Connect with a diverse group of stakeholders, including hackers, healthcare professionals, medical device manufacturers, and policymakers. Collaborate in an environment that fosters innovation, trust, and shared learning.
The Biohacking Village is your gateway to understanding and addressing the complex challenges of medical technology and cybersecurity. Attendees will leave equipped with knowledge, skills, and connections to drive meaningful change in the industry.
Links: Website -
https://villageb.io/
Return to Index
BICV Village: Talk List
Home Page: https://www.blacksincyberconf.com/bic-village
DC Village Page: #orga_40724
Location: LVCCWest-Level3-W322-W324 - Map
Social Media Links:
TW @BlackInCyberCo1
https://defcon.social/@blacksincyber
TI @blacksincybersecurity
YT link
LI @blackincyberconference
PT @blacksincybersecurity
FB @blackincyberconf

The Blacks In Cybersecurity (B.I.C.) Village seeks to bring culturally diverse perspectives to the holistic Cybersecurity community; by way of a series of talks and a capture the flag event. In providing these activities, we hope to help highlight Black experiences, innovations in the field, Black culture and educate the community about Black history.
In doing this, we believe that we can better educate and normalize the discussion of deficiency or prejudices in Cybersecurity education/development for minority communities. We also believe this effort can be translated to aid in eradication of these issues in the Cybersecurity and Hacker/Maker community and allow for more diverse hobbyists and professionals to engage and contribute.
Links: Mastodon (infosec.exchange) -
https://infosec.exchange/@blacksincyber
Mastodon (defcon.social) -
https://defcon.social/@blacksincyber
Website -
https://www.blacksincyberconf.com/bic-village
Return to Index
BTV Village: Talk List
Home Page: https://blueteamvillage.org/
DC Village Page: #orga_40725
DC Discord Chan: https://discord.com/channels/708208267699945503/732454317658734613
Location: LVCCWest-Level2-W213-W218 - Map
Social Media Links:
TW @BlueTeamVillage
TI @blueteamvillage
YT https://www.youtube.com/c/blueteamvillage
DC https://discord.gg/blueteamvillage
https://defcon.social/@blueteamvillage

Blue Team Village (BTV) is both a place and a community built for and by people who defend computer systems, networks, and people against cyber attacks. It's a place to gather, talk, share, and learn from each other about the latest tools, technologies, and tactics that our community can use to detect attackers and prevent them from achieving their goals.
The Blue Team Village's Project Obsidian is a defensive cybersecurity learning experience that provides attendees with the opportunity to gain knowledge of Incident Response (IR), Digital Forensics (DF), Malware Analysis, Cyber Threat Intelligence (CTI), and Cyber Threat Hunting (CTH). Deep dive into technical topics through training and exercises that provide practical hands-on experience across each discipline. Project Obsidian 101 trainings provide cybersecurity knowledge that will enable attendees to develop the skills needed to be successful in their current and future roles.
Two of the most valuable takeaways are how to strategically approach a task and the operational processes supporting each task's objectives. Knowing 'how' to do something is only part of the challenge. Knowing 'when' and 'why' to perform specific tasks adds the necessary context to develop the full story of defensive cybersecurity.
Links: Mastodon (@blueteamvillage@defcon.social) -
https://defcon.social/@blueteamvillage
Website -
https://blueteamvillage.org/
Return to Index
CHV Village: Talk List
Home Page: https://www.carhackingvillage.com/
DC Village Page: #orga_40727
DC Discord Chan: https://discord.com/channels/708208267699945503/732722838942777474
Location: LVCCWest-Level1-Hall2-W602 - Map
Social Media Links:
TW @CarHackVillage
YT http://youtube.com/@carhackingvillage
LI @car-hacking-village
DC https://discord.gg/JWCcTAM

For over a decade, we’ve been leading the charge in automotive security, and this year, we’re shifting into high gear! Get ready for an electrifying DEF CON 33 experience packed with interactive challenges, exclusive badges, and mind-bending exercises designed to supercharge your skills.
Join us and make this DEF CON one for the record books!
Links: Website -
https://www.carhackingvillage.com
Return to Index
CLV Village: Talk List
Home Page: https://cloud-village.org/
DC Village Page: #orga_40728
DC Discord Chan: https://discord.com/channels/708208267699945503/732733373172285520
Location: LVCCWest-Level3-W311-W313 - Map
Social Media Links:
TW @cloudvillage_dc
YT https://www.youtube.com/cloudvillage_dc
DC https://discord.gg/EygUDJABee

With the industry’s rapid growth in cloud infrastructure, the presence of an open platform to discuss and showcase cloud research becomes a necessity.
Cloud village is an open platform for researchers interested in the area of cloud security. We plan to organise talks, tool demos, CTF and workshops around Cloud Security and advancements.
Our CTF will be a jeopardy style 2.5 days contest where participants will have to solve challenges around Cloud infrastructure, security, recon, etc. These challenges will cover different cloud platforms including AWS, GCP, Azure, Alibaba, Digital Ocean, etc. We will also reward our top 3 teams with awards.
Links: Website -
https://dc33.cloud-village.org
Mastodon (@cloudvillage_dc@mastodon.social) -
https://mastodon.social/@cloudvillage_dc
Return to Index
CON Village: Talk List
Home Page: https://defcon.outel.org/dcwp/dc33/activities/contests-list/
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_CON
Social Media Links:
link
Return to Index
CPV Village: Talk List
Home Page: https://cryptovillage.org/
DC Village Page: #orga_40729
DC Discord Chan: https://discord.com/channels/708208267699945503/732734002011832320
Location: LVCCWest-Level1-Hall1-W403 - Map
Social Media Links:
TW @cryptovillage
SL https://cryptovillage.slack.com/
YT link
TI @cryptovillage
https://defcon.social/@cryptovillage

Launched in 2014, Crypto & Privacy Village (CPV) is a community-run village centred on privacy and cryptography that aims to educate and inform the general public, students, educators, hackers, security and privacy professionals, and policymakers. We provide a unique hybrid space that features talks; chill space for relaxing with friends, doing CTFs, and cross industry networking; the Gold Bug Challenge and desk for hints and support; privacy-related art installations; and an information desk for questions about privacy and cryptography. Come talk with us about facial recognition technology, privacy-preserving data analytics, or crypto backdoor laws!
Links: Website -
https://cryptovillage.org/
Mastodon (@cryptovillage@defcon.social) -
https://defcon.social/@cryptovillage
Return to Index
DC Village: Talk List
Home Page: https://defcon.org/html/defcon-33/dc-33-speakers.html
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_DC
Social Media Links:
TW @defcon
FB @defcon
YT https://www.youtube.com/user/DEFCONConference
http://www.reddit.com/r/defcon
IG @wearedefcon
DC https://discord.gg/defcon
Return to Index
DCG Village: Talk List
Return to Index
DCGVR Village: Talk List
Home Page: https://www.dcgvr.org/
DC Forums Page:
Social Media Links:
TW @DCGVR
TI @defcon_groups
DC https://discord.gg/bsX4QXf3rD
YT link
Return to Index
DDV Village: Talk List
Home Page: https://dcddv.org/
DC Village Page: #orga_40730
DC Discord Chan: https://discord.com/channels/708208267699945503/732732641694056478
Location: LVCCWest-Level2-W225 - Map
Social Media Links:
TW @DDV_DC

The Data Duplication Village has all the updated bits and bytes available from infocon.org packed up into nice, neat packages. If you're looking for a copy of just about any security con talk known to hacker-kind or a copy of the VX-Underground archive (along with a few hundred gigs of cat pictures), you'll find it here. Our village provides a "free-to-you" service of direct access to terabytes of useful data to help build those hacking skills and allow open discussions with other storage enthusiasts.
We'll also be partnering with DC Next Gen to ensure that our future generations have the opportunity to explore the details of how past and current data storage works!
Links: Website -
https://dcddv.org/
Return to Index
DL Village: Talk List
Home Page: https://forum.defcon.org/node/252635
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_DL
Return to Index
ESV Village: Talk List
Home Page: https://embeddedvillage.org/
DC Village Page: #orga_40731
Location: LVCCWest-Level1-Hall1-W401 - Map
Social Media Links:
TW @EmbeddedVillage

Embedded systems exist at the intersection of hardware and software, built to accomplish a specific task. Often these disciplines are dealt with individually, but understanding the custom relationships between hardware and software is key to performing security research on these devices.
Embedded Systems Village advances the security of embedded systems by hosting hands-on hacking workshops, showcasing new security research demos, and organizing exciting hacking contests to educate attendees and manufacturers on the approach hackers use to attack these devices. Attendees will leave the village with an understanding of how to reduce complex, exotic devices to their underlying embedded components and to extract the information required to use the tools and techniques taught at other villages where embedded systems are on display.
Links: Website -
https://embeddedvillage.org/
Return to Index
GHV Village: Talk List
Home Page: https://gamehacking.gg/
DC Village Page: #orga_40967
Location: LVCCWest-Level1-Hall1-W402

Gaming and cybersecurity intersect in many exciting and interactive ways. Our mission is to delve into various aspects of game security, fostering an environment of exploration, play, and learning. At the Game Hacking Community, participants can engage in activities ranging from modding games to exploring the intricacies of memory hacking and multiplayer cheats and learning about game malware. Whether you're a beginner or an experienced hacker, we will have presentations and activities to challenge your skills. Be part of the evolution of game security. Dive into our activities, engage with other game hackers, and explore opportunities to contribute to and support the Game Hacking Community. Let's play, learn, exploit, and perhaps even profit. Our community focuses on learning and does NOT endorse cheating in competitive online games.
Links: Website -
https://gamehacking.gg
Return to Index
HDA Village: Talk List
Social Media Links:
TW @HDA_DEFCON
Return to Index
HHV Village: Talk List
Home Page: https://dchhv.org/
DC Village Page: #orga_40733
DC Discord Chan: https://discord.com/channels/708208267699945503/732728536149786665
Location: LVCCWest-Level1-Hall2-W802 - Map
Social Media Links:
TW @DC_HHV
https://defcon.social/@DC_HHV

Every day our lives become more connected to consumer hardware. Every day the approved uses of that hardware are reduced, while the real capabilities expand. Come discover hardware hacking tricks and tips regain some of that capacity, and make your own use for things! We have interactive demos to help you learn new skills. We have challenges to compete against fellow attendees. We have some tools to help with your fever dream modifications. Come share what you know and learn something new.
Links: Website -
https://dchhv.org/
Mastodon (@DC_HHV@defcon.social) -
https://defcon.social/@DC_HHV
Return to Index
HRV Village: Talk List
Home Page: https://hamvillage.org/
DC Village Page: #orga_40732
DC Discord Chan: https://discord.com/channels/708208267699945503/732733631667372103
Location: LVCCWest-Level3-W321 - Map
Social Media Links:
TW @HamRadioVillage
TI @HamRadioVillage
DC https://discord.gg/hrv
https://defcon.social/@HamRadioVillage

Ham Radio has been considered to be the original group of hackers, launching before computers, integrated circuits, and even the transistor! Hams of all generations have a hacker mindset, solving problems their own way, regardless of what the manual has to say. Continuing this pioneer spirit, the Ham Radio Community is here to support advancement of the hobby with a cybersecurity slant.
Everything we do today involves wireless communications of some sort, and a basic knowledge of how radio works is crucial. In the Ham Radio Community, you can learn hand-on with topics such as how to legally use a radio to send commands to a satellite, communicating around the globe when no other methods exist, and how to send and receive real-time location data without relying on any cellular networks. You can put your skills to the test by trying to find the hidden transmitters in the Ham Radio Fox Hunt contest, as well as transmitting memes over the airwaves to DEF CON attendees.
We provide license testing services for those looking to become licensed or upgrade their license class, as well as guidance on how to hack on the medium to achieve the best results and have the most fun!
Links: Website -
https://hamvillage.org/
Return to Index
ICSV Village: Talk List
Home Page: https://www.icsvillage.com/
DC Village Page: #orga_40734
DC Discord Chan: https://discord.com/channels/708208267699945503/735938018514567178
Location: LVCCWest-Level1-Hall2-W805 - Map
Social Media Links:
TW @ICS_Village
LI @icsvillage
YT link
TI @ics_village

**Mission**. ICS Village is a non-profit organization with the purpose of providing education and awareness of Industrial Control System security.
- Connecting public, industry, media, policymakers, and others directly with ICS systems and experts.
- Providing educational tools and materials to increase understanding among media, policymakers, and general population.
- Providing access to ICS for security researchers to learn and test.
- Hands on instruction for industry to defend ICS systems.
**Exhibits**. Interactive simulated ICS environments that provide safe yet realistic examples to preserve safe, secure, and reliable operations. We bring real components such as Programmable Logic Controllers (PLC), Human Machine Interfaces (HMI), Remote Telemetry Units (RTU), and actuators, to simulate a realistic environment throughout different industrial sectors. Visitors can connect their laptops to assess these ICS devices with common security scanners, network sniffers to sniff the industrial traffic, and more! We will also have space dedicated to Maritime technology as well as Escape Rooms ran by Idaho National Labs and CISA. In addition to talks, hands-on demos/hacking, and escape rooms we are collaborating with BioHacking Village to demonstrate how Industrial Control Systems are used in Health Care.
Links: Website -
https://www.icsvillage.com/
Return to Index
IOTV Village: Talk List
Home Page: https://www.iotvillage.org/
DC Village Page: #orga_40735
DC Discord Chan: https://discord.com/channels/708208267699945503/732734565604655114
Location: LVCCWest-Level1-Hall2-W605 - Map
Social Media Links:
TW @iotvillage
TW @ISEsecurity
TW @Villageidiotlab
https://defcon.social/@IoTVillage/
TI @iotvillage
YT https://www.youtube.com/c/IoTVillage/videos
DC https://discord.gg/EFKbNFrFaN

IoT Village advocates for advancing security in the Internet of Things (IoT) industry through bringing researchers and industry together. IoT Village hosts talks by expert security researchers, interactive hacking labs, live bug hunting in the latest IoT tech, and competitive IoT hacking contests, including our 4 time black badge DEF CON CTF. Over the years, IoT Village has served as a platform to showcase and uncover hundreds of new vulnerabilities, giving attendees from around the globe the opportunity to learn about the most innovative techniques to both hack and secure IoT. IoT Village is organized by security consulting and research firm, [Independent Security Evaluators (ISE)](https://www.ise.io/).
Links: Website -
https://iotvillage.org/defcon.html
Return to Index
LPV Village: Talk List
Home Page: https://www.toool.us/
DC Village Page: #orga_40736
DC Discord Chan: https://discord.com/channels/708208267699945503/732734164780056708
Location: LVCCWest-Level1-Hall2-W701 - Map
Social Media Links:
TW @toool
TI @toool_us
YT https://youtube.com/c/TOOOL-US
https://techhub.social/@TOOOL

Want to tinker with locks and tools the likes of which you've only seen in movies featuring secret agents, daring heists, or covert entry teams?
Then come on by the Lockpick Village, run by The Open Organization Of Lockpickers, where you will have the opportunity to learn hands-on how the fundamental hardware of physical security operates and how it can be compromised.
The Lockpick Village is a physical security demonstration and participation area. Visitors can learn about the vulnerabilities of various locking devices, techniques used to exploit these vulnerabilities, and practice on locks of various levels of difficultly to try it themselves.
Experts will be on hand to demonstrate and plenty of trial locks, pick tools, and other devices will be available for you to handle. By exploring the faults and flaws in many popular lock designs, you can not only learn about the fun hobby of sport-picking, but also gain a much stronger knowledge about the best methods and practices for protecting your own property.
Links: Website -
https://www.toool.us/
Return to Index
MHV Village: Talk List
Home Page: https://maritimehackingvillage.com/
DC Village Page: #orga_40969
Location: LVCCWest-Level1-Hall2-W504
Social Media Links:
https://x.com/maritimevillage
LI @maritimehackingvillage

The Maritime Hacking Village (MHV) has set sail for LVCC to deliver the first and only immersive maritime hacking experience for you to learn what it takes to exploit and defend real-world maritime systems. Our mission is simple: we are creating a space for stakeholders to come together and navigate the changing tides in the maritime sector’s technological, geopolitical, and adversarial landscapes which demand ever-more-urgent collective action to address the systemic cybersecurity vulnerabilities in the systems which underpin global maritime defense and trade. Together we hack to facilitate the discovery and sharing of knowledge integral to the development of effective maritime cybersecurity policy, industry standards and regulations, vulnerability information sharing, cyber threat intelligence, and most importantly – a capable and trusted workforce and community-of-interest.
Why? Maritime infrastructure is the backbone of the global economy and order. Countries, companies, and militaries all use the sea for power projection and commerce, but no single stakeholder controls the implementation of policies and regulations. Stakeholders unanimously agree that from machines, to systems, to governance, the maritime domain is fundamentally insecure. Still, seemingly insurmountable access barriers are preventing the security community, and anyone else, from doing anything to help.
MHV has made it our purpose to eliminate these barriers – and to provide every human with the access and resources necessary to engage in maritime vulnerability research and cybersecurity innovation. Our village is a safe, shared space where the security community (elite hackers, trusted providers, and young talent alike) can develop and demonstrate their competence in attacking and defending real maritime systems – and where maritime industry stakeholders can engage with this community on neutral ground to grow their arsenals of knowledge, tools, trusted and capable providers, and fresh talent. We believe that this work together will create rising tides of awareness, information sharing, and innovation that will lift all ships and allow us to gradually secure the maritime sector.
Links: Website -
https://maritimehackingvillage.com/
Mastodon (@maritimehackingvillage@defcon.social) -
https://defcon.social/@maritimehackingvillage
Return to Index
MISC Village: Talk List
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_MISC
Return to Index
MWV Village: Talk List
Home Page: https://malwarevillage.org/
DC Village Page: #orga_40968
Location: LVCCWest-Level1-Hall1-W303
Social Media Links:
https://x.com/MalwareVillage
LI @malwarevillage
DC https://discord.com/invite/xQwqY48SrJ

Malware Village is dedicated to providing a safe and engaging environment for participants to learn and share knowledge about malware analysis. Our mission is to equip attendees with the skills, techniques, and historical context needed to understand, research, and combat malware. Participants will gain hands-on experience with real-world analysis techniques, guided by seasoned infosec professionals.
Beyond technical training, Malware Village fosters a strong community where researchers, enthusiasts, and professionals can connect. We welcome everyone—whether you're an artist creating malware-inspired art, a hardware researcher discovering unexpected connections to malware analysis, or a seasoned analyst reminiscing about early malware history. Even children can explore malware through Malmons (aka Malware Monsters by Lena Yu aka LambdaMamba), making cybersecurity education more accessible.
At its core, Malware Village is about uniting people—newcomers and experts alike—with a shared mission: understanding, analyzing, and defending against malware to protect society.
Links: Website -
https://malwarevillage.org/
Mastodon (@malwarevillage@defcon.social) -
https://defcon.social/@malwarevillage
Return to Index
PHV Village: Talk List
Home Page: https://www.wallofsheep.com/
DC Village Page: #orga_40737
DC Discord Chan: https://discord.com/channels/708208267699945503/708242376883306526
Location: LVCCWest-Level3-W303-W310 - Map
Social Media Links:
TW @wallofsheep
FB @wallofsheep
YT https://youtube.com/wallofsheep
TI @wallofsheep
PS https://www.periscope.tv/wallofsheep
https://defcon.social/@wallofsheep
IG @wallofsheep

The Packet Hacking Village at DEF CON provides a community learning experience for people of all skill levels, from absolute beginners to seasoned professionals. While DEF CON is made up of dozens of small community-of-interest villages, we are one of the largest and most well known. We host practical training, network forensics and analysis games, and the renowned Capture The Packet event, which has been a Black Badge contest over 10 times and draws world-class hackers from around the world. Our mission has always been simple: to teach people good internet safety practices, and to provide an atmosphere that encourages everyone to explore and learn.
We provide a welcoming environment for hackers of all skill levels and backgrounds to network, learn new things, and be active participants in DEF CON. Our famous “Wall of Sheep” provides a fun and interactive take on internet security and privacy, while our contests Packet Inspector, Packet Detective, and Capture The Packet serve as a zero-to-hero pathway for individuals to learn network security, packet analysis, and delve into advanced security topics. Every year we strive to bring something new and innovative to DEF CON, whether it’s never-seen-before talks or creative games to teach and test skills.
Links: Website -
https://www.wallofsheep.com
Mastodon (defcon.social) -
https://defcon.social/@wallofsheep
Return to Index
PLV Village: Talk List
Home Page: https://defcon.org/policy/
DC Village Page: #orga_40740
Location: LVCCWest-Level2-W234 - Map
Social Media Links:
TW @DEFCONPolicy
link
https://defcon.social/@defconpolicy

The DEF CON community understands that creating a safer digital society requires collaboration between security and policy experts. Policy @ DEF CON provides a space for representatives of all areas of security to come together to educate and engage each other.
Tech policy is being written as we speak and we believe that including diverse expert voices will improve outcomes and help to bridge gaps between technical and policy practitioners. Senior government officials, nonprofit and private sector experts, security researchers, hackers, academics and technologists from around the world all come together at Policy @ DEF CON.
Links: Mastodon (defcon.social) -
https://defcon.social/@defconpolicy
Website -
https://defcon.org/policy/
Return to Index
PSV Village: Talk List
Home Page: https://www.physsec.org/
DC Village Page: #orga_40970
DC Discord Chan: https://discord.com/channels/708208267699945503/732732893830447175
Location: LVCCWest-Level1-Hall2-W804 - Map
Social Media Links:
TW @physsec
TI @bypassvillage
LI @physsec
https://defcon.social/@physsec

Physical security is an important aspect to think about when considering securing your facility. The Physical Security Village provides an important opportunity to learn about real-world threats, hands-on mitigation techniques, and best practices for protecting assets. Our village brings together experts, practitioners, and enthusiasts to share knowledge through interactive demos, talks, and discussions. Whether you're new to physical security or a seasoned professional, you'll find valuable insights and practical skills.
Links: Mastodon (@physsec/media@defcon.social) -
https://defcon.social/@physsec/media
Website -
https://physsec.org
Return to Index
PYV Village: Talk List
Home Page: https://www.paymentvillage.org/
DC Village Page: #orga_40738
DC Discord Chan: https://discord.com/channels/708208267699945503/732733473558626314
Location: LVCCWest-Level1-Hall2-W505 - Map
Social Media Links:
TW @paymentvillage
TI @paymentvillage
YT link
https://t.me/paymentvillage

Come to the Payment Village to learn about payment technologies! Payments play a crucial role in our daily lives, yet many of us lack an understanding of how they work. Our mission is to educate and cultivate the next generation of payment security experts and to foster open discussions around payments. We want to raise the bar in payment security! We invite you to explore the history of payments and to learn how modern-day payments work.
The village is jam-packed with hands-on experiences and exciting challenges! Unsure of where to start? Register for one of our workshops to acquire new skills or attend a talk by one of our carefully chosen experts. Already a pro? Pick up a Payment Village credit card to take part in our contest! Looking for unique challenges? Take home all the money from our cash-grab machine or have a go at our scavenger hunt!
As if that is not enough, this year we have created the largest badge EVER at DEF CON, our vulnerable ATM badge. We are bringing ATM hacking to the masses; our badge simulates an ATM attack surfaces in a physical form factor you can carry with two hands! not a forklift truck.
Links: Website -
https://www.paymentvillage.org/
Mastodon (@paymentvillage@mastodon.social) -
https://mastodon.social/@paymentvillage
Return to Index
QTV Village: Talk List
Home Page: https://quantumvillage.org/
DC Village Page: #orga_40741
Location: LVCCWest-Level1-Hall1-W206 - Map
Social Media Links:
TW @quantum_village
DC https://discord.gg/6WUjH5cBXu
LI @quantumvillage
YT https://youtube.com/@quantum_village/

Quantum Village Returns with our Year of Quantum Edition @ DEF CON 33!! Our theme this year is “Sense and Security” and we are bringing some amazing talks, workshops, demos, and hands-on activities to this year’s incredible Quantum Village! Come and find out how to hack quantum computers, learn more about quantum technologies, and meet the engineers and scientists who are building the machines that manipulate the quantum world. We also introduce the world’s first hackable, fully open sourced diamond-based quantum sensing platform - and we’ll be showing some of the amazing things it can do! We have quantum computers, quantum sensors, The OG Quantum CTF, quantum art (and artists), and all you need to prepare for the quantum future!
Links: Website -
https://quantumvillage.org/
Return to Index
RCV Village: Talk List
Home Page: https://www.reconvillage.org/
DC Village Page: #orga_40743
DC Discord Chan: https://discord.com/channels/708208267699945503/732733566051418193
Location: LVCCWest-Level1-Hall2-W603 - Map
Social Media Links:
TW @ReconVillage
FB @reconvillage
YT https://www.youtube.com/reconvillage/

Recon Village is an Open Space with Talks, Live Demos, Workshops, Discussions, CTFs, etc., with a common focus on Reconnaissance. The core objective of this village is to spread awareness about the importance of reconnaissance and open-source intelligence (OSINT) and demonstrate how even a small piece of information about a target can cause catastrophic damage to individuals and organizations.
As recon is a vital phase for infosec as well as investigations, folks should have this skill set in their arsenal. People should check out Recon Village, as they get to learn novel point/recon techniques, play hands-on CTF, participate in Live Recon, and, most of all, have fun. At RV, we keep things simple, and the focus is on generating quality content using talks, workshops, CTF, live hacking, hackathons, and other hands-on activities, etc.
We also run fun and hands-on live competitions where participants learn while they play.
Links: Website -
https://reconvillage.org/
Mastodon (@reconvillage@defcon.social) -
https://defcon.social/@reconvillage
Return to Index
RFV Village: Talk List
Home Page: https://rfhackers.com/
DC Village Page: #orga_40742
DC Discord Chan: https://discord.com/channels/708208267699945503/732732595493666826
Location: LVCCWest-Level1-Hall2-W803 - Map
Social Media Links:
TW @rfhackers
TW @rf_ctf
link
DC https://discordapp.com/invite/JjPQhKy

After 17 years of evolution, from the WiFi Village, to the Wireless Village, RF Hackers Sanctuary presents: The Radio Frequency Village at DEFCON 32. The Radio Frequency Village is an environment where people come to learn about the security of radio frequency (RF) transmissions, which includes wireless technology, applications of software defined radio (SDR), Bluetooth (BT), Zigbee, WiFi, Z-wave, Radio Frequency Identification (RFID), Infrared (IR) and other protocols within the usable RF spectrum. As a security community we have grown beyond WiFi, and even beyond Bluetooth and Zigbee. The RF Village includes talks on all manner of radio frequency command and control as well as communication systems. While everyone knows about the WiFi and Bluetooth attack surfaces, most of us rely on many additional technologies every day. RF Hackers Sanctuary is supported by a group of experts in the area of information security as it relates to RF technologies. RF Hackers Sanctuary’s common purpose is to provide an environment in which participants may explore these technologies with a focus on improving their skills through offense and defense. These learning environments are provided in the form of guest speakers, panels, and Radio Frequency Capture the Flag games, to promote learning on cutting edge topics as it relates to radio communications. We promise to still provide free WiFi.
Co-located with the RF Village is the RF Capture the Flag. Come for the talks, stay for the practice and the competition.
Who runs this thing?
RF Hackers Sanctuary is a group of all volunteers with expertise in radio security and various other related fields. We are the original creators of the WiFi Capture the Flag, Wireless Capture the Flag, and RF Capture the Flag. We are the original founders of the WiFi Village, Wireless Village, and RF Village. Often imitated, never duplicated.
Links: Website -
https://rfhackers.com/
Return to Index
RTV Village: Talk List
Home Page: https://redteamvillage.io/
DC Village Page: #orga_40744
Location: LVCCWest-Level1-Hall1-W405-Red Team Village - Map
Social Media Links:
TW @RedTeamVillage_
YT https://www.youtube.com/redteamvillage
TI @redteamvillage
DC https://discord.gg/redteamvillage

The Red Team Village is focused on training the art of critical thinking, collaboration, and strategy in offensive security. The RTV brings together information security professionals to share new tactics and techniques in offensive security.
Links: Website -
https://redteamvillage.io/
Return to Index
SEV Village: Talk List
Home Page: https://www.se.community/
DC Village Page: #orga_40745
DC Discord Chan: https://discord.com/channels/708208267699945503/732733952867172382
Location: LVCCWest-Level3-W317-W319 - Map
Social Media Links:
TW @sec_defcon
YT link
TI @se_community
LI @social-engineering-community
FB @Social-Engineering-Community-108883855139272

The Social Engineering Community is formed by a group of individuals who have a passion to enable people of all ages and backgrounds interested in Social Engineering with a venue to learn, discuss, and practice this craft. We plan to use this opportunity at DEF CON to present a community space that offers those elements through panels, research opportunities, and contests in order to act as a catalyst to foster discussion, advance the craft and create a space for individuals to expand their network. DEF CON attendees can either participate in these events, or they can watch the events unfold and learn about Social Engineering as an audience member. We plan to accomplish the above by bringing together passionate individuals to have a shared stake in building this community.
Links: Website -
https://www.se.community/
Return to Index
SOC Village: Talk List
Return to Index
TCV Village: Talk List
Home Page: https://telecomvillage.com/
DC Village Page: #orga_40747
Location: LVCCWest-Level2-W224 - Map
Social Media Links:
TW @TelecomVillage

At Telecom Village, our mission is to cultivate critical and innovative thinking in telecom security, with a strong focus on 5G networks. We offer a structured learning approach that enables participants to:
- Identify key areas for research and security analysis.
- Explore telecom vulnerabilities and misconfigurations in depth.
- Develop essential skills, including security gap analysis, penetration testing of telecom protocols, Radio Access Networks (RAN), 5G API gap analysis and ICT-related threat mitigation.
Our goal is to bridge the gap between theory and real-world application, equipping participants with the expertise to navigate and counter emerging telecom security challenges effectively. Through guided research, hands-on learning, and continuous exploration, we foster a community of skilled professionals ready to tackle the evolving telecom landscape.
Links: Website -
https://telecomvillage.com/
Return to Index
VMV Village: Talk List
Home Page: https://votingvillage.org/
DC Village Page: #orga_40748
DC Discord Chan: https://discord.com/channels/708208267699945503/732733881148506164
Location: LVCCWest-Level2-W222-W223 - Map
Social Media Links:
TW @votingvillagedc
YT link
TI @votingvillagedc
LI @election-integrity-foundation
IG @votingvillage?igsh=MWJreTh6dGl3eDEzNg==

The [Voting Village](https://votingvillage.org) has been an annual event since 2017 that provides hands-on opportunities to understand and analyze voting system hardware and software. Before the Voting Village, ordinary technologists and citizens had no access to the systems that run our election infrastructure. As the only open environment that gives the public hands-on access to their election systems, it is a critical antidote to rampant misinformation about election security and provides an opportunity to strengthen these systems against malicious attacks. The Voting Village is brought to you by our 501(c)3 tax exempt not for profit organization, the Election Integrity Foundation, EIN: 83-4089169.
The Voting Village has been invited to testify to Congress several times about how to strengthen election infrastructure. Conversely, we have drawn fire from voting system manufacturers, prompting a bipartisan group of senators to co-sign a public letter defending the Voting Village against some of the largest voting machine companies in 2018.
Even between presidential election cycles, expanding the reach of the Voting Village and providing education about how our election systems work is critical to democracy.
Links: Website -
https://votingvillage.org/
Return to Index
WS Village: Talk List
Home Page: https://defcon.org/html/defcon-33/dc-33-workshops.html
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_WS
Return to Index
Speaker List
EdD
EdD
Tung 123ojp
1nfocalypse
4dw@r3
Aamiruddin Syed
Aaron "ironcat" Rosenmund
Aaron "KNOX" James
Aaron "KNOX" James
Aaron "scriptingxss" Guzman
Aaron Boyd
Aaron Hogan
Aastha Sahni
Abdel Sy Fane
Abhijith "Abx" B R
Abhinav Khanna
Abhinav Khanna
Abhinav Pandagale
Abhinav Pandagale
Adam "BuildHackSecure" Langley
Adam "pi3" Zabrocki
Adam "UNC1739" Crosser
Adam "UNC1739" Crosser
Adam "UNC1739" Crosser
Adam Batori
Adam Pennington
Adam Robbie
Adam Segal
Adam915
Adel Karimi
Adnan Khan
Adrien Ogee
Adwiteeya Agrawal
Afonso Tinoco
Agostino "Van1sh" Panico
Agostino "Van1sh" Panico
Akib Sayyed
Alejandro "0xedh" Hernando
Alejandro "TheMalwareGuardian" Vazquez
Alek Amrani
Alessandro Di Federico
Alessandro Di Federico
Alessandro Grisa
Alessandro Strino
Alethe Denis
Alex "cheet" Delifer
Alex Ackerman
Alex Bernier
Alex Holden
Alex Matrosov
Alexandrine TORRENTS
Alexandru Lazar
Alexis Cao
Alexis Hancock
Alfie Champion
Allan Friedman
Alon "alon_leviev" Leviev
Alyssa Coley
Amal Graafstra
Amelia Shapiro
Amp
Anchises Moraes
Andrea Downing
Andrea
Andrew "Helicopters of DC" Logan
Andrew "Spike" Brandt
Andrew Brandt
Andrew Case
Andrew Cockburn
Andrzej Olchawa
Andy Hull
Anil Celik
Anil Celik
Anissa Elias
Anıl Çelik
Anmol "Fr13nd0x7f" K. Sachan
Anmol "Fr13nd0x7f" K. Sachan
Anna Pham
Anna portasynthinca3 Antonenko
Anthony "Coin" Rose
Anthony "Coin" Rose
Anthony Silva
Antoine Goichot
Apurv "ASG_Sc0rpi0n" Singh Gautam
Apurv "ASG_Sc0rpi0n" Singh Gautam
Archwisp
Arda Büyükkaya
Arjun "T3R4_KAAL" Chaudhary
Arjun "T3R4_KAAL" Chaudhary
Arjun "T3R4_KAAL" Chaudhary
Arjun "T3R4_KAAL" Chaudhary
Arnaud Soullié
Asher Davila
Ashwin Iyer
Ata Seren
Ata Seren
AtHeartEngineer
Audrey Adeline
Austin Norby
Austin Reid
Austin Worline
Aviad Gispan
Aviad Hahami
AviNash Srinivasan
Ayaan Qayyum
Ayaan Qayyum
Ayman Boulaich
Ayman Elsawah
Ayman Elsawah
Ayodele Ibidapo
Ayodele Ibidapo
Barb Hirz
Barrett Darnell
Ben "nahamsec" Sadeghipour
Ben "nahamsec" Sadeghipour
Ben "nahamsec" Sadeghipour
Ben "nahamsec" Sadeghipour
Ben "polygonben" Folland
Ben "polygonben" Folland
Ben Gardiner
Ben Gardiner
Ben Hawkins
Ben Nassi
Benjamin "bmixonbaca" Mixon-Baca
Benjamin "Cave Twink" Woodill
Bill Demirkapi
Bleon "Gl4ssesbo1" Proko
Bleon "Gl4ssesbo1" Proko
Bob Coecke
Bobby Graydon
Bobby Kuzma
Borja "borjmz" Martinez
Brad Ammerman
Braelynn Luedtke
Bramwell Brizendine
Bramwell Brizendine
Brandon Bailey
Brent "TheDukeZip" Dukes
Brent Harrell
Brent Muir
Brent White
Bret Fowler
Brian Baskin
Brian Burnett
Bruno "BrunoModificato" Halltari
Bug Bounty Village Staff
Bug Bounty Village Staff
Cale "calebot" Smith
Capt. Kit Louttit
Carey Parker
Carl Miller
Carson Green
Casey Edman
Cernica Ionut Cosmin
César Ramirez
Cesare "Red5heep" Pizzi
Cesare "Red5heep" Pizzi
Cesare "Red5heep" Pizzi
Chad Calease
Chad Spensky
Chelsea Button
Chelsea Button
Chelsea Button
Chen Levy Ben Aroy
Chiao-Lin "Steven Meow" Yu
Chiao-Lin "Steven Meow" Yu
Chiao-Lin "Steven Meow" Yu
Chistopher Lopez
Chloe Chong
Chris DeCarmen
Chris DeCarmen
Chris DeCarmen
Chris Greer
Chris Monteiro
Christophe Tafani-Dereeper
Christopher "xoreaxeaxeax" Domas
Christopher Dio Chavez
Christopher Nourrie
Coby Abrams
CoD_Segfault
CoD_Segfault
collin
Constantine Macris (TheDini)
Cooper "CyberTiger" Quintin
Cooper "CyberTiger" Quintin
Cooper "CyberTiger" Quintin
Corey Ball
Corey Ball
Cory Wolff
Craig Heffner
Cronkitten
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
CTF.ae
CTF.ae
Cthulhu
Cthulhu
Cybelle Oliveira
Cyrus Parzian
Dakshitaa Babu
Dakshitaa Babu
Dan Bongiorno
Dan Goga
Dan Pelegro
Dan
Dane Sherrets
Daniel "Varx" Beard
Daniel "Varx" Beard
Daniel Baker
Daniel Benavides
Daniel Cuthbert
Daniel Donze
Daniel Isler
Daniel Koranek
Daniel Marques
Daniel Reilly
Daniel Seetoh
Daniel Ward
Daniel Ward
Daniele Antonioli
Danilo Erazo
Data
David "johnnyspandex" Cash
David "Votd_ctf" Wearing
David "Votd_ctf" Wearing
David Rushmer
Dawn Song
Debasis Parida
Denis Smajlović
Dennis Giese
Deputy Minister Herming Chiueh
Desiree Wilson
Deviant Ollam
Devon Colmer
Devon Colmer
Diego "djurado" Jurado
Diego "rehrar" Salazar
Dirk-jan Mollema
Dong-Yi "Kazma Ye" Ye
Dr. Ahmet Furkan Aydogan
Drinor Selmanaj
Drinor Selmanaj
Eaton Zveare
Eaton Zveare
Eddie Rios
Edward "Actuator" Warren
Edward Crowder
Edward Landers
Ege Feyzioglu
eigentourist
Eijah
Elaine Shi
Elaine Shi
Elisa Gangemi
Elizabeth Biddlecome
Elliot Chernofsky
Elliot Chernofsky
Emily Fane
Emma Fang
Emma Stewart
Emre Odaman
Emre Odaman
Emre Odaman
Endrit Shaqiri
Endrit Shaqiri
Endrit Shaqiri
Enrico Faccioli
Enzo Damato
Eric Woodruff
Eric Woodruff
Erlend Leiknes
Erwin "Dollarhyde" Karincic
Espen Torseth
Estelle Ruellan
Eugene "spaceraccoon" Lim
Eugene "spaceraccoon" Lim
Eugene "spaceraccoon" Lim
Eva Benn
Ezra "Shammahwoods" Woods
Ezra "Shammahwoods" Woods
Ezz Tahoun
Ezz Tahoun
Ezz Tahoun
Ezz Tahoun
Ezz Tahoun
Farid Zakaria
Farzan Karimi
Federico Lucifredi
Federico Valentini
Filipi Pires
fir3d0g
Fotis Chantizis
Francisco Perdomo
Fredrik Sandström
Furkan Aydogan
Gabi Joseph
Gabriel Gegenhuber
Gabriel Nitu
Gannon "Dorf" Gebauer
Garrett Gee
Garrett Gee
Gary Kao
Gaston Aznarez
Gecko
George "sophron" Chatzisofroniou
George Hughey
George
Gijs Rijnders
Giovanni Cruz Forero
Giustina Kent
Godman666
Goshak
Grace "Baelfire" Parrish
Graham Helton
Greg Conti
Greg Conti
Greg Conti
Gregory Carpenter
Gunnar "g0lden" Andrews
HackeMate
HalFinneyIsMyHomeBoy
Hannah Zhao
Harini Ramprasad
Harrison "rs0n" Richardson
Harrison Sand
HD Moore
Hector Cuevas Cruz
Hubert Lin
Hugo van den Toorn
Huseyn "Khatai" Gadashov
Huseyn "Khatai" Gadashov
Hydrox
Hydrox
Ibai Castells
Ileana Barrionuevo
Ilkin Javadov
Inti "intidc" De Ceukelaire
Inti "intidc" De Ceukelaire
Irene Mo
Irvin Lemus
Isaac Soon
Isabel Straw
Jack Heysel
Jack Heysel
Jack Heysel
Jack Voltaic
Jack Voltaic
Jacob Avidar
Jae Young Kim
Jae Young Kim
Jake "Hubble" Krasnov
Jake "Hubble" Krasnov
Jake "Hubble" Krasnov
Jake "Hubble" Krasnov
Jake Braun
James "albinowax" Kettle
James Hawk
James Rice
James Rowley
James Utley
Jan "SP3ZN45" Berens
Jan "SP3ZN45" Berens
Janet Vertesi
Jasmin "JR0ch17" Landry
Jasmin "JR0ch17" Landry
Jason "jhaddix" Haddix
Jason Andress
Jason Vogt
Javan Rasokat
Jay Dancer
Jaya Baloo
Jayson E Street
Jeff "caffix" Foley
Jeff "The Dark Tangent" Moss
Jeff "The Dark Tangent" Moss
Jeff Jordan
Jennifer Schieferle Uhlenbrock
Jesse Michael
Jeswin Mathai
Jeswin Mathai
Ji'an "azraelxuemo" Zhou
Ji'an "azraelxuemo" Zhou
Jianjia Yu
Jianqiang (Stark) Li
Jimmy Wylie
Joe "Juno" Aurelio
Joe "securelyfitz" FitzPatrick
Joel "niemand_sec" Noguera
Joey Dreijer
John "Jlo" Lopes
John Andre Bjørkhaug
John Andre Bjørkhaug
John Fokker
John Johnson
Johnny Xmas
Jon DiMaggio
Jon DiMaggio
Jon McCoy
Jonathan Coradi
Jonathan Elkabas
Jonathan Elkabas
Jonny Lin
Jordan Bonagura
Jordan Kasper
Jordan Macey
Jorge Acevedo Canabal
José Gómez
Jose Plascencia
Josep Albors
Joseph "stoppingcart" Gabay
Joseph Davis
Joseph Lim
Joseph
Josh Huff
Josh Millsap
Josh Stiebel
Joshua "jstrosch" Stroschein
Joshua "jstrosch" Stroschein
Joshua "jstrosch" Stroschein
Joshua "jstrosch" Stroschein
JP Ausmasson
Juanma "M4C" Tejada
Juanma "M4C" Tejada
Jugal Patel
Juho Jauhiainen
Julian "Julez" Dunning
Jun “Ghost Hacker” Kawasaki
Junming "Chapoly1305" Chen
Junming "Chapoly1305" Chen
Justin "rhynorater" Gardner
Justin "rhynorater" Gardner
Justin W. Lin
Kai-Ching "Keniver" Wang
Kai-Ching "Keniver" Wang
Kai-Ching "Keniver" Wang
Kaitlyn Handelman
Kara Nance
Karen Ng
Karthik Tadinada
Katarina Amrichova
Katie "InsiderPhD" Paxton-Fear
Katie "InsiderPhD" Paxton-Fear
Katie "InsiderPhD" Paxton-Fear
KC Wong
Keane Lucas
Keanu "RedByte" Nys
Keenan Skelly
Kenneth Miltenberger
Kerry "Professor Kilroy" Hazelton
Kevin Clark
Kevin Clark
Kevin Clark
Kevin Shi
Kevin Shi
Klaus Agnoletti
Konstantinos Karagiannis
Krity Kharbanda
Kyle "d4rksystem" Cucci
Kyle "d4rksystem" Cucci
Kyle "d4rksystem" Cucci
Langston Clements
Laura S. Scherling
Laura S. Scherling
Lauren Pace
Lauren Proehl
Lee McWhorter
Lee McWhorter
Lee McWhorter
Leigh Trinity
Leigh-Anne Galloway
Leigh-Anne Galloway
Leigh-Anne Galloway
Lena "LambdaMamba" Yu
Lena "LambdaMamba" Yu
Lena "LambdaMamba" Yu
Lenin Alevski
Lenin Alevski
Leon "leonjza" Jacobs
Lexie "L3xic0n" Thach
Lexie "L3xic0n" Thach
Lior Adar
Lior ZL
Lisa Femia
Lishuo "ret2ddme" Song
Logan Cannan
Luke Cycon
Luke Szramowski
M0nkeyDrag0n
M0nkeyDrag0n
Madhu "madhuakula" Akula
Madhu "madhuakula" Akula
Madhu "madhuakula" Akula
Mahmut "ErdemOzgen" Erdem Ozgen
Mahmut "ErdemOzgen" Erdem Ozgen
MakeItHackin
Maksim Shudrak
Manish Gupta
Mansoor Ahmad
Marcell Szakály
Marcell Szakály
Marcelo Ribeiro
Marco Casagrande
Marek Tóth
Maria "drkrysSrng" San Jose
Marius Fleischer
Marius Muench
Mark "LargeCardinal" Carney
Mark Omo
Marko Mitic
Martin "tincho_508" Doyhenard
Martyn Higson
Matei Josephs
Matt Cheung
Matt Cheung
Matt Cheung
Matt Gaffney
Matt Holland
Matt Muir
Matthew Cancilla
Mauro Eldritch
Mauro Eldritch
Mauro Eldritch
Max "Libra" Kersten
Max Bazalii
Maximilian Günther
Megan Squire
Meghan Jacquot
Mehdi "kalimer0x00" Elyassa
Mehmet Önder Key
Mehmet Önder Key
Melanie "Goldfishlaser" Allen
Melanie "Goldfishlaser" Allen
Micah "micahflee" Lee
Micah "micahflee" Lee
Michael "bouncyhat" Weber
Michael "codingo_" Skelton
Michael "MSvB" Schloh von Bennewitz
Michael "MSvB" Schloh von Bennewitz
Michael "mtu" Torres
Michael "v3ga" Aguilar
Michael "v3ga" Aguilar
Michael DeVolld
Michael Donley
Michael Frank
Michael Gianarakis
Michael Odell
Michael Sulmeyer
Michael Tassey
Michelle Lopez
Mickey Shkatov
Mike "CroodSolutions" Manrod
Mike "CroodSolutions" Manrod
Mike Holcomb
Mike Lisi
Mike Raggo
Mikko Hypponen
Milenko Starcik
Miracle "OWOLABI" Abiodun
Mishaal Khan
MJ Casado
Monnappa "Monnappa22" K A
Monnappa "Monnappa22" K A
Moses Frost
MrBill
MrBill
Mrigakshi Goel
Muhammad Mudassar Yamin
Muhammad Mudassar Yamin
Munir Muhammad
Munir Muhammad
Nathan Case
Nathan Case
Natyra Shaqiri
Natyra Shaqiri
Natyra Shaqiri
Navaar Johnson
Nebu Varghese
Nelson Colón
Nelson Colón
Netanel Ben Simon
Neumann "scsideath" Lim
Nicholas Fredericksen
Nick "c7five" Percoco
Nick Aleks
Nick Copi
Noah Holland
Noam Moshe
Noel Wong
nyx
oblivion
Octavio Gianatiempo
Olivier Bilodeau
Omar Hamoudeh
Omar Hamoudeh
Omar Santos
Omar Santos
oopsbagel
oopsbagel
Or "oryair1999" Yair
Or "oryair1999" Yair
Or Eshed
Or Sahar
Ori David
PamirAI
Param D Pithadia
Param D Pithadia
Parsia "CryptoGangsta" Hakimian
Parsia "CryptoGangsta" Hakimian
Pat Patterson
Pat Patterson
Patrick "Gigstorm" Kiley
Patrick Walsh
Patrick Wardle
Patrick Wardle
Patrick Wardle
Patrick Wardle
Paul "6mile" McCarty
Paul McCarty
Paulino Calderon
Peter Hefley
Philip "Soldier of FORTRAN" Young
Philip Dunsey
Philippe "phLaul" Laulheret
Pietro Fezzardi
Pietro Fezzardi
Portswigger
Pratik Lotia
Preston Zen
Priyanka Joshi
Qiang Zeng
Qiang Zeng
Qidan "flanker_hqd" He
Quentin "croco_byte" Roland
Quinn Dombrowski
Rachael Tubbs
RADM John Mauger
Rafael Felix
Rafael Felix
Randy Pargman
Ravi Rajput
Ray "CURZE$" Cervantes
Ray "CURZE$" Cervantes
Rear Admiral John Mauger
Rebecah Miller
Red Team Village Staff
Rey "Privesc" Bango
Reynaldo "buh0"
Ricardo Fradique
Ricardo Sanchez
Rich "Buffaloverflow" Warren
Rich Compton
Richard "HeadlessZeke" Lawshae
Richard "neuralcowboy" Thieme
Richard "richeeta" Hyunho Im
Richard "richeeta" Hyunho Im
Rigo Salazar
Rik Chatterjee
Rishi "rxerium" Chudasama
Ritika Verma
Rob King
Robert "LambdaCalculus" Menes
Robert "nytr0gen" Vulpe
Robert Pafford
Robert Pimentel
Roberto Soares
Rodney Beede
Roee Idan
Roger "arma" Dingledine
Rohit Mothe
Ron Ben Yizhak
Ronald González
Roni "lupin" Carta
Roshan Piyush
Rosie "Lady Cyber Rosie" Anderson
Royce Yaezenko
Ruchira Pokhriyal
Russell Phillips
Ryan "0day" Montgomery
Ryan "rj_chap" Chapman
Ryan Emmons
Ryan Holeman
Ryan Mitchell
Ryan Nolette
Sajan Shetty
Sajan Shetty
Sam "erbbysam" Erb
Sam Bowne
Sam Collins
Sam Comini
Sam Hanson
Samuel Gasparro
Samuel Gasparro
Sandra Stibbards
Sandra Stibbards
Sanjeev Sharma
Sarah Hume
Sarah Powazek
Sasuke "Element138" Kondo
Sasuke "Element138" Kondo
Savannah Lazzara
Scott "ScottCTaylor12" Taylor
Scott "ScottCTaylor12" Taylor
Scott "ScottCTaylor12" Taylor
Scott Shackleford
Sean Marquez
Sean Marquez
Sean Prescott
Sebastian Köhler
Sebastian Köhler
Sebastian Tapia
Seongsu Park
Shahak Morag
Shane Krause
Shang-De "HackerPeanutJohn" Jiang
Sharlene Toney
Shawn
Shlomie Liberow
Shota "Sh1n0g1" Shinogi
Shota "Sh1n0g1" Shinogi
Shourya Pratap Singh
Shourya Pratap Singh
Shourya Pratap Singh
Shu-Hao
Sigusr Polke
Sinu
Sky Gul
Skyler Knecht
Skyler Knecht
Skyler Knecht
Sohum Thakkar
SolaSec
Spencer "ZeroSteiner" McIntyre
Spencer "ZeroSteiner" McIntyre
Spencer "ZeroSteiner" McIntyre
Spencer Koch
Stav Cohen
Stephanie Corvese
Stephanie Doyle
Stephanie Doyle
Stephen Bono
Steve Winston
Sydney Marrone
Tal "TLP" Peleg
Tal Skverer
Tanya "SheHacksPurple" Janca
Tapan Khilnani
Ted Carefoot
Temel Demir
Thomas "fr0gger_" Roccia
Thomas "XM20" Xuan Meng
Thomas "XM20" Xuan Meng
Thomas Pope
Thorin Klosowski
Tib3rius
Tim Clevenger
Tim Fowler
Tim Roberts
Tobias "ItsSixtyNein" Diehl
Tom Berek
Tom Chothia
Tom Cope
Tom Cross
Tom Cross
Tom Cross
Tom Tervoort
Tomer Nahum
Tomer Nahum
Tomer Nahum
Tomer Nahum
Tony Turner
Tony Webber
Tony Webber
Travis Goodspeed
Trevor Flynn
Troy Fridley
Tung-Lin "Echo Lee" Lee
Tyler Bertles
Tyler Ramsbey
Tyson Laa Deng
Utku Sen
Utku Sen
utvecklas
Valerio "MrSaighnal" Alessandroni
Vanshal Gaur
Veronika
Victoria "V__Wave" Kumaran
Vince Sloan
Vince Sloan
Vincent "Vinnybod" Rose
Vincent "Vinnybod" Rose
Vincent "Vinnybod" Rose
Vishal "Vish" Thakur
Vishal "Vish" Thakur
Vishal "Vish" Thakur
Vlad Iliushin
Vlatko Kosturjak
Wei Hong
Weihan Goh
Wes Thurner
Wesley McGrew
Wesley McGrew
Wesley McGrew
Whit "un1tycyb3r" Taylor
Wilfried "tiyeuse" Bécard
Will Baggett
Will McGraw
Will Thomas
William Giles
William Giles
Woody
Xian Xiang Chang
Xian Xiang Chang
Yael Grauer
Yago Lizarribar
Yann Allain
Yariv Tal
Yash Bharadwaj
Ying Zhu
Yoann "OtterHacker" DEQUEKER
Yoann "OtterHacker" DEQUEKER
Yoav Magid
Young Seuk Kim
Yuval Gordon
Yvonne "Von Marie" Cervantes
Yvonne "Von Marie" Cervantes
Zane "earl" Hoffman
Zhengyu Liu
ZiYang "lz2y" Li
Zoltan "zh4ck" Balazs
Zoziel Freire
Talk List
"We are currently clean on OPSEC": The Signalgate Saga - DCT
#ReclaimTech - A community movement - CRE
10 Lessons from the Frontlines of AI Vishing: From Zero to (Almost) Hero - SEV
10 Years of IoT Village: Insights in the World of IoT - IOTV
64-bit Intel Assembly Language Programming for Hackers - DCW
7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built - DCT
A Look into Using Native Godot Calls to Create Malware - RTV
A Tale of Weeds and Roses: Propagating the Right Data Protection Agreements with Vendors - CPV
Accelerating Malware Analysis with WinDbg Time Travel Debugging - DCW
Access Control Done Right the First Time - PSV
accessDenied: Step Into the Scenario. Deal the Consequences. - BHV
accessDenied: Step Into the Scenario. Deal the Consequences. - BHV
Advanced Active Directory to Entra ID lateral movement techniques - DCT
Advanced Ghidra Scripting & Automation - DCW
Adversarial mindset, thinking like an attacker is no longer optional - ADV
Adversaries at War: Tactics, technologies, and lessons from modern battlefields - ADV
Adversary Intel Lab: Build Your First Threat Emulation Plan - RTV
AI-Powered Web Applications: A New Era in Security – Live Technical Demo - RTV
AIMaL - Artificially Intelligent Malware Launcher - DL
AIMaL - Artificially Intelligent Malware Launcher - DL
AIMaL: Artificially Intelligent Malware Launcher - RTV
AirBleed - Covert Bluetooth Plist Payload Injection - DL
AirBleed - Covert Bluetooth Plist Payload Injection - DL
Airport Security! - S01 E008 - Breaking into your baggage - PSV
All your keyboards are belong to us! - HHV
Amber64: Mining Hacker History from Over Half a Million Commodore 64 Disks - DCT
AML Cryptocurrency Compliance - CRE
Analyzing and Creating Windows Shellcode for Hackers - DCW
Angry Magpie - DLP Bypass Simulator - DL
Angry Magpie - DLP Bypass Simulator - DL
Anotomy of Telecom Malware - TELV
AppleStorm - Unmasking the Privacy Risks of Apple Intelligence - DCT
Applied Cryptocurrency Hardware - CRE
Ask a Hiring Manager with Cory Wolff - RTV
Ask a Hiring Manager with Peter Hefley - RTV
Ask a Hiring Manager with Troy Fridley - RTV
Ask EFF - DCT
Assessing the Capabilities Gap Between Foundation Models and Cybersecurity Experts: Benchmarks, Safeguards, and Policy - AIV
Attack Flow and Root Cause Discovery - No LLMs, No Queries, Just Explainable ML - DL
Attack Flow and Root Cause Discovery - No LLMs, No Queries, Just Explainable ML - DL
Attacking AI - BBV
Attacking Kubernetes: Tools and Tactics to Compromise Your First Cluster - RTV
Back to Basics: Building Resilient Cyber Defenses - CPV
Badgelife: Lessons from Years of Do’s, Don’ts, and Last-Minute Saves - CRE
Bare Metal Reverse Engineering - BHV
Beaconator C2 Framework - DL
Beaconator C2 Framework - DL
Becoming a Caido Power User - BBV
Beginner's Guide to Attacks and Defenses - TRN
Behind the Badge: How We Used and Abused Hardware (again) to Create the AV Badge for DC33 - ASV
Behind The Dashboard - (Lack Of) Automotive Privacy - CPV
Beyond the Stack: How External Failures Impact Payments Security - PAYV
Binary exploitation basics - MWV
Binary Facades: Reversing approaches to extract embedded scripts in compiled macOS malware - DCT
Bio-Cryptography is the Game-Genie in a post quantum dystopia - BHV
BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets - DCT
Blackdagger - Cyber Workflow Automation Framework - DL
Blackdagger - Cyber Workflow Automation Framework - DL
Blind Trailer Shouting - CHV
Blind Trailer Shouting - DCT
BloodHound Enterprise CTF - RTV
Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors - ADV
BOAZ - A Multilayered Approach to AV/EDR Evasion Engineering - DL
BOAZ - A Multilayered Approach to AV/EDR Evasion Engineering - DL
Book Signing - Adversary Emulation with MITRE ATT&CK - Drinor Selmanaj - MISC
Book Signing - Adversary Emulation with MITRE ATT&CK - Drinor Selmanaj - MISC
Book Signing - Alex Matrosov/No Starch Press - MISC
Book Signing - Alfie Champion/No Starch Press - MISC
Book Signing - Breaking IN: A Practical Guide To Starting a Career In Information Security Cybersecurity Essentials For Startups : A Practical Guide - Ayman Elsawah - MISC
Book Signing - Breaking IN: A Practical Guide To Starting a Career In Information Security Cybersecurity Essentials For Startups : A Practical Guide - Ayman Elsawah - MISC
Book Signing - Casey Edman/No Starch Press - MISC
Book Signing - Corey Ball/No Starch Press - MISC
Book Signing - Cyber Calendar 2026 - Chris DeCarmen/Squared Away LLC - MISC
Book Signing - Cyber Calendar 2026 - Chris DeCarmen/Squared Away LLC - MISC
Book Signing - Cyber Calendar 2026 - Chris DeCarmen/Squared Away LLC - MISC
Book Signing - Daniel Reilly/No Starch Press - MISC
Book Signing - Eugene Lim/ No Starch Press - MISC
Book Signing - Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (5th ed) - Carey Parker - MISC
Book Signing - Fotis Chantizis/ No Starch Press - MISC
Book Signing - Future of Hacking: The Rise of Cybercrime and the Fight to Keep Us Safe - Laura S. Scherling, EdD / Bloomsbury - MISC
Book Signing - Future of Hacking: The Rise of Cybercrime and the Fight to Keep Us Safe - Laura S. Scherling, EdD / Bloomsbury - MISC
Book Signing - Ghost Hacker : How to hack human spirit - Jun Kawasaki - MISC
Book Signing - Jason Andress/ No Starch Press - MISC
Book Signing - Jon DiMaggio/ No Starch Press - MISC
Book Signing - JP Ausmasson/No Starch Press - MISC
Book Signing - Kara Nance/No Starch Press - MISC
Book Signing - Kyle Cucci/No Starch Press - MISC
Book Signing - Micah Lee/ No Starch Press - MISC
Book Signing - Nick Aleks/No Starch Press - MISC
Book Signing - Patrick Wardle/ No Starch Press - MISC
Book Signing - Paulino Calderon/No Starch Press - MISC
Book Signing - Philip Dunsey/No Starch Press - MISC
Book Signing - Practical Lock Picking; Keys to the Kingdom - Deviant Ollam/Red Team Tools - MISC
Book Signing - Supply Chain Software Security-AI, IoT and Application Security - Aamiruddin Syed/Apres Media LLC - MISC
Book Signing - The Browser Security Field Manual Adeline - Audrey Adeline - MISC
Book Signing - The Hacker Mindset: A 5-Step Methodology for Cracking the System and Achieving Your Dreams - Garrett Gee/Hacker Warehouse - MISC
Book Signing - The Hacker Mindset: A 5-Step Methodology for Cracking the System and Achieving Your Dreams - Garrett Gee/Hacker Warehouse - MISC
Book Signing - Travis Goodspeed/No Starch Press - MISC
Brazil's aPIXcalypse - How real time payments turned Brazilian threat scenario into a nightmare - PAYV
Break Systems, Not Promises: I promised to do a keynote at DEF CON - MWV
Breakin 'Em All – Overcoming Pokemon Go's Anti-Cheat Mechanism - DCT
Breaking In: Real Paths Into Cybersecurity from Hackers, Humans, and Hiring Pros - CRE
Breaking the Chain: Advanced Offensive Strategies in the Software Supply Chain - BBV
Breaking Wi-Fi Easy Connect: A Security Analysis of DPP - DCT
Bridge to Nowhere Good: When Azure Relay becomes a Red Teamer's highway - RTV
Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen - DCT
BT hacking - PAYV
Bug Bounty Village Closing Ceremony - BBV
Bug Bounty Village CTF Awards - BBV
Bug Bounty Village CTF Walkthrough - BBV
Building a Malware Museum - DCT
Building Your First Windows Malware Loader - RTV
Burning, trashing, spacecraft crashing: a collection of vulnerabilities that will end your space mission - ASV
C4 - Cross Compatible Command and Control - DL
C4 - Cross Compatible Command and Control - DL
Caldera for OT - Oops! All Software - DL
Caldera for OT - Oops! All Software - DL
Can't Stop the ROP: Automating Universal ASLR Bypasses for Windows - DCT
Card testing workshop - PAYV
Card testing workshop - PAYV
Carding is Dead, Long Live Carding: How MaaS is fueling NFC relay attacks - PAYV
Carding, Sabotage & Survival: A Darknet Market Veteran’s Story - DCT
Career Fair: Interview Tips and Referral - CRE
Career Fair: Resume Review - CRE
Cash, Drugs, and Guns: Why Your Safes Aren't Safe - DCT
Cheat Code for Hacking on T-Mobile: From Inside the TMO BBP Perspective - BBV
China's Health Sector Ambitions and Information Needs: Implications for U.S. Health Care Cyber Defense - PLV
ChromeAlone: Transforming a Browser into a C2 Platform - DCT
Claude--Climbing a CTF Scoreboard Near You - DCT
ClickFix: The Malware Delivery Technique Enabling Ransomware Affiliates and State-Sponsored APT Operations - MWV
Client or Server? The Hidden Sword of Damocles in Kafka - DCT
Cloud Forensics Workshop: Smart Grid Edition - DCW
Compromising Threat Actor Communications - MWV
Context Aware Anomaly Detection in Automotive CAN Without Decoding - CHV
Contextualizing alerts & logs at scale without queries or LLMs (opensource) - IOTV
Contextualizing alerts with relevant logs and events without queries or LLMs - DCW
Copycat - Identity Stealer Extension - DL
Copycat - Identity Stealer Extension - DL
Countering Forensics Software by Baiting Them - ADV
Cracking Chaos: Making, Using, and Breaking PRNGs - CPV
Creating an AI Agent to Hack a Web Application - RTV
Creating Integrated Threat Surveillance: AI + OSINT + Security Onion - CRE
Creating malicious functional app on Android - DCW
Creator Panel Discussion - BBV
Critically Neglected: Cybersecurity for buildings - ICSV
Crossing the Line: Advanced Techniques to Breach the OT DMZ - ICSV
Crypto Privacy Village: Closing Remarks - CPV
Crypto Privacy Village: Welcome - CPV
Crypto Privacy Village: Welcome - CPV
Crypto Privacy Village: Welcome - CPV
Cryptocurrency Enforcement Actions - CRE
Cryptocurrency Nodes and Relays - CRE
Cryptocurrency Opening Keynote - CRE
Cryptocurrency Weekend Keynote - CRE
Cryptography is hard: Breaking the DoNex ransomware - MWV
Cryptosploit - DL
Cryptosploit - DL
CTRAPS: CTAP Impersonation and API Confusion Attacks on FIDO2 - DCT
Cyber Volunteering and Community Defense - DEF CON Franklin and the Cyber Resilience Corps 1 Year In - DCT
Cybersecurity in Latin America: The Untold Stories of Resilience & Innovation - PGE
Dark Capabilities: When Tech Companies Become Threat Actors - PLV
DDoS: The Next Generation - CRE
De-Virtualizing the Dragon: Automated Unpacking and Deobfuscation of Nested VM-Based Protectors using Symbolic Execution and Taint Tracking - DCT
Dead Made Alive Again: Bypassing Intent Destination Checks and Reintroducing LaunchAnyWhere Privilege Escalation - DCT
Dead Reckoning: Hijacking Marine Autopilots - MHV
Deconstructing Malware Lineage with Graph Neural Networks - MWV
Deep-dive into modern network fingerprinting - DCW
Deepfake Image and Video Detection - PHV
DEF CON Closing Ceremonies & Awards - DCT
DEF CON Groups (DCGs): Keeping the Signal Alive All Year Long - DCG
Defeating Malware Evasion: Techniques and Countermeasures - DCW
Deploying Deception in Depth for ICS - ICSV
Diamonds Are For Hackers - Building the first fully open source and hackable Quantum Sensor - DCT
Digital Casualties: Documenting Cyber-Induced Patient Harm in Modern Healthcare - BHV
Digital First Responders: Fixing Patient Safety Gaps with Smart Tech & AI - BHV
Direct Memory, Access Everywhere - DCT
DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks - DCT
Disrupting Digital Dataflows: A 101 on how 2 detect, analyze, & disrupt digital systems by reverse engineering real-world Electronic Warfare techniques from Ukraine at the hardware level - DCW
Dive into Windows Library Loading - DCW
DIY Malware Emulation: Build It, Break It, Detect It - DCW
DNS-Based OSINT Tactics for Product and Service Discovery - RTV
Do Scammers dream of electric Phish? Lessons learned from deploying AI-driven phishing ops - SEV
Domain Fronting in 2025: a retro analysis - MWV
Don the Mantle: Red Team Campaign Planning and Execution with MITRE ATT&CK - RTV
Don't be LLaMe - The basics of attacking LLMs in your Red Team exercises - RTV
Don’t Cry Wolf: Evidence-based assessments of ICS Threats - ICSV
DVBE - Damn Vulnerable Browser Extension - DL
DVBE - Damn Vulnerable Browser Extension - DL
Dyna - Automating the OWASP MASTG with Offensive Android Tactics - DL
Dyna - Automating the OWASP MASTG with Offensive Android Tactics - DL
Edge of Tomorrow: Foiling Large Supply Chain Attacks By Taking 5k Abandoned S3 Buckets from Malware and Benign Software - DCT
EduQ: A DIY Self-Education Platform for Hackers to Break, Build, and Experiment with Quantum-Secured Networks - QTV
Effectively Detecting Modern Malware with Volatility 3 - DCW
Elevators 101 - PSV
Eliminating Bug Classes at Scale: Leveraging Browser Features for Proactive Defense - DCW
EMMC BGA Secrets, hack bga memory, no reballing necessary: Learn how to safely remove EMMC memory modules, hack them and then reinstall, without the difficult process of trying to reball the BGA. - DCW
Empire 6.0 - DL
Empire 6.0 - DL
Emulating Embedded Linux Devices at Scale with Light-Touch Firmware Rehosting - DCT
EncryptedClientHelloWorld: TLSv1.3 ECH As A Covert C2 Channel - RTV
Enshittification: It's Over 9000 - MWV
EntraGoat - A Deliberately Vulnerable Entra ID Environment - DL
EntraGoat - A Deliberately Vulnerable Entra ID Environment - DL
Escaping the Privacy Sandbox with Client-Side Deanonymization Attacks - DCT
Escaping the Privacy Sandbox with Client-Side Deanonymization Attacks - CPV
Evolution and History of Drain and Approval Attacks - CRE
Exploiting the Off-chain ecosystem in Web 3 Bug Bounty - BBV
Exposing Infosec Frauds and Foreign Agents Behind Mercenary Spyware Disinformation - MWV
Exposing Infosec Frauds and Foreign Agents Behind Mercenary Spyware Disinformation - MWV
Fear vs. Physics: Diagnosing Grid Chaos - ICSV
Fighting the Digital Blockade: A View from Taiwan - MHV
Fine Tune your personal LLM assistant to Secure coding - DCW
Fingerprinting Maritime NMEA2000 Networks - MHV
Firewalls Under Fire: China's 5+ year campaign to penetrate perimeter network defenses - DCT
Firmware Decryption: For, and By, the Cryptographically Illiterate - IOTV
FLARE-VM - DL
FLARE-VM - DL
Flipping Locks - Remote Badge Cloning with the Flipper Zero and More - PSV
Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems - DCW
Frida for reverse engineering payment applications - PAYV
From adversarial to aligned, redefining purple teaming for maximum impact - ADV
From Component to Compromised: XSS via React createElement - BBV
From Prey to Playbook: Learning about victim behavior from infostealer logs - RTV
From Prompt to Protection: A Practical Guide to Building and Securing Generative AI Applications - DCW
From Pwn to Plan: Turning Physical Exploits Into Upgrades - PSV
From Shanghai to the Shore: The Silent Threat in Global Shipping - DCT
From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion - DCT
From USB to C2 - RTV
Full Disclosure, Full Color: Badge-making story of this year's BBV badge - BBV
Game Hacking 101 - GHV
Garuda Threat Hunting Framework - DL
Garuda Threat Hunting Framework - DL
Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb That Hackers Can Access Everywhere - DCT
GenAI red teaming for Payment Fraud - PAYV
Getting Caught in Offensive Security - RTV
Getting started in Malware Analysis with Ghidra - MWV
Ghost Calls: Abusing Web Conferencing for Covert Command & Control - DCT
Ghosts in the Machine Check - Conjuring Hardware Failures for Cross-ring Privilege Escalation - DCT
Ghosts of REvil: An Inside Look with the Hacker Behind the Kaseya Ransomware Attack - DCT
GlytchC2 - Command Execution and Data Exfiltration of Any Kind Through Live Streaming Platforms - DL
GlytchC2 - Command Execution and Data Exfiltration of Any Kind Through Live Streaming Platforms - DL
GlytchC2: Command execution and data exfiltration of any kind through live streaming platforms - RTV
Go Hack Yourself: API Hacking for Beginners - RTV
Go Malware Meets IoT: Challenges, Blind Spots, and Botnets - IOTV
Grandoreiro & friends: brazilian banking trojans tour outside Latin America - MWV
Grind vs Gleam: Building Reddit's DDoS Resilience - CRE
Growing Red Team Village: What We’ve Learned Building an Offensive Security Community - RTV
Hack the Clock: Automating CVE Exploit searches to save time, money, and not get bored. - RTV
Hacker Troll House - RTV
Hacker VPN - DCW
Hacker vs. Triage: Inside the Bug Bounty Battleground - BBV
Hackers Dropping Mid-Heist Selfies: LLM Identifies Information Stealer Infection Vector and Extracts IoCs - DCT
Hacking a head unit with malicious PNG - CHV
Hacking at Scale with AI Agents: Building an Autonomous Bug Bounty Hunter - BBV
Hacking Context for Auto Root Cause and Attack Flow Discovery - PHV
Hacking Custody and Exchanges - CRE
Hacking Hotel Locks; The Saflok Vulnerabilities Expanded - PSV
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G and 4G/LTE Routers - DCT
Hacking Space to Defend It: Generating IoBs with SPARTA - ASV
Hacking the connected plant: AI edition! - DCW
Hacking the Edge: Real-World ESI Injection Exploits - BBV
Hacking the First Amendment: A press photographer's perspective on Red Teaming scenarios - SEV
Hacking the Graph: Advanced Target Discovery with OWASP Amass - BBV
Hacking The Metal: Into the GPU - DCW
Hacking the Nautical Rules of the Road: Turn Left for Global Pwnage - MHV
HaKCing OBD-II Emissions Testing - DCT
Hands-on IoT firmware extraction and flash forensics - DCW
Hands-on Kubernetes Attack & Defense Masterclass - DCW
Hands-On Threat Hunting with Wireshark - DCW
Hard Hat Brigade Creations Q&A -
Hard Hat Brigade Organizer Panel -
Have I Been Ransomed? - DL
Have I Been Ransomed? - DL
Help! Linux in my Webcam! (•_•) - DCT
Here and Now: Exploiting the Human Layer at the Right Moment - ADV
How AI + Hardware can Transforming Point-of-Care Workflows - BHV
How API flaws led to admin access to over 1,000 USA dealers and control over your car - CHV
How Computers Kill People: Marine Systems - MHV
How Not to IoT: Lessons in Security Failures - ESV
How NOT to Perform Covert Entry Assessments by WeHackPeople.com - PSV
How to Fake a Badge like a Pro: 11 Tips to Counterfeiting Event Credentials - DCT
How to secure unique ecosystem shipping 1 billion+ cores? - DCT
HTTP/1.1 Must Die! The Desync Endgame - DCT
Hull Integrity: Applying MOSAICS to Naval Mission Systems - ICSV
Hybrid Attack - RTV
I Can't RE (and You Can Too!) - MWV
Illuminating the Dark Corners of AI: Extracting Private Data from AI Models and Vector Embeddings - CPV
Impact of Frontier AI on the Landscape of Cybersecurity - AIV
Infecting the Boot to Own the Kernel: Bootkits and Rootkits Development - DCT
Influence Operations: Tactics, Defense, and Exploitation - TRN
Influence Operations: Tactics, Defense, and Exploitation - TRN
Initial Access Tactics on MacOS - RTV
Inside Look at a Chinese Operational Relay Network - DCT
Inside the Threat: Designing and Deploying Malicious Browser Extensions to Understand Their Risk - DCW
Instant API Hacker! - RTV
Intro to Ciphers [Mini Workshop/Talk] - CPV
Intro to Common Industrial Protocol Exploitation - ICSV
Intro to Physical Security Bypass - PSV
Intro to village - PAYV
Intro to village - PAYV
Introducing CIPHER: The Open-Source Platform Revealing Patient Harms from Healthcare Cyberattacks - BHV
Introduction of Loong Community & Financial Identity crime (deepfake) regulation of diferetn jurisdictions - CRE
Introduction to Cryptographic Attacks - DCW
Introduction to Operationalizing & Using C2 (w/ some AI) - RTV
Invitation Is All You Need! Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite - DCT
Jailbreaking the Hivemind: Finding and Exploiting Kernel Vulnerabilities in the eBPF Subsystem - DCT
Journey to the center of the PSTN: How I became a phone company, and why you should too. - DCT
K8sploitation: Hacking Kubernetes the Fun Way - DCW
KeePass, weaponized - MWV
Kill Chain Reloaded: Abusing legacy paths for stealth persistence - DCT
Kill List: Hacking an Assassination Site on the Dark Web - DCT
Killing Killnet - DCT
Learning to Hack Bluetooth Low Energy with BLE CTF - DCW
Legalizing Ethical Hacking: A Global Safe Harbor for Security Research - PLV
Let's Break Enigma! - CRE
Letthemin: Facilitating High-Value Purple Teams Using an Assumed Compromise Approach - ADV
Level UP OSINT - RTV
Leveraging AI and MCP Servers for Automated External Attack Surface Testing - RTV
Lex Sleuther - DL
Lex Sleuther - DL
Loading Models, Launching Shells: Abusing AI File Formats for Code Execution - DCT
Locked Down, Not Locked Out: How I Escaped Your Secure Operator Workstation - ICSV
Mac Malware Analysis - MWV
Magical Hacks - BBV
Making Dirty Pictures - The Issue with DICOM - MWV
Malware and Monsters - MWV
Malware Exploitation in PDFs: A Red Team Perspective - RTV
Malware in the gist: How malicious packages on npm bypass existing security tools - ADV
Malware Matryoshka: Nested Obfuscation Techniques - MWV
Man-in-the-Malware: Intercepting Adversarial Communications - DCT
Mastering Apple's Endpoint Security for Advanced macOS Malware Detection - DCT
Medical Device Hacking: 201 - DCW
Messenger - Proxies Here There and Everywhere - DL
Messenger - Proxies Here There and Everywhere - DL
Metal-as-a-Disservice: Exploiting Legacy Flaws in Cutting-Edge Clouds - DCT
Metasploit's Latest Attack Capability and Workflow Improvements - DL
Metasploit's Latest Attack Capability and Workflow Improvements - DL
Metasploit's Latest Attack Capability and Workflow Improvements - DL
MFT2: More Fungible Threats - DDV
MFT2: More Fungible Threats - DDV
Mind the Data Voids: Hijacking Copilot Trust to Deliver C2 Instructions with Microsoft Authority - DCT
Mind vs. Machine: Finding the Sweet Spot in Modern Red Teaming - RTV
Modern Odometer Manipulation - CHV
ModuleOverride – Changing a Tyre Whilst Driving - RTV
Moonlight Defender - Purple Teaming in Space! - ASV
MPIT - Matrix Prompt Injection Tool and ShinoLLMApps - DL
MPIT - Matrix Prompt Injection Tool and ShinoLLMApps - DL
Mythic, Ghostwriter, Nemesis, and Tying the Room Together: The Dude's Guide to Red Team Operations - RTV
Navigating the Invisible - MHV
Nebula - 4 Years and Still Kicking *aaS - DL
Nebula - 4 Years and Still Kicking *aaS - DL
Network tokens - PAYV
Never enough about cameras - The firmware encryption keys hidden under the rug - IOTV
No Brain No Gain - IOTV
No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol - DCT
NO-HAVOC today, NO-HAVOC tomorrow - MWV
North Korea's Fur Shop: Poaching for Otters, Beavers, Ferrets and Capybaras - MWV
Not Just a Pipeline Leak: Reconstructing the Real Attack Behind tj-actions - DCT
nRootTag - Exploiting Find My and Transforming Computers Into Unauthorized Trackers - DL
nRootTag - Exploiting Find My and Transforming Computers Into Unauthorized Trackers - DL
Nuclei: Beyond The Basic Templates - BBV
Nuclei: Beyond The Basic Templates - BBV
OAuthSeeker - DL
OAuthSeeker - DL
Obfuscation Reloaded: Modern Techniques for Evading Detection - DCW
Oblivious Access to Blockchains - CRE
Of Stochastic Parrots and Deterministic Predators: Decision-Making in Adversarial Automation - ADV
Off-Grid Datarunning in Oppresive Regimes: Sneakernet and Pirate Box - CRE
Old Tactics, New Weapons: Abusing Modern Software Stacks for Reliable Shell Access - RTV
One Key, Two Key, I Just Stole Your goTenna Key - DCT
One Modem to Brick Them All: Exploiting Vulnerabilities in the EV Charging Communication - CHV
One Modem to Brick Them All: Exploiting Vulnerabilities in the EV Charging Communication - DCT
Open Source Malware 101 - Everything you always wanted to know about npm malware (and more) - DCW
Operation Europa Crisis: A Tabletop Simulation - BHV
Operational Twilight: APTs, OT, and the geopolitics of a dying climate - ADV
Original Sin of SSO: macOS PRT Cookie Theft & Entra ID Persistence via Device Forgery - DCT
Orion - fuzzing workflow automation - DCT
OSINT Challenges - RTV
OSINT for Hackers - RTV
OT Network Segmentation Planning, Implementation, and Validation - ICSV
OverLAPS: Overriding LAPS Logic - DCT
PAPRa - DL
PAPRa - DL
Passing the Torch: Mentoring and Protecting Our Students in Education Spaces - CRE
Passkeys in payments - PAYV
Passkeys Pwned: Turning WebAuthn Against Itself - DCT
PatchLeaks - DL
PatchLeaks - DL
Paywall Optional: Stream for Free with a New Technique, Recursive Request Exploits (RRE) - DCT
Pen-testing Cloud REST APIs - DCW
Pirates of the North Sea - MHV
Planting C4: Cross-Compatible External C2 for All Your Implants - DCT
Platform Panel about Triage - BBV
Playing Dirty Without Cheating - Getting Banned for Fun and No Profit - DCT
PLC Playground: Hands-On Industrial Control Systems Attacks - DCW
Portswigger Awards: Top 10 web hacking techniques of 2024 - BBV
Post-Quantum Panic: When Will the Cracking Begin, and Can We Detect it? - QTV
Practical YARA: Crafting Custom Rules for Targeted Malware Defense - DCW
Private, Private, Private: Access Everywhere - CRE
Prompt. Scan. Exploit: AI’s Journey Through Zero-Days and a Thousand Bugs - BBV
promptmap2 - DL
promptmap2 - DL
Provably exfiltrating data by breaking TLS in the right ways - DCW
Putting EDRs in Their Place: Killing and Silencing EDR Agents - DCW
QC Intro - QTV
QRAMM: The Cryptographic Migration to a Post-Quantum World - CPV
Quantum Pictorialism for Hackers - QTV
Quantum Table Top Threat Modelling - QTV
Quantum-Resistant Healthcare - BHV
Quiet Confidence: An Introvert's Journey to Technical Public Speaking - CRE
Ransomware vs EDR: Inside the Attacker's Mind - RTV
RATs & Socks abusing Google Services - DCT
Rayhunter Internals - CRE
Reach the Nirvana - DCW
Rebadged, Relabeled, and Rooted: Pwnage via the Solar Supply Chain - DCT
Rebuild The World: Access to secure software dependency management everywhere with Nix - CRE
Recording PCAPs from Stingrays With a $20 Hotspot - DCT
Red Alerts and Blue Oceans: Incident Response from a Sysadmin’s War Room in Maritime Ops - MHV
Red Russians: How Russian APT groups closely follow offensive security research - ADV
Red Teaming Financial Defenses - CRE
Red Teaming Kubernetes: From App-Level CVEs to Full Cluster Takeover - RTV
Red Teaming Space: Hacking the Final Frontier - ASV
Redteam Infrastructure Vibez Edition - RTV
Referral Beware, Your Rewards Are Mine - BBV
Remote code execution via MIDI messages - DCT
Resilient and Reconfigurable Maritime Comms. - MHV
RETCON - Reticulum Embedded Turnkey Connection Operating Node - DL
RETCON - Reticulum Embedded Turnkey Connection Operating Node - DL
RETINA - Realtime Electronic Threat and Intrusion Neutralization Apparatus - DL
RETINA - Realtime Electronic Threat and Intrusion Neutralization Apparatus - DL
RETINA - Realtime Electronic Threat and Intrusion Neutralization Apparatus - DL
rev.ng Decompiler - DL
rev.ng Decompiler - DL
ReVault! Compromised by your Secure SoC - DCT
Risk and payments across the ecosystem - PAYV
Robin - The Archaeologist of the Dark Web - DL
Robin - The Archaeologist of the Dark Web - DL
Rusty pearls: Postgres RCE on cloud databases - DCT
Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch - DCT
Safeguarding the Industrial Frontier: OT SOC & Incident Response - ICSV
SAMLSmith - DL
SAMLSmith - DL
Satellite Networks Under Siege: Cybersecurity Challenges of Targeted DDoS Attacks - ASV
SCCM: The tree that always bears bad fruits - DCT
Secret Life of an Automationist: Engineering the Hunt - BBV
Secure Code Is Critical Infrastructure: Hacking Policy for the Public Good - PLV
Securing Intelligence: How hackers are breaking modern AI systems … and how bug bounty programs can keep up - BBV
Self Custodial Wallet Use - CRE
Shaking Out Shells with SSHamble - DCT
Silent Leaks: Harvesting Secrets from Shared Linux Environments - DCT
Silent Sabotage: How Nation-State Hackers Turn Human Error into Catastrophic Failures - CRE
Silent Sigma: Unraveling Iranian APT's 0-Day Warfare and Covert C2 - MWV
Silent Signals: Exploiting Security and Privacy Side-Channels in End-to-End Encrypted Messengers - DCT
Siri-ously Leaky: Exploring Overlooked Attack Surfaces Across Apple's Ecosystem - DCT
Smart Bus Smart Hacking: From Free WiFi to Total Control - CHV
Smart Devices, Dumb Resets? Testing Firmware Persistence in Commercial IoT - IOTV
Smashing the Sandbox: Inside DBatLoader's Unique Evasion Techniques - MWV
SnowGoat: Exposing Hidden Security Risks and Leaking Data Like a Threat Actor - DCW
So Long, and Thanks for All the Phish - DCT
Social Engineering Community Village Greeting and 2025 Badge Overview - SEV
Sometimes you find bugs, sometimes bugs find you - BBV
Spotter - Universal Kubernetes Security Scanner and Policy Enforcer - DL
Spotter - Universal Kubernetes Security Scanner and Policy Enforcer - DL
SSH Honeypots and Walkthrough Workshops: A History - PHV
SSH-nanigans: Busting Open the Mainframes Iron Fortress through Unix - DCT
State of Open Source in the Federal Government - PLV
State of the Pops: Mapping the Digital Waters - MHV
Stealing Browser Cookies: Bypassing the newest Chrome security measures - RTV
Stealing Browser Cookies: Bypassing the newest Chrome security measures - RTV
StealthToken: Exploiting Identity Providers the Serverless Way - RTV
Stories from a Tor dev - DCT
Surfing through the Stream: Advanced HTTP Desync exploitation in the wild - BBV
Surviving the Dataclysm: Resistance through Resilience - CRE
Takes All Kinds: Building Onramps for Emergency Web Archiving in Ukraine and Beyond - PLV
Tales from the NIST AI Pen Test Challenge - AI Pen Testing 101 - RTV
Teaching Your Reverse Proxy to Think: Fingerprint-Based Bot Blocking & Dynamic Deception - PHV
Tengu Marauder v2 - DL
Tengu Marauder v2 - DL
Testing Trust Relationships: Breaking Network Boundaries - BBV
The (Un)Rightful Heir: My dMSA Is Your New Domain Admin - DCT
The Ars0n Framework V2 Beta - BBV
The Beauty of Reversing Swift Malware - MWV
The challenges of Sub-dermal Payments - PAYV
The Cookie Heist: How Cybercriminals Are Outsmarting Chrome's Latest Defenses - MWV
The creation of the Malmongotchi badge - MWV
The depths that marketers will plummet to - CPV
The Devil Wears Headsets - SEV
The DOMino Effect: Automated Detection and Exploitation of DOM Clobbering Vulnerability at Scale - DCT
The Human Vulnerability: Social Engineering in a Hyper Connected World - SEV
The Missing Link: Draytek’s New RCEs Complete the Chain - HHV
The One Bitcoin Heist: Making a custom Hashcat module to solve a decade-old puzzle challenge - DCT
The Power(Point) Glove - HHV
The Quantum Shift: Practical Post-Quantum Risk: Algorithms, Infrastructure, and Transition - MWV
The Things know What You Did Last Session - IOTV
The Ultimate Hack: Applying Lessons Learned from the loss of TITAN to Maritime Cybersecurity - DCT
The Worst ICS/OT Love Story Ever Told - ICSV
The Year of the Bounty Desktop: Bugs from Binaries - BBV
There and Back Again: Discovering OT devices across protocol gateways - ICSV
TheTimeMachine - DL
TheTimeMachine - DL
They deployed Health AI on us. We’re bringing the rights & red teams. - BHV
Thinking Like a Hacker in the Age of AI - DCT
Third-Party Access Granted: A Postmortem on Student Privacy and the Exploit That’s Still in Production - PLV
Threat Dynamics on the Seas - MHV
To Pay or Not to Pay? The Battle Between Bug Bounty & Vulnerability Disclosure Programs - BBV
TotalTest 2.Oh!: Unleashing a Testing Program to Break Smarter, Measure Better, and Fund Your Fixes - ADV
Tracking 300k+ drives: What we’ve learned after 13 years - DDV
Tracking 300k+ drives: What we’ve learned after 13 years - DDV
TSPU: Russia's Firewall and Defending Against the Future of Digital Repression - DCT
Tunnelpocalypse - CRE
Turning Camera Surveillance on its Axis - DCT
Turning Microsoft's Login Page into our Phishing Infrastructure - DCT
Turning your Active Directory into the attacker’s C2: modern Group Policy Objects enumeration and exploitation - DCT
Uncovering the Secrets of Tire Pressure Monitoring Systems - CHV
Unexpected Connections: How a vulnerability in obscure dealer software could have unlocked your car from anywhere - DCT
Unmanned Wireless Penetration Testing Device - DL
Unmanned Wireless Penetration Testing Device - DL
Unmasking the Snitch Puck: the creepy IoT surveillance tech in the school bathroom - DCT
Unveiling IoT Vulnerabilities: From Backdoors to Bureaucracy - IOTV
Unveiling the shadows: Digital Forensics evidence in AI-Driven CyberCrime - MWV
Using Stardew Valley mods as a C2 and infostealer - MWV
VDP in Aviation - How it shouldn't be done! - ASV
Vector Space Manipulation in LLMs - RTV
Vibe School: Making dumb devices smart with AI - IOTV
Virtualization-Based (In)security - Weaponizing VBS Enclaves - DCT
Voice Cloning Air Traffic Control: Vulnerabilities at Runway Crossings - DCT
Voices from the Frontlines: Managing Bug Bounties at Scale - BBV
Voices of the Industry: A Fireside Chat with Payment Leaders - PAYV
VRP @ Google -- a look inside a large self-hosted VRP - BBV
WarHead - DL
WarHead - DL
Weaponizing Kestrel: Red Team Tradecraft for Hunting - RTV
Weaponizing Trust: Investigating a Threat Actor Targeting Security Researchers and Academics - DCT
Welcome to DEF CON 33! - DCT
What Europeans are doing right about cyber security - PLV
What Game Hackers teach us about Offensive Security and Red Teaming - GHV
What is Dead May Never Die: The Ghost of Internet Explorer in Windows: MapUrlToZone - DCT
What is Dead May Never Die: The Immortality of SDK Bugs - IOTV
What’s Really in the Box? The Case for Hardware Provenance and HBOMs - IOTV
Where’s My Crypto, Dude? The Ultimate Guide to Crypto Money Laundering (and How to Track It) - DCT
Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking - RTV
Whitebox Web Exploit Dev (WWED) - DCW
Wi-Fi-So-Serious - DCW
Win-DoS Epidemic: A crash course in abusing RPC for Win-DoS & Win-DDoS - DCT
You Can Mix but You Can’t Hide: Uncovering Node Behaviors in Nym Network - CPV
You snooze you lose: RPC-Racer winning RPC endpoints against services - DCT
Your Passkey is Weak: Phishing the Unphishable - PSV
Your Static Tools Are Cute - My AI Ripped ZebLoader Apart - MWV
Zero Trust, Total Bust - Breaking into thousands of cloud-based VPNs with one bug - DCT
DEF CON News
Workshops Registration announced!
Posted 2025-07-07
Registration for DEF CON workshops will open at precisely noon Pacific Daylight Time on July 15. It's a good idea to have your clicking device oiled up and sighted in - spaces get snapped up very quickly.
The full lineup is on the
Workshops Page
. Get your faves and alts all lined up for maximum efficiency.
It's happening, people. Feel free to get amped.
Speakers and Workshops are Live!
Posted 2025-07-01
Who's speaking on the main stages at DEF CON
? What
DEF CON Workshops
are going to be available? Inquiring minds want to know!
Lucky day for you, curious netizens. The listings for both are live now on the #dc33 website. Familiarize yourself with the lineup, and make your plans accordingly.
Final stretch people. DEF CON positively LOOMS on the horizon!
Workshops submission responses are out!
Posted 2025-06-17
Friendly reminder to all Workshops CFP submitters: Responses have gone out! If you don't see a response to your submission in your inbox, please check your spam folder.
Thanks to everyone who sent in a submission and congratulations to everyone that's been selected.
Parties, Meetups, & Events Page is live!
Posted 2025-06-12
Less than two months until DEF CON 33! Time to start planning to make the most of your DEF CON experience.
One of the best parts of DEF CON is meeting other humans and bonding over shared interests. On the
Parties, Meetups and Events page
you'll find a shockingly comprehensive list of group hangs. Whether you're into Running or Ham Radio, Blanket Forts or Karaoke, we've got you covered.
Set aside some time for fun and connection. Your people are waiting.
Jedi Training Registration Open
Posted 2025-05-04
We sense a disturbance in the force…
registration is open for DEF CON Training Las Vegas 2025
!
Whether you're a Rebel Red Teamer or a True Blue Defender, there is training for all, from any world in the galaxy!
Pack up your droids and join us in Vegas! Register today and take advantage of this opportunity to train with our Jedi Masters - uh, we mean instructors.
DEF CON 33 Lodging Update
Posted 2025-04-25
DC33 planning alert - The DEF CON room block at the Fontainebleau is sold out. The blocks at the Sahara and Venetian are filling up. To lock down your own deep DEF CON 33 discounts visit
defcon.org
for the reg links.
August will be here before you know it. Make sure you plan accordingly.
See you soon!
Call for Authors!
Posted 2025-04-24
Attention independent authors! DEF CON 33 is offering a space for
book signings in the Vendor area
. If you've got a book that will appeal to the DEF CON Community, we encourage you to submit it for consideration.
Get your work (and yourself) in front of a vibrant, engaged community of enthusiastic readers.
DEF CON 33 Short Story Contest!
Posted 2025-04-23
Attention all scribes and tale-weavers of the DEF CON community - the DEF CON 33 Short Story Contest is open for business! It takes place entirely online - you can find the details at
https://forum.defcon.org/node/252691
.
The theme is Access Everywhere. In addition to literary glory, you can also win free human badges for DC33.
let's GO.
DEF CON 33 Deadline Alert!
Posted 2025-04-04
Friendly DEF CON reminder: the deadline for the DEF CON 33
Call for Papers
,
Call for Workshops
and
Call for Demo Labs
is now less than a month away! Get your submissions in ahead of the mad rush at the May 1 deadline for maximum attention. We can't wait to see what you're working on.
DEF CON Training Las Vegas Registration Now Open!
Posted 2025-03-17
DEF CON Training Las Vegas Registration is officially open! Expanded menu includes dozens of course options, new 4-day trainings and a $200 earlybird discount. Join us in August for DEF CON style hands-on technical training from our world-class trainers. Information and signup at
training.defcon.org
. Reserve your spot now!
DEF CON 33 Deadline Alert!
Posted 2025-03-14
Friendly reminder to #defcon people everywhere 🚨
The
open calls for DEF CON 33
Contests, Villages and Communities close March 15. If you've got a cool idea to propose, now is the time!
Fortune favors the bold. Let's GO.
DEF CON 33 Theme Drop!
Posted 2025-03-05
"Access Everywhere."
This year we're thinking about how to make information and services available to everyone. Available wherever you are, whoever you are, and usable no matter how you need to connect.
Less walled gardens, more sunlight.
You can read the theme story and get some visual inspiration on the
DEF CON 33 Theme and Style Guide page
. You can get it in a
PDF on media.defcon.org
. Homework assignments to get you into the vibe coming soon.
We can't wait to see where you'll take it.
See you at DEF CON!
Pre-reg for DEF CON 33 opens 3/5!
Posted 2025-03-04
DEF CON 33 is building steam. Planning is in full swing. In fact, a glance at any nearby calendar will tell you we're already halfway there!
We know you need to plan, too. That's why we're opening up Early Bird Online Registration. For the go-getters who register early, weve got our lowest online price. And just like in years past, registering online guarantees your badge, no matter what the attendance numbers turn out to be.
Starting Wednesday you'll be able to hit up
shop.defcon.org
to get your ticket. Are you ready?
The Early Reg price is $540 ($520 +$20 processing fee.) Early Bird season ends May 23.
Regular Pricing is $560 ($540 + $20 processing) and is available until July 18.
Late Pricing is $580 ($560 +$20 processing) from July 19 to the close of Online Registration.
As always, online registration is not required. The cash-at-the-door price is just $500, and it comes with the bonus of our world-famous LineCon.
We're very excited about how DEF CON 33 is shaping up. We hope you are too.Past the halfway point, people. Let's GO.
New Calls Open! CFP, Workshops, Demo Labs, and Policy!
Posted 2025-03-03
The DEF CON 33 Call Season is now almost complete! The Call for Papers is LIVE. We're also ready to accept submissions for Demos, Workshops, and Policy. Things are well and truly underway. Time to breathe deep, gather your ideas and get busy proposing.
For the comprehensive list of open calls, visit
the DEF CON 33 Call Index
. Rules, guidance, deadlines – it's all there.
Participation is the cheat code that unlocks the secret DEF CON levels. We can't wait to see what you've got in mind.
DEF CON 33 Open Calls!
Posted 2.7.25
The moment has arrived - the DEF CON 33 Call Season is officially afoot! Time to get thinking on how you want to participate. Whether you've got ideas to start a new Village, or have the tunes to rock the crowd after hours, the doors are open. There are a bunch of Calls you can peruse at leisure from Contests to Soundtrack to Vendors, and all the info you need to get started is on the
DEF CON 33 Call Index
.
Don't let your dreams be dreams! Make this the year your idea makes headlines at DEF CON.
DEF CON season is underway, people. Let's get after it.
DEF CON CTF Quals Dates Announced!
Posted 12.30.24
DEF CON 33 CTF Qualifcations have a date! "Packet sorcerers, make room in your calendar for the official qualifier event for #defcon 33 CTF! Our esteemed colleagues at the Nautilus Institute are hard at work building the challenges - can you afford to do less?"
Further information available at
https://nautilus.institute
. The long season of preparation begins.
New Room Block for DEF CON 33: Fontainebleau!
Posted 11.15.24
Another discounted room block for DEF CON 33 has dropped! This time it's at the ultra-swanky Fontainebleau, just a short walk from the LVCC.To book yourself into the Fontainebleau, you can call (833) 702-7272 between 6am to 10pm (PST) or use this link:
https://book.passkey.com/go/DefCon2025FBLV
. You can also reach the link from defcon.org.Maybe it's time to treat yourself. 2025 will be here before you know it.
DEF CON 2025 Call for Trainers is Open!
Posted 11.8.24
Attention DEF CON educators ! The DEF CON Training 2025 Call for Trainers is live!
We're looking for unique, technical, and practical presentations from trainers with deep knowledge of their subject. If that's you, let's talk!
All the info you need to apply is at
training.defcon.org
.
Room block now open at the Venetian for DEF CON 33!
Posted 10.11.24
Good news, everyone! We've already got some discounted room blocks you can use to lock down your lodgings for DEF CON 33.
DC33 doesn't kick off until August 7, 2025, but that's no reason to lollygag. If you're a high-octane go-getter you already know how good it feels to get those To-Do items checked off early. If not, this is far enough ahead to forget you booked and give yourself a nice surprise when there's one less thing to do at crunch time.
You can book at
the
Venetian
now and get the DC33 ball rolling. We'll keep you posted as additional options become available.
We're already 2 months closer to the next DEF CON. Be prepared.
Return to Index
© 1992-2025 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information
DEF CON FAQ
Frequently asked questions about DEF CON
What is DEF CON?
DEF CON is one of the oldest continuously running hacker conventions around, and also one of the largest.
How did DEF CON start?
Originally started in 1993, it was a meant to be a party for member of "Platinum Net", a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I'll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can't remember. Why not invite everyone on #hack? Good idea!
Where did the name come from?
The short answer is a combination of places. There as a SummerCon in the summer, a HoHoCon in the winter, a PumpCon during Halloween, etc. I didn't want any association with a time of year. If you are a Phreak, or just use your phone a lot you'll notes "DEF" is #3 on the phone. If you are into military lingo DEF CON is short for "Defense Condition." Now being a fan of the movie War Games I took note that the main character, David Lightman, lived in Seattle, as I do, and chose to nuke Las Vegas with W.O.P.R. when given the chance. Well I knew I was doing a con in Vegas, so it all just sort of worked out.
There are several resources that will give you an idea of what DEF CON is all about.
DEF CON Press: through the prism of the media
DEF CON Groups: Local groups that meet
DEF CON Media Server: DC 1 to the present, captured
Google: always a good research starting point
Just remember, DEF CON is what you make of it.
When and where is DEF CON?
DEF CON is generally in the last week of July or first week of August in Las Vegas. DEF CON 33 will be held August 7th through August 10th, 2025. Many people arrive a day early, and many stay a day later.
Isn't there a DEF CON FAQ already?
Yes, an unofficial one. It's quite humorous, sometimes informative, and DEF CON takes no responsibility for its content. It is archived here.
What are the rules of DEF CON?
Physical violence is prohibited. Harassment of any kind is prohibited. We don't support illegal drug use. Minors should be accompanied by their parent(s) or guardian(s). Please refrain from doing anything that might jeopardize the conference or attendees such as lighting your hair on fire or throwing lit road flares in elevators. DEF CON Goons are there to answer your questions and keep everything moving. Hotel security is there to watch over their property. Each has a different mission, and it is wise to not anger the hotel people. Please be aware that if you engage in illegal activities there is a large contingency of feds that attend DEF CON. Talking about how you are going to bomb the RNC convention in front of an FBI agent is a Career Limiting Move!
You can view the DEF CON Code of Conduct at https://defcon.org/html/links/dc-code-of-conduct.html.
Is DEF CON cancelled?
No.
What is there to do at DEF CON?
DEF CON is a unique experience for each con-goer. If you google around you'll find dozens of write-ups that will give you an idea of what people have experienced at DEF CON. Trust write-ups more than media articles about the con. Some people play capture the flag 24x7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of. Half the fun is learning what happened at DEF CON after the fact!
I'm not a hacker, should I go to DEF CON?
Many people have different definitions of what is a ‘hacker’. I would recommend looking at previous years speeches, and write-ups from past attendees - this should give you a good idea if DEF CON is for you. This hacker FAQ might give you some insight into the matter as well. If you do not have any technical interests, DEF CON is probably not for you. Sure there is a lot of socializing you can do, but technology and hacking is the core of the con.
Do criminals go to DEF CON?
Yes. They also go to high school, college, work in your workplace, and the government. There are also lawyers, law enforcement agents, civil libertarians, cryptographers, and hackers in attendance. Ssshhh. Don't tell anyone.
What are Goons?
They are the staff at DEF CON. They have many roles including safety, speaker coordination, vendor room coordination, network operations, et cetera... Please try to be helpful to them if they make requests of you. If any goon tells you to move, please do so immediately as there may be safety issues they are attempting to address.
How can I help out or become a Goon?
The staff at DEF CON has grown organically. All positions have some degree of trust associated with them, so typically new goons are ‘inducted’ by friends of existing goons. There are many random points when goons need help and may ask people for help, generally for helping move stuff or other tasks that don't require high amounts of trust or unsupervised work. Just because you help out doesn't make you a goon. If you really want to be a goon, talk with one and see how much work they actually do (Hint: you may want to enjoy being at DEF CON, not working full-time at it). One year the network group got a new Goon when a networking engineer was needed, and he came to the rescue. The intent behind the goons is not to be elitist, but to have a network of trusted people who can help run the conference - please do not feel upset if you are not chosen to be a goon.
How can I help or participate?
DEF CON is not a spectator sport! Before the con, during, and after there are chances for you to get involved. Before the con you can read about the contests and maybe sign up for one like Capture the Flag. There are artwork contests for shirts and posters. You can practice your lock pick skills, or just get your laptop all locked down and ready to do battle. Organize your .mp3s. Check out the DEF CON Forums to see what other people are up to. If you want to create your own event, you can do that as well - you will not get official space or sanctions, but virtually every official event at DEF CON started out as an unofficial event.
I would love to see XYZ event, how do I make this happen?
Virtually all events at DEF CON were conceived by the attendees. The DEF CON forums are a great place for recruiting help for an event you want to put on, and making sure your efforts aren't being duplicated. If it doesn't require resources from DEF CON (space, namely) you generally don't have to ask anyone’s permission. Most events are unofficial until they've been going on for a couple of years. Please let us know if you have an idea for an event, we may help facilitate or promote it. Email [suggestions at DEF CON dot org] to keep us in the loop.
How can I speak at DEF CON?
You can submit a response to our CFP (opening soon). All entries are read and evaluated by a selection committee. We would love to have your submission. The call for papers usually opens in January and closes mid-May.
I'm press, how do I sign up, why can't I get in for free (I'm just doing my job)?
Please email press[at]defcon[d0t]org if you wish press credentials. Lots of people come to DEF CON and are doing their job; security professionals, federal agents, and the press. It wouldn't be fair to DEF CON attendees if we exempted one group from paying. If you are a major network and plan on doing a two minute piece showing all the people with blue hair, you probably shouldn't bother applying for a press pass - you won't get one. If you are a security writer or from a real publication please submit, and someone will respond with an answer.
I want to sell stuff, how do I do this?
If you want a space in our vendor area, you need to apply. Because of limited space and our attempt to have a diversity of vendors, you may not be able to get a booth. It is wise to think of staffing issues - if you are one person do you want to spend your entire time behind a vendors booth?
What are the different price rates?
Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script kiddies. The only discount is for Goons and speakers, who get to work without paying for the privilege.
How much is admission DEF CON, and do you take credit cards?
Online pricing at shop.defcon.org ( where you can pay with a credit card) is as follows:
The Early Reg price is $540 ($520 +$20 processing fee.) Early Bird season ends May 23.
Regular Pricing is $560 ($540 + $20 processing) and is available until July 18.
Late Pricing is $580 ($560 +$20 processing) from July 19 to the close of Online Registration.
As always, online registration is not required. The cash-at-the-door price is just $500, and it comes with the bonus of our world-famous LineCon.
Does my underage child need a badge?
Children under the age of 8 will not need to purchase a badge.
Can I get a discount on DEF CON badges?
DEF CON charges one price regardless of your social status or affiliation. Please know that we depend on attendee income to pay the costs of the conference and don't have sponsors to help defray the expenses.
We sometimes get requests for discounts [students, veterans, children], unfortunately we don't want to try and validate if you are a current student, look at your ID to determine your age, decode military discharge papers, etc.
If you really want to attend DEF CON for free then do something for the con.
You could:
Submit a CFP and be an accepted speaker or workshop instructor.
Work on a contest, event, or village.
Qualify for CTF/Contests that include entry.
Find a team to become a Goon newbie.
Contribute to content, or perform some entertainment.
I need a letter of invite for my visa application, how do I get that?
In most cases, DEF CON can send a signed letter of invite, usually within a few short business days once we have all the info. If you also require verification of housing, we can put you in touch with someone to help you get your hotel stay organized, let us know if you need that.
Along with your request, please email us the following to info(at)defcon(.)org
Name as is on passport:
Passport number:
Country of issue:
Date of issue:
Date of expiration:
Country of origin:
DEF CON is too expensive, how can I afford it?
Many people have made an art and science out of coming to DEF CON very cheaply. Here are a couple of tips.
Travel: Buy airfare in advance, go Greyhound, Carpool, hitch-hike. (Note: this may be dangerous and/or illegal.)
Lodging: Share rooms - some people have up to 10 people they share a room with, find a hotel cheaper than the one that the conference is scheduled at, stay up for three days, etc. (note: this can be hazardous to your health.)
Food: Pack food for your trip, go off site to find food, eat in your hotel rooms, and look for cheap Vegas food at Casinos. (Look for deals and specials that are trying to get you in the door to gamble.)
Booze: You don't need to drink. Brew your own and bring it. (It's been done.)
Entrance: Admission can be saved, mow some lawns. Try to go to another 4 day event for cheaper than this that offers so much. We have increased the fees slowly over the years, but also the amount and quality of events have increased.
Inevitably people will try to do some math and pretend that DT gets rich each DEF CON - they seem to lack the ability to subtract.
How many people typically attend DEF CON?
There have been roughly 25-28k attendees in the last few (pre-COVID) years of DEF CON. DEF CON 27 had a record showing with approximately 30,000.
Is there a network at DEF CON?
Why yes, DEF CON is FULLY network-enabled. Now that we've perfected the art of a stable hacker con network, we're ascending to a higher level - we're providing you a network that you feel SAFE in using! Since DEF CON 18 we're WPA2 encrypted over-the-air, with a direct trunk out to the Internet. No peer-to-peer, no sniffing, just straight to the net (and internal servers). We'll provide login credentials at Registration. We know the LTE airwaves will be saturated so we're putting our own cred on the line to give you a net that even we would put our own mobile phones on.
If you're feeling frisky, we'll still have the traditional "open" network for you - bring your laptop (we'd recommend a clean OS, fully patched--you know the procedure) because we don't police what happens on that net. Share & enjoy!
What is the age limit?
People have brought children to DEF CON - it is not recommended to do this unless you are going to constantly supervise them. It is generally an ‘adult’ atmosphere (language, booze, et cetera). If you've never been to DEF CON, you may want to refrain from bringing your children (unless they are demanding that you bring them). While there are no age limits, we have consistently cooperated with parents and/or private investigators who are looking for children that ‘ran away from home’ to go to DEF CON. You will have to be 21 to reserve a room.
What is a DEF CON "Black Badge"?
The Black Badge is the highest award DEF CON gives to contest winners of certain events. CTF winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.
How can I get a hold of DT? I tried to mail him and haven't seen a response yet.
DT doesn't dislike you, isn't trying to hurt your feelings, and bears you no ill will. The fact is he gets an unmanageable load of mail continually. Mailing him again may elicit a response. Try mailing FAQ (at) DEFCON.ORG if you have a general question that isn't answered here or in the forums.
Is it hot in Vegas?
Yes. Bring sunscreen (high SPF), do not fall asleep near the pool (lest you wake up to sunburn), and do not walk far in the sun unless you are experienced in dealing with extreme heat. The sun is dangerous in Las Vegas. Sleeping in lawn chairs is a sure way to wake up to severe burns in the morning when that bright yellow thing scorches your skin. Drink plenty of water and liquids - remember that alcohol will dehydrate you.
What should I bring?
It depends on what you're going to do at DEF CON. This is discussed in quite some depth on the unofficial DC FAQ, as well as a thread in the DC Forums. You may want to bring fancy (or outrageously silly) clothes for the official Music events, on Friday and Saturday nights, where everyone shows off nifty attire.
How much do rooms cost, and how do I reserve a room?
Currently we have room blocks at Venetian, and Sahara
Check the the DEF CON 33 venue page periodically for more as we add them
How much is internet access?
We are looking into this. Free (and possibly more dangerous) internet access is available in the convention area.
Will the hotels broadcast the speeches on their cable system?
DEF CON TV has succcessfully streamed all tracks to all the hotels in the past, and a couple of tracks out to the internet, for several years now. We are navigating a new venue and new hotels, so stay tuned. If we can, we probably will!
Will we have DEF CON branded poker chips?
You will have to attend DEF CON to find out.
Will conference attendees have entire floors of hotel rooms to themselves?
Probably not. Hotels have been very cooperative in attempting to centralize the DEF CON attendees, for their convenience and ours, but there will be non-DEF CON attendees in hotel rooms next to us.
This FAQ didn't answer my questions, or was unclear, how can I get further information?
Check out the DEF CON Forums to ask follow up questions.
Return to Index
© 1992-2025 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information
DEF CON Villages Table
Each Village, as it’s name may imply, specializes in a topic or aspect of security or computers.
One Page All Villages list with descriptions
defcon.org Villages page
You may need to scroll to the right to see all info
DEF CON Contests Table
Various contests, some lasting all 4 days of DEF CON, some short time on stage
One Page All Contests list with descriptions
defcon.org Contests page
You may need to scroll to the right to see all info
DEF CON DemoLabs Table
Brief demonstrations for people to show off their project.
One Page All Demolabs list with descriptions
defcon.org DemoLabs page
You may need to scroll to the right to see all info
DEF CON Workshops Table
Longer, more detailed, hands on, lasting half a day.
These have limited seating. These will fill up VERY quickly!
One Page All Workshops list with descriptions
defcon.org Workshops page
You may need to scroll to the right to see all info
64-bit Intel Assembly Language Programming for Hackers Workshop Info
|
Accelerating Malware Analysis with WinDbg Time Travel Debugging Workshop Info
|
Advanced Ghidra Scripting & Automation Workshop Info
|
Analyzing and Creating Windows Shellcode for Hackers Workshop Info
|
Cloud Forensics Workshop: Smart Grid Edition Workshop Info
|
Contextualizing alerts with relevant logs and events without queries or LLMs Workshop Info
|
Creating malicious functional app on Android Workshop Info
|
Deep-dive into modern network fingerprinting Workshop Info
|
Defeating Malware Evasion: Techniques and Countermeasures Workshop Info
|
Disrupting Digital Dataflows: A 101 on how 2 detect, analyze, & disrupt digital systems by reverse engineering real-world Electronic Warfare techniques from Ukraine at the hardware level Workshop Info
|
Dive into Windows Library Loading Workshop Info
|
DIY Malware Emulation: Build It, Break It, Detect It Workshop Info
|
Effectively Detecting Modern Malware with Volatility 3 Workshop Info
|
Eliminating Bug Classes at Scale: Leveraging Browser Features for Proactive Defense Workshop Info
|
EMMC BGA Secrets, hack bga memory, no reballing necessary: Learn how to safely remove EMMC memory modules, hack them and then reinstall, without the difficult process of trying to reball the BGA. Workshop Info
|
Fine Tune your personal LLM assistant to Secure coding Workshop Info
|
Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems Workshop Info
|
From Prompt to Protection: A Practical Guide to Building and Securing Generative AI Applications Workshop Info
|
Hacker VPN Workshop Info
|
Hacking the connected plant: AI edition! Workshop Info
|
Hacking The Metal: Into the GPU Workshop Info
|
Hands-on IoT firmware extraction and flash forensics Workshop Info
|
Hands-on Kubernetes Attack & Defense Masterclass Workshop Info
|
Hands-On Threat Hunting with Wireshark Workshop Info
|
Inside the Threat: Designing and Deploying Malicious Browser Extensions to Understand Their Risk Workshop Info
|
Introduction to Cryptographic Attacks Workshop Info
|
K8sploitation: Hacking Kubernetes the Fun Way Workshop Info
|
Learning to Hack Bluetooth Low Energy with BLE CTF Workshop Info
|
Medical Device Hacking: 201 Workshop Info
|
Obfuscation Reloaded: Modern Techniques for Evading Detection Workshop Info
|
Open Source Malware 101 – Everything you always wanted to know about npm malware (and more) Workshop Info
|
Pen-testing Cloud REST APIs Workshop Info
|
PLC Playground: Hands-On Industrial Control Systems Attacks Workshop Info
|
Practical YARA: Crafting Custom Rules for Targeted Malware Defense Workshop Info
|
Provably exfiltrating data by breaking TLS in the right ways Workshop Info
|
Putting EDRs in Their Place: Killing and Silencing EDR Agents Workshop Info
|
Reach the Nirvana Workshop Info
|
SnowGoat: Exposing Hidden Security Risks and Leaking Data Like a Threat Actor Workshop Info
|
Whitebox Web Exploit Dev (WWED) Workshop Info
|
Wi-Fi-So-Serious Workshop Info
|
Paid Training Table
2 day training sessions on the Mon and Tue after DEF CON. There will be an additional cost for these.
One Page All Paid Training list with descriptions
DEF CON 33 Training Signup Pages
You may need to scroll to the right to see all info
A Complete Practical Approach to Malware Analysis & Threat Hunting Using Memory Forensics
Training Info
|
A Practical Approach to Breaking & Pwning Kubernetes Clusters
Training Info
|
Active Directory Attacks for Red and Blue Teams – Advanced Edition
Training Info
|
Advanced Cloud Incident Response in Azure and Microsoft 365
Training Info
|
Adversarial Thinking: The Art of Dangerous Ideas
Training Info
|
AI SecureOps: Attacking & Defending AI Applications and Services
Training Info
|
Attack and Defend Software Supply Chain
Training Info
|
Attacking & Securing CI/CD Pipeline Certification (ASCPC) by White Knight Labs
Training Info
|
Azure Cloud Attacks for Red & Blue Teams – Beginner Edition
Training Info
|
Beginner’s Guide to Attacks and Defenses
Training Info
|
BRIDGING THE GAP – An Introduction to IoT Security from Serial to Bluetooth
Training Info
|
Deep Dive into Fuzzing
Training Info
|
Dodging the EDR bullet: A Training on Malware Stealth Tactics
Training Info
|
Everyday Ghidra: Practical Windows Reverse Engineering
Training Info
|
Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access
Training Info
|
Hack the Connected Plant!
Training Info
|
Hacking Cryptography: Attacks, Tools, and Techniques
Training Info
|
Hacking Modern Web Apps: Master the Future of Attack Vectors
Training Info
|
Hands-on Car Hacking & Automotive Cybersecurity
Training Info
|
Harnessing LLMs for Application Security
Training Info
|
Hunting for Hackers by Deloitte
Training Info
|
Influence Operations: Tactics, Defense, and Exploitation
Training Info
|
Loudmouth Security – Offensive IoT Exploitation
Training Info
|
Medical Device Penetration Testing
Training Info
|
Offensive Cyber Security Operations: Mastering Breach and Adversarial Attack Simulation Engagements
Training Info
|
Offensive Development Practitioner Certification (On-Site) by White Knight Labs
Training Info
|
RFID and Electronic Physical Access Control System Hacking
Training Info
|
Simulated Adversary: Tactics & Tools Training
Training Info
|
SOC 101 – SOC 1 Analyst Bootcamp
Training Info
|
Software Defined Radios 101
Training Info
|
Solving Modern Cybersecurity Problems with AI
Training Info
|
Windows Payload Development: EDR Evasion and Initial Access Tradecraft
Training Info
|
DC Party,Gather,Event Table
DEF CON Vendors Table
List by name of the Vendors that will be in the Vendor area at DEF CON 33
One Page All Vendors list with descriptions
defcon.org Vendors page
DEF CON Exhibitors Table
List by name of the Exhibitors that will be in the Exhibitor area at DEF CON 33
One Page All Exhibitors list with descriptions
defcon.org Exhibitors page
You may need to scroll to the right to see all info
DEF CON Communities Table
A group of people with common interests, but don’t qualify as a Village, is a Community,
One Page All Communities list with descriptions
defcon.org Communities page
You may need to scroll to the right to see all info
Links to DEF CON 33 related pages
Links
DEF CON . org Links
DEF CON
Main page
DEF CON 33
Home Page
DEF CON
FAQ
DEF CON
Recent News
DEF CON 33
Venue
DEF CON 33
Training Signup
DEF CON 33
Contests
DEF CON CTF
Nautilus Institute, Twitter
@Nautilus_CTF
DEF CON 33
Villages
DEF CON 33
Communities
DEF CON 33
Parties, Meets, Events
DEF CON
YouTube channel, prev years talks
DEF CON 33
Planning Forum page ( limited official use )
Thanks to the InfoBooth crew for providing access to their backend database. <claps> to their hard work!
Combined Schedules of DEF CON, Villages, and everything else DC33
Hacker Tracker -
Android and
IOS - the official DEF CON schedule app
The ONE! - A consolidated DEFCON 33 schedule in multiple file formats - html, PDF, CSV, ICAL, epub, mobi, Google calendar
info.defcon.org - the official DEF CON InfoBooth site
Other Interesting Links
DEF CON 33 Planning Highlights (URLs of note)
DEF CON Hackers with Disabilities
Forum Topic -
DC33 HDA for DC33 thread
@defconparties -
calendar
defconmusic - Schedule/News from the DC Artists & Entertainment ( A&E ) Department
Official SoundTrack
DEFCONorg Twitch stream
defconmusic
DEF CON Entertainment Twitch stream
defconmusic
YouTube channel
DCTV - DEF CON TV: Twitch streams and Hotel TV channels
#badgelife spreadsheet of unofficial badges for DC33
@qumqats Twitter
List of Village accounts to assist in watching Village happenings
Other cons during #SummerHackerCamp
Guides/Tips/FAQs
The Definitive Guide to DEF CON
DEF CON A&E - Resources - Rough Distances and Maps
DEF CON A&E - Resources - Packing List
Guide to Attending DEF CON 31
How to Survive Def Con 2022
OpSec For DEF CON 30
DCG 201 Hacker Double Summer 2023 Guides
Birds of a Feather-Resources for 2022 Hacker Summer Camp
Lonely Hackers Club - DEF CON n00b guide -
reddit thread
The Lost Policymaker's Guide to Hacker Summer Camp
Holon
DEF CON 30 Preparation
DEF CON: The Survival Guide
Preparing for "Hacker Summer Camp"
General / previous years
DEF CON for N00bs
JK-47 - BSidesLV & DEFCON Conference Tips
Just another DEF CON guide
HACKER SUMMER CAMP 2018 GUIDE
On Attending DefCon