The ONE!

One Schedule to Rule them All!


Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 33.

It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings no longer include epub and mobi formats and instead now include html, csv, PDF, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use.

The intent is still to be a resource to answer the question at the end of an hour of "What's next?"

As a general rule I do not include:

Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links and a Infoboot data feed. There is much more going on at DEF CON than what is listed here.

Check out the Guides/Tips/FAQs links if you're new to Las Vegas.
Notable suggestions are:

And finally, this is only as good as the ideas and information used to generate it. I welcome your constructive suggestions and comments. Please send them to qumqats@outel.org

Have a good time at DEF CON 33!


Index of DEF CON 33 Activities


Maps List

Maps Browser

Detailed Village Info

Villages Table

Hour by Hour list of happenings, start at the top, or go to a specific day.
Schedule
 - Thursday  - Friday  - Saturday  - Sunday

Sorted list of all the Speakers Names linked to their talk's description.
Speaker List

Sorted list of all the Talk's titles linked to the talk description.
Talk Title List
Talk lists for each Village, start at the alphabetic top, or go to a specific Village.
Village Talk List
    .edu Community   -   Adversary Village   -   Aerospace Village   -   Aerospace VillageBlue Team Village (BTV)   -   AI Village   -   AppSec Village   -   Artificial Intelligence Cyber Challenge (AIxCC)   -   Badgelife Community   -   BBWIC Foundation   -   Biohacking Village   -   Blacks In Cyber Village   -   Blue Team Village (BTV)   -   Bug Bounty Village   -   Car Hacking Village   -   Car Hacking VillageCar Hacking Village Capture the Flag (CTF)   -   Cloud Village   -   Contests   -   Crypto Privacy Village   -   Cryptocurrency Community   -   Data Duplication Village   -   DC NextGen   -   DDoS Community   -   DEF CON Academy   -   DEF CON Groups (DCG)   -   DEF CON Groups VR (DCGVR)   -   DEF CON Talks   -   DEF CON Training   -   DEF CON Workshops   -   Demo Labs   -   Embedded Systems Village   -   GameHacking.GG   -   Hackers With Disabilities (HDA)   -   Hackers.town Community   -   Ham Radio Village   -   Hard Hat Brigade   -   Hardware Hacking and Soldering Skills Village (HHV-SSV)   -   ICS Village   -   Illumicon   -   IOT Village   -   La Villa   -   Lock Pick Village   -   Lock Pick VillageDozier Drill Lockpicking Challenge   -   Lonely Hackers Club   -   Lonely Hackers ClubOWASP CommunityWomen in Security and Privacy (WISP)   -   Loong Community   -   Malware Village   -   Maritime Hacking Village   -   Memorial Chamber   -   Mobile Hacking Community   -   Nix Vegas Community   -   NMDP (Formally Be The Match)   -   Noob Community   -   Operating Systems Community   -   OWASP Community   -   Packet Hacking Village   -   Payment Village   -   Physical Security Village   -   Policy @ DEF CON   -   Quantum Village   -   Queercon Community Lounge   -   Radio Frequency Village   -   Recon Village   -   Red Team Village   -   Social Engineering Community Village   -   Social Gatherings/Events   -   Telecom Village   -   The Diana Initiative   -   The Diana Initiative's Quiet Room   -   Voting Village   -   Women in Security and Privacy (WISP)   -   

Descriptions and Info for all the talks.
Talk Descriptions

Contests Table
Contests

Demolabs Table
Demolabs

Workshops Table
Workshops

Paid Trainings Table
Paid Trainings

Parties, Gatherings, and Events Table
Parties Gatherings Events

DEF CON 33 Vendors
Vendors

DEF CON 33 Exhibitors
Exhibitors

DEF CON 33 Communities
Communities

The latest news from defcon.org
DEF CON News

The answer to your questsions about DEF CON overall.
DEF CON FAQ

DEF CON .org Links

Combined Schedule Sources

Interesting Links

Guides/Tips/FAQs

Maps List



Overview of the area around DEF CON 33

Click on image to view full size





LVCCW Full map of Level 1

Click on image to view full size




LVCCW map of North portion of Level 1

Click on image to view full size




LVCCW map of South portion of Level 1

Click on image to view full size




LVCCW map of South Lobby and Registration Area of Level 1

Click on image to view full size




LVCCW map of Hall 1 of Level 1

Click on image to view full size




LVCCW map of Hall 2 of Level 1

Click on image to view full size




LVCCW map of Hall 3 of Level 1

Click on image to view full size




LVCCW map of Hall 4 of Level 1

Click on image to view full size




LVCCW Full map of Level 2

Click on image to view full size




LVCCW map of North portion of Level 2

Click on image to view full size




LVCCW map of West portion of Level 2

Click on image to view full size




LVCCW map of East portion of Level 2

Click on image to view full size




LVCCW Full map of Level 3

Click on image to view full size




LVCCW map of North portion of Level 3

Click on image to view full size




LVCCW map of South portion of Level 3

Click on image to view full size




LVCC North Hall, Level 2, Workshops, Paid Training

Click on image to view full size




Pool Parties - Sahara

Click on image to view full size



Map Browser


LV Strip Overview - Closeup - Sahara
LVCCW_L1_Full - L1_North - L1_South
    L1_Reg - L1_Hall1 - L1_Hall2 - L1_Hall3 - L1_Hall4
LVCCW_L2_Full - L2_North - L2_West - L2_East
LVCCW_L3_Full - L3_North - L3_South
LVCCN_Level2
One page DEF CON 33 map
Las Vegas Convention Center - Virtual Tour

Detailed Village Info


Adversary Village

Adversary Village: Talk List
Home Page: https://adversaryvillage.org
Sched Page: https://adversaryvillage.org/adversary-events/DEFCON-33/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40719
Location: LVCC West-Level 1-Exhibit Hall 2-702 (Adversary Village) - Map
Social Media Links:
   TW @AdversaryVillag
         https://defcon.social/@AdversaryVillage
   YT https://youtube.com/AdversaryVillage
   DC http://adversaryvillage.org/discord
   TI @AdversaryVillage
   FB @AdversaryVillage
   LI @adversaryvillage


Adversary Village is a community initiative which primarily focuses on adversary simulation/emulation, purple teaming, and adversary tradecraft. The village covers offensive operations, threat/APT/ransomware simulation, breach and adversarial attack simulation, supply chain security, adversary tactics, research on nation-state-sponsored threat-actors, adversary intelligence, adversarial mindset, philosophy, and hacker survival skills.

The goal of the Adversary Village is to build an open security community for the researchers and organizations, who are putting together new means, methodologies towards the simulation-emulation of adversary tactics and collaboration.

Subsequent to feedback from past editions, Adversary Village shall focus on hosting hands-on deep technical workshops, live demonstrations, panel discussions and a ton of other hands-on activities on adversarial attack simulation/emulation, offensive tradecraft to engage and educate the community. Adversary Village would have the following hands-on activities for this year at DEF CON;

Adversary simulator and purple teaming hands-on booth

Adversary Simulator booth is a volunteer assisted activity, which has hands-on adversary emulation plans and exercises specific to a wide variety of threat-actors; these are meant to provide the participants with a better understanding of adversarial attack emulation. The booth will be hosting a simulated environment meant to recreate enterprise infrastructure, operational technology environment, which serves targets for various attack simulations. The hands-on simulator booth also hosts an activity, which would need the participants to generate their own adversary emulation plans to assess the efficacy of the defense systems based on publicly available cyber threat intelligence.

Choose-your-own-Adversary-Adventure Tabletop Game

Adversary adventure is a story-scenario based, interactive, cyber war-gaming, choose-your-own adventure model interactive game. This is a gamified version of table-top exercises which is presented to the participants as they can choose to play as an attacker, post exploitation OR a Defender who is defending against an attacker group-threat actor OR even play as a CISO who is dealing with an adversarial situation such as a ransomware incident.

Hands-on deep technical workshops

Adversary Village will feature a limited number of deep technical workshops focused on advanced adversary tradecraft and techniques.

Hands-on guided breach and offensive attack simulation exercises

This area will feature guided attack simulation exercises for participants to engage with. There will be a few scenario-focused activities, "Breach-the-Hospital", "Breach-the-Office", “Breach-the-Bank” etc., visually represented by modular-brick-LEGO sets. A simulated cyber range will be available for each scenario, providing an exact replica of an enterprise production environment. We will provide a detailed walkthrough of the attack scenarios, including Tools-Techniques-and-Procedures, commands and how-to guides, demonstrating how to attack and breach the target environment. This exercise will give participants a clear understanding of how threat actors infiltrate corporate environments.

Adversary Wars CTF

Adversary Village will be hosting "Adversary Wars CTF", where the participants will have to pose as adversaries and replicate adversarial actions against each element of a “target” organization. Adversary Wars would have real world challenge scenarios and challenges, where the participants can perform various attacks and learn new TTPs. To visualize the CTF environment, the contest area will feature a miniature model of the city made using interlocking-plastic-bricks. The breached components will be physically marked in the city model as the CTF progresses. There will be prizes, complimentary hoodies (yes, the iconic adversary village hoodies), free t-shirts, cool stickers, village coins, badges, and various other swags.

Links:
    Mastodon (defcon.social) - https://defcon.social/@AdversaryVillage
    Website - https://adversaryvillage.org/

Return to Index

AI Village

AI Village: Talk List
Home Page: https://aivillage.org/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40718
Location: LVCC West-Level 3-W314-W316 (AI Village) - Map
Social Media Links:
   TW @aivillage_dc
   TI @aivillage
   YT link
   DC https://discord.com/invite/GX5fhfT


Join us at the AI Village for interactive demonstrations at the intersection of AI and security. We’ve got something new this year with a full purple team demonstration from the AI Cyber League.

For the third Generative Red Team we are going to “red team” the evaluations that establish a model’s performance. We are bringing several model systems built to do different tasks each with their own model card. These model cards will define uses and restrictions the model creators want and determine what we mean by “trust” when it comes to fuzzier concepts like “can write good Rust” and “doesn’t help you hack”. This model card will be built off of open source evaluations that prove and establish how effective the model is. We will be paying bounties for findings against the evaluations that the model cards used to make their claims.

Following the success of last year's real-time deepfake demonstrations, we're taking things to the next level. This year, we're showcasing five different deepfake systems across a spectrum of computational requirements – from high-end professional setups to consumer-grade hardware that's becoming increasingly accessible. You can see how detections we have will break down as compute per dollar keeps improving.

Links:
    Website - https://aivillage.org/

Return to Index

Artificial Intelligence Cyber Challenge

Artificial Intelligence Cyber Challenge: Talk List
Home Page: https://aicyberchallenge.com/
Sched Page: https://aicyberchallenge.com/storage/2025/08/AIxCC-Web-Schedule-1.pdf
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40722
Location: LVCC West-Level 1-Exhibit Hall 1-404 (AIxCC) - Map
Social Media Links:
   TW @DARPA


The AIxCC Finals will unfold at DEF CON 33 in August 2025. The top seven teams who qualified during Semifinals will compete for a grand prize of $4 million.

The AIxCC Final Competition will introduce new challenge repositories and vulnerabilities, encouraging teams to improve upon their current CRS implementations and push forward their systems' capabilities in terms of robustness, scale, and real-world impact.

Links:
    Website - https://aicyberchallenge.com/

Return to Index

AppSec Village

AppSec Village: Talk List
Home Page: https://www.appsecvillage.com/
Sched Page: https://www.appsecvillage.com/events/dc-2025
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40721
Location: LVCC West-Level 1-Exhibit Hall 2-604 (AppSec Village) - Map
Social Media Links:
   TW @AppSec_Village
   LI @appsecvillage
   YT https://www.youtube.com/c/AppSecVillage
   DC https://discord.gg/5XY8qYXd7R


Come immerse yourself in everything the world of application security has to offer. Whether you are a red, blue, or purple teamer, come learn from the best of the best to exploit software vulnerabilities and secure software. Software is everywhere, and Application Security vulnerabilities are lurking around every corner, making the software attack surface attractive for abuse. If you are just an AppSec n00b or launch deserialization attacks for fun and profit, you will find something to tickle your interest at the AppSec Village.

Software runs the world. Everything from IoT, medical devices, the power grid, smart cars, and voting apps - all have software behind them. Such a variety of topics will be reflected in our cadre of guest speakers representing all backgrounds and walks of life.

AppSec Village welcomes all travelers to choose from talks and workshops by expert community members, an all-AppSec-focused CTF, contests that challenge your mind and your skillz, and more. Bring your thirst for knowledge and passion for breaking things, and your visit to AppSec Village will be thrilling!​

Links:
    Mastodon (@AppSecVillage@defcon.social) - https://defcon.social/@AppSecVillage
    Website - https://www.appsecvillage.com/

Return to Index

Aerospace Village

Aerospace Village: Talk List
Home Page: https://aerospacevillage.org/
Sched Page: https://www.aerospacevillage.org/def-con-33
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40720
Location: LVCC West-Level 1-Exhibit Hall 2-503 (Aerospace Village) - Map
Social Media Links:
   TW @secureaerospace
   LI @aerospace-village
   TW @hack_a_sat
   DC https://discord.gg/gV4EWuk
   YT https://www.youtube.com/c/AerospaceVillage
         https://defcon.social/@aerospacevillage


The aviation and space industries, security researchers, and the public share a common goal: safe, reliable, and trustworthy aviation and space operations. For too long, negative perceptions and fractured trust on all sides have held back collaboration between the aviation, space, and security researcher communities that has advanced safety, reliability, and security of other industries. As the traditional domains of aviation safety and cybersecurity increasingly overlap, more effective collaboration between stakeholders ensures we will be safer, sooner, together.

Through the Aerospace Village, the security research community invites industry leaders, researchers and academia interested in aviation and space security, safety, and resilience to attend, understand, collaborate together to achieve our common goals. Empathy and understanding build common ground, while acts and words likely to increase division between these two communities undermine these efforts. The Aerospace Village welcomes those who seek to improve aviation and space security, safety, and resilience through positive, productive collaboration among all ecosystem stakeholders.

Our Goal

The Aerospace Village is a volunteer team of hackers, pilots, and policy advisors who come from the public and private sectors. We believe the flying public deserves safe, reliable, and trustworthy air travel which is highly dependent on secure aviation and space operations.

Links:
    Mastodon (@aerospacevillage@defcon.social) - https://defcon.social/@aerospacevillage
    Website - https://www.aerospacevillage.org/

Return to Index

Bug Bounty Village

Bug Bounty Village: Talk List
Home Page: https://bugbountydefcon.com/
Sched Page: https://www.bugbountydefcon.com/agenda
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40726
Location: LVCC West-Level 3-W326 (Bug Bounty Village) - Map
Social Media Links:
   TW @BugBountyDEFCON
   YT https://www.youtube.com/BountyTalks
   TW @arl_rose
   TW @infinitelogins
   YT https://www.youtube.com/infinitelogins


The global bug bounty community has witnessed exponential growth, with thousands of members actively engaged in the field. This thriving ecosystem now represents a legitimate and sought-after profession for hackers and cybersecurity specialists. After a big success and great feedback during the first ever Bug Bounty Village during DEFCON 32, We want to be part of DEFCON 33 and keep celebrating the bug bounty community, where hunters, learners, and enthusiasts can converge, interact with top-tier hackers, attend insightful workshops, talks, and immerse themselves in hands-on activities.

With over 20 workshops, panels and talks, the Bug Bounty Village at DEFCON 32 was a huge success. The room was completely full of hackers at all times, Some of the best bug bounty hunters in the community were part of our village to share knowledge, create content, teach others, and also, to make new friends. With waiting lines of over 100 people waiting to get in for some of our workshops, we have demonstrated that there is a huge interest in Bug Bounty to remain as a specific village at DEFCON, and have that special place in the biggest hacker conference in the world, where the Bug Bounty community can connect, grow and help others become the future of Bug Bounty.

Links:
    Website - https://www.bugbountydefcon.com/

Return to Index

Biohacking Village

Biohacking Village: Talk List
Home Page: https://www.villageb.io/
Sched Page: https://www.villageb.io/def-con
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40723
Location: LVCC West-Level 1-Exhibit Hall 2-606 (Biohacking Village) - Map
Social Media Links:
   TW @dc_bhv
   LI @biohacking-village
   YT http://youtube.com/biohackingvillage
   TI @biohackingvillage
   DC https://discord.gg/Q8ubDb5
   IG @biohacking_village
         link


At the Biohacking Village, attendees can expect an immersive, hands-on experience at the intersection of cybersecurity, healthcare, and medical technology, offering opportunities to learn, explore, and collaborate on some of the most pressing challenges in the industry.

What Attendees Can Learn at the Biohacking Village:

  1. Medical Device Security: Understand how medical devices work, the cybersecurity vulnerabilities they face, and the critical importance of securing these devices for patient safety and national security. Participate in hands-on demonstrations, such as penetration testing on virtualized devices, learning real-world techniques for identifying and addressing vulnerabilities.
  2. Critical Infrastructure Resilience: Explore the intersection of healthcare and critical infrastructure, including how hospitals and medical systems rely on interconnected technologies. Learn about best practices for securing healthcare networks, including strategies to mitigate ransomware attacks and manage incident response.
  3. Collaboration and Ecosystem Development: Discover how to work effectively with manufacturers, regulators, researchers, and practitioners to build secure and innovative healthcare technologies. Engage in discussions about fostering trust, transparency, and accountability within the cybersecurity and healthcare communities.
  4. New Technologies in Healthcare: Get hands-on with cutting-edge innovations, such as AI-driven medical devices, digital twins, and IoT-enabled healthcare systems. Learn about emerging regulatory requirements, including those surrounding AI, cybersecurity, and the EU Cyber Resilience Act (CRA).
  5. Ethical Hacking and Vulnerability Disclosure: Delve into the principles of responsible disclosure and how ethical hackers contribute to securing patient safety. Understand the legal and ethical considerations of hacking medical devices, guided by frameworks like the Hippocratic Oath for Hackers.
  6. Policy and Regulatory Insights: Gain insights into the latest global regulations, standards, and metrics impacting medical technology, such as FDA guidelines, GDPR, NIS2, and more. Participate in workshops and panels with experts discussing policy advocacy and global harmonization of cybersecurity standards.
  7. Tabletop Exercises and CTFs (Capture the Flags): Engage in interactive tabletop exercises designed to simulate real-world scenarios, from ransomware incidents to critical system failures, promoting teamwork and problem-solving. Compete in cybersecurity challenges and CTFs to test your skills in securing medical and healthcare IT systems.
  8. Networking and Community Building: Connect with a diverse group of stakeholders, including hackers, healthcare professionals, medical device manufacturers, and policymakers. Collaborate in an environment that fosters innovation, trust, and shared learning.

The Biohacking Village is your gateway to understanding and addressing the complex challenges of medical technology and cybersecurity. Attendees will leave equipped with knowledge, skills, and connections to drive meaningful change in the industry.

Links:
    Website - https://villageb.io/

Return to Index

Blacks in Cyber Village

Blacks in Cyber Village: Talk List
Home Page: https://www.blacksincyberconf.com/bic-village
Sched Page: https://www.blacksincyberconf.com/bic-village
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40724
Location: LVCC West-Level 3-W322-W324 (Blacks In Cyber Village) - Map
Social Media Links:
   TW @BlackInCyberCo1
         https://defcon.social/@blacksincyber
   TI @blacksincybersecurity
   YT link
   LI @blackincyberconference
   PT @blacksincybersecurity
   FB @blackincyberconf


The Blacks In Cybersecurity (B.I.C.) Village seeks to bring culturally diverse perspectives to the holistic Cybersecurity community; by way of a series of talks and a capture the flag event. In providing these activities, we hope to help highlight Black experiences, innovations in the field, Black culture and educate the community about Black history.

In doing this, we believe that we can better educate and normalize the discussion of deficiency or prejudices in Cybersecurity education/development for minority communities. We also believe this effort can be translated to aid in eradication of these issues in the Cybersecurity and Hacker/Maker community and allow for more diverse hobbyists and professionals to engage and contribute.

Links:
    Website - https://www.blacksincyberconf.com/bic-village
    Mastodon (infosec.exchange) - https://infosec.exchange/@blacksincyber
    Mastodon (defcon.social) - https://defcon.social/@blacksincyber

Return to Index

Blue Team Village

Blue Team Village: Talk List
Home Page: https://blueteamvillage.org/
Sched Page: https://blueteamvillage.org/btv-at-def-con-33/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40725
Location: LVCC West-Level 2-W213-W218 (Blue Team Village) - Map
Social Media Links:
   TW @BlueTeamVillage
   TI @blueteamvillage
   YT https://www.youtube.com/c/blueteamvillage
   DC https://discord.gg/blueteamvillage
         https://defcon.social/@blueteamvillage


Blue Team Village (BTV) is both a place and a community built for and by people who defend computer systems, networks, and people against cyber attacks. It's a place to gather, talk, share, and learn from each other about the latest tools, technologies, and tactics that our community can use to detect attackers and prevent them from achieving their goals.

The Blue Team Village's Project Obsidian is a defensive cybersecurity learning experience that provides attendees with the opportunity to gain knowledge of Incident Response (IR), Digital Forensics (DF), Malware Analysis, Cyber Threat Intelligence (CTI), and Cyber Threat Hunting (CTH). Deep dive into technical topics through training and exercises that provide practical hands-on experience across each discipline. Project Obsidian 101 trainings provide cybersecurity knowledge that will enable attendees to develop the skills needed to be successful in their current and future roles.

Two of the most valuable takeaways are how to strategically approach a task and the operational processes supporting each task's objectives. Knowing 'how' to do something is only part of the challenge. Knowing 'when' and 'why' to perform specific tasks adds the necessary context to develop the full story of defensive cybersecurity.

Links:
    Website - https://blueteamvillage.org/
    Mastodon (@blueteamvillage@defcon.social) - https://defcon.social/@blueteamvillage

Return to Index

Car Hacking Village

Car Hacking Village: Talk List
Home Page: https://www.carhackingvillage.com/
Sched Page: https://www.carhackingvillage.com/defcon-33-talk
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40727
Location: LVCC West-Level 1-Exhibit Hall 2-602 (Car Hacking Village) - Map
Social Media Links:
   TW @CarHackVillage
   YT http://youtube.com/@carhackingvillage
   LI @car-hacking-village
   DC https://discord.gg/JWCcTAM


For over a decade, we’ve been leading the charge in automotive security, and this year, we’re shifting into high gear! Get ready for an electrifying DEF CON 33 experience packed with interactive challenges, exclusive badges, and mind-bending exercises designed to supercharge your skills.

Join us and make this DEF CON one for the record books!

Links:
    Website - https://www.carhackingvillage.com

Return to Index

Cloud Village

Cloud Village: Talk List
Home Page: https://cloud-village.org/
Sched Page: https://www.cloud-village.org/dc33
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40728
Location: LVCC West-Level 3-W311-W313 (Cloud Village) - Map
Social Media Links:
   TW @cloudvillage_dc
   YT https://www.youtube.com/cloudvillage_dc
   DC https://discord.gg/EygUDJABee


With the industry’s rapid growth in cloud infrastructure, the presence of an open platform to discuss and showcase cloud research becomes a necessity. Cloud village is an open platform for researchers interested in the area of cloud security. We plan to organise talks, tool demos, CTF and workshops around Cloud Security and advancements.

Our CTF will be a jeopardy style 2.5 days contest where participants will have to solve challenges around Cloud infrastructure, security, recon, etc. These challenges will cover different cloud platforms including AWS, GCP, Azure, Alibaba, Digital Ocean, etc. We will also reward our top 3 teams with awards.​

Links:
    Mastodon (@cloudvillage_dc@mastodon.social) - https://mastodon.social/@cloudvillage_dc
    Website - https://dc33.cloud-village.org

Return to Index

Contests

Contests: Talk List
Home Page: https://defcon.outel.org/dcwp/dc33/activities/c/
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_Contests
Social Media Links:
         link

Return to Index

Crypto Privacy Village

Crypto Privacy Village: Talk List
Home Page: https://cryptovillage.org/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40729
Location: LVCC West-Level 1-Exhibit Hall 1-403 (Crypto Privacy Village) - Map
Social Media Links:
   TW @cryptovillage
   SL https://cryptovillage.slack.com/
   YT link
   TI @cryptovillage
         https://defcon.social/@cryptovillage


Launched in 2014, Crypto & Privacy Village (CPV) is a community-run village centred on privacy and cryptography that aims to educate and inform the general public, students, educators, hackers, security and privacy professionals, and policymakers. We provide a unique hybrid space that features talks; chill space for relaxing with friends, doing CTFs, and cross industry networking; the Gold Bug Challenge and desk for hints and support; privacy-related art installations; and an information desk for questions about privacy and cryptography. Come talk with us about facial recognition technology, privacy-preserving data analytics, or crypto backdoor laws!

Links:
    Website - https://cryptovillage.org/
    Mastodon (@cryptovillage@defcon.social) - https://defcon.social/@cryptovillage

Return to Index

DEF CON Groups (DCG)

DEF CON Groups (DCG): Talk List

Return to Index

DEF CON Groups VR (DCGVR)

DEF CON Groups VR (DCGVR): Talk List
Home Page: https://www.dcgvr.org/
DC Forums Page:
Social Media Links:
   TW @DCGVR
   TI @defcon_groups
   DC https://discord.gg/bsX4QXf3rD
   YT link

Return to Index

DEF CON Talks

DEF CON Talks: Talk List
Home Page: https://defcon.org/html/defcon-33/dc-33-speakers.html
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_DEF CON Talks
Social Media Links:
   TW @defcon
   FB @defcon
   YT https://www.youtube.com/user/DEFCONConference
         http://www.reddit.com/r/defcon
   IG @wearedefcon
   DC https://discord.gg/defcon

Return to Index

DEF CON Workshops

DEF CON Workshops: Talk List
Home Page: https://defcon.org/html/defcon-33/dc-33-workshops.html
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_WS

Return to Index

Data Duplication Village

Data Duplication Village: Talk List
Home Page: https://dcddv.org/
Sched Page: https://dcddv.org/dc-33-talks-schedule
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40730
Location: LVCC West-Level 2-W225 (Data Duplication Village) - Map
Social Media Links:
   TW @DDV_DC


The Data Duplication Village has all the updated bits and bytes available from infocon.org packed up into nice, neat packages.  If you're looking for a copy of just about any security con talk known to hacker-kind or a copy of the VX-Underground archive (along with a few hundred gigs of cat pictures), you'll find it here. Our village provides a "free-to-you" service of direct access to terabytes of useful data to help build those hacking skills and allow open discussions with other storage enthusiasts.

We'll also be partnering with DC Next Gen to ensure that our future generations have the opportunity to explore the details of how past and current data storage works!

Links:
    Website - https://dcddv.org/

Return to Index

Demo Labs

Demo Labs: Talk List
Home Page: https://forum.defcon.org/node/252635
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_DL

Return to Index

Embedded Systems Village

Embedded Systems Village: Talk List
Home Page: https://embeddedvillage.org/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40731
Location: LVCC West-Level 1-Exhibit Hall 1-401 (Embedded Systems Village) - Map
Social Media Links:
   TW @EmbeddedVillage


Embedded systems exist at the intersection of hardware and software, built to accomplish a specific task. Often these disciplines are dealt with individually, but understanding the custom relationships between hardware and software is key to performing security research on these devices.

Embedded Systems Village advances the security of embedded systems by hosting hands-on hacking workshops, showcasing new security research demos, and organizing exciting hacking contests to educate attendees and manufacturers on the approach hackers use to attack these devices. Attendees will leave the village with an understanding of how to reduce complex, exotic devices to their underlying embedded components and to extract the information required to use the tools and techniques taught at other villages where embedded systems are on display.

Links:
    Website - https://embeddedvillage.org/

Return to Index

GameHacking.GG

GameHacking.GG: Talk List
Home Page: https://gamehacking.gg/
Sched Page: https://www.gamehacking.gg/#20f50369c35980dabc63ceafedc52594
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40967
Location: LVCC West-Level 1-Exhibit Hall 1-402 (GameHacking.GG Village) - Map


Gaming and cybersecurity intersect in many exciting and interactive ways. Our mission is to delve into various aspects of game security, fostering an environment of exploration, play, and learning. At the Game Hacking Community, participants can engage in activities ranging from modding games to exploring the intricacies of memory hacking and multiplayer cheats and learning about game malware. Whether you're a beginner or an experienced hacker, we will have presentations and activities to challenge your skills. Be part of the evolution of game security. Dive into our activities, engage with other game hackers, and explore opportunities to contribute to and support the Game Hacking Community. Let's play, learn, exploit, and perhaps even profit. Our community focuses on learning and does NOT endorse cheating in competitive online games.

Links:
    Website - https://gamehacking.gg

Return to Index

DEF CON Hackers with Disabilities

DEF CON Hackers with Disabilities: Talk List
Social Media Links:
   TW @HDA_DEFCON

Return to Index

Hardware Hacking and Soldering Skills Village (HHV-SSV)

Hardware Hacking and Soldering Skills Village (HHV-SSV): Talk List
Home Page: https://dchhv.org/
Sched Page: https://dchhv.org/schedule/schedule.html
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40733
Location: LVCC West-Level 1-Exhibit Hall 2-802 (HHV-SSV) - Map
Social Media Links:
   TW @DC_HHV
         https://defcon.social/@DC_HHV


Every day our lives become more connected to consumer hardware. Every day the approved uses of that hardware are reduced, while the real capabilities expand. Come discover hardware hacking tricks and tips regain some of that capacity, and make your own use for things! We have interactive demos to help you learn new skills. We have challenges to compete against fellow attendees. We have some tools to help with your fever dream modifications. Come share what you know and learn something new.​

Links:
    Website - https://dchhv.org/
    Mastodon (@DC_HHV@defcon.social) - https://defcon.social/@DC_HHV

Return to Index

Ham Radio Village

Ham Radio Village: Talk List
Home Page: https://hamvillage.org/
Sched Page: https://hamvillage.org/events/dc33
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40732
Location: LVCC West-Level 3-W320 (Ham Radio Village) - Map
Social Media Links:
   TW @HamRadioVillage
   TI @HamRadioVillage
   DC https://discord.gg/hrv
         https://defcon.social/@HamRadioVillage


Ham Radio has been considered to be the original group of hackers, launching before computers, integrated circuits, and even the transistor! Hams of all generations have a hacker mindset, solving problems their own way, regardless of what the manual has to say. Continuing this pioneer spirit, the Ham Radio Community is here to support advancement of the hobby with a cybersecurity slant.

Everything we do today involves wireless communications of some sort, and a basic knowledge of how radio works is crucial. In the Ham Radio Community, you can learn hand-on with topics such as how to legally use a radio to send commands to a satellite, communicating around the globe when no other methods exist, and how to send and receive real-time location data without relying on any cellular networks. You can put your skills to the test by trying to find the hidden transmitters in the Ham Radio Fox Hunt contest, as well as transmitting memes over the airwaves to DEF CON attendees.

We provide license testing services for those looking to become licensed or upgrade their license class, as well as guidance on how to hack on the medium to achieve the best results and have the most fun!

Links:
    Website - https://hamvillage.org/

Return to Index

ICS Village

ICS Village: Talk List
Home Page: https://www.icsvillage.com/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40734
Location: LVCC West-Level 1-Exhibit Hall 2-805 (ICS Village) - Map
Social Media Links:
   TW @ICS_Village
   LI @icsvillage
   YT link
   TI @ics_village


**Mission**. ICS Village is a non-profit organization with the purpose of providing education and awareness of Industrial Control System security.

**Exhibits**. Interactive simulated ICS environments that provide safe yet realistic examples to preserve safe, secure, and reliable operations. We bring real components such as Programmable Logic Controllers (PLC), Human Machine Interfaces (HMI), Remote Telemetry Units (RTU), and actuators, to simulate a realistic environment throughout different industrial sectors. Visitors can connect their laptops to assess these ICS devices with common security scanners, network sniffers to sniff the industrial traffic, and more! We will also have space dedicated to Maritime technology as well as Escape Rooms ran by Idaho National Labs and CISA. In addition to talks, hands-on demos/hacking, and escape rooms we are collaborating with BioHacking Village to demonstrate how Industrial Control Systems are used in Health Care.

Links:
    Website - https://www.icsvillage.com/

Return to Index

IOT Village

IOT Village: Talk List
Home Page: https://www.iotvillage.org/
Sched Page: https://www.iotvillage.org/events/def-con-33/index.html
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40735
Location: LVCC West-Level 1-Exhibit Hall 2-605 (IOT Village) - Map
Social Media Links:
   TW @iotvillage
   TW @ISEsecurity
   TW @Villageidiotlab
         https://defcon.social/@IoTVillage/
   TI @iotvillage
   YT https://www.youtube.com/c/IoTVillage/videos
   DC https://discord.gg/EFKbNFrFaN


IoT Village advocates for advancing security in the Internet of Things (IoT) industry through bringing researchers and industry together. IoT Village hosts talks by expert security researchers, interactive hacking labs, live bug hunting in the latest IoT tech, and competitive IoT hacking contests, including our 4 time black badge DEF CON CTF. Over the years, IoT Village has served as a platform to showcase and uncover hundreds of new vulnerabilities, giving attendees from around the globe the opportunity to learn about the most innovative techniques to both hack and secure IoT. IoT Village is organized by security consulting and research firm, [Independent Security Evaluators (ISE)](https://www.ise.io/).

Links:
    Website - https://iotvillage.org/defcon.html

Return to Index

Lock Pick Village

Lock Pick Village: Talk List
Home Page: https://www.toool.us/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40736
Location: LVCC West-Level 1-Exhibit Hall 2-701 (Lock Pick Village) - Map
Social Media Links:
   TW @toool
   TI @toool_us
   YT https://youtube.com/c/TOOOL-US
         https://techhub.social/@TOOOL


Want to tinker with locks and tools the likes of which you've only seen in movies featuring secret agents, daring heists, or covert entry teams?

Then come on by the Lockpick Village, run by The Open Organization Of Lockpickers (TOOOL), where you will have the opportunity to learn hands-on how the fundamental hardware of physical security operates and how it can be compromised.

The Lockpick Village is a physical security demonstration and participation area. Visitors can learn about the vulnerabilities of various locking devices, techniques used to exploit these vulnerabilities, and practice on locks of various levels of difficultly to try it themselves.

Experts will be on hand to demonstrate and plenty of trial locks, pick tools, and other devices will be available for you to handle. By exploring the faults and flaws in many popular lock designs, you can not only learn about the fun hobby of sport-picking, but also gain a much stronger knowledge about the best methods and practices for protecting your own property.

Links:
    Website - https://toool.us/

Return to Index

Maritime Hacking Village

Maritime Hacking Village: Talk List
Home Page: https://maritimehackingvillage.com/
Sched Page: https://maritimehackingvillage.com/dc33
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40969
Location: LVCC West-Level 1-Exhibit Hall 2-504 (Maritime Hacking Village) - Map
Social Media Links:
         https://x.com/maritimevillage
   LI @maritimehackingvillage


The Maritime Hacking Village (MHV) has set sail for LVCC to deliver the first and only immersive maritime hacking experience for you to learn what it takes to exploit and defend real-world maritime systems. Our mission is simple: we are creating a space for stakeholders to come together and navigate the changing tides in the maritime sector’s technological, geopolitical, and adversarial landscapes which demand ever-more-urgent collective action to address the systemic cybersecurity vulnerabilities in the systems which underpin global maritime defense and trade. Together we hack to facilitate the discovery and sharing of knowledge integral to the development of effective maritime cybersecurity policy, industry standards and regulations, vulnerability information sharing, cyber threat intelligence, and most importantly – a capable and trusted workforce and community-of-interest.

Why? Maritime infrastructure is the backbone of the global economy and order. Countries, companies, and militaries all use the sea for power projection and commerce, but no single stakeholder controls the implementation of policies and regulations. Stakeholders unanimously agree that from machines, to systems, to governance, the maritime domain is fundamentally insecure. Still, seemingly insurmountable access barriers are preventing the security community, and anyone else, from doing anything to help.

MHV has made it our purpose to eliminate these barriers – and to provide every human with the access and resources necessary to engage in maritime vulnerability research and cybersecurity innovation. Our village is a safe, shared space where the security community (elite hackers, trusted providers, and young talent alike) can develop and demonstrate their competence in attacking and defending real maritime systems – and where maritime industry stakeholders can engage with this community on neutral ground to grow their arsenals of knowledge, tools, trusted and capable providers, and fresh talent. We believe that this work together will create rising tides of awareness, information sharing, and innovation that will lift all ships and allow us to gradually secure the maritime sector.

Links:
    Mastodon (@maritimehackingvillage@defcon.social) - https://defcon.social/@maritimehackingvillage
    Website - https://maritimehackingvillage.com/

Return to Index

Malware Village

Malware Village: Talk List
Home Page: https://malwarevillage.org/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40968
Location: LVCC West-Level 1-Exhibit Hall 1-303 (Malware Village) - Map
Social Media Links:
         https://x.com/MalwareVillage
   LI @malwarevillage
   DC https://discord.com/invite/xQwqY48SrJ


Malware Village is dedicated to providing a safe and engaging environment for participants to learn and share knowledge about malware analysis. Our mission is to equip attendees with the skills, techniques, and historical context needed to understand, research, and combat malware. Participants will gain hands-on experience with real-world analysis techniques, guided by seasoned infosec professionals.

Beyond technical training, Malware Village fosters a strong community where researchers, enthusiasts, and professionals can connect. We welcome everyone—whether you're an artist creating malware-inspired art, a hardware researcher discovering unexpected connections to malware analysis, or a seasoned analyst reminiscing about early malware history. Even children can explore malware through Malmons (aka Malware Monsters by Lena Yu aka LambdaMamba), making cybersecurity education more accessible.

At its core, Malware Village is about uniting people—newcomers and experts alike—with a shared mission: understanding, analyzing, and defending against malware to protect society.

Links:
    Website - https://malwarevillage.org/
    Mastodon (@malwarevillage@defcon.social) - https://defcon.social/@malwarevillage

Return to Index

Payment Village

Payment Village: Talk List
Home Page: https://www.paymentvillage.org/
Sched Page: https://www.paymentvillage.org/events/def-con-33/schedule
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40738
Location: LVCC West-Level 1-Exhibit Hall 2-505 (Payment Village) - Map
Social Media Links:
   TW @paymentvillage
   TI @paymentvillage
   YT link
         https://t.me/paymentvillage


Come to the Payment Village to learn about payment technologies! Payments play a crucial role in our daily lives, yet many of us lack an understanding of how they work. Our mission is to educate and cultivate the next generation of payment security experts and to foster open discussions around payments. We want to raise the bar in payment security! We invite you to explore the history of payments and to learn how modern-day payments work.

The village is jam-packed with hands-on experiences and exciting challenges! Unsure of where to start? Register for one of our workshops to acquire new skills or attend a talk by one of our carefully chosen experts. Already a pro? Pick up a Payment Village credit card to take part in our contest! Looking for unique challenges? Take home all the money from our cash-grab machine or have a go at our scavenger hunt!

As if that is not enough, this year we have created the largest badge EVER at DEF CON, our vulnerable ATM badge. We are bringing ATM hacking to the masses; our badge simulates an ATM attack surfaces in a physical form factor you can carry with two hands! not a forklift truck.

Links:
    Website - https://www.paymentvillage.org/
    Mastodon (@paymentvillage@mastodon.social) - https://mastodon.social/@paymentvillage

Return to Index

Packet Hacking Village

Packet Hacking Village: Talk List
Home Page: https://www.wallofsheep.com/
Sched Page: https://www.phvillage.io/pages/dc33/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40737
Location: LVCC West-Level 3-W303-W310 (Packet Hacking Village) - Map
Social Media Links:
   TW @wallofsheep
   FB @wallofsheep
   YT https://youtube.com/wallofsheep
   TI @wallofsheep
   PS https://www.periscope.tv/wallofsheep
         https://defcon.social/@wallofsheep
   IG @wallofsheep


The Packet Hacking Village at DEF CON provides a community learning experience for people of all skill levels, from absolute beginners to seasoned professionals. While DEF CON is made up of dozens of small community-of-interest villages, we are one of the largest and most well known. We host practical training, network forensics and analysis games, and the renowned Capture The Packet event, which has been a Black Badge contest over 10 times and draws world-class hackers from around the world. Our mission has always been simple: to teach people good internet safety practices, and to provide an atmosphere that encourages everyone to explore and learn.

We provide a welcoming environment for hackers of all skill levels and backgrounds to network, learn new things, and be active participants in DEF CON. Our famous “Wall of Sheep” provides a fun and interactive take on internet security and privacy, while our contests Packet Inspector, Packet Detective, and Capture The Packet serve as a zero-to-hero pathway for individuals to learn network security, packet analysis, and delve into advanced security topics. Every year we strive to bring something new and innovative to DEF CON, whether it’s never-seen-before talks or creative games to teach and test skills.

Links:
    Mastodon (defcon.social) - https://defcon.social/@wallofsheep
    Website - https://www.wallofsheep.com

Return to Index

Policy @ DEF CON

Policy @ DEF CON: Talk List
Home Page: https://defcon.org/policy/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html #orga_40740
Location: LVCC West-Level 2-W234 (Policy @ DEF CON) - Map
Social Media Links:
   TW @DEFCONPolicy
         link
         https://defcon.social/@defconpolicy


The DEF CON community understands that creating a safer digital society requires collaboration between security and policy experts. Policy @ DEF CON provides a space for representatives of all areas of security to come together to educate and engage each other.

Tech policy is being written as we speak and we believe that including diverse expert voices will improve outcomes and help to bridge gaps between technical and policy practitioners. Senior government officials, nonprofit and private sector experts, security researchers, hackers, academics and technologists from around the world all come together at Policy @ DEF CON.

Links:
    Website - https://defcon.org/policy/
    Mastodon (defcon.social) - https://defcon.social/@defconpolicy

Return to Index

Physical Security Village

Physical Security Village: Talk List
Home Page: https://www.physsec.org/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40970
Location: LVCC West-Level 1-Exhibit Hall 2-804 (Physical Security Village) - Map
Social Media Links:
   TW @physsec
   TI @bypassvillage
   LI @physsec
         https://defcon.social/@physsec


Physical security is an important aspect to think about when considering securing your facility. The Physical Security Village provides an important opportunity to learn about real-world threats, hands-on mitigation techniques, and best practices for protecting assets. Our village brings together experts, practitioners, and enthusiasts to share knowledge through interactive demos, talks, and discussions. Whether you're new to physical security or a seasoned professional, you'll find valuable insights and practical skills.

Links:
    Mastodon (@physsec/media@defcon.social) - https://defcon.social/@physsec/media
    Website - https://physsec.org

Return to Index

Quantum Village

Quantum Village: Talk List
Home Page: https://quantumvillage.org/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40741
Location: LVCC West-Level 1-Exhibit Hall 1-206 (Quantum Village) - Map
Social Media Links:
   TW @quantum_village
   DC https://discord.gg/6WUjH5cBXu
   LI @quantumvillage
   YT https://youtube.com/@quantum_village/


Quantum Village Returns with our Year of Quantum Edition @ DEF CON 33!! Our theme this year is “Sense and Security” and we are bringing some amazing talks, workshops, demos, and hands-on activities to this year’s incredible Quantum Village! Come and find out how to hack quantum computers, learn more about quantum technologies, and meet the engineers and scientists who are building the machines that manipulate the quantum world. We also introduce the world’s first hackable, fully open sourced diamond-based quantum sensing platform - and we’ll be showing some of the amazing things it can do! We have quantum computers, quantum sensors, The OG Quantum CTF, quantum art (and artists), and all you need to prepare for the quantum future!

Links:
    Website - https://quantumvillage.org/

Return to Index

Recon Village

Recon Village: Talk List
Home Page: https://www.reconvillage.org/
Sched Page: https://www.reconvillage.org/schedule-2025
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40743
Location: LVCC West-Level 1-Exhibit Hall 2-603 (Recon Village) - Map
Social Media Links:
   TW @ReconVillage
   FB @reconvillage
   YT https://www.youtube.com/reconvillage/


Recon Village is an Open Space with Talks, Live Demos, Workshops, Discussions, CTFs, etc., with a common focus on Reconnaissance. The core objective of this village is to spread awareness about the importance of reconnaissance and open-source intelligence (OSINT) and demonstrate how even a small piece of information about a target can cause catastrophic damage to individuals and organizations.

As recon is a vital phase for infosec as well as investigations, folks should have this skill set in their arsenal. People should check out Recon Village, as they get to learn novel point/recon techniques, play hands-on CTF, participate in Live Recon, and, most of all, have fun. At RV, we keep things simple, and the focus is on generating quality content using talks, workshops, CTF, live hacking, hackathons, and other hands-on activities, etc.

We also run fun and hands-on live competitions where participants learn while they play.

Links:
    Website - https://reconvillage.org/
    Mastodon (@reconvillage@defcon.social) - https://defcon.social/@reconvillage

Return to Index

Radio Frequency Village

Radio Frequency Village: Talk List
Home Page: https://rfhackers.com/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40742
Location: LVCC West-Level 1-Exhibit Hall 2-803 (Radio Frequency Village) - Map
Social Media Links:
   TW @rfhackers
   TW @rf_ctf
         link
   DC https://discordapp.com/invite/JjPQhKy


After 17 years of evolution, from the WiFi Village, to the Wireless Village, RF Hackers Sanctuary presents: The Radio Frequency Village at DEFCON 32. The Radio Frequency Village is an environment where people come to learn about the security of radio frequency (RF) transmissions, which includes wireless technology, applications of software defined radio (SDR), Bluetooth (BT), Zigbee, WiFi, Z-wave, Radio Frequency Identification (RFID), Infrared (IR) and other protocols within the usable RF spectrum. As a security community we have grown beyond WiFi, and even beyond Bluetooth and Zigbee. The RF Village includes talks on all manner of radio frequency command and control as well as communication systems. While everyone knows about the WiFi and Bluetooth attack surfaces, most of us rely on many additional technologies every day. RF Hackers Sanctuary is supported by a group of experts in the area of information security as it relates to RF technologies. RF Hackers Sanctuary’s common purpose is to provide an environment in which participants may explore these technologies with a focus on improving their skills through offense and defense. These learning environments are provided in the form of guest speakers, panels, and Radio Frequency Capture the Flag games, to promote learning on cutting edge topics as it relates to radio communications. We promise to still provide free WiFi.

Co-located with the RF Village is the RF Capture the Flag. Come for the talks, stay for the practice and the competition.

Who runs this thing?

RF Hackers Sanctuary is a group of all volunteers with expertise in radio security and various other related fields. We are the original creators of the WiFi Capture the Flag, Wireless Capture the Flag, and RF Capture the Flag. We are the original founders of the WiFi Village, Wireless Village, and RF Village. Often imitated, never duplicated.

Links:
    Website - https://rfhackers.com/

Return to Index

Red Team Village

Red Team Village: Talk List
Home Page: https://redteamvillage.io/
Sched Page: https://redteamvillage.io/defcon-33/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40744
Location: LVCC West-Level 1-Exhibit Hall 1-405 (Red Team Village) - Map
Social Media Links:
   TW @RedTeamVillage_
   YT https://www.youtube.com/redteamvillage
   TI @redteamvillage
   DC https://discord.gg/redteamvillage


The Red Team Village is focused on training the art of critical thinking, collaboration, and strategy in offensive security. The RTV brings together information security professionals to share new tactics and techniques in offensive security.

Links:
    Website - https://redteamvillage.io/

Return to Index

Social Engineering Community Village

Social Engineering Community Village: Talk List
Home Page: https://www.se.community/
Sched Page: https://www.se.community/schedule/
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40745
Location: LVCC West-Level 3-W317-W319 (Social Engineering Community Village) - Map
Social Media Links:
   TW @sec_defcon
   YT link
   TI @se_community
   LI @social-engineering-community
   FB @Social-Engineering-Community-108883855139272


The Social Engineering Community is formed by a group of individuals who have a passion to enable people of all ages and backgrounds interested in Social Engineering with a venue to learn, discuss, and practice this craft. We plan to use this opportunity at DEF CON to present a community space that offers those elements through panels, research opportunities, and contests in order to act as a catalyst to foster discussion, advance the craft and create a space for individuals to expand their network. DEF CON attendees can either participate in these events, or they can watch the events unfold and learn about Social Engineering as an audience member. We plan to accomplish the above by bringing together passionate individuals to have a shared stake in building this community.

Links:
    Website - https://www.se.community/

Return to Index

Social Gatherings/Events

Social Gatherings/Events: Talk List

Return to Index

Telecom Village

Telecom Village: Talk List
Home Page: https://telecomvillage.com/
Sched Page: https://telecomvillage.com/defcon-32.html
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40747
Location: LVCC West-Level 2-W224 (Telecom Village) - Map
Social Media Links:
   TW @TelecomVillage


At Telecom Village, our mission is to cultivate critical and innovative thinking in telecom security, with a strong focus on 5G networks. We offer a structured learning approach that enables participants to:

Our goal is to bridge the gap between theory and real-world application, equipping participants with the expertise to navigate and counter emerging telecom security challenges effectively. Through guided research, hands-on learning, and continuous exploration, we foster a community of skilled professionals ready to tackle the evolving telecom landscape.

Links:
    Website - https://telecomvillage.com/

Return to Index

Tamper Evident Village

Tamper Evident Village: Talk List
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#tev
Location: LVCC West-Level 1-Exhibit Hall 2-502 (Tamper-Evident Village) - Map

"Tamper-evident" refers to a physical security technology that provides evidence of tampering (access, damage, repair, or replacement) to determine authenticity or integrity of a container or object(s). In practical terms, this can be a piece of tape that closes an envelope, a plastic detainer that secures a hasp, or an ink used to identify a legitimate document. Tamper-evident technologies are often confused with "tamper resistant" or "tamper proof" technologies which attempt to prevent tampering in the first place. Referred to individually as "seals," many tamper technologies are easy to destroy, but a destroyed (or missing) seal would provide evidence of tampering! The goal of the TEV is to teach attendees how these technologies work and how many can be tampered with without leaving evidence.


Return to Index

DEF CON Training

DEF CON Training: Talk List
Home Page: https://defcontrainings.myshopify.com/collections/all
DC Forums Page: https://forum.defcon.org/node/244768

Return to Index

Voting Village

Voting Village: Talk List
Home Page: https://votingvillage.org/
Sched Page: https://www.votingvillage.org/s/VV2025-schedule-bhgf.pdf
DC Village Page: https://defcon.org/html/defcon-33/dc-33-villages.html#orga_40748
Location: LVCC West-Level 2-W222-W223 (Voting Village) - Map
Social Media Links:
   TW @votingvillagedc
   YT link
   TI @votingvillagedc
   LI @election-integrity-foundation
   IG @votingvillage?igsh=MWJreTh6dGl3eDEzNg==


The [Voting Village](https://votingvillage.org) has been an annual event since 2017 that provides hands-on opportunities to understand and analyze voting system hardware and software. Before the Voting Village, ordinary technologists and citizens had no access to the systems that run our election infrastructure. As the only open environment that gives the public hands-on access to their election systems, it is a critical antidote to rampant misinformation about election security and provides an opportunity to strengthen these systems against malicious attacks. The Voting Village is brought to you by our 501(c)3 tax exempt not for profit organization, the Election Integrity Foundation, EIN: 83-4089169.

The Voting Village has been invited to testify to Congress several times about how to strengthen election infrastructure. Conversely, we have drawn fire from voting system manufacturers, prompting a bipartisan group of senators to co-sign a public letter defending the Voting Village against some of the largest voting machine companies in 2018.

Even between presidential election cycles, expanding the reach of the Voting Village and providing education about how our election systems work is critical to democracy.

Links:
    Website - https://votingvillage.org/

Return to Index

Speaker List


Psychoholics
The Honorable
The Honorable
Tung 123ojp
VI
0xdade
1nfocalypse
4dw@r3
800xl
Aamiruddin Syed
Aaron "ironcat" Rosenmund
Aaron "KNOX" James
Aaron "KNOX" James
Aaron "scriptingxss" Guzman
Aaron Boyd
Aaron Hogan
Aaron Shim
Aastha Sahni
Abdel Sy Fane
Abdulla "Abu" Abdullayev
Abdulla "Abu" Abdullayev
Abdulla "Abu" Abdullayev
Abhijith "Abx" B R
Abhijith "Abx" B R
Abhinav Khanna
Abhinav Khanna
Abhinav Pandagale
Abhinav Pandagale
Abhinav Pandagale
Abraham De Leon Gutierrez
Acid-T
Adam "BuildHackSecure" Langley
Adam "BuildHackSecure" Langley
Adam "pi3" Zabrocki
Adam "UNC1739" Crosser
Adam "UNC1739" Crosser
Adam "UNC1739" Crosser
Adam Batori
Adam Pennington
Adam Robbie
Adam Segal
Adam Shostack
Adam915
adeci
Adel Karimi
Adelia Ibragimova
Adnan Khan
Adonai Cruz
Adrien Ogee
Adwiteeya Agrawal
Afonso Tinoco
Afonso Tinoco
Agostino "Van1sh" Panico
Agostino "Van1sh" Panico
Ahmet Furkan Aydogan.
Aidan Nakache
Akib Sayyed
Akib Sayyed
Akib Sayyed
Akib Sayyed
Alaric Becker
Albin Antony
Albin Antony
Albin Vattakattu
alchemy1729
Alee97422
Alejandro "0xedh" Hernando
Alejandro "TheMalwareGuardian" Vazquez
Alek Amrani
Alessandro Di Federico
Alessandro Di Federico
Alessandro Grisa
Alessandro Strino
Alethe Denis
Alethe Denis
Alethe Denis
Alethe Denis
Alex "cheet" Delifer
Alex Ackerman
Alex Bernier
Alex Holden
Alex Hurtado
Alex Kantchelian
Alex Lorman
Alex Matrosov
Alexandre Cabrol-Perales
Alexandrine TORRENTS
Alexandru Lazar
Alexei Bulazel
Alexis Cao
Alexis Cao
Alexis Cao
Alexis Cao
Alexis Hancock
Alexis Hancock
Alfie Champion
Allan Friedman
Allan Friedman
Allan Riordan Boll
Allan Riordan Boll
Allison Kline
Alon "alon_leviev" Leviev
Alon Klayman
Alyssa Coley
Amal Graafstra
amazonv
Amelia Shapiro
Amp
Anchises Moraes
Anchises Moraes
Andoni Alonso Fernández
Andra Lezza
Andrea Downing
Andrea
Andrew "Helicopters of DC" Logan
Andrew "Spike" Brandt
Andrew "Spike" Brandt
Andrew Carney
Andrew Carney
Andrew Case
Andrew Cockburn
Andrzej Olchawa
Andy Hull
Andy Kilianski
Angel
Anissa Elias
Anit Hajdari
Anıl Çelik
Anıl Çelik
Anıl Çelik
Ankit Gupta
Ankur Bhargava
Ankur Bhargava
Ankur Bhargava
Ankur Bhargava
Anmol "Fr13nd0x7f" K. Sachan
Anmol "Fr13nd0x7f" K. Sachan
Anmol "Fr13nd0x7f" K. Sachan
Anna Pham
Anna portasynthinca3 Antonenko
Annie Plews
Anthony "Coin" Rose
Anthony "Coin" Rose
Anthony Silva
Anto Joseph
Antoine Carossio
Antoine Goichot
Antonio Escalera
Ap0ll0
Ap0ll0
Apurv "ASG_Sc0rpi0n" Singh Gautam
Apurv "ASG_Sc0rpi0n" Singh Gautam
Apurv "ASG_Sc0rpi0n" Singh Gautam
Archwisp
Ariel Kalman
Arielle Baine
Arif
Ariz Soriano
Arjun "T3R4_KAAL" Chaudhary
Arjun "T3R4_KAAL" Chaudhary
Arjun "T3R4_KAAL" Chaudhary
Arjun "T3R4_KAAL" Chaudhary
Arjun "T3R4_KAAL" Chaudhary
Armando Aguilar
Armend Gashi
Arnaud Soullié
Arvind Singh
Asher Davila
Asher Davila
Ashley Hiram Muñoz
Ashley Stryker
Ashwin Iyer
Ata Seren
Ata Seren
AtHeartEngineer
Athlex
Audra Streetman
Audrey Adeline
Austin Norby
Austin Reid
Austin Worline
Avi Lumelsky
Avi Zajac
Aviad Gispan
Aviad Hahami
AviD
AviNash Srinivasan
Axel Labruna
Ayaan Qayyum
Ayaan Qayyum
Ayman Boulaich
Ayman Elsawah
Ayman Elsawah
Ayodele Ibidapo
Ayodele Ibidapo
Barb Hirz
Barrett Darnell
Basi Team Six (BT6)
Beans
Ben "nahamsec" Sadeghipour
Ben "nahamsec" Sadeghipour
Ben "nahamsec" Sadeghipour
Ben "nahamsec" Sadeghipour
Ben "polygonben" Folland
Ben "polygonben" Folland
Ben Gardiner
Ben Gardiner
Ben Goerz
Ben Hawkins
Ben Nassi
Benjamin "bmixonbaca" Mixon-Baca
Benjamin "Cave Twink" Woodill
Benjamin Koltermann
Betta Lyon-Delsordo
Betta Lyon-Delsordo
Bhagavan Bollina
Bhavesh
BiaSciLab
BiaSciLab
Bill Demirkapi
Blenster
Bob Coecke
Bob Gourley
Bobby Graydon
Bobby Kuzma
Bogdan Tiron
Borja "borjmz" Martinez
Brad Ammerman
Bradán Lane
Bradan Lane
Bradán Lane
Bradán Lane
Braelynn Luedtke
Bramwell Brizendine
Bramwell Brizendine
Brandon Bailey
Brenna Buuck
Brent "TheDukeZip" Dukes
Brent Harrell
Brent Muir
Brent White
Bret Fowler
Bret Fowler
Brett Alexander Tolbert
Brian "RedBeard" Harrington
Brian Baskin
Brian Burnett
Brien Croteau
Brien Croteau
Britne Jenke
Britton Robitzsch
Bruno "BrunoModificato" Halltari
Bryson Bort
BTV Directors
Bug Bounty Village Staff
Bug Bounty Village Staff
Cale "calebot" Smith
Candice Hoke
Capt. Kit Louttit
Carey Parker
Carey Parker
Carl Miller
Carl Tashian
Carl Tashian
Carl Tashian
Carlo Anez Mazurco
Carlos Abellan
Carlos Benitez
Carson Green
Carson Zimmerman
Casey Beaumont
Casey Edman
Casey Ellis
Casey Ellis
Cassie Crossley
Catherine Terranova
Cecilia Oriolo
Cernica Ionut Cosmin
César Ramirez 
Cesare "Red5heep" Pizzi
Cesare "Red5heep" Pizzi
Cesare "Red5heep" Pizzi
Chad Calease
Chad Spensky
Chandan Nandakumaraiah
Chang Mou
Charan Akiri
Charles Pinney
Charlie Waterhouse
Chelsea Button
Chelsea Button
Chelsea Button
Chen Levy Ben Aroy
Chiao-Lin "Steven Meow" Yu
Chiao-Lin "Steven Meow" Yu
Chiao-Lin "Steven Meow" Yu
Chistopher Lopez
Chloe Chong
Chompie
Chris DeCarmen
Chris DeCarmen
Chris DeCarmen
Chris Glanden
Chris Greer
Chris Maenner
Chris Monteiro
Chris Navarrete
Chris Navarrete
Christiane Borges
Christina Worrel Adkins
Christophe Tafani-Dereeper
Christopher "xoreaxeaxeax" Domas
Christopher Guerra
Christopher Nourrie
Christopher Painter
Christopher Robinson
Clark F
Cliff Braun
Coby Abrams
CoD_Segfault
CoD_Segfault
CoD_Segfault
Coleman Kane
Colin Shea-Blymyer
collin
Connar McCasland
Constantine Macris (TheDini)
cooldadhacking
Cooper "CyberTiger" Quintin
Cooper "CyberTiger" Quintin
Cooper "CyberTiger" Quintin
Cooper "CyberTiger" Quintin
Corey Ball
Corey Ball
Corwin Stout
Cory Wolff
Cpt. Pradhuman
craic'd
Craig Heffner
Cronkitten
Crypto Privacy Village Program Committee 2025
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
Crypto Privacy Village Staff
CTF.ae
CTF.ae
Cthulhu_Answers
Cthulhu
Cybelle Oliveira
Cybelle Oliveira
cybermeow
Cyrus Parzian
D.J. Davis
d1stinctmind
Daemon Chadeau
Daisy Newbold-Harrop
Dakshitaa Babu
Dakshitaa Babu
Dan Bongiorno
Dan Goga
Dan Pelegro
Dan Ting
Dan
Dane Sherrets
dani.pink
dani.pink
Daniel "Varx" Beard
Daniel "Varx" Beard
Daniel Baker
Daniel Baker
Daniel Benavides
Daniel Cuthbert
Daniel Donze
Daniel Heinan
Daniel Isler
Daniel Koranek
Daniel Marques
Daniel Marques
Daniel Morrisey
Daniel Morrisey
Daniel Morrisey
Daniel Reilly
Daniel Schwalbe
Daniel Seetoh
Daniel Ward
Daniel Ward
Daniele Antonioli
Danielle Aminov
Danilo Erazo
Danny Quist
Darren Meyer
Darren Meyer
Darren Meyer
Daryl Haegley
Data
Dave Aitel
Dave Aitel
Dave Aitel
David "johnnyspandex" Cash
David "Votd_ctf" Wearing
David "Votd_ctf" Wearing
David Brumley
David Caswell
David Caswell
David Jefferson
David Jefferson
David Melamed
David Rushmer
David Wank
Davide Venturelli
Davide
Dean "TheDini" Macris
Debasis Parida
Debra Bowen
Debra Bowen
Deep Therapy
Deepak
Denis Smajlović
Dennis Giese
Desiree Wilson
Devansh "dotguy" Khare
Deviant Ollam
Devon Colmer
Devon Colmer
Dhruv Shah
Dhruv Shah
Dhruv Shah
Dhruv Shah
Diana Kramer
Diana Kramer
Diego "djurado" Jurado
Diego "rehrar" Salazar
Diego Staino
Diego Staino
Dirk-jan Mollema
Dj Husk3
DJ null
DJ Scythe
DJ XORAC
Dominik Swierad
Donald Pellegrino
Dong-Yi "Kazma Ye" Ye
Doug Mooney
Dr. David Musliner
Dr. Kathleen Fisher
Dr. Matt McLure
Drew Springall
Drew Springall
Drew Springall
Drinor Selmanaj
Drinor Selmanaj
Drinor Selmanaj
Dual Core
Duncan Woodbury
Duncan Woodbury
Duncan Woodbury
Dustin Born
Dylan "CyberStrike" Butler
Eaton Zveare
Eaton Zveare
Ebony Grey
Eddie Rios
Eduard Agavriloae
Edward "Actuator" Warren
Edward Crowder
Edward Landers
Ege Feyzioglu
eigentourist
Eijah
Elaine Shi
Elaine Shi
Eli McRae
Elie Burzstein
Elipscion
Eliraz Levi
Elisa Gangemi
Elizabeth Biddlecome
Elizabeth Eigner
Elliot Chernofsky
Elliot Chernofsky
Emanuel Gawrieh
Emile Fugulin
Emily Choi-Greene
Emily Fane
Emily Soward
Emma Stewart
Emma Yuan Fang
Emma Yuan Fang
Emre Odaman
Emre Odaman
Emre Odaman
Endrit Shaqiri
Endrit Shaqiri
Endrit Shaqiri
Eno Dynowski
Enrico Faccioli
Enzo Damato
Eoin Wickens
Equip
Erez Yalon
Eric Escobar
Eric Escobar
Eric Lippart
Eric Woodruff
Eric Woodruff
Erin West
Erlend Leiknes
Erwin "Dollarhyde" Karincic
Estelle Ruellan
Ethan Michalak
Eugene "spaceraccoon" Lim
Eugene "spaceraccoon" Lim
Eugene "spaceraccoon" Lim
Evgueni Erchov
ExplodingLemur
Exploitee.rs
Exploitee.rs
Ezra "Shammahwoods" Woods
Ezra "Shammahwoods" Woods
Ezz Tahoun
Ezz Tahoun
Ezz Tahoun
Ezz Tahoun
Ezz Tahoun
f4_u57
Fabian "LiveOverflow" Faessler
Fabian "LiveOverflow" Faessler
Farid Zakaria
Farid Zakaria
Farzan Karimi
Fede Pacheco
Fede Pacheco
Federico Lucifredi
Federico Valentini
Felipe Zipitria
Fernando De La Peña Llaca
Filipi Pires
Filipi Pires
Filipi Pires
Filipi Pires
fir3d0g
Fling
Fotis Chantizis
Fozzie
Francisco Perdomo
Frank Victory
Fredrik Sandström
Fredrik Sandström
Frozencesium
Funktribe
Funktribe
Furkan Aydogan
Gabi Joseph
Gabriel Gegenhuber
Gabriel Nitu
Gabrielle Botbol
Gal Elbaz
Garrett Gee
Garrett Gee
Gary Kao
Gaston Aznarez
Gater_Byte
Gaurav Joshi
Gautam Peri
Gecko
George "sophron" Chatzisofroniou
George Hughey
George
George
Gerald Auger.
Gerardo Mejia
GhostGlitch
Giglio
Gijs Rijnders
Giovanni Cruz Forero
Giovanni Cruz Forero
Giustina Kent
Glen Sorensen
Godman666
Golan Myers
Goraksh Shinde
Gordon "Fizzle" Boom
Gowthamaraj Rajendran
Grace "Baelfire" Parrish
Grace Menna
Graham Helton
Greg Conti
Greg Conti
Greg Conti
Greg Harper
Greg Harper
Greg Slepak
Greg Slepak
Gregory Carpenter
Gregory Carpenter
Grey Fox
Grigoris Papoutsis
Grigoris Papoutsis
Gunnar "g0lden" Andrews
HackeMate
HalFinneyIsMyHomeBoy
Hamster
Hankashyyyk
Hanna Papirna
Hare Krishna Rai
Hari Pranav Arun Kumar
Harini Ramprasad
Harrison "rs0n" Richardson
Harrison Sand
HD Moore
HD Moore
Heal-Hak4Kidz
Heal
Heather Adkins
Heather West
Heather West
HEAV
heckseven
Hector Cuevas Cruz
Heidi Wachs
Helen Oakley
Himanshu Kumar Das
Himanshu Kumar Das
Himanshu Kumar Das
Himanshu Kumar Das
Hipu
HK
Hoseok Lee
Hubert Lin
Hugh Shepherd
Hugo van den Toorn
Hunter Hawke
Hunter Hawke
Hunter Hawke
Huseyn "Khatai" Gadashov
Huseyn "Khatai" Gadashov
Hyaesun Ji
Hydrox
Hydrox
hyperreality
Ian Brelinsky
Ian Brelinsky
Ian Brelinsky
Ian Campbell
Ian G. Harris
Ian Patton
Ian Roos
Ibai Castells
Icetre Normal
Iggy
Ileana Barrionuevo
Ilkin Javadov
Inti "intidc" De Ceukelaire
Inti "intidc" De Ceukelaire
Irene Mo
Irvin Lemus
Isaac Goldthwaite
Isaac Goldthwaite
Isaac Soon
Isabel Manjarrez
Isabel Manjarrez
Itsik Mantin
Jack Heysel
Jack Heysel
Jack Heysel
Jack Rhysider
Jack Rhysider
Jack Voltaic
Jack Voltaic
Jack Voltaic
Jackie Bow
Jacob Avidar
Jacob Oakley
Jad Meouchy
Jad Meouchy
Jae Young Kim
Jae Young Kim
JaeSeok Jung
Jainil Malaviya
Jake "Hubble" Krasnov
Jake "Hubble" Krasnov
Jake "Hubble" Krasnov
Jake "Hubble" Krasnov
Jake Braun
Jakub Szefer
Jamal Theodore
James "albinowax" Kettle
James Hawk
James McQuiggan
James Rice
James Rowley
James Utley
James Williams
Jan "SP3ZN45" Berens
Jan "SP3ZN45" Berens
Janet Vertesi
Janosch Köpper
Janosch Köpper
Jared Graff
Jared Graff
Jared MacDonald
Jared MacDonald
Jared MacDonald
Jasmin "JR0ch17" Landry
Jasmin "JR0ch17" Landry
Jason "jhaddix" Haddix
Jason "jhaddix" Haddix
Jason "jhaddix" Haddix
Jason "jhaddix" Haddix
Jason Andress
Jason Brooks
Jason Clinton
Jason Haddix
Jason Ross
Jason Vogt
Jason Vogt
Jason Vogt
Jason Vogt
Javan Rasokat
Javan Rasokat
Jay Dancer
Jaya Baloo
Jayesh Singh Chauhan
Jayesh Singh Chauhan
Jayson E. Street
Jayson E. Street
Jayson E. Street
Jayson E. Street
JC (Crashwire)
Jeff "BigTaro" Geisperger
Jeff "BigTaro" Geisperger
Jeff "caffix" Foley
Jeff "caffix" Foley
Jeff "caffix" Foley
Jeff "The Dark Tangent" Moss
Jeff "The Dark Tangent" Moss
Jeff "The Dark Tangent" Moss
Jeff Casavant
Jeff Diecks
Jeff Greer
Jeff Huang
Jeff Hung
Jeff Jordan
Jenko Hwong
Jenn Gile
Jenn Gile
Jennifer Roberts
Jennifer Schieferle Uhlenbrock
Jennifer VanAntwerp
Jennifer VanAntwerp
Jeremiah Edwards
Jeremy Fleischman
Jeronimo Anaya
Jesika Juarez
Jesse Michael
Jessica Burbank
Jessica Hoffman
Jessie "Ringer" Jamieson
Jessie "Ringer" Jamieson
Jessie "Ringer" Jamieson
Jeswin Mathai
Jeswin Mathai
jgamblin
Ji'an "azraelxuemo" Zhou
Ji'an "azraelxuemo" Zhou
Jianjia Yu
Jianqiang (Stark) Li
Jill "thejillboss" Moné-Corallo
Jim O'Neill
Jimmy Wylie
Joe "Juno" Aurelio
Joe "securelyfitz" FitzPatrick
Joe Head
Joe Marshall
Joe Zerafa
Joe Zerafa
Joel "niemand_sec" Noguera
Joel Panther
Joey Dreijer
John "Jlo" Lopes
John Andre Bjørkhaug
John Dilgen
John Fokker
John Hammond
John Johnson
John Mauger
John Mauger
John Odum
John Stoner
John W. Ailes
Johnathan Hampe
Johnny Xmas
Jon "K4CHN" Marler
Jon "K4CHN" Marler
Jon DiMaggio
Jon DiMaggio
Jon McCoy
Jon Siliman
Jonathan "JBO" Bar Or
Jonathan Coradi
Jonathan Elkabas
Jonathan Elkabas
Jonny Lin
Jordan Bonagura
Jordan Kasper
Jordan Macey
Jorge Acevedo Canabal
José Gómez
Jose Plascencia
Josep Albors
Joseph "stoppingcart" Gabay
Joseph Davis
Joseph Lim
Joseph
Josh Corman
Josh Grossman
Josh Grossman
Josh Huff
Josh Millsap
Josh Stiebel
Joshua "jstrosch" Stroschein
Joshua "jstrosch" Stroschein
Joshua "jstrosch" Stroschein
Joshua "jstrosch" Stroschein
Joshua Morgan
Josiah Lashley
Joy Toney
JP Ausmasson
Jr-Wei Huang
Juanma "M4C" Tejada
Juanma "M4C" Tejada
Jugal Patel
Juho Jauhiainen
Julian "Julez" Dunning
Jun “Ghost Hacker” Kawasaki
Junming "Chapoly1305" Chen
Junming "Chapoly1305" Chen
Justin "rhynorater" Gardner
Justin "rhynorater" Gardner
Justin W. Lin
Justin
Juwon Cho
K Singh
Kai-Ching "Keniver" Wang
Kai-Ching "Keniver" Wang
Kainu
Kaitlyn Handelman
Kaleeque Pierce
Kaloyan Ivanov
Kam Talebzadeh
kampf
Kara Nance
Karen Ng
Karl Fosaaen
Karthik Tadinada
Kasimir Schulz
Kat "rnbwkat" Fitzgerald
Katarina Amrichova
Kataze
Katelyn Bowden
Katherine Rackliffe
Katie "InsiderPhD" Paxton-Fear
Katie "InsiderPhD" Paxton-Fear
Katie "InsiderPhD" Paxton-Fear
Katie "InsiderPhD" Paxton-Fear
KC Wong
Keane Lucas
Keanu "RedByte" Nys
Keenan Skelly
Keith Busby
Keith Busby
Keith O'Reilly
Kelly Ohlert
Ken "cktricky" Johnson
Ken "cktricky" Johnson
Ken "cktricky" Johnson
Ken Harding
Kenneth Miltenberger
KennethSalt
KennethSalt
Kerry "Professor Kilroy" Hazelton
Kevin Clark
Kevin Clark
Kevin Clark
Kévin Courdesses
Kévin Courdesses
Kevin Dela Rosa
Kevin Mitchell
Kevin Shi
Kevin Shi
Kim Wuyts
Kirsten Sireci Renner
Kitboga
Kitty Hegemon
Kitty Hegemon
Kiwi
Klaus Agnoletti
Konstantinos Karagiannis
Krishna Priya
Kristen Chu
Kristen Chu
Krity Kharbanda
Kumar Ashwin
Kurt Hoffman
kuzushi
kvprashant
Kyle "d4rksystem" Cucci
Kyle "d4rksystem" Cucci
Kyle "d4rksystem" Cucci
Kyle Kelly
Kyle Skey
Kyle Skey
Laavanya Rachakonda
Langston Clement
Large Cardinal
Larry Pesce
Larry Pesce
Larry Pesce
Laura S. Scherling
Laura S. Scherling
Lauren Pace
Lauren Proehl
Leah Siskind
Leah Siskind
Leandro Morales Perito em computação
Lee McWhorter
Lee McWhorter
Lee McWhorter
Leigh Trinity
Leigh-Anne Galloway
Leigh-Anne Galloway
Leigh-Anne Galloway
Len Noe
Lena "LambdaMamba" Yu
Lenin Alevski
Lenin Alevski
Lenin Alevski
Lenin Alevski
Leo Tsaousis
Leon "leonjza" Jacobs
Leon "leonjza" Jacobs
Leon Denard
Levone Campbell
lexicon121
lexicon121
Lexie "L3xic0n" Thach
Lexie "L3xic0n" Thach
Liad Cohen
Lior Adar
Lior ZL
Lipo
Lipo
Lipo
Lipo
Lisa Femia
Lishuo "ret2ddme" Song
Liz Wharton
Logan Cannan
Lorenzo Faletra
Lorenzo White
Louis Deweaver
Lozaning
Luis De la Rosa
Luis Diego Raga
Lukas Dresel
Luke Cycon
Luke Szramowski
M0nkeyDrag0n
M0nkeyDrag0n
M0nkeyDrag0n
m4lwhere
Maarten van Dantzig
Mackenzie Jackson
Mackenzie Jackson
Mackenzie
Madhu "madhuakula" Akula
Madhu "madhuakula" Akula
Madhu "madhuakula" Akula
Madhu "madhuakula" Akula
Madhu "madhuakula" Akula
Madison Oliver
Mahmut "ErdemOzgen" Erdem Ozgen
Mahmut "ErdemOzgen" Erdem Ozgen
Maia Hamin
MakeItHackin
Maksim Shudrak
Malachi Walker
Malachi Walker
Manfred
Manish Gupta
Mansoor Ahmad
Manuel Rábade
Mar
Marcell Szakály
Marcell Szakály
Marcelo Ribeiro
Marco Casagrande
Marco Figueroa
Marco Figueroa
Marcus J.carey
Marek Tóth
Mari Galloway
Maria "drkrysSrng" San Jose
Mariano Marino
Marie "ScorpVayne" Hamilton
Marilyn Marks
Marilyn Marks
Marios Gyftos
Marius Fleischer
Marius Muench
Marius Muench
Marius Muench
Mark "LargeCardinal" Carney
Mark Griffin
Mark Manning
Mark Omo
Mark Perry
Mark Trumpbour
Marko Mitic
Mars Cheng
Martha Mahoney
Martin "tincho_508" Doyhenard
Martyn Higson
Master Chen
Matei Josephs
Mateusz Chrobok
Matias Armándola
Matt "OB-1" Olmsted
Matt Blaze
Matt Blaze
Matt Blaze
Matt Blaze
Matt Blaze
Matt Brown
Matt Brown
Matt Cheung
Matt Cheung
Matt Cheung
Matt Gaffney
Matt Holland
Matt Muir
Matt Turek
Matt Wein
Matthew Cancilla
Matthew Canham
Matthew Knight
Matthew Knight
Matthew Knight
Matthew Thomassen
Matthew Woodcock
Matthias Göhring
Matthias Göhring
Matthias Göhring
mattrix
mattrix
Mauro Eldritch
Mauro Eldritch
Mauro Eldritch
mauvehed
Max "Libra" Kersten
Max Bazalii
Max
Maximilian Günther
Mayra Robles
Mea Clift
Mea Clift
Megan Allen
Megan Allen
Megan Allen
Megan Allen
Megan Allen
Megan Allen
Megan Squire
Meghan "CarpeDiemT3ch" Jacquot
Mehdi "kalimer0x00" Elyassa
Mehmet Önder Key
Mehmet Önder Key
Melanie "Goldfishlaser" Allen
Melanie "Goldfishlaser" Allen
Melinda Baeriswyl
Mher Tolpin
Micah "micahflee" Lee
Micah "micahflee" Lee
Michael "bouncyhat" Weber
Michael "codingo_" Skelton
Michael "MSvB" Schloh von Bennewitz
Michael "MSvB" Schloh von Bennewitz
Michael "mtu" Torres
Michael "r00tkillah"
Michael "v3ga" Aguilar
Michael "v3ga" Aguilar
Michael Crouse
Michael D. Brown
Michael DeVolld
Michael Donley
Michael Frank
Michael Gianarakis
Michael Goberman
Michael Katchinskiy
Michael Klein
Michael Moore
Michael Odell
Michael Portera
Michael Razeeq
Michael Rodriguez
Michael Specter
Michael Specter
Michael Sulmeyer
Michael Tassey
Michele Reilly
Michele Reilly
Michelle Lopez
Mickey Shkatov
Mike "CroodSolutions" Manrod
Mike "CroodSolutions" Manrod
Mike Holcomb
Mike Hunter
Mike Hunter
Mike Lisi
Mike Raggo
Mike Walker
Mikko Hypponen
Milenko Starcik
Miracle Owolabi
Mishaal Khan
Mishaal Khan
Miss Jackalope
MJ Casado
Mohamed Nabeel
Mohd. Arif
Monica Carranza
Monish Alur Gowdru
Monnappa "Monnappa22" K A
Monnappa "Monnappa22" K A
Morgan Jones
Morgan Jones
Morgan Jones
Moritz "momo" Frenzel
Moritz "momo" Frenzel
Moses Frost
Moshe Siman Tov Bustan
MrBill
MrBill
MrBill
Mrigakshi Goel
Muhammad Usman
Muhammad Yuga Nugraha
Munir Muhammad
Munir Muhammad
Muslim Koser
n0pslide
N3rd H3Rder
N8
Nadeem Bagwan
Nadeem Bagwan
Nandan Gupta
Nandan Gupta
Naomi Brockwell
Naomi Brockwell
Natan Morette
Natan Morette
Nate "N8MOR" Moore
Nate "wants.beer" Martin
Nate Young
Nathan Case
Nathan Case
Nathan Case
Nathan Salminen
Nathan
Nathaniel
Natyra Shaqiri
Natyra Shaqiri
Natyra Shaqiri
Navaar Johnson
Nebu Varghese
Nelson Colón
Nelson Colón
Netanel Ben Simon
Netspooky
Neumann "scsideath" Lim
Neumann "scsideath" Lim
Nevada Romsdahl
Newton Cheng
Niall Canavan
Nicholas Fredericksen
Nicholas Vidovich
Nick "c7five" Percoco
Nick Aleks
Nick Copi
Nick Halt
Nico Lidzborski
Nico Waisman
Nicole "CircuitSwan" Schwartz
Nicole "CircuitSwan" Schwartz
Nikhil
Nikita Kronenberg
Nikkia Henderson
Nikkia Henderson
Niklas Lindroos
Nikolas Behar
Nikos Vourdas
NilbinSec
NilbinSec
Nina Alli
Niru Ragupathy
Nishant Sharma
Nishant Sharma
Nishant Sharma
Nitetrain
Nitetrain
Nnenna Ndukwe
Noah Holland
Noah K
Noam Moshe
Noel Wong
Nykolas Muldrow
nyx
oblivion
Octavio Gianatiempo
Olesya Menon
Olivier Bilodeau
Om Narayan
Omar Hamoudeh
Omar Hamoudeh
Omar Santos
Omar Santos
Omenscan
oopsbagel
oopsbagel
Or "oryair1999" Yair
Or "oryair1999" Yair
Or Eshed
Or Sahar
Ori David
Orv "W6BI" Beach
Özgün Kültekin
Pablo Trujillo
Pablo Trujillo
Paco Sanchez Lopez
Palinuro
PamirAI
Panda
Pankaj
Param D Pithadia
Param D Pithadia
Parker Crook
Parsia "CryptoGangsta" Hakimian
Parsia "CryptoGangsta" Hakimian
Pat Patterson
Pat Patterson
PatAttack
Patrick "Gigstorm" Kiley
Patrick Walsh
Patrick Wardle
Patrick Wardle
Patrick Wardle
Patrick Wardle
Paul "6mile" McCarty
Paul "6mile" McCarty
Paul Goffar
Paul M. Nakasone
Paul Miller
Paul Roberts
Paulino Calderon
Pedro "drop" Paniago
Pedro Martin
Penzz
Penzz
Perri Adams
Peter Hefley
Philip "Soldier of FORTRAN" Young
Philip Davis
Philip Davis
Philip Dursey
Philip Stark
Philip Stark
Philippe "phLaul" Laulheret
Philippe Ribiere
Philippos Giavridis
Phillip Wylie
Phillip Wylie
Phillip Wylie
phreakocious + n0pslide
phreakocious
Pietro Fezzardi
Pietro Fezzardi
Plug
polomaster
polomaster
Portswigger
Prahalad
Prahalad
Pramod Rana
Pramod Rana
Pratik Lotia
Preeti Ravindra
Preston Zen
Priyanka Joshi
Pushkar Jaltare
pwn.talk crew
Qiang Zeng
Qiang Zeng
Qidan "flanker_hqd" He
Qingxiao Xu
Quantum Village People
Quantum Village People
Quantum Village People
Quentin "quent0x1" Roland
Quinn Dombrowski
Rachael Tubbs
Rafael Felix
Rafael Felix
Ram Ganesh
Randy Pargman
Randy Varela
Ranny Bergamotte
Raphael Silva
Raphael Silva
Raphael Silva
Raphael Silva
Rashmi
Ravi Rajput
Ravi Rajput
Ravi Rajput
Ray "CURZE$" Cervantes
Ray "CURZE$" Cervantes
Ray [REDACTED]
Ray [REDACTED]
Ray [REDACTED]
Ray Derac
Ray Derac
Rebecah Miller
Red Team Village Staff
RedBaron
Remi Afon
Remy DeCausemaker
Reuel Magistrado
Rey "Privesc" Bango
Reynaldo "buh0"
RF Hackers
RF Hackers
RF Hackers
rh4hunnid
Ricardo Fradique
Ricardo Sanchez
Rich "Buffaloverflow" Warren
Rich Compton
Richard "HeadlessZeke" Lawshae
Richard "neuralcowboy" Thieme
Richard "richeeta" Hyunho Im
Richard "richeeta" Hyunho Im
Richard Rauscher
richinseattle
Rigo Salazar
Rik Chatterjee
Rishi "rxerium" Chudasama
Ritika Verma
Ritvik Arya
Rob King
Rob Mendoza
Robert "LambdaCalculus" Menes
Robert "nytr0gen" Vulpe
Robert Pafford
Robert Pimentel
Robert Soligan
Robert Soligan
Roberto Soares
robwaz
robwaz
Rodney Beede
Rodrigo Montoro
Roee Idan
Roger "arma" Dingledine
RoguePacket
Rohit Grover
Rohit Mothe
Romel Marin
Ron Ben Yizhak
Ron Broberg
Ron Rivest
Ronald González
Roni "lupin" Carta
RootRouge
Roshan Piyush
Roshan Piyush
Rosie "Lady Cyber Rosie" Anderson
Ross Uhrich
Roxey Davis
Royce Yaezenko
Ruchira Pokhriyal
Russell Mosley
Russell Phillips
Ryan "0day" Montgomery
Ryan "rj_chap" Chapman
Ryan Bonner
Ryan Emmons
Ryan Holeman
Ryan Mitchell
Ryan Nolette
Ryan Nolette
Ryan O'Donnell
Ryan Robinson
Sagnik Haldar
Sai Molige
Sajan Shetty
Sajan Shetty
Saksham Agrawal
Sam "erbbysam" Erb
Sam Bowne
Sam Collins
Sam Comini
Sam Hanson
Samet Can Tasci
Samuel Gasparro
Samuel Gasparro
Samuele Doria
Sandra Stibbards
Sandra Stibbards
Sandy Clark
Sanjeev Sharma
Sanne Maasakkers
Sara Martinez Giner
Sarah Evans
Sarah Hume
Sarah Mackey
Sarah Powazek
Saransh Rana
Sarthak Taneja
Sasuke "Element138" Kondo
Sasuke "Element138" Kondo
Savannah Lazzara
Scott "ScottCTaylor12" Taylor
Scott "ScottCTaylor12" Taylor
Scott "ScottCTaylor12" Taylor
Scott Lee
Scott Shackleford
Sean Gilligan
Sean Jones
Sean Marquez
Sean Marquez
Sean McKeever
Sean Prescott
Sebastian Köhler
Sebastian Tapia
Seongsu Park
Seth Art
Seth Law
Shaanan Cohney
Shahak Morag
Shane Krause
Shang-De "HackerPeanutJohn" Jiang
Shani Peled
Sharlene Toney
Sharon Ohayon Pshoul
Shawn
Shilpi Mittal
Shin-Ming Cheng
Shlomie Liberow
Shota "Sh1n0g1" Shinogi
Shota "Sh1n0g1" Shinogi
Shourya Pratap Singh
Shourya Pratap Singh
Shourya Pratap Singh
Shourya Pratap Singh
Shu-Hao
Shubham Mittal
Shubham Mittal
Sierra Haex
Sigusr Polke
Silas Cutler
Silas Cutler
Simon Maxwell-Stewart
Sinu
Sinwindie
sjzhu
Skittish and Bus
Sky Gul
Skyler Knecht
Skyler Knecht
Skyler Knecht
Snahil Singh
Sohum Thakkar
SolaSec
some-natalie
Sonicos
Sonicos
Sonicos
Sonicos
Soujanya Namburi
Spencer "securimancer" Koch
Spencer "ZeroSteiner" McIntyre
Spencer "ZeroSteiner" McIntyre
Spencer "ZeroSteiner" McIntyre
Spyros Gasteratos
Stacey Lokey-Day
Stanley Harris
Stav Cohen
Stephanie Corvese
Stephanie Doyle
Stephanie Doyle
Stephen Bono
Stephen Winchell
Stephen Winchell
Steve "hamster" Ball
Steve Winston
Steven
Stitcharoo
Subho Halder
Subho Halder
Subho Halder
Sudhanshu Chauhan
Sudhanshu Chauhan
Sudhanshu Chauhan
Sudhanshu Chauhan
Susan Greenhalgh
Susan Greenhalgh
Susan Greenhalgh
Susan Greenhalgh
Susan Lerner
Suzanne Borders
Suzanne Borders
Sven Cattell
Sydney Johns
Sydney Marrone
Syntax + Luna (VJ)
Syntax + Luna (VJ)
Taeeun Lee
Taesoo Kim
Takeshi Matsuda
Takeshi Matsuda
Tal "TLP" Peleg
Tal Skverer
Tanya "SheHacksPurple" Janca
Tanya "SheHacksPurple" Janca
Tanya "SheHacksPurple" Janca
Tanya "SheHacksPurple" Janca
Tapan Khilnani
tavoo
Tay Sze Ying
Ted Carefoot
tedan_vosin
Temel Demir
Terrance DeJesus
The Computer Guy
The Computer Guy
The Gold Bug Team 2025
The Gold Bug Team 2025
The Magician
Thiago Bordini
Thomas "fr0gger_" Roccia
Thomas "fr0gger_" Roccia
Thomas "stacksmashing" Roth
Thomas "stacksmashing" Roth
Thomas "XM20" Xuan Meng
Thomas "XM20" Xuan Meng
Thomas Elling
Thomas Jost
Thomas Pope
Thorin Klosowski
Thorin Klosowski
Tia Pope.
Tib3rius
Tim Allison
Tim Clevenger
Tim Fowler
Tim Roberts
Tim Weston
Tobias "ItsSixtyNein" Diehl
Todd Fletcher
Tom Bereknyei
Tom Chothia
Tom Chothia
Tom Cope
Tom Cross
Tom Cross
Tom Cross
Tom Tervoort
Tomer Nahum
Tomer Nahum
Tomer Nahum
Tomer Nahum
Toni de la Fuente
Tony Webber
Tony Webber
TOOOL
TOOOL
TOOOL
TOOOL
TOOOL
TOOOL
TOOOL
Tori Noble
Travis Goodspeed
Trevor Flynn
Trevor
Trey Bilbrey
Trey Ford
Trey Ford
TRIODE
Tristan Kalos
Trouble1
Troy Fridley
Tung-Lin "Echo Lee" Lee
Tyler Bertles
Tyler Nighswander
Tyler Ramsbey
Tyson Laa Deng
Uday
Umit Aksu
Utku Sen
Utku Sen
utvecklas
utvecklas
Valerio "MrSaighnal" Alessandroni
Vanessa Wrenn
Veronika
Victor Le Pochat
Victoria "V__Wave" Kumaran
Viktor Gazdag
Vince Sloan
Vince Sloan
Vincent "Vinnybod" Rose
Vincent "Vinnybod" Rose
Vincent "Vinnybod" Rose
Vincent Cannone
Vincent Cannone
Vincent Cannone
Vinod Shrimali
Vinod Shrimali
Vinod Shrimali
Vinod Shrimali
Vinod Shrimali
Vishal "Vish" Thakur
Vishal "Vish" Thakur
Vishal "Vish" Thakur
Vlad Iliushin
Vladimir Tokarev
Vlatko Kosturjak
Vortex1 - Coruscant Ventures
Vortex1 - Coruscant Ventures
Vortex1 - Coruscant Ventures
Vortex1 - Coruscant Ventures
Vy Hong
W. Martín Villalba
W. Martín Villalba
W. Martín Villalba
Walter Martin Villalba
Wei Hong
Weihan Goh
Wes Payne
Wes Thurner
Wesley McGrew
Wesley McGrew
Wesley McGrew
Wesley Snell
Wesley
Whit "un1tycyb3r" Taylor
Wil Gibbs
Wilfried "wil_fri3d" Bécard
Will Bagget
Will Bagget
Will McGraw
Will Thomas
willasaywhat
William (Bill) Butler
William Giles
William Giles
Window Snyder
Winnona DeSombre Bernsen
WISP + BTV
Woody
Wrickert
Wrickert
x3ero0
Xian Xiang Chang
Xian Xiang Chang
Xinyu Xing
Yaara Shriki
Yael Basurto
Yael Grauer
Yago Lizarribar
Yakir Kadkoda
Yann Allain
Yariv Tal
Yash Bharadwaj
Ying Liu
Ying Zhu
Yoann "OtterHacker" DEQUEKER
Yoann "OtterHacker" DEQUEKER
Yoav Magid
Yossi Weizman
Young Seuk Kim
Youngseo Park
Yuval Gordon
Yuval Guri
Yvonne "Von Marie" Cervantes
Yvonne "Von Marie" Cervantes
Zach Malinich
Zack Fink
Zandreia Keys
Zane "earl" Hoffman
zardus
Ze Sheng
Zhengyu Liu
Zibran Sayyed
Zibran Sayyed
ZiYang "lz2y" Li
zizkill
Zoey Selman
Zoltan "zh4ck" Balazs
Zoltan "zh4ck" Balazs
Zoltan "zh4ck" Balazs
Zoltan "zh4ck" Balazs
Zoziel Freire
ZwinK
ZwinK
zziks

Talk List


.edu Community - .edu Community
.edu Community - .edu Community
.edu Community - .edu Community
"Do not obey in advance": Cybersecurity in the Fight Against Techno-Authoritarianism - DEF CON Groups VR (DCGVR)
"We are currently clean on OPSEC": The Signalgate Saga - DEF CON Talks
“Robo Duck” Architecture - Artificial Intelligence Cyber Challenge (AIxCC)
“Secure AI” is 20 years old - AI Village
[Virtual] National Service Panel - CTU,BIC,MCPA - Blacks In Cyber Village
#ReclaimTech - A community movement - Hackers.town Community
+61: the Australian Embassy - Social Gatherings/Events
0 to Infra in 100 Days: A Nix Speedrun - Nix Vegas Community
1 year of GenAI JailBreaks by 0din - La Villa
10 Lessons from the Frontlines of AI Vishing: From Zero to (Almost) Hero - Social Engineering Community Village
10 Years of IoT Village: Insights in the World of IoT - IOT Village
101 Labs: Firmware and Software exploitation - Embedded Systems Village
101 Labs: Firmware and Software exploitation - Embedded Systems Village
101 Labs: Firmware and Software exploitation - Embedded Systems Village
101 Labs: Hardware Lab - Embedded Systems Village
101 Labs: Hardware Lab - Embedded Systems Village
101 Labs: Hardware Lab - Embedded Systems Village
12th CPV Program Committee Chitchat at the garden - Crypto Privacy Village
2025 Authentication Survival Guide - Crypto Privacy Village
40 Years Of Phrack: Hacking, Zines & Digital Dissent - DEF CON Talks
5 stories to understand quantum computing - Quantum Village
5N4CK3Y - Contests
5N4CK3Y - Contests
5N4CK3Y - Contests
6 Simple Rules for Building a Better SkyNet: AI-Powered War Planning - Policy @ DEF CON
7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built - DEF CON Talks
7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built - AppSec Village
A Brief History of the Knox Box - Lock Pick Village
A Look into Using Native Godot Calls to Create Malware - Red Team Village
A Recipe for Distrust: Regularty Failure with Ballot Marking Marking Devices - Unreadable Images and Multiple Records of Each Voter's Choices - Voting Village
A Tale of Weeds and Roses: Propagating the Right Data Protection Agreements with Vendors - Crypto Privacy Village
A Taste of Chrome V8 Exploitation - AppSec Village
A Wake-Up Call in Telecom Security: The SK Telecom Case - Telecom Village
Abusing the Rules: Detect and Defend Against Business Logic Attacks in APIs - AppSec Village
Access Control Done Right the First Time - Physical Security Village
Access Denied: How Students Can Enforce Their Disability Rights in Education - The Diana Initiative
Access Denied: How Students Can Enforce Their Disability Rights in Education - Hackers With Disabilities (HDA)
accessDenied: Step Into the Scenario. Deal the Consequences. - Biohacking Village
accessDenied: Step Into the Scenario. Deal the Consequences. - Biohacking Village
accessDenied: Step Into the Scenario. Deal the Consequences. - Biohacking Village
Aceleradores criptográficos basados en dispositivos reconfigurables (ESP) - La Villa
ACUPRESSURE FOR VITALITY - The Diana Initiative
Addressable LEDs and WLEDs - Illumicon
Addressable LEDs and WLEDs - Illumicon
Advanced Active Directory to Entra ID lateral movement techniques - DEF CON Talks
Adversarial mindset, thinking like an attacker is no longer optional - Adversary Village
Adversaries at War: Tactics, technologies, and lessons from modern battlefields - Adversary Village
Adversary Intel Lab: Build Your First Threat Emulation Plan - Red Team Village
Adversary Simulator Booth - Adversary attack simulation and purple teaming hands-on booth - Adversary Village
Adversary Simulator Booth - Adversary attack simulation and purple teaming hands-on booth - Adversary Village
Adversary Simulator Booth - Adversary attack simulation and purple teaming hands-on booth - Adversary Village
Adversary Village - Village Open - Adversary Village
Adversary Village - Village Open - Adversary Village
Adversary Village - Village Open - Adversary Village
Adversary Village kick-off keynote panel - Adversary Village
Adversary Wars CTF Contest - Contests
Adversary Wars CTF Contest - Contests
Adversary Wars CTF Contest - Contests
AI Art Battle - Contests
AI in OT Should be Cheaper Than in IT - Artificial Intelligence Cyber Challenge (AIxCC)
AI Red Team - Artificial Intelligence Cyber Challenge (AIxCC)
AI Red Teaming as an Evaluation Process - AI Village
AI Red Teaming for Everyone - AI Village
AI Supply Chain: Generating AI SBOMs for Hugging Face Models - AppSec Village
AI vs. the APTs: Using LLMs to discover malware and undisclosed vulnerabilities - AppSec Village
AI-Powered Web Applications: A New Era in Security – Live Technical Demo - Red Team Village
AIMaL - Artificially Intelligent Malware Launcher - Demo Labs
AIMaL - Artificially Intelligent Malware Launcher - Demo Labs
AIMaL: Artificially Intelligent Malware Launcher - Red Team Village
AirBleed - Covert Bluetooth Plist Payload Injection - Demo Labs
AirBleed - Covert Bluetooth Plist Payload Injection - Demo Labs
Airborne WiFi - Rouge Waves in the Sky - Radio Frequency Village
Aircraft onboard AI cyber detection - Aerospace Village
Aircraft onboard AI cyber detection - Aerospace Village
Aircraft onboard AI cyber detection - Aerospace Village
Airport Security! - S01 E008 - Breaking into your baggage - Physical Security Village
All You Need Is a Fuzzing Brain: A Retrospective - Artificial Intelligence Cyber Challenge (AIxCC)
All your keyboards are belong to us! - Hardware Hacking and Soldering Skills Village (HHV-SSV)
Alternative Entry Points - Noob Community
Amber64: Mining Hacker History from Over Half a Million Commodore 64 Disks - DEF CON Talks
AML Cryptocurrency Compliance - Cryptocurrency Community
Amplifying Phishing Attacks with Generative AI (POR-ESP) - La Villa
AN EXPERIENTIAL JOURNEY THROUGH THE 7 CHAKRAS - The Diana Initiative
An update from the LLM scaling laws frontier - Artificial Intelligence Cyber Challenge (AIxCC)
Anatomy of a Crypto Scam - Cryptocurrency Community
Angry Magpie - DLP Bypass Simulator - Demo Labs
Angry Magpie - DLP Bypass Simulator - Demo Labs
Anotomy of Telecom Malware - Telecom Village
Antenna Building: Make Your Own LoRa Yagi and VHF Foxhunt Loop Workshop - Ham Radio Village
AppleStorm - Unmasking the Privacy Risks of Apple Intelligence - DEF CON Talks
Applied Cryptocurrency Hardware - Cryptocurrency Community
Applying DevSecOps Lessons to MLSecOps - Artificial Intelligence Cyber Challenge (AIxCC)
AppSec in the Shadows: Adversarial Tradecraft in App and API Defenses - AppSec Village
Aranya Open-Source messaging system hands-on workshop - Aerospace Village
Aranya Open-Source messaging system hands-on workshop - Aerospace Village
Aranya Open-Source messaging system hands-on workshop - Aerospace Village
Arcade Party - Social Gatherings/Events
Artificially Insecure - AppSec Village
Artificially Insecure - AppSec Village
ARTIPHISHELL Intelligence - Artificial Intelligence Cyber Challenge (AIxCC)
Ask a Hiring Manager with Cory Wolff - Red Team Village
Ask a Hiring Manager with Peter Hefley - Red Team Village
Ask a Hiring Manager with Troy Fridley - Red Team Village
Ask a Hiring Manger with Doug Mooney - Red Team Village
Ask EFF - DEF CON Talks
Assembly Alchemy: From Opcodes to Exploits - DEF CON Academy
Assessing the Capabilities Gap Between Foundation Models and Cybersecurity Experts: Benchmarks, Safeguards, and Policy - AI Village
Attack Flow and Root Cause Discovery - No LLMs, No Queries, Just Explainable ML - Demo Labs
Attack Flow and Root Cause Discovery - No LLMs, No Queries, Just Explainable ML - Demo Labs
Attacking Kubernetes: Tools and Tactics to Compromise Your First Cluster - Red Team Village
Audience Picked By Popular Demand Demo Lab - TheTimeMachine - Demo Labs
Audience Picked By Popular Demand Demo Lab - Demo Labs
Audit This: Breaking Down Bias in the Cyber Stack - Blacks In Cyber Village
Auths Gone Wild: When ‘Authenticated’ Means Anyone - Cloud Village
Autoformatting with Nix in Neovim - Nix Vegas Community
Automated security assessment for CCSDS protocols - Aerospace Village
Automated security assessment for CCSDS protocols - Aerospace Village
Automated security assessment for CCSDS protocols - Aerospace Village
Autonomous System Demo - Artificial Intelligence Cyber Challenge (AIxCC)
Autonomous Video Hunter: AI Agents for Real-Time OSINT - Recon Village
Aw, man...pages! - Contests
AzDevRecon - Azure DevOps Enumeration Tool - Cloud Village
Back to Basics: Building Resilient Cyber Defenses - Crypto Privacy Village
Backdoors and Breaches (ESP-ENG) - La Villa
Badge Drop - Black Badge Raffle TCG - Badgelife Community
Badge Drop - Black Badge Raffle TCG - Badgelife Community
Badge Drop - Black Badge Raffle TCG - Badgelife Community
Badge Drop - Black Badge Raffle TCG - Badgelife Community
Badge Drop - GigaGeiger - Badgelife Community
Badge Drop - GigaGeiger - Badgelife Community
Badge Drop - Hack ‘em Crack ‘em Robots - Badgelife Community
Badge Drop - Hack ‘em Crack ‘em Robots - Badgelife Community
Badge Drop - Laser* Tag Badge - Badgelife Community
Badge Drop - Laser* Tag Badge - Badgelife Community
Badge Drop - Masonic33 Badge - Badgelife Community
Badge Drop - NeoSword - Badgelife Community
Badge Drop - NeoSword - Badgelife Community
Badge Drop - Rust Badge - Badgelife Community
Badge Drop - SaO MANY SAOs - Badgelife Community
Badge Drop - SaO MANY SAOs - Badgelife Community
Badge Drop - SaO MANY SAOs - Badgelife Community
Badge Drop - SaO MANY SAOs - Badgelife Community
Badge Drop - Shitty Kitty v2 - Badgelife Community
Badge Drop - Shitty Kitty v2 - Badgelife Community
Badge Drop - Submarine Badge/FrogStar Badge/FightDystopia Badge - Badgelife Community
Badge Drop - The Hacker Pager - Badgelife Community
Badge Drop - The Hacker Pager - Badgelife Community
Badgelife Panel: Lessons from Years of Do’s, Don’ts, and Last-Minute Saves - Badgelife Community
BadVR: Signals Everywhere a collaboration with XR Village - OWASP Community
BadVR: Signals Everywhere a collaboration with XR Village - OWASP Community
Banxhil y la autopsia a un RAT modular en Java (ESP) - La Villa
Bare Metal Reverse Engineering - Biohacking Village
Battle of the Bots: Vishing Edition - Contests
Be The Threat! - Adversary Village
Beaconator C2 Framework - Demo Labs
Beaconator C2 Framework - Demo Labs
Becoming a Caido Power User - Bug Bounty Village
Beginner's Guide to Attacks and Defenses - DEF CON Training
Behind the Badge: How We Used and Abused Hardware (again) to Create the AV Badge for DC33 - Aerospace Village
Behind The Dashboard - (Lack Of) Automotive Privacy - Crypto Privacy Village
Better AppSec through better DevEx - DEF CON Groups VR (DCGVR)
Beyond Assistants: Securing Agentic AI Systems and Multi-Agent Workflows in High-Stakes Environments - AppSec Village
Beyond Assistants: Securing Agentic AI Systems and Multi-Agent Workflows in High-Stakes Environments - OWASP Community
Beyond CTFs: Evaluating AI Cyber capabilities in Real-World Environments - AI Village
Beyond the Hype: Leveraging MITRE ATT&CK for a Hands-On, Practical Assessment with Caldera - Red Team Village
Beyond the Stack: How External Failures Impact Payments Security - Payment Village
Beyond Vibe Coding: Building Reliable AI AppSec Tools - AppSec Village
Beyond Watermarks: What Security's Past Can Teach Us About Sythetic Content's Future - AI Village
BIC Village "B.I.C. Pick" DEF CON 33 Badge Walkthrough - Blacks In Cyber Village
Binary exploitation basics - Malware Village
Binary Facades: Reversing approaches to extract embedded scripts in compiled macOS malware - DEF CON Talks
Bio-Cryptography is the Game-Genie in a post quantum dystopia - Biohacking Village
Biohacking Device Lab - Biohacking Village
Biohacking Device Lab - Biohacking Village
Biohacking Device Lab - Biohacking Village
BIPOC of Queercon - Queercon Community Lounge
Biting into the forbidden fruit: how the EU’s Digital Markets Act breaks open walled gardens - Policy @ DEF CON
BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets - DEF CON Talks
Blackdagger - Cyber Workflow Automation Framework - Demo Labs
Blackdagger - Cyber Workflow Automation Framework - Demo Labs
BlanketFort Con - Social Gatherings/Events
Blind Trailer Shouting (Car Hacker's Version) - Car Hacking Village
Blind Trailer Shouting - DEF CON Talks
BloodHound Enterprise CTF - Red Team Village
Blue Team Careers: Battle the Job Market and Get Hired (A BTV Interactive Panel) - Blue Team Village (BTV)
Blue Team Village Closing Remarks - Blue Team Village (BTV)
Blue Team Village CTF - Contests
Blue Team Village CTF - Contests
Blue Team Village Robs a Bank - Blue Team Village (BTV)
Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors - Adversary Village
Boarding the VSAT: Real-World Exploits, Testbed Validation, and Policy Gaps in Maritime Connectivity - Maritime Hacking Village
BOAZ - A Multilayered Approach to AV/EDR Evasion Engineering - Demo Labs
BOAZ - A Multilayered Approach to AV/EDR Evasion Engineering - Demo Labs
Book Signing - Adversary Emulation with MITRE ATT&CK - Drinor Selmanaj - Social Gatherings/Events
Book Signing - Adversary Emulation with MITRE ATT&CK - Drinor Selmanaj - Social Gatherings/Events
Book Signing - Alex Matrosov/No Starch Press - Social Gatherings/Events
Book Signing - Alfie Champion/No Starch Press - Social Gatherings/Events
Book Signing - Breaking IN: A Practical Guide To Starting a Career In Information Security Cybersecurity Essentials For Startups : A Practical Guide - Ayman Elsawah - Social Gatherings/Events
Book Signing - Breaking IN: A Practical Guide To Starting a Career In Information Security Cybersecurity Essentials For Startups : A Practical Guide - Ayman Elsawah - Social Gatherings/Events
Book Signing - Casey Erdman/No Starch Press - Social Gatherings/Events
Book Signing - Corey Ball/No Starch Press - Social Gatherings/Events
Book Signing - Cyber Calendar 2026 - Chris DeCarmen/Squared Away LLC - Social Gatherings/Events
Book Signing - Cyber Calendar 2026 - Chris DeCarmen/Squared Away LLC - Social Gatherings/Events
Book Signing - Cyber Calendar 2026 - Chris DeCarmen/Squared Away LLC - Social Gatherings/Events
Book Signing - Daniel Reilly/No Starch Press - Social Gatherings/Events
Book Signing - Eugene Lim/ No Starch Press - Social Gatherings/Events
Book Signing - Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (5th ed) - Carey Parker - Social Gatherings/Events
Book Signing - Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (5th ed) - Carey Parker - Social Gatherings/Events
Book Signing - Fotis Chantizis/ No Starch Press - Social Gatherings/Events
Book Signing - Future of Hacking: The Rise of Cybercrime and the Fight to Keep Us Safe - Laura S. Scherling, EdD / Bloomsbury - Social Gatherings/Events
Book Signing - Future of Hacking: The Rise of Cybercrime and the Fight to Keep Us Safe - Laura S. Scherling, EdD / Bloomsbury - Social Gatherings/Events
Book Signing - Ghost Hacker : How to hack human spirit - Jun Kawasaki - Social Gatherings/Events
Book Signing - Hunter Scott/No Starch Press - Social Gatherings/Events
Book Signing - Jason Andress/ No Starch Press - Social Gatherings/Events
Book Signing - Jon DiMaggio/ No Starch Press - Social Gatherings/Events
Book Signing - JP Ausmasson/No Starch Press - Social Gatherings/Events
Book Signing - Kara Nance/No Starch Press - Social Gatherings/Events
Book Signing - Kurtis Minder - Social Gatherings/Events
Book Signing - Kurtis Minder - Social Gatherings/Events
Book Signing - Kurtis Minder - Social Gatherings/Events
Book Signing - Kurtis Minder - Social Gatherings/Events
Book Signing - Kyle Cucci/No Starch Press - Social Gatherings/Events
Book Signing - Lindsay Kay / No Strach Press - Social Gatherings/Events
Book Signing - Micah Lee/ No Starch Press - Social Gatherings/Events
Book Signing - Nick Aleks/No Starch Press - Social Gatherings/Events
Book Signing - Patrick Wardle/ No Starch Press - Social Gatherings/Events
Book Signing - Paulino Calderon/No Starch Press - Social Gatherings/Events
Book Signing - Philip Dursey/No Starch Press - Social Gatherings/Events
Book Signing - Phrack / No Starch Press - Social Gatherings/Events
Book Signing - Practical Lock Picking; Keys to the Kingdom - Deviant Ollam/Red Team Tools - Social Gatherings/Events
Book Signing - Supply Chain Software Security-AI, IoT and Application Security - Aamiruddin Syed/Apres Media LLC - Social Gatherings/Events
Book Signing - The Browser Security Field Manual Adeline - Audrey Adeline - Social Gatherings/Events
Book Signing - The Hacker Mindset: A 5-Step Methodology for Cracking the System and Achieving Your Dreams - Garrett Gee/Hacker Warehouse - Social Gatherings/Events
Book Signing - The Hacker Mindset: A 5-Step Methodology for Cracking the System and Achieving Your Dreams - Garrett Gee/Hacker Warehouse - Social Gatherings/Events
Book Signing - Travis Goodspeed/No Starch Press - Social Gatherings/Events
Bootloader? I hardly know her! - IOT Village
Bootloader? I hardly know her! - IOT Village
Bootloader? I hardly know her! - IOT Village
BotNet - Packet Hacking Village
BotNet - Packet Hacking Village
BotNet - Packet Hacking Village
Braving the Storm-2372: The Tempest Decoded - Cloud Village
Brazil's aPIXcalypse - How real time payments turned Brazilian threat scenario into a nightmare - Payment Village
Breach and attack simulation exercises - Guided breach and offensive attack simulation hands-on exercises - Adversary Village
Breach and attack simulation exercises - Guided breach and offensive attack simulation hands-on exercises - Adversary Village
Breach and attack simulation exercises - Guided breach and offensive attack simulation hands-on exercises - Adversary Village
Break Systems, Not Promises: I promised to do a keynote at DEF CON - Malware Village
Breakin 'Em All – Overcoming Pokemon Go's Anti-Cheat Mechanism - DEF CON Talks
Breaking In: Real Paths Into Cybersecurity from Hackers, Humans, and Hiring Pros - Noob Community
Breaking Revocation – Fixing a Broken Trust Model with Bloom Filters - DEF CON Groups VR (DCGVR)
Breaking Secure Boot: Exploiting GRUB2's Forgotten Attack Surface (and other bootloaders) - DEF CON Groups VR (DCGVR)
Breaking the Backbone: SS7 and GTPdoor Malware Exploits - Telecom Village
Breaking the Black Box: Why Testing Generative AI Is Full Spectrum - OWASP Community
Breaking the Chain: Advanced Offensive Strategies in the Software Supply Chain - Bug Bounty Village
Breaking the CI/CD Chain: Security Risks in GitHub Actions - AppSec Village
Breaking the Rules: WAF Bypass - OWASP Community
Breaking Wi-Fi Easy Connect: A Security Analysis of DPP - DEF CON Talks
Bricks in the Air - Aerospace Village
Bricks in the Air - Aerospace Village
Bricks in the Air - Aerospace Village
Bridge to Nowhere Good: When Azure Relay becomes a Red Teamer's highway - Red Team Village
Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen - DEF CON Talks
BT hacking - Payment Village
Buckle Up, Buttercup - Our Experience Competing in AIxCC - Artificial Intelligence Cyber Challenge (AIxCC)
Bug Bounty CTF - Contests
Bug Bounty CTF - Contests
Bug Bounty Village Closing Ceremony - Bug Bounty Village
Bug Bounty Village CTF Awards - Bug Bounty Village
Bug Bounty Village CTF Walkthrough - Bug Bounty Village
Bug Bounty Workshop - Noob Community
Build Your Own Meshtastic Node: Off-Grid, Encrypted LoRa Meshnets for Beginners! - IOT Village
Build Your Own Meshtastic Node: Off-Grid, Encrypted LoRa Meshnets for Beginners! - IOT Village
Build your own OS - Operating Systems Community
Building a Malware Museum - DEF CON Talks
Building and defending your systems before encryption and firewalls - Badgelife Community
Building Better Security Champions: A Hands-On Program Design Workshop - OWASP Community
Building Local Knowledge Graphs for OSINT: Bypassing Rate Limits and Maintaining OPSEC - Recon Village
Building the Cross-Cloud Kill Chain: A DE's Playbook for AWS, Azure & GCP Detections - Cloud Village
Building Your First Windows Malware Loader - Red Team Village
Burning, trashing, spacecraft crashing: a collection of vulnerabilities that will end your space mission - Aerospace Village
Bypassing Security Mechanisms Using Application Patching and Code Instrumentation - Mobile Hacking Community
Byte-Sized Basics: A Beginner's Guide to x86 Assembly - DEF CON Academy
C4 - Cross Compatible Command and Control - Demo Labs
C4 - Cross Compatible Command and Control - Demo Labs
Caldera for OT - Oops! All Software - Demo Labs
Caldera for OT - Oops! All Software - Demo Labs
Caldera for OT Mini-CTF - Aerospace Village
Call a Vendor? How MSPs/MSSPs Do (and Don’t) Help High-Risk Communities - Policy @ DEF CON
Call Center Village Contest - Contests
Call Center Village Contest - Contests
Call Center Village Contest - Contests
Call Center Village Party - Social Gatherings/Events
Can it Ham? - Contests
Can it Ham? - Contests
Can it Ham? - Contests
Can't Stop the ROP: Automating Universal ASLR Bypasses for Windows - DEF CON Talks
Capture The Packet - Packet Hacking Village
Capture The Packet - Packet Hacking Village
Capture The Packet - Packet Hacking Village
Car Hacking Village Capture the Flag (CTF) - Results Announcement - Car Hacking VillageCar Hacking Village Capture the Flag (CTF)
Car Hacking Village Capture the Flag (CTF) - Contests
Car Hacking Village Capture the Flag (CTF) - Contests
Car Hacking Village Capture the Flag (CTF) - Contests
Card testing workshop - Payment Village
Card testing workshop - Payment Village
Carding is Dead, Long Live Carding: How MaaS is fueling NFC relay attacks - Payment Village
Carding, Sabotage & Survival: A Darknet Market Veteran’s Story - DEF CON Talks
Career Fair: Interview Tips and Referral - BBWIC Foundation
Career Fair: Resume Review - BBWIC Foundation
CARVER Vulnerability Analysis and the U.S. Voting System - Voting Village
Cash, Drugs, and Guns: Why Your Safes Aren't Safe - DEF CON Talks
Catch the Flow: Securing CI/CD with Flowlyt - AppSec Village
Chained Exploits: The Silent Takeover - AppSec Village
Challenges and Lessons from the AIxCC Journey: A Perspective from 42-b3yond-6ug - Artificial Intelligence Cyber Challenge (AIxCC)
Cheat Code for Hacking on T-Mobile: From Inside the TMO BBP Perspective - Bug Bounty Village
Chelonia: End-to-End Encryption For Every App - Crypto Privacy Village
Chelonia: End-to-End Encryption For Every App - Crypto Privacy Village
China's Health Sector Ambitions and Information Needs: Implications for U.S. Health Care Cyber Defense - Policy @ DEF CON
Choose-your-own-Adversary-Adventure Tabletop Game - Adversary Village
Choose-your-own-Adversary-Adventure Tabletop Game - Adversary Village
Choose-your-own-Adversary-Adventure Tabletop Game - Adversary Village
ChromeAlone: Transforming a Browser into a C2 Platform - DEF CON Talks
Ciphers & Cryptography - From Simple to Secure (Bradán Lane) - DC NextGen
Classical Problems with Quantum Cryptography - Quantum Village
Claude for Defenders: Beyond Automation to Augmentation - Artificial Intelligence Cyber Challenge (AIxCC)
Claude--Climbing a CTF Scoreboard Near You - DEF CON Talks
Client or Server? The Hidden Sword of Damocles in Kafka - DEF CON Talks
Cloned Vishing: A case study - Social Engineering Community Village
Cloud Village Closing - Cloud Village
Cloud Village CTF 101 Workshop - Contests
Cloud Village CTF Award Ceremony - Contests
Cloud Village CTF - Contests
Cloud Village CTF - Contests
Cloud Village Opening - Cloud Village
CMD+CTRL Casual Web App CTF - Contests
CMD+CTRL Casual Web App CTF - Contests
CMD+CTRL Casual Web App CTF - Contests
CMD+CTRL Cloud Cyber Range Competition - Contests
Coating your PCBs - Badgelife Community
Code Breaker Challenge - Contests
Code Breaker Challenge - Contests
Code Breaker Challenge - Contests
Code Crimson: A Biohacker’s Emergency - Contests
Code Crimson: A Biohacker’s Emergency - Contests
Code Crimson: A Biohacker’s Emergency - Contests
Cognito, Ergo Some Extra Permissions - Cloud Village
Cold Calls - Social Engineering Community Village
Cold Calls - Social Engineering Community Village
Cold Calls - Social Engineering Community Village
Color with Friends & Smallstep - AppSec Village
Color with Friends & Smallstep - AppSec Village
Color with Friends & Smallstep - AppSec Village
Comadres en cyber Meetup (girls only) - La Villa
Command and KubeCTL: Kubernetes Security for Pentesters and Defenders - Cloud Village
Common Cause NY and The Black Insitute's Legal Challenge to the ExpressVote XL's use of barcodes to record votes - Voting Village
Common Threads - Queercon Community Lounge
Common Threads - Queercon Community Lounge
Como recuperar dados de um dispositivo movel destruido (POR) - La Villa
Compromising Threat Actor Communications - Malware Village
Conference Planners Meetup - Social Gatherings/Events
Connected Car Attack Surface Mapping: OSINT Techniques for Automotive Threat Intelligence - Recon Village
Container Escapes 101 - AppSec Village
Contest Closing Ceremonies & Awards - DEF CON Talks
Context & Cringe: Bringing Privacy into Threat Modeling - AppSec Village
Context Aware Anomaly Detection in Automotive CAN Without Decoding - Car Hacking Village
Contextualizing alerts & logs at scale without queries or LLMs (opensource) - IOT Village
Conversational Security engineering across your aws cloud infrastructure - Cloud Village
Copycat - Identity Stealer Extension - Demo Labs
Copycat - Identity Stealer Extension - Demo Labs
Countering Forensics Software by Baiting Them - Adversary Village
CPV: Closing Remarks - Crypto Privacy Village
Cracking Chaos: Making, Using, and Breaking PRNGs - Crypto Privacy Village
Cracking the Vault: Runtime API Testing in MDM-Locked Apps - Mobile Hacking Community
Creating a Ham Radio IP Network with AREDN Software - Ham Radio Village
Creating a Virtual Ship Environment Optimized for Cybersecurity Use - Maritime Hacking Village
Creating an AI Agent to Hack a Web Application - Red Team Village
Crises Precipitate Change, Tools for Success - DEF CON Groups VR (DCGVR)
Crisis en La Villa: Simulación de Respuesta a Incidentes (ESP-ENG) - La Villa
Critical Draw - How to Build a Culture of Security the Right Way - AppSec Village
Critical Draw - How to Build a Culture of Security the Right Way - AppSec Village
Critical Draw - How to Build a Culture of Security the Right Way - AppSec Village
Critically Neglected: Cybersecurity for buildings - ICS Village
Cross-Site WebSocket Hijacking in 2025: Exploitation, Evolution, and Mitigation - AppSec Village
Crossing the Line: Advanced Techniques to Breach the OT DMZ - ICS Village
Crypto Privacy Village - Welcome - Crypto Privacy Village
Crypto Privacy Village - Welcome - Crypto Privacy Village
Crypto Privacy Village - Welcome - Crypto Privacy Village
Crypto Privacy Village: Closing Remarks - Crypto Privacy Village
Crypto Privacy Village: Welcome - Crypto Privacy Village
Crypto Privacy Village: Welcome - Crypto Privacy Village
Crypto Privacy Village: Welcome - Crypto Privacy Village
Cryptocurrency Enforcement Actions - Cryptocurrency Community
Cryptocurrency Nodes and Relays - Cryptocurrency Community
Cryptocurrency Opening Keynote - Cryptocurrency Community
Cryptography is hard: Breaking the DoNex ransomware - Malware Village
Cryptojacking in the Cloud: Investigating Attacks on Container Clusters - Cloud Village
Cryptosploit - Demo Labs
Cryptosploit - Demo Labs
CTF 101 - Noob Community
CTF Award Ceremony - AppSec Village
CTI-Agent: Automated battlecards from CTI reports - Recon Village
CTRAPS: CTAP Impersonation and API Confusion Attacks on FIDO2 - DEF CON Talks
Cultivating the Adversarial Mindset, Offensive Cyber security and the Power of Security Communities - Adversary Village
CVE Crisis: State of the Vulnerability Disclosure Landscape - AppSec Village
Cyber 101 Talk - Noob Community
Cyber Defender - The Game - Contests
Cyber Defender - The Game - Contests
Cyber Defender - The Game - Contests
Cyber Demonstrator Challenge - Aerospace Village
Cyber Demonstrator Challenge - Aerospace Village
Cyber Demonstrator Challenge - Aerospace Village
Cyber Gamechangers: Women Who Lead, Secure, and Inspire - Blacks In Cyber Village
Cyber Policy 101: Packets Hit Politics - Policy @ DEF CON
Cyber Threat Intelligence 101: From Foundations to AI‑Driven Defense - Blue Team Village (BTV)
Cyber Volunteering and Community Defense - DEF CON Franklin and the Cyber Resilience Corps 1 Year In - DEF CON Talks
Cyber Wargames: King of the Hill - Contests
Cyber Wargames: King of the Hill - Contests
Cyber Wargames: Redteam Rumble - Contests
Cyber Wargames: Redteam Rumble - Contests
Cyber Wargames: Strategic Operations - Contests
Cyber Wargames: Strategic Operations - Contests
CyberChef like automation within BurpSuite - Let’s get cooking with the CSTC - AppSec Village
CYBERCLAW (CYBERsecurity Card-based Learning And Wargaming) - Maritime Hacking Village
CYBERCLAW (CYBERsecurity Card-based Learning And Wargaming) - Maritime Hacking Village
CYBERCLAW (CYBERsecurity Card-based Learning And Wargaming) - Maritime Hacking Village
Cyberdelia Rave - Social Gatherings/Events
Cyberjutsu Path to a Digital Martial Art - Adversary Village
Cyberjutsu Path to a Digital Martial Art - Adversary Village
Cyberjutsu Path to a Digital Martial Art - Adversary Village
Cyberjutsu Path to a Digital Martial Art - Adversary Village
Cybersecurity Career Fireside Chat: Offensive Security - Blacks In Cyber Village
Cybersecurity in Latin America: The Untold Stories of Resilience & Innovation - La Villa
Cycle Override - Contests
Cypherpunk Java with Nix - Nix Vegas Community
DA-62 GPS Spoofing Challenge - Aerospace Village
DA-62 GPS Spoofing Challenge - Aerospace Village
DA-62 GPS Spoofing Challenge - Aerospace Village
Dark Capabilities: When Tech Companies Become Threat Actors - Policy @ DEF CON
Darknet Diaries x DCG Meet up - Social Gatherings/Events
Darknet-NG: Mesh Communications with your Community - Badgelife Community
Day of the Dead Hacker Party - Social Gatherings/Events
DC Book Club Discussion - Social Gatherings/Events
DC NextGen - Social Gatherings/Events
DC101 Panel - DEF CON Talks
DC404/DC678/DC770/DC470 (Atlanta Metro) Meetup - Social Gatherings/Events
DC702 Meetup - Social Gatherings/Events
DCG LAN Party: Frag You Very Much - DEF CON Groups (DCG)
DCG LAN Party: Frag You Very Much - DEF CON Groups (DCG)
DCG312 Meetup: Windy City Hackers Take Vegas - Social Gatherings/Events
DCG805 SLO Meetup: Surf, Shells & Shellcodes - DEF CON Groups (DCG)
DCG831 Santa Cruz Meetup - DEF CON Groups (DCG)
DCGVR Closing words - DEF CON Groups VR (DCGVR)
DCNext Gen Closing Ceremonies - DC NextGen
DDoS Wargames - DDoS Community
DDoS Wargames - DDoS Community
DDoS Wargames - DDoS Community
DDoS: The Next Generation - DDoS Community
DDV open and accepting drives for duplication - Data Duplication Village
DDV open and accepting drives for duplication - Data Duplication Village
DDV starts accepting drives for duplication - Data Duplication Village
De-Virtualizing the Dragon: Automated Unpacking and Deobfuscation of Nested VM-Based Protectors using Symbolic Execution and Taint Tracking - DEF CON Talks
Dead Made Alive Again: Bypassing Intent Destination Checks and Reintroducing LaunchAnyWhere Privilege Escalation - DEF CON Talks
Dead Reckoning: Hijacking Marine Autopilots - Maritime Hacking Village
Deceit by Design: Exploiting the Lies CPUs Tell During Execution - DEF CON Academy
Deck out your Device! Mobility device hacking & modding - Hackers With Disabilities (HDA)
Deconstructing Malware Lineage with Graph Neural Networks - Malware Village
Deepfake Image and Video Detection   - Packet Hacking Village
DEF CON 33 MUD - Contests
DEF CON 33 MUD - Contests
DEF CON 33 MUD - Contests
DEF CON Academy - DEF CON Academy
DEF CON Academy - DEF CON Academy
DEF CON Academy - DEF CON Academy
DEF CON Beard and Mustache Contest - Contests
DEF CON Closing Ceremonies & Awards - DEF CON Talks
DEF CON CTF - Contests
DEF CON CTF - Contests
DEF CON CTF - Contests
DEF CON Groups (DCGs): Keeping the Signal Alive All Year Long - DEF CON Groups (DCG)
DEF CON Holland Group Presents: 
Drinking with the Dutch - Social Gatherings/Events
DEF CON Scavenger Hunt - Contests
DEF CON Scavenger Hunt - Contests
DEF CON Scavenger Hunt - Contests
Defcon.run - Social Gatherings/Events
Defcon.run - Social Gatherings/Events
Defcon.run - Social Gatherings/Events
Defcon.run - Social Gatherings/Events
Defend the Airport CTF - Aerospace Village
Defend the Airport CTF - Aerospace Village
Defend the Airport CTF - Aerospace Village
Defense Against The Dark Arcs: Teaching kids to create magic - Badgelife Community
Demonstration - Mobile Hacking Community
Demonstration - Mobile Hacking Community
Demonstration - Mobile Hacking Community
Deploying Deception in Depth for ICS - ICS Village
Desktop Applications: Yes, We Still Exist in the Era of AI!!! - AppSec Village
Diamonds Are For Hackers - Building the first fully open source and hackable Quantum Sensor - DEF CON Talks
Digging Deeper: Reflections on the TRBR and EVEREST Studies on behalf of the California and Ohio Secretaires of State - Voting Village
Digital Casualties: Documenting Cyber-Induced Patient Harm in Modern Healthcare - Biohacking Village
Digital First Responders: Fixing Patient Safety Gaps with Smart Tech & AI - Biohacking Village
Digital Forensics 101: Investigating Compromised Machines - Blue Team Village (BTV)
Direct Memory, Access Everywhere - DEF CON Talks
Disclosure Encounters of a New Kind: Building the CVE Program of the Future - Policy @ DEF CON
Discord OSINT: An Empathic Banana and a Data Scraper Walk into a Search Bar - Recon Village
Discover GE Appliances! - IOT Village
Discover GE Appliances! - IOT Village
Discover GE Appliances! - IOT Village
Discussion Group: 1st generation college student - The Diana Initiative
Discussion Group: From Networking to your First Interview - The Diana Initiative
Discussion Group: GRC- three little letters, many big roads - The Diana Initiative
Discussion Group: Harnessing your Security impact by participating in bug bounties, CTFs & contributing in Open Source projects - The Diana Initiative
Discussion Group: Making Work Accessible - The Diana Initiative
Discussion Group: Mental Health, Burnout, and Boundaries- a roundtable discussion - The Diana Initiative
Discussion Group: Open to all sober/alcohol-free folks in our industry; all recovery pathways welcome - The Diana Initiative
Discussion Group: Toot your horn: Personal branding and networking tips for introverts or those who typically shy away from the spotlight. - The Diana Initiative
DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks - DEF CON Talks
DIY Affirmation Cards - Women in Security and Privacy (WISP)
DIY Affirmation Cards - Women in Security and Privacy (WISP)
DNS-Based OSINT Tactics for Product and Service Discovery - Red Team Village
Do Scammers dream of electric Phish? Lessons learned from deploying AI-driven phishing ops - Social Engineering Community Village
Do Your Own Recon Activity - Recon Village
Do Your Own Recon Activity - Recon Village
Doing bad things for the right reasons: Vulnerability Disclosure at Amazon and AWS - Cloud Village
Doing toolchains declaratively - Nix Vegas Community
Domain Fronting in 2025: a retro analysis - Malware Village
Dominion ICX Technical Demo - Voting Village
Dominion ICX Touchscreen; Simple Hacks and Daunting Recoveries - Voting Village
Don the Mantle: Red Team Campaign Planning and Execution with MITRE ATT&CK - Red Team Village
Don't be LLaMe - The basics of attacking LLMs in your Red Team exercises - Red Team Village
Don't trust Rufus, he's a mole - introducing KIEMPossible - Cloud Village
Don’t Cry Wolf: Evidence-based assessments of ICS Threats - ICS Village
Don’t Just Trust Always Verify - A Review of Post-Election Audits in Swing States in the 2024 Elections - Voting Village
Doom and Gloom Answer Your SOC Questions - Blue Team Village (BTV)
Doors, Cameras, and Mantraps: OH MY! - Lock Pick Village
Dozier Drill Tournament - Lock Pick VillageDozier Drill Lockpicking Challenge
Drain and Approval Attacks - Cryptocurrency Community
Driver Abuse: Evasión de Antivirus mediante un Driver legítimo (ESP) - La Villa
Driving Tech Forward: A Fireside Chat with Perri Adams and Alexei Bulazel - Artificial Intelligence Cyber Challenge (AIxCC)
Drone Flying Experience - Aerospace Village
Drone Flying Experience - Aerospace Village
Drone Flying Experience - Aerospace Village
Drone Hacking Workshop - Aerospace Village
Drone Hacking Workshop - Aerospace Village
Drone Hacking Workshop - Aerospace Village
Ducking Gatekeepers, Becoming Game Changers: From Asking Permission to Full Ownership - Blacks In Cyber Village
DVBE - Damn Vulnerable Browser Extension - Demo Labs
DVBE - Damn Vulnerable Browser Extension - Demo Labs
Dyna - Automating the OWASP MASTG with Offensive Android Tactics - Demo Labs
Dyna - Automating the OWASP MASTG with Offensive Android Tactics - Demo Labs
Easy IoT App Hacking - IOT Village
Easy IoT App Hacking - IOT Village
Easy IoT App Hacking - IOT Village
Edge of Tomorrow: Foiling Large Supply Chain Attacks By Taking 5k Abandoned S3 Buckets from Malware and Benign Software - DEF CON Talks
EDR in the Ether: Detecting Malware Where the Mobile Network Breathes - Telecom Village
EduQ: A DIY Self-Education Platform for Hackers to Break, Build, and Experiment with Quantum-Secured Networks - Quantum Village
EFF Tech Trivia - Contests
EFF/Hackers.town RayHunter build clinic - Hackers.town Community
ELEMENTAL MOVING MEDITATION - The Diana Initiative
Elevators 101 - Physical Security Village
Embedded CTF - Contests
Embedded CTF - Contests
Embedded CTF - Contests
Empire 6.0 - Demo Labs
Empire 6.0 - Demo Labs
Emulating Embedded Devices - Embedded Systems Village
Emulating Embedded Devices - Embedded Systems Village
Emulating Embedded Devices - Embedded Systems Village
Emulating Embedded Linux Devices at Scale with Light-Touch Firmware Rehosting - DEF CON Talks
EncryptedClientHelloWorld: TLSv1.3 ECH As A Covert C2 Channel - Red Team Village
Enshittification: It's Over 9000 - Malware Village
EntraGoat - A Deliberately Vulnerable Entra ID Environment - Demo Labs
EntraGoat - A Deliberately Vulnerable Entra ID Environment - Demo Labs
enumeraite: AI assisted web attack surface enumeration - Recon Village
Escape the Sandbox Challenge - GameHacking.GG
Escape the Sandbox Challenge - GameHacking.GG
Escape the Sandbox Challenge - GameHacking.GG
Escaping the Privacy Sandbox with Client-Side Deanonymization Attacks - Crypto Privacy Village
Escaping the Privacy Sandbox with Client-Side Deanonymization Attacks - DEF CON Talks
Estrategias de Ciberengaño: ¿Donde está mi honeypot? (POR) - La Villa
Evening Hangout - Noob Community
Evidence Based Elections and Software Independence - Voting Village
Evolution and History of Drain and Approval Attacks - Cryptocurrency Community
Evolution of telecommunication attacks and future trends - a vendor perspective - Telecom Village
Examining Access Control Vulnerabilities in GraphQL - A Feeld Case Study - Mobile Hacking Community
Exploitable In The Wild CVE Appears! But Should We Fix Them All? - AppSec Village
Exploiting Expectations: A Beginner's Guide to Buffer Overflows - DEF CON Academy
Exploiting Public AWS Resources - Cloud Village
Exploiting the Off-chain ecosystem in Web 3 Bug Bounty - Bug Bounty Village
Exploring The Possibilities of Azure Fabric Abuses - Cloud Village
Exposing Infosec Frauds and Foreign Agents Behind Mercenary Spyware Disinformation - Malware Village
Exposor - A Contactless reconnaissance tool using internet search engines with a unified syntax - AppSec Village
F-35 Joint Strike Fighter Badge Challenge - Aerospace Village
F-35 Joint Strike Fighter Badge Challenge - Aerospace Village
F-35 Joint Strike Fighter Badge Challenge - Aerospace Village
Faith-based cryptography: running with unverified entropy - Quantum Village
Families of Queercon - Queercon Community Lounge
Fear vs. Physics: Diagnosing Grid Chaos - ICS Village
Feet Feud (Hacker Family Feud) - Contests
Fighting the Digital Blockade: A View from Taiwan - Maritime Hacking Village
Fingerprinting Maritime NMEA2000 Networks - Maritime Hacking Village
Fingerprinting Maritime NMEA2000 Networks - Maritime Hacking Village
Finite State IoT Pentest Blitz - AppSec Village
Finite State IoT Pentest Blitz - AppSec Village
Finite State IoT Pentest Blitz - AppSec Village
Fireside Chat with DT and General Paul M. Nakasone - DEF CON Talks
Firewalls Under Fire: China's 5+ year campaign to penetrate perimeter network defenses - DEF CON Talks
Firmware Decryption with Open Source Clues - IOT Village
Firmware Decryption with Open Source Clues - IOT Village
Firmware Decryption with Open Source Clues - IOT Village
Firmware Decryption: For, and By, the Cryptographically Illiterate - IOT Village
Fix the Flag Wargame (Day 1) - AppSec Village
Fix the Flag Wargame (Day 2) - AppSec Village
Fix the Flag Wargame (Day 3) - AppSec Village
FLARE-VM - Demo Labs
FLARE-VM - Demo Labs
Flipping Locks - Remote Badge Cloning with the Flipper Zero and More - Physical Security Village
Following Threat Actors’ Rhythm — to Give Them More Blues - Blacks In Cyber Village
Forging Strong Cyber Communities in Uncertain Times - The Diana Initiative
Format Fu: The Way of the Percent Sign - DEF CON Academy
Free Ham Radio Exams - Social Gatherings/Events
Free Ham Radio Exams - Social Gatherings/Events
Free Ham Radio Exams - Social Gatherings/Events
Frida for reverse engineering payment applications - Payment Village
Friends of Bill W - Social Gatherings/Events
Friends of Bill W - Social Gatherings/Events
Friends of Bill W - Social Gatherings/Events
Friends of Bill W - Social Gatherings/Events
Friends of Bill W - Social Gatherings/Events
Friends of Bill W - Social Gatherings/Events
Friends of Bill W - Social Gatherings/Events
Friendship Bracelets - Women in Security and Privacy (WISP)
Friendship Bracelets - Women in Security and Privacy (WISP)
Friendship Bracelets - Women in Security and Privacy (WISP)
From adversarial to aligned, redefining purple teaming for maximum impact - Adversary Village
From Cheat Engine to GPT: AI Hacks So Good, You’ll Get Banned IRL - DEF CON Groups VR (DCGVR)
From Code to Control: Embedded System Design vs. Traditional Software Design - Blacks In Cyber Village
From Component to Compromised: XSS via React createElement - Bug Bounty Village
From Dare to Discovery: How OSINT and Modern Recon Techniques Uncovered a Global VPN Infrastructure - Recon Village
From Data Security to Discovery: How ARPA-H is Using AI to Transform Health Care in America - Artificial Intelligence Cyber Challenge (AIxCC)
From Hexeditor to Root, Multi Stage Approach to Root Access - IOT Village
From Hexeditor to Root, Multi Stage Approach to Root Access - IOT Village
From Hexeditor to Root, Multi Stage Approach to Root Access - IOT Village
From Intel to Emulation: Turning Threat Actor Trends into Defensive Muscle - Adversary Village
From One-Shot Red Teams to Continuous AI Security: Building Scalable Evaluation with Inspect Cyber - AI Village
From Prey to Playbook: Learning about victim behavior from infostealer logs - Red Team Village
From Prompt to Pwn: Un viaje por el OWASP Top 10 para LLMs (ESP) - La Villa
From Pwn to Plan: Turning Physical Exploits Into Upgrades - Physical Security Village
From Quantum Picturalism to Quantum Intelligence - Quantum Village
From Shanghai to the Shore: The Silent Threat in Global Shipping - DEF CON Talks
From Solo Nix to Team Infrastructure: Deploying NixOS with Clan - Nix Vegas Community
From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion - DEF CON Talks
From Tests to Targets: Expanding DAST with Selenium & ZAProxy - AppSec Village
From the Other Side: Bug Bounty Platforms on Triage Challenges and Solutions - Bug Bounty Village
From USB to C2 - Red Team Village
From Wake Island to the War Room: A Black Cyber Leader’s Path to Purpose - Blacks In Cyber Village
Full Court Press: How Basketball Officiating Shaped a Cybersecurity Career - Blacks In Cyber Village
Full Disclosure, Full Color: Badge-making story of this year's BBV badge - Bug Bounty Village
Fundamentals of Election Technology Security - Voting Village
Game Hacking 101 - GameHacking.GG
Game Hacking Intro Game - GameHacking.GG
Game Hacking Intro Game - GameHacking.GG
Game Hacking Intro Game - GameHacking.GG
Garuda Threat Hunting Framework - Demo Labs
Garuda Threat Hunting Framework - Demo Labs
Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb That Hackers Can Access Everywhere - DEF CON Talks
Geopolitical Cyber Topic Survey Results Panel - Policy @ DEF CON
GEOSINT Final - Recon Village
GEOSINT Playoffs - Recon Village
GEOSINT Playoffs - Recon Village
GEOSINT Semi Finals - Recon Village
Getting Caught in Offensive Security - Red Team Village
Getting into CTF - DEF CON Academy
Getting started in Malware Analysis with Ghidra - Malware Village
Getting to Top 250 on HtB with Nix and LLMs - Nix Vegas Community
Ghost Calls: Abusing Web Conferencing for Covert Command & Control - DEF CON Talks
Ghosts in the Machine Check - Conjuring Hardware Failures for Cross-ring Privilege Escalation - DEF CON Talks
Ghosts of REvil: An Inside Look with the Hacker Behind the Kaseya Ransomware Attack - DEF CON Talks
Glitching millions with a Pico: Using fault-injection to hack crypto wallets - Embedded Systems Village
Glitching millions with a Pico: Using fault-injection to hack crypto wallets - Embedded Systems Village
Global DCGs: Chaos, Connection, and Community – The 2025 State of the Hack - DEF CON Groups (DCG)
GlytchC2 - Command Execution and Data Exfiltration of Any Kind Through Live Streaming Platforms - Demo Labs
GlytchC2 - Command Execution and Data Exfiltration of Any Kind Through Live Streaming Platforms - Demo Labs
GlytchC2: Command execution and data exfiltration of any kind through live streaming platforms - Red Team Village
Go Hack Yourself: API Hacking for Beginners - Red Team Village
Go Malware Meets IoT: Challenges, Blind Spots, and Botnets - IOT Village
Going from Breadboard to PCB with KiCAD - Badgelife Community
Gold Bug: Puzzle Panel with Friends - Crypto Privacy Village
Gold Bug: Welcome - Crypto Privacy Village
GOTHCON - Social Gatherings/Events
GPON & Discovery - Telecom Village
Grandoreiro & friends: brazilian banking trojans tour outside Latin America - Malware Village
Growing Red Team Village: What We’ve Learned Building an Offensive Security Community - Red Team Village
Hac-Mac Contest Booth Open - Contests
Hac-Mac Contest Booth Open - Contests
Hac-Mac Contest Booth Open - Contests
Hac-Man - Remote play available - Contests
Hac-Man - Remote play available - Contests
Hac-Man - Remote play available - Contests
Hac-Man - Remote play available - Contests
Hack my Bot - Hardware Hacking and Soldering Skills Village (HHV-SSV)
Hack my Bot - Hardware Hacking and Soldering Skills Village (HHV-SSV)
Hack Our Shirt - Women in Security and Privacy (WISP)
Hack the Clock: Automating CVE Exploit searches to save time, money, and not get bored. - Red Team Village
Hack the Code (of Practice): Protecting Responsible Hackers - Policy @ DEF CON
Hack Your Career with JHaddix - OWASP Community
Hack3r Runw@y Contest - Contests
Hackable.sol - Do you know how to hack smart contracts? - AppSec Village
Hacker Jeopardy - Contests
Hacker Jeopardy - Contests
Hacker Karaoke - Social Gatherings/Events
Hacker Karaoke - Social Gatherings/Events
Hacker Troll House - Red Team Village
Hacker Vs Hacker Olympics - GameHacking.GG
Hacker Vs Hacker Olympics - GameHacking.GG
Hacker Vs Hacker Olympics - GameHacking.GG
Hacker vs. Triage: Inside the Bug Bounty Battleground - Bug Bounty Village
Hackers Dropping Mid-Heist Selfies: LLM Identifies Information Stealer Infection Vector and Extracts IoCs - DEF CON Talks
Hackers Welcome: How One Government Agency Got It Right - Policy @ DEF CON
Hacking a head unit with malicious PNG - Car Hacking Village
Hacking Back to School: How states, hackers, and civil society can support K-12 cybersecurity when federal support wavers - Policy @ DEF CON
Hacking Context for Auto Root Cause and Attack Flow Discovery - Packet Hacking Village
Hacking Custody and Exchanges - Cryptocurrency Community
Hacking Hotel Locks; The Saflok Vulnerabilities Expanded - Physical Security Village
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G and 4G/LTE Routers - DEF CON Talks
Hacking Kubernetes - Cloud Village
Hacking phones for Linux: Introduction to postmarketOS - Operating Systems Community
Hacking Reality: HoloConnect AI and the Rise of Offline Holograms in Medical Devices - Biohacking Village
Hacking Space to Defend It: Generating IoBs with SPARTA - Aerospace Village
Hacking the Edge: Real-World ESI Injection Exploits - Bug Bounty Village
Hacking the Final Frontier: Offensive Security in Aerospace and Satellite Systems (ESP) - La Villa
Hacking the First Amendment: A press photographer's perspective on Red Teaming scenarios - Social Engineering Community Village
Hacking the Graph: Advanced Target Discovery with OWASP Amass - Bug Bounty Village
Hacking the Nautical Rules of the Road: Turn Left for Global Pwnage - Maritime Hacking Village
HaKCing OBD-II Emissions Testing - DEF CON Talks
Ham Radio Fox Hunt - Contests
Ham Radio Fox Hunt - Contests
Ham Radio Fox Hunt - Contests
HAM RADIO VS. OPPRESSION – HOW THE AIRWAVES DEFY CENSORSHIP - Ham Radio Village
Handcuffs for beginners - Lock Pick Village
Hard Hat Brigade Creations Q&A - Hard Hat Brigade
Hard Hat Brigade Organizer Panel - Hard Hat Brigade
Hardware Hacking and Soldering Skills Village (HHV/SSV) - Hardware Hacking and Soldering Skills Village (HHV-SSV)
Hardware Hacking and Soldering Skills Village (HHV/SSV) - Hardware Hacking and Soldering Skills Village (HHV-SSV)
Hardware Hacking and Soldering Skills Village (HHV/SSV) - Hardware Hacking and Soldering Skills Village (HHV-SSV)
Hardware Hacking: Glitching Lab - Embedded Systems Village
Hardware Hacking: Glitching Lab - Embedded Systems Village
Hardware Hacking: Glitching Lab - Embedded Systems Village
Hardwired - Packet Hacking Village
Hardwired - Packet Hacking Village
Hardwired - Packet Hacking Village
Have I Been Ransomed? - Demo Labs
Have I Been Ransomed? - Demo Labs
HavocAI Autonomous Surface Vessel Hacking - Maritime Hacking Village
HavocAI Autonomous Surface Vessel Hacking - Maritime Hacking Village
HavocAI Autonomous Surface Vessel Hacking - Maritime Hacking Village
HDA Community Open - Hackers With Disabilities (HDA)
HDA Community Open - Hackers With Disabilities (HDA)
HDA Community Open - Hackers With Disabilities (HDA)
HDA Open Synthesizer Jam Session - Hackers With Disabilities (HDA)
HDA Setup, Meet & Greet, Services available after setup - Hackers With Disabilities (HDA)
Help! Linux in my Webcam! (•_•) - DEF CON Talks
Here and Now: Exploiting the Human Layer at the Right Moment - Adversary Village
Hijacking AI Agents with ChatML Role Injection - AppSec Village
History and Significance of the Top to Bottom Review (TTBR) and the Post Election Audit Standars Working Group (PEASWG) - Voting Village
Homemade Designs and Wearables - Illumicon
Homemade Designs and Wearables - Illumicon
Hooks and Hooks: How AI Is Revolutionizing Both Phishing Attacks and Our Defenses - Blacks In Cyber Village
How AI + Hardware can Transforming Point-of-Care Workflows - Biohacking Village
How API flaws led to admin access to over 1,000 USA dealers and control over your car - Car Hacking Village
How Computers Kill People: Marine Systems - Maritime Hacking Village
How Extra Features In Contactless Payments Break Security And What We Can Do About it. - Payment Village
How Ham Radio supported 911 25 years - Ham Radio Village
How Not to IoT: Lessons in Security Failures - Embedded Systems Village
How NOT to Perform Covert Entry Assessments by WeHackPeople.com - Physical Security Village
How the DMCA Security Research Exemption Affects Election Security Research - Voting Village
How to Become One of Them: Deep Cover Operations in Cybercriminal Communities - Recon Village
How to Fake a Badge like a Pro: 11 Tips to Counterfeiting Event Credentials - DEF CON Talks
How to secure unique ecosystem shipping 1 billion+ cores? - DEF CON Talks
How We Protect Cat Memes from DDoS - DDoS Community
How zkVMS and zkTLS Transform Exploit Markets - Crypto Privacy Village
HTTP/1.1 Must Die! The Desync Endgame - DEF CON Talks
Hull Integrity: Applying MOSAICS to Naval Mission Systems - ICS Village
Human factors and safety critical aspects of man-machine interfaces - Policy @ DEF CON
Human Registration Open - Social Gatherings/Events
Human Registration Open - Social Gatherings/Events
Human Registration Open - Social Gatherings/Events
Human Registration Open - Social Gatherings/Events
Hung out to dry: Airing the dirty laundry of stored value washing cards - Radio Frequency Village
Hunting Advanced Mobile Vulnerabilities with AI - Mobile Hacking Community
Hybrid Attack - Red Team Village
Hypervisor Hangover: Persistence Mechanisms on ESXi - Cloud Village
I Can't RE (and You Can Too!) - Malware Village
ICS Fundamentals - ICS Village
ICS Fundamentals - ICS Village
ICS Fundamentals - ICS Village
ICS Fundamentals - ICS Village
ICS Fundamentals - ICS Village
Identity Crisis: The Unmanaged World of Azure Managed Identities - Cloud Village
Illumicon Community - Illumicon
Illumicon Community - Illumicon
Illumicon Community - Illumicon
Illuminating the Dark Corners of AI: Extracting Private Data from AI Models and Vector Embeddings - Crypto Privacy Village
Implementing AI in Security Teams: Lessons from the Trenches - Blue Team Village (BTV)
Impossible Until It Isn’t: DARPA, Disruption, and the Future of Cyber - Artificial Intelligence Cyber Challenge (AIxCC)
Improv - Social Engineering Community Village
Improv - Social Engineering Community Village
Incident Response 101: What Happens After the Hack? - Blue Team Village (BTV)
Infecting the Boot to Own the Kernel: Bootkits and Rootkits Development - DEF CON Talks
Influence Operations: Tactics, Defense, and Exploitation - DEF CON Training
Influence Operations: Tactics, Defense, and Exploitation - DEF CON Training
InfoSecMap: El nexo global de eventos y comunidades de InfoSec - La Villa
Ingenieria inversa en dispositivos (inalámbricos) (ESP) - La Villa
Initial Access Tactics on MacOS - Red Team Village
Inside KnoxSpy: Real-Time Visibility into MDM-Secured Mobile Traffic - AppSec Village
Inside Look at a Chinese Operational Relay Network - DEF CON Talks
Inside the Shadows: Tracking RaaS Groups and Evolving Cyber Threats - Recon Village
Instant API Hacker! - Red Team Village
Intersection of the security and cryptographic architecture [Workshop] - Crypto Privacy Village
Intro to Ciphers [Mini Workshop/Talk] - Crypto Privacy Village
Intro to Ciphers [Mini Workshop/Talk] - Crypto Privacy Village
Intro to Common Industrial Protocol Exploitation - ICS Village
Intro to Lockpicking - Lock Pick Village
Intro to Lockpicking - Lock Pick Village
Intro to Lockpicking - Lock Pick Village
Intro to Lockpicking - Lock Pick Village
Intro to Lockpicking - Lock Pick Village
Intro to Lockpicking - Lock Pick Village
Intro to Lockpicking - Lock Pick Village
Intro to Physical Security Bypass - Physical Security Village
Intro to Python - breakin’ it down - DC NextGen
Intro to village - Payment Village
Intro to village - Payment Village
Introducing OWASP Amass v5.0 - OWASP Community
Introduction of Loong Community & Financial Identity crime (deepfake) regulation of diferetn jurisdictions - Loong Community
Introduction to CICDGuard - Orchestrating visibility and security of CICD ecosystem - AppSec Village
Introduction to Operationalizing & Using C2 (w/ some AI) - Red Team Village
Introduction To SeVa [Secret Validator] - Secrets Prioritization Framework - AppSec Village
Investigating Foreign Tech from Online Retailers - Recon Village
Invitation Is All You Need! Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite - DEF CON Talks
IoT Intro Labs. New to all of this? You’re in the right spot! - IOT Village
IoT Intro Labs. New to all of this? You’re in the right spot! - IOT Village
IoT Intro Labs. New to all of this? You’re in the right spot! - IOT Village
IoT Village book signing - IOT Village
IoT Village: 10 Years. 1,000 Devices. Infinite Vulns. (IoT Village 10th Birthday Party) - Social Gatherings/Events
Is End-to-End-Verifiability an Internet Voting Magic Bullet? A Perspective for Policymakers - Voting Village
Is it Safe Yet? A Discussion on the Fundamental Security Profile of Internet Voting and its Use Today - Voting Village
It Came From Space - Ham Radio Village
It's Not Safe Yet - Voting Village
Jack Rhysider, Ray [REDACTED] and more 1337 hackers! DXNextGen Meet and Greet - Social Gatherings/Events
Jailbreaking the Hivemind: Finding and Exploiting Kernel Vulnerabilities in the eBPF Subsystem - DEF CON Talks
Journey to the center of the PSTN: How I became a phone company, and why you should too. - DEF CON Talks
Just a TIP: DIY Your First Threat and Adversary Intelligence Platform - Adversary Village
KeePass, weaponized - Malware Village
KEYNOTE: Attack Surface in Motion: Why Today’s Threats Don’t Knock First - Recon Village
Keynote: Attacking AI - Bug Bounty Village
Keysight CTF Challenge - IOT Village
Keysight CTF Challenge - IOT Village
Keysight CTF Challenge - IOT Village
Kill Chain Reloaded: Abusing legacy paths for stealth persistence - DEF CON Talks
Kill List: Hacking an Assassination Site on the Dark Web - DEF CON Talks
Killing Killnet - DEF CON Talks
Kubernetes Competitive CTF - Contests
Kubernetes Learning CTF (Non-competitive) w/ Support - Contests
Kubernetes Learning CTF (Non-competitive) w/ Support - Contests
Kubernetes Learning CTF (Non-competitive) w/ Support - Contests
Kubernetes Security Scanner - Cloud Village
Kubernetes Security: Hands-On Attack and Defense - Cloud Village
La Villa - Opening Seremony 0din Presentation - La Villa
La Villa Affer hours - Friday - Networking Event - La Villa
La Villa Affer hours - Sat - Networking Event - La Villa
Laser Fault Injection - Embedded Systems Village
Laser Fault Injection - Embedded Systems Village
Laser shows and how they are made - Illumicon
Laser shows and how they are made - Illumicon
Last chance to pick up drives at the DDV - Data Duplication Village
Latin America: The perfect ransomware playground (ESP) - La Villa
Latinas en Cyber - La Villa
Lawyers Meet - Social Gatherings/Events
Layer-2 Liberation: Weird & Wonderful Things Your AP Never Dreamed Of - Radio Frequency Village
Learn BadUSB Hacking With the USB Nugget - IOT Village
Learn Nix the Fun Way - Nix Vegas Community
Legal Entity-Driven Reconnaissance with OWASP Amass: Enhancing Bottom-Up Discovery Using RDAP - Recon Village
Legally Dubious Incident Response Tabletop - Policy @ DEF CON
Let AI Auto-Generate Neural-ASR Rules for OT-specific Attacks via NLP Approach - ICS Village
Let's Break Enigma! - Cryptocurrency Community
Let's Lose the Shock-Mystery of Linux - A Pain-free Intro - Blacks In Cyber Village
Let's Play! OWASP Cornucopia Engineers and Exploits the Quest for Security - OWASP Community
Let's Play! OWASP Cornucopia Threat Modeling - OWASP Community
Letthemin: Facilitating High-Value Purple Teams Using an Assumed Compromise Approach - Adversary Village
Level UP OSINT - Red Team Village
Level Up Your CI/CD: Building a secure pipeline with OSS - Cloud Village
Leveraging AI and MCP Servers for Automated External Attack Surface Testing - Red Team Village
Lex Sleuther - Demo Labs
Lex Sleuther - Demo Labs
LHC Capture the Flag - Lonely Hackers Club
LHC Capture the Flag - Lonely Hackers Club
LHC First Time DEF CON Meetup - Lonely Hackers Club
Lightning Talks and Unconference - Nix Vegas Community
Lightning Talks and Unconference - Nix Vegas Community
Linux Trainer - Packet Hacking Village
Linux Trainer - Packet Hacking Village
Linux Trainer - Packet Hacking Village
Live Recon Contest - Recon Village
Live Recon Internal Pre-Screening - Recon Village
Live Recon Judges Presentations - Recon Village
Live Recon Session - Recon Village
Living off the Graph: Module-less Azure Recon & Exploitation via PowerShell - Cloud Village
Loading Models, Launching Shells: Abusing AI File Formats for Code Execution - DEF CON Talks
Locked Down, Not Locked Out: How I Escaped Your Secure Operator Workstation - ICS Village
Locktopus Speed Picking Finals - Lock Pick Village
Loong Community Activities - Loong Community
Loong Community Activities - Loong Community
Loong Community Activities - Loong Community
Lost & Found - Social Gatherings/Events
Lost & Found - Social Gatherings/Events
Lost & Found - Social Gatherings/Events
Lost & Found - Social Gatherings/Events
Mac Malware Analysis - Malware Village
Magical Hacks - Bug Bounty Village
Magnets, how do they work? - Lock Pick Village
Make your very own evil IoT Cat Lamp with WLED! - IOT Village
Make your very own evil IoT Cat Lamp with WLED! - IOT Village
Make your very own evil IoT Cat Lamp with WLED! - IOT Village
Making Dirty Pictures - The Issue with DICOM - Malware Village
Making Of The Arcanum Gospel Book Badge - Badgelife Community
Making SAOs for Fun and No Profit - Badgelife Community
Making the DEF CON 33 Badge - DEF CON Talks
MalSIM: Building - Telecom Village
Malvynox - Telecom Village
Malware and Monsters - Malware Village
Malware Attack in PDFs: An Adversary Real Attack Analysis - Adversary Village
Malware Exploitation in PDFs: A Red Team Perspective - Red Team Village
Malware In 5G Core - Telecom Village
Malware in the gist: How malicious packages on npm bypass existing security tools - Adversary Village
Malware Matryoshka: Nested Obfuscation Techniques - Malware Village
Man-in-the-Malware: Intercepting Adversarial Communications - DEF CON Talks
Mapping the Shadow War - From Estonia to Ukraine - Recon Village
MassLogger: The Infostealer That Knows Your Passwords Better Than You Do (ESP) - La Villa
Master Keying: privilege escalation on your key ring - Lock Pick Village
Mastering Apple's Endpoint Security for Advanced macOS Malware Detection - DEF CON Talks
Mastering Frontend Security: A Hands-On Workshop to Engineer XSS-Proof Web Applications - AppSec Village
Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android - Mobile Hacking Community
Matter Playground - Embedded Systems Village
Matter Playground - Embedded Systems Village
Matter Playground - Embedded Systems Village
May the Least Privilege Be With You: Exposing the Dark Side of Azure Service Principal Permissions - Cloud Village
Maybe A Few Hydra Failures - Nix Vegas Community
Maybe A Few Hydra Failures - Nix Vegas Community
McJump Box: Leveraging Free Corporate WiFi and 802.11AH for Unattributable Fun and Profit - Radio Frequency Village
Medical Device Penetration Testing - DEF CON Training
Memorial Chamber Open - Memorial Chamber
Memorial Chamber Open - Memorial Chamber
Memorial Chamber Open - Memorial Chamber
Memory Attacks in a Stateless World - AppSec Village
Mentor-Mentee Mixer - .edu Community
Merch (formerly swag) Area Open -- README - Social Gatherings/Events
Merch (formerly swag) Area Open -- README - Social Gatherings/Events
Merch (formerly swag) Area Open -- README - Social Gatherings/Events
Mesh Network Sidecars for NixOS Services - Nix Vegas Community
Meshtastic Command & Control - Radio Frequency Village
Meshtastic Command & Control - Ham Radio Village
Meshtastic for Hackers: Set up, Configure, & Deploy Nodes for Advanced Use - IOT Village
Meshtastic for Hackers: Set up, Configure, & Deploy Nodes for Advanced Use - IOT Village
Meshtastic Under the Microscope: From Chirps to Chat - Radio Frequency Village
Meshtastic: Mesh Networking Made Easy with LoRa and ESP32 - Ham Radio Village
Messenger - Proxies Here There and Everywhere - Demo Labs
Messenger - Proxies Here There and Everywhere - Demo Labs
Metal-as-a-Disservice: Exploiting Legacy Flaws in Cutting-Edge Clouds - DEF CON Talks
Metasploit's Latest Attack Capability and Workflow Improvements - Demo Labs
Metasploit's Latest Attack Capability and Workflow Improvements - Demo Labs
Metasploit's Latest Attack Capability and Workflow Improvements - Demo Labs
MFT2: More Fungible Threats - Data Duplication Village
MFT2: More Fungible Threats - Data Duplication Village
MHV Badge 101 - Maritime Hacking Village
MHV CTF - Closing and Awards - Maritime Hacking Village
MHV CTF 101 - Maritime Hacking Village
MHV CTF 101 - Maritime Hacking Village
MHV CTF Recap - Daily - Maritime Hacking Village
MHV CTF Recap - Daily - Maritime Hacking Village
MHV Overview 101 - Maritime Hacking Village
MHV Overview 101 - Maritime Hacking Village
Microsoft Security with AI - Artificial Intelligence Cyber Challenge (AIxCC)
Microsoft Security with AI - Artificial Intelligence Cyber Challenge (AIxCC)
Mind the Data Voids: Hijacking Copilot Trust to Deliver C2 Instructions with Microsoft Authority - DEF CON Talks
Mind vs. Machine: Finding the Sweet Spot in Modern Red Teaming - Red Team Village
Minecraft Coding Puzzles - GameHacking.GG
Minecraft Coding Puzzles - GameHacking.GG
Minecraft Coding Puzzles - GameHacking.GG
Misaligned: AI Jailbreaking Panel - Bug Bounty Village
MITRE eCTF: 10 Years of the Embedded Capture the Flag - Embedded Systems Village
MITRE eCTF: 10 Years of the Embedded Capture the Flag - Embedded Systems Village
MITRE iCaldera: Purple Teaming in the Future - Adversary Village
Mobile CTF - Mobile Hacking Community
Mobile CTF - Mobile Hacking Community
Mobile CTF - Mobile Hacking Community
Mobile Game Hacking - GameHacking.GG
Mobile Game Hacking - GameHacking.GG
Mobile Game Hacking - GameHacking.GG
Mobile Pentest Survival Guide Reloaded (ESP) - La Villa
Modern defenses, ancient problems! Why adversaries can still break cyber defenses - Adversary Village
Modern Odometer Manipulation - Car Hacking Village
Modern warfare and nation state sponsored cyber threat actors - Adversary Village
Module 1: What is OT/ICS/SCADA? How Can We Protect It? - ICS Village
Module 2: Performing Research on OT/ICS Attacks - ICS Village
Module 3: Why Asset Registers are Important - ICS Village
Module 4: Hacking with OT/ICS Protocols - ICS Village
Module 5: Performing Recon to Find OT/ICS Assets on the Internet - ICS Village
Module 6: Pentesting in OT/ICS Networks - ICS Village
ModuleOverride – Changing a Tyre Whilst Driving - Red Team Village
Money for Nothing: Med Tech SBIR Grants are Easier than You Thought - Badgelife Community
Moonlight Defender - Purple Teaming in Space! - Aerospace Village
Morning meditation - The Diana Initiative
Morning meditation - The Diana Initiative
Morning meditation - The Diana Initiative
Movie Night - Social Gatherings/Events
Movie Night - Social Gatherings/Events
MPIT - Matrix Prompt Injection Tool and ShinoLLMApps - Demo Labs
MPIT - Matrix Prompt Injection Tool and ShinoLLMApps - Demo Labs
Music Set / Entertainment (Chillout Stage, Friday) - Social Gatherings/Events
Music Set / Entertainment (Chillout Stage, Saturday) - Social Gatherings/Events
Music Set / Entertainment (Chillout Stage, Thursday) - Social Gatherings/Events
Mythic, Ghostwriter, Nemesis, and Tying the Room Together: The Dude's Guide to Red Team Operations - Red Team Village
Naomi Brockwell Saves Us From the Internet Again! - Hackers With Disabilities (HDA)
Navigating the Invisible - Maritime Hacking Village
Network tokens - Payment Village
Networking 101 - DC NextGen
NetworkOS - Packet Hacking Village
NetworkOS - Packet Hacking Village
NetworkOS - Packet Hacking Village
Never enough about cameras - The firmware encryption keys hidden under the rug - IOT Village
Nix Vegas Opening Ceremony - Nix Vegas Community
Nix Vegas Unconference - Nix Vegas Community
NMDP (formerly Be The Match) - Registration Drive - NMDP (Formally Be The Match)
NMDP (formerly Be The Match) - Registration Drive - NMDP (Formally Be The Match)
No Brain No Gain - IOT Village
No IP, No Problem: Exfiltrating Data Behind IAP - Cloud Village
No Radios, No Problem: Hacking WiFi in a Virtual World - Radio Frequency Village
No Server, No Cry: the Ups and Downs of Building a Scalable Security Serverless Platform - Cloud Village
No Spook Leaves Randomness to Chance - Crypto Privacy Village
No Stupid Questions - Noob Community
No Stupid Questions - Noob Community
No Stupid Questions - Noob Community
No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol - DEF CON Talks
NO-HAVOC today, NO-HAVOC tomorrow - Malware Village
Non-Binary at Queercon - Queercon Community Lounge
Noob Community Buddies - Noob Community
Noob Community Buddies - Noob Community
Noob Community Buddies - Noob Community
Noob Community CTF - Noob Community
Noob Community CTF - Noob Community
Noob Community CTF - Noob Community
Noob Community Open - Noob Community
Noob Community Open - Noob Community
Noob Community Open - Noob Community
NoPrompt: Exposing Conditional Access Failures in Azure - Cloud Village
North Korea's Fur Shop: Poaching for Otters, Beavers, Ferrets and Capybaras - Malware Village
Not Just a Pipeline Leak: Reconstructing the Real Attack Behind tj-actions - DEF CON Talks
NOVA: The Prompt Pattern Matching - Blue Team Village (BTV)
NPM Imposters - The malware detection card game - AppSec Village
NPM Imposters - The malware detection card game - AppSec Village
nRootTag - Exploiting Find My and Transforming Computers Into Unauthorized Trackers - Demo Labs
nRootTag - Exploiting Find My and Transforming Computers Into Unauthorized Trackers - Demo Labs
Nuclei: Beyond The Basic Templates - Bug Bounty Village
O2 Case Study - Telecom Village
OAuthSeeker - Demo Labs
OAuthSeeker - Demo Labs
Oblivious Access to Blockchains - Cryptocurrency Community
Oblivious computation, from theory to practice - Cryptocurrency Community
Octopus Game 4: The Order of the White Tentacle - Contests
Octopus Game 4: The Order of the White Tentacle - Contests
Octopus Game 4: The Order of the White Tentacle - Contests
Of Stochastic Parrots and Deterministic Predators: Decision-Making in Adversarial Automation - Adversary Village
Off-Grid Datarunning in Oppresive Regimes: Sneakernet and Pirate Box - Hackers.town Community
Oh hai! Meet Adam Shostack - OWASP Community
Oh hai! Meet Cthulhu Answers ( ;,;)~ - OWASP Community
Oh hai! Meet Philip Wylie - OWASP Community
Oh hai! Meet Ray [REDACTED] & friends - OWASP Community
Old SOC, new tricks: An immersive AI/ML workshop for effective tool adoption - Blue Team Village (BTV)
Old Tactics, New Weapons: Abusing Modern Software Stacks for Reliable Shell Access - Red Team Village
One Key, Two Key, I Just Stole Your goTenna Key - DEF CON Talks
One Modem to Brick Them All: Exploiting Vulnerabilities in the EV Charging Communication - Car Hacking Village
One Modem to Brick Them All: Exploiting Vulnerabilities in the EV Charging Communication - DEF CON Talks
ONI: Shadow Surveillance via VOLTE malware - Telecom Village
Open Source Art - Women in Security and Privacy (WISP)
Open Source Art - Women in Security and Privacy (WISP)
Open Source Cellular Test Beds for the EFF Rayhunter - Radio Frequency Village
OpenAI: Meet our security research team! - Artificial Intelligence Cyber Challenge (AIxCC)
OpenAI: Meet our security research team! - Artificial Intelligence Cyber Challenge (AIxCC)
Operating System Community - Operating Systems Community
Operating System Community - Operating Systems Community
Operating System Community - Operating Systems Community
Operation Europa Crisis: A Tabletop Simulation - Biohacking Village
Operation Horizon Veil - Biohacking Village
Operational Twilight: APTs, OT, and the geopolitics of a dying climate - Adversary Village
Orchestrating the Reasoners - Artificial Intelligence Cyber Challenge (AIxCC)
Original Sin of SSO: macOS PRT Cookie Theft & Entra ID Persistence via Device Forgery - DEF CON Talks
Orion - fuzzing workflow automation - DEF CON Talks
OSINT 101 - Noob Community
OSINT Against the Machine: Fighting AI-Generated Disinformation - Recon Village
OSINT Challenges - Red Team Village
OSINT Enabled Ghost Mode: Counter-Surveillance for Everyday People Like Us - BBWIC Foundation
OSINT for Hackers - Red Team Village
OSINT Signals Pop Quiz! - Recon Village
OverLAPS: Overriding LAPS Logic - DEF CON Talks
OWASP Chapter Meetup - OWASP Community
OWASP x Hack the Box - Top10 Ahoy! - OWASP Community
OWASP x Hack the Box - Top10 Ahoy! - OWASP Community
Packet AI - Packet Hacking Village
Packet AI - Packet Hacking Village
Packet AI - Packet Hacking Village
Packet Detective - Packet Hacking Village
Packet Detective - Packet Hacking Village
Packet Detective - Packet Hacking Village
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Hacking Village Music - Social Gatherings/Events
Packet Inspector - Packet Hacking Village
Packet Inspector - Packet Hacking Village
Packet Inspector - Packet Hacking Village
Painting with Ransomware - Crypto Privacy Village
Panel Discussion - The State of OSINT in 2025: The technical Arms Race - Recon Village
Panel Discussion Bug Bounty - Recon Village
Panelizing PCBs: It’s Exciting I Swear - Badgelife Community
PAPRa - Demo Labs
PAPRa - Demo Labs
Parser Goes Rogue: Tree-Sitter’s Hidden Superpowers - Operating Systems Community
Passing the Torch: Mentoring and Protecting Our Students in Education Spaces - .edu Community
Passive and Active Attacks on TPMS Systems - Car Hacking Village
Passkeys in payments - Payment Village
Passkeys Pwned: Turning WebAuthn Against Itself - DEF CON Talks
Password Lab - Packet Hacking Village
Password Lab - Packet Hacking Village
Password Lab - Packet Hacking Village
Patching Critical Infrastructure: Announcing the Winners of DARPA’s AI Cyber Challenge - DEF CON Talks
PatchLeaks - Demo Labs
PatchLeaks - Demo Labs
pAWS: The Breach Has Happened. Can You Catch It? - Cloud Village
Paywall Optional: Stream for Free with a New Technique, Recursive Request Exploits (RRE) - DEF CON Talks
Pentester Blueprint - Noob Community
PentestGPT: El Arte de Hackear con Palabras (ESP) - La Villa
Pentesting AI - Hacking the GPTs (ESP) - La Villa
People as the Payload: OSINT Tactics for Identity Tracing, Social Graphing, and Executive Recon - Recon Village
Petty Proteins: When Molecules Go Rogue — And Why Cyberbiosecurity Needs You - Blacks In Cyber Village
PhishOps like an APT: Simulando Adversarios para el Acceso Inicial (ESP) - La Villa
Physical Security Village Activities - Physical Security Village
Physical Security Village Activities - Physical Security Village
Physical Security Village Activities - Physical Security Village
Pick Up Your Feelings: The Effects of Bias and Subjectivity in Threat Assessments and Cybersecurity - Blacks In Cyber Village
Pirates of the North Sea - Maritime Hacking Village
Plain TXT, Malicious Context: Uncovering DNS Malware - Malware Village
Planting C4: Cross-Compatible External C2 for All Your Implants - DEF CON Talks
Play with Matter and Board the IoTrain! - Embedded Systems Village
Play with Matter and Board the IoTrain! - Embedded Systems Village
Play with Matter and Board the IoTrain! - Embedded Systems Village
Playing Dirty Without Cheating - Getting Banned for Fun and No Profit - DEF CON Talks
PLC Hacking 101 - Maritime Hacking Village
PLC Hacking 101 - Maritime Hacking Village
Plug and Prey: Scanning and Scoring Browser Extensions - Recon Village
Plug at Your Own Risk: End-to-End Security Analysis for Third-Party IoT Integrations - AppSec Village
Plugins Gone Rogue: Attacking Developer Environments - AppSec Village
Plumbing The Plumber: A Playbook for Integration Servers - Recon Village
Policy @ DEF CON Mixer - Social Gatherings/Events
Policy @ DEF CON Mixer - Social Gatherings/Events
PolyCon - Queercon Community Lounge
Portable Entanglement and Other Heresies - Quantum Village
Portswigger Awards: Top 10 web hacking techniques of 2024 - Bug Bounty Village
Post-Quantum Panic: When Will the Cracking Begin, and Can We Detect it? - Quantum Village
Pre-Identifying DNS Wildcards: A New Standard of Care - Recon Village
Predator Mode: Threat Hunting from First Hunts to Final Bosses - Blue Team Village (BTV)
Pretty Good Pivot: Examining the PGP Key Pair Creation Habits of Dark Net Vendors - Recon Village
Privacy Accelerationism: Fighting for the Future of Privacy - Crypto Privacy Village
Privacy is Dead: The Threat of Criminal PII Search Panels (ESP-POR) - La Villa
Privacy on a Shoestring: Crypto Challenges in Local Government - Crypto Privacy Village
Private, Private, Private: Access Everywhere - BBWIC Foundation
Professionally Dangerous: Ask the Experts in Vulnerability Research - DEF CON Academy
Project Obsidian: Defending the Kill Chain, Building a Cloud-Native CTF for Blue Teamers - Blue Team Village (BTV)
Prompt. Scan. Exploit: AI’s Journey Through Zero-Days and a Thousand Bugs - Bug Bounty Village
promptmap2 - Demo Labs
promptmap2 - Demo Labs
Protect Your Privacy Online and on the Streets with EFF Tools - Women in Security and Privacy (WISP)
Protecting Election Researchers Globally: Legal Gaps and Lessons from the Global South - Voting Village
Prowler - Maximize your Cloud Security Compliance Assessments with Open Source and a pinch of AI - Cloud Village
Pub Quiz at DEF CON - Contests
Public Speaking for Nervous Hackers - The Diana Initiative
Pwn My Ride: Jailbreaking Cars with CarPlay - AppSec Village
pwn.college Belting Ceremony - DEF CON Academy
pwn.talk - live from DEF CON - DEF CON Academy
Pwning AWS: Exploiting Cloud Misconfigurations - Cloud Village
PyIntruder: Customizable, CLI-Native Web Fuzzer - AppSec Village
Q-DAY: Village Elder’s Q&A - Quantum Village
QRAMM: The Cryptographic Migration to a Post-Quantum World - Crypto Privacy Village
Quantum Authentication Protocol - Quantum Village
Quantum CTF Winners Announced - Quantum Village
Quantum Cybersecurity: More than just a pretty algorithm - Quantum Village
Quantum Modular Whiteboxes: Join the Stack Hack - Quantum Village
Quantum Networks - AMA - Quantum Village
Quantum Sensors: Hacking Reality with Atomic Precision - Quantum Village
Quantum Table Top Threat Modelling - Quantum Village
Quantum Village Debates - Quantum Village
Quantum-Resistant Healthcare - Biohacking Village
Qubit Crosstalk Attacks in Cloud-Based Quantum Computers - Quantum Village
Queercon at The KEVOPS Sellout Pool Party - Queercon Community Lounge
Queercon Bibliophiles and CinemaGeeks - Queercon Community Lounge
QueerCon Community Lounge Open - Queercon Community Lounge
QueerCon Community Lounge Open - Queercon Community Lounge
QueerCon Community Lounge Open - Queercon Community Lounge
Queercon Locals - Queercon Community Lounge
Queercon Mixer - Social Gatherings/Events
Queercon Mixer - Social Gatherings/Events
Queercon Volunteer Training - Queercon Community Lounge
Queercord Tech-Talk Channel - Queercon Community Lounge
Quickstart for a Breach! When Official Installations Expose Your K8 and Your Cloud - Cloud Village
Quiet Confidence: An Introvert's Journey to Technical Public Speaking - BBWIC Foundation
R.A.M.P. Room - Resilience, Accessibility, Mentorship & Party - Hackers With Disabilities (HDA)
R.A.M.P. Room - Resilience, Accessibility, Mentorship & Party - Hackers With Disabilities (HDA)
R.A.M.P. Room - Resilience, Accessibility, Mentorship & Party - Hackers With Disabilities (HDA)
r/DIY: How Do We Build Our Own Code Scanning Platform? - AppSec Village
Race Against the Machine - DEF CON Academy
Radio Frequency Capture the Flag - Contests
Radio Frequency Capture the Flag - Contests
Radio Frequency Capture the Flag - Contests
Radio Frequency Capture the Flag - Contests
Radio Frequency Village Events - Radio Frequency Village
Radio Frequency Village Events - Radio Frequency Village
Radio Frequency Village Events - Radio Frequency Village
Radio Recon Slot 1 - Recon Village
Radio Recon Slot 2 - Recon Village
Radio Recon Slot 3 - Recon Village
Radio Recon Slot 4 - Recon Village
Ransomware vs EDR: Inside the Attacker's Mind - Red Team Village
RATs & Socks abusing Google Services - DEF CON Talks
Rayhunter Internals - Hackers.town Community
RBAC Atlas: Mapping Real-World Kubernetes Permissions and Exposing Risky Projects - La Villa
RE for the Rest of Us: An Introduction to Reverse Engineering - Blacks In Cyber Village
Real life hacker stories (that can’t be recorded!) - DC NextGen
Rebadged, Relabeled, and Rooted: Pwnage via the Solar Supply Chain - DEF CON Talks
Rebuild The World: Access to secure software dependency management everywhere with Nix - Nix Vegas Community
Reconfigurable HSMs: Future-Proofing Hardware Security Against Evolving Threats - Crypto Privacy Village
Recording PCAPs from Stingrays With a $20 Hotspot - DEF CON Talks
Red Alert ICS CTF - Contests
Red Alert ICS CTF - Contests
Red Alert ICS CTF - Contests
Red Alerts and Blue Oceans: Incident Response from a Sysadmin’s War Room in Maritime Ops - Maritime Hacking Village
Red Russians: How Russian APT groups closely follow offensive security research - Adversary Village
Red Team Village CTF - Contests
Red Team Village CTF - Contests
Red Team Village CTF - Contests
Red Teaming AI: How to Stress-Test LLM-Integrated Apps Like an Attacker - AppSec Village
Red Teaming Financial Defenses - Cryptocurrency Community
Red teaming fraud prevention systems with GenAI - Payment Village
Red Teaming Kubernetes: From App-Level CVEs to Full Cluster Takeover - Red Team Village
Red Teaming Space: Hacking the Final Frontier - Aerospace Village
Red-for-Blue: Fortifying Applications through Actionable Red-Teaming - Red Team Village
Redteam Infrastructure Vibez Edition - Red Team Village
Referral Beware, Your Rewards Are Mine - Bug Bounty Village
Regex For Hackers - Bug Bounty Village
RegEx Trainer - Packet Hacking Village
RegEx Trainer - Packet Hacking Village
RegEx Trainer - Packet Hacking Village
Regional Airport System CTF - Aerospace Village
Regional Airport System CTF - Aerospace Village
Regional Airport System CTF - Aerospace Village
Remote code execution via MIDI messages - DEF CON Talks
Reproduce This Build: How we built the Nix Badge - Nix Vegas Community
Resilient and Reconfigurable Maritime Comms. - Maritime Hacking Village
Restless Guests: From Subscription to Backdoor Intruder - Cloud Village
Resume Reviews (would like 2-3 more reviewers) - The Diana Initiative
Resume Reviews feat. Lonely Hackers Club x OWASP x WISP - Lonely Hackers ClubOWASP CommunityWomen in Security and Privacy (WISP)
Resume Reviews feat. Lonely Hackers Club x OWASP x WISP - Lonely Hackers ClubOWASP CommunityWomen in Security and Privacy (WISP)
RETCON - Reticulum Embedded Turnkey Connection Operating Node - Demo Labs
RETCON - Reticulum Embedded Turnkey Connection Operating Node - Demo Labs
RETINA - Realtime Electronic Threat and Intrusion Neutralization Apparatus - Demo Labs
RETINA - Realtime Electronic Threat and Intrusion Neutralization Apparatus - Demo Labs
RETINA - Realtime Electronic Threat and Intrusion Neutralization Apparatus - Demo Labs
Retos de Offensive Security en LATAM - La Villa
rev.ng Decompiler - Demo Labs
rev.ng Decompiler - Demo Labs
ReVault! Compromised by your Secure SoC - DEF CON Talks
Reverse Engineering Marine Engines: How to make powerboats do your bidding - Maritime Hacking Village
Reverse Engineering Modern Websites - Practical Decomposition for Security Analysis - AppSec Village
RF CTF Daily Kick Off - Contests
RF CTF Daily Kick Off - Contests
RF CTF Outbrief - Contests
Right to Repair: The Latest - Policy @ DEF CON
Risk and payments across the ecosystem - Payment Village
Risk Limiting Audits: What They Are and What They Aren't - Voting Village
RLA Demo and Workshop - Voting Village
Robin - The Archaeologist of the Dark Web - Demo Labs
Robin - The Archaeologist of the Dark Web - Demo Labs
Robin: The Archaeologist of the Dark Web - Because Manual Dark Web OSINT is So Last Season - Recon Village
RoboSumo Competition - Hardware Hacking and Soldering Skills Village (HHV-SSV)
Rooting a Hikvision Camera via Firmware Modification - Embedded Systems Village
Rooting a Hikvision Camera via Firmware Modification - Embedded Systems Village
Rooting the Rootless: Kernel Tactics to Nullify RASP Protections - Mobile Hacking Community
Roundtable Cyber JV - La Villa
Running a Software Defined Radio Capture the Flag using challengectl - Radio Frequency Village
Rust/C Interop & Multiplatform - Operating Systems Community
Rusty pearls: Postgres RCE on cloud databases - DEF CON Talks
Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch - DEF CON Talks
Safeguarding the Industrial Frontier: OT SOC & Incident Response - ICS Village
Salt Tyfoon APT - Telecom Village
SAMLSmith - Demo Labs
SAMLSmith - Demo Labs
Satellite Hacking - Aerospace Village
Satellite Hacking - Aerospace Village
Satellite Networks Under Siege: Cybersecurity Challenges of Targeted DDoS Attacks - Aerospace Village
SBOM Meetup - AppSec Village
Scaling Bug Hunting in Open Source Software - AppSec Village
Scamming the Scammers: Weaponizing Open Source Against Pig Butchering and Organized Crime - Payment Village
SCCM: The tree that always bears bad fruits - DEF CON Talks
SEC Vishing Competition (SECVC) - Contests
SEC Vishing Competition (SECVC) - Contests
SEC Vishing Competition (SECVC) - Contests
Sec-Gemini - Artificial Intelligence Cyber Challenge (AIxCC)
Secret Life of an Automationist: Engineering the Hunt - Bug Bounty Village
Sector Down - Biohacking Village
Sector Down - Biohacking Village
Sector Down - Biohacking Village
Secure Code Is Critical Infrastructure: Hacking Policy for the Public Good - Policy @ DEF CON
Secure Compute Module and Microcontroller Workshop - Embedded Systems Village
Secure Compute Module and Microcontroller Workshop - Embedded Systems Village
Secure Compute Module and Microcontroller Workshop - Embedded Systems Village
Secure SDLC Roundtable: Scratch The Duct Tape - OWASP Community
Securing Intelligence: How hackers are breaking modern AI systems … and how bug bounty programs can keep up - Bug Bounty Village
Securing the 5G Core Service-Based Architecture - Telecom Village
Securing the Future with Claude - Artificial Intelligence Cyber Challenge (AIxCC)
Security Research: OpenAI's reflections and direction - Artificial Intelligence Cyber Challenge (AIxCC)
Self Custodial Wallet Use - Cryptocurrency Community
Serverless but Not Defenseless: A Security Deep Dive into Cloud Run - Cloud Village
SESNSploit: Red Team Exploitation of AWS SES and SNS Misconfigurations - Cloud Village
Sh*t Show Triage: An Honest Panel on Incident Response - Blue Team Village (BTV)
Shaking Out Shells with SSHamble - DEF CON Talks
Silent Leaks: Harvesting Secrets from Shared Linux Environments - DEF CON Talks
Silent Sabotage: How Nation-State Hackers Turn Human Error into Catastrophic Failures - OWASP Community
Silent Signals: Exploiting Security and Privacy Side-Channels in End-to-End Encrypted Messengers - DEF CON Talks
SIMjitsu: Art of Silent Exploits - Telecom Village
Siri-ously Leaky: Exploring Overlooked Attack Surfaces Across Apple's Ecosystem - DEF CON Talks
SkyHijack: Breaking Trust in the Satellite Chain) - Telecom Village
Smart Bus Smart Hacking: From Free WiFi to Total Control - Car Hacking Village
Smart Devices, Dumb Resets? Testing Firmware Persistence in Commercial IoT - IOT Village
Smashing the Sandbox: Inside DBatLoader's Unique Evasion Techniques - Malware Village
SMS from No Where - Telecom Village
So Long, and Thanks for All the Phish - DEF CON Talks
So What The Heck Is This Radio Stuff Anyway? - Radio Frequency Village
So you want to make a badge? Badge Creation 101, from SAO to full #badgelife - Badgelife Community
Social Engineering Community Village - Contest Awards - Social Engineering Community Village
Social Engineering Community Village - Village Open - Social Engineering Community Village
Social Engineering Community Village - Village Open - Social Engineering Community Village
Social Engineering Community Village - Village Open - Social Engineering Community Village
Social Engineering Community Village Greeting and 2025 Badge Overview - Social Engineering Community Village
Sold Out - 64-bit Intel Assembly Language Programming for Hackers - DEF CON Workshops
Sold Out - Accelerating Malware Analysis with WinDbg Time Travel Debugging - DEF CON Workshops
Sold Out - Advanced Ghidra Scripting & Automation - DEF CON Workshops
Sold Out - Analyzing and Creating Windows Shellcode for Hackers - DEF CON Workshops
Sold Out - Cloud Forensics Workshop: Smart Grid Edition - DEF CON Workshops
Sold Out - Contextualizing alerts with relevant logs and events without queries or LLMs - DEF CON Workshops
Sold Out - Creating malicious functional app on Android - DEF CON Workshops
Sold Out - Deep-dive into modern network fingerprinting - DEF CON Workshops
Sold Out - Defeating Malware Evasion: Techniques and Countermeasures - DEF CON Workshops
Sold Out - Disrupting Digital Dataflows: A 101 on how 2 detect, analyze, & disrupt digital systems by reverse engineering real-world Electronic Warfare techniques from Ukraine at the hardware level - DEF CON Workshops
Sold Out - Dive into Windows Library Loading - DEF CON Workshops
Sold Out - DIY Malware Emulation: Build It, Break It, Detect It - DEF CON Workshops
Sold Out - Effectively Detecting Modern Malware with Volatility 3 - DEF CON Workshops
Sold Out - Eliminating Bug Classes at Scale: Leveraging Browser Features for Proactive Defense - DEF CON Workshops
Sold Out - EMMC BGA Secrets, hack bga memory, no reballing necessary: Learn how to safely remove EMMC memory modules, hack them and then reinstall, without the difficult process of trying to reball the BGA. - DEF CON Workshops
Sold Out - Fine Tune your personal LLM assistant to Secure coding - DEF CON Workshops
Sold Out - Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems - DEF CON Workshops
Sold Out - From Prompt to Protection: A Practical Guide to Building and Securing Generative AI Applications - DEF CON Workshops
Sold Out - Hacker VPN - DEF CON Workshops
Sold Out - Hacking the connected plant: AI edition! - DEF CON Workshops
Sold Out - Hacking The Metal: Into the GPU - DEF CON Workshops
Sold Out - Hands-on IoT firmware extraction and flash forensics - DEF CON Workshops
Sold Out - Hands-on Kubernetes Attack & Defense Masterclass - DEF CON Workshops
Sold Out - Hands-On Threat Hunting with Wireshark - DEF CON Workshops
Sold Out - Inside the Threat: Designing and Deploying Malicious Browser Extensions to Understand Their Risk - DEF CON Workshops
Sold Out - Introduction to Cryptographic Attacks - DEF CON Workshops
Sold Out - K8sploitation: Hacking Kubernetes the Fun Way - DEF CON Workshops
Sold Out - Learning to Hack Bluetooth Low Energy with BLE CTF - DEF CON Workshops
Sold Out - Medical Device Hacking: 201 - DEF CON Workshops
Sold Out - Obfuscation Reloaded: Modern Techniques for Evading Detection - DEF CON Workshops
Sold Out - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more) - DEF CON Workshops
Sold Out - Pen-testing Cloud REST APIs - DEF CON Workshops
Sold Out - PLC Playground: Hands-On Industrial Control Systems Attacks - DEF CON Workshops
Sold Out - Practical YARA: Crafting Custom Rules for Targeted Malware Defense - DEF CON Workshops
Sold Out - Provably exfiltrating data by breaking TLS in the right ways - DEF CON Workshops
Sold Out - Putting EDRs in Their Place: Killing and Silencing EDR Agents - DEF CON Workshops
Sold Out - Reach the Nirvana - DEF CON Workshops
Sold Out - SnowGoat: Exposing Hidden Security Risks and Leaking Data Like a Threat Actor - DEF CON Workshops
Sold Out - Whitebox Web Exploit Dev (WWED) - DEF CON Workshops
Sold Out - Wi-Fi-So-Serious - DEF CON Workshops
Sometimes you find bugs, sometimes bugs find you - Bug Bounty Village
Source to Scale: Using Nix to Deploy Secure, Self-Hosted Data Lakehouses - Nix Vegas Community
Space Camp 33: An Orbital Incident Response Odyssey - Aerospace VillageBlue Team Village (BTV)
Space Systems Security CTF – Platform Security - Aerospace Village
Space Systems Security CTF – Platform Security - Aerospace Village
Space Systems Security CTF – Platform Security - Aerospace Village
Spades Tournament & Game Night Social - Social Gatherings/Events
Spotlight: Access Everywhere with InfoSecMap - OWASP Community
Spotlight: Access Everywhere with InfoSecMap - OWASP Community
Spotter - Universal Kubernetes Security Scanner and Policy Enforcer - Demo Labs
Spotter - Universal Kubernetes Security Scanner and Policy Enforcer - Demo Labs
Spotter – Universal Kubernetes Security Engine - Cloud Village
Spotter – Universal Kubernetes Security Engine - AppSec Village
SquarePhish 2.0 - Turning QR Codes into Entra ID Primary Refresh Tokens - Cloud Village
SSH Honeypots and Walkthrough Workshops: A History - Packet Hacking Village
SSH-nanigans: Busting Open the Mainframes Iron Fortress through Unix - DEF CON Talks
Staring at You, Staring Inside You - IOT Village
Staring at You, Staring Inside You - IOT Village
Staring at You, Staring Inside You - IOT Village
StarPWN CTF - Aerospace Village
StarPWN CTF - Aerospace Village
State of (Absolute) AppSec - AppSec Village
State of Open Source in the Federal Government - Policy @ DEF CON
State of the Evals: Lessons from U.S. CAISI's Evaluations of Cyber Capabilities and Security in AI Models - Artificial Intelligence Cyber Challenge (AIxCC)
State of the Pops: Mapping the Digital Waters - Maritime Hacking Village
Static Analysis Hero - Security Code Reviews for Professionals - AppSec Village
Static Analysis Hero - Security Code Reviews for Professionals - AppSec Village
Stealing Browser Cookies: Bypassing the newest Chrome security measures - Red Team Village
Stealing Browser Cookies: Bypassing the newest Chrome security measures - Red Team Village
StealthToken: Exploiting Identity Providers the Serverless Way - Red Team Village
Sticker Swap at DEF CON 33 - Social Gatherings/Events
Sticker Swap - Lonely Hackers Club
Sticker Swap - Lonely Hackers Club
Sticker Swap - Lonely Hackers Club
Sticky Privacy: Stickering Re-Identification & Manufacturing Stickers - Crypto Privacy Village
Stories from a Tor dev - DEF CON Talks
Storytellers: Ethical Hackers in the Digital Spotlight - Bug Bounty Village
Supply Chain Mismanagement: How to embarrass yourself on your first project - Badgelife Community
Surfing through the Stream: Advanced HTTP Desync exploitation in the wild - Bug Bounty Village
Surviving the Dataclysm: Resistance through Resilience - Hackers.town Community
Sweet Deception: Deploying Honeypots and Honey Tokens in Microsoft 365 - Cloud Village
T-Minus 24 Hours: From Source to Spaceflight in a Single Day - Nix Vegas Community
Tactical Flipper Zero: You Have 1 Hour and No Other Equipment - Radio Frequency Village
Taiwan Digital Blockade Lite: Wargame - Maritime Hacking Village
Taiwan Digital Blockade Lite: Wargame - Maritime Hacking Village
Taiwan Digital Blockade Lite: Wargame - Maritime Hacking Village
Take all my money – penetrating ATMs - Payment Village
Takes All Kinds: Building Onramps for Emergency Web Archiving in Ukraine and Beyond - Policy @ DEF CON
Tales from the NIST AI Pen Test Challenge - AI Pen Testing 101 - Red Team Village
Taskmooster - Contests
Teaching Your Reverse Proxy to Think: Fingerprint-Based Bot Blocking & Dynamic Deception - Packet Hacking Village
Team Atlanta’s Takeaways from DARPA's AIxCC - Artificial Intelligence Cyber Challenge (AIxCC)
Telecom Village Inugration - Telecom Village
Temporary Tattoo Bar - Women in Security and Privacy (WISP)
Temporary Tattoo Bar - Women in Security and Privacy (WISP)
TencentGoat: An Intentionally Vulnerable Tencent Cloud Environment - Cloud Village
Tengu Marauder v2 - Demo Labs
Tengu Marauder v2 - Demo Labs
Terminal Tactics for Beginners: A Hacker's Guide to Command Line Mastery - DEF CON Academy
Testing 1, 2, 3 Testing: Automatically Finding and Fixing Software Vulnerabilities at Scale and Speed - Artificial Intelligence Cyber Challenge (AIxCC)
Testing Environment Setup and Local Storage Enumeration - Mobile Hacking Community
Testing Trust Relationships: Breaking Network Boundaries - Bug Bounty Village
The "Fortress Island" of Voting System Physical Security - Voting Village
The (Un)Rightful Heir: My dMSA Is Your New Domain Admin - DEF CON Talks
The #Badgelife Meet, Greet, and Trade Party! (Open to Public, Formerly Hacker Flairgrounds) - Badgelife Community
The 2025 Pwnie Awards - DEF CON Talks
The African Cybercrime Economy: Inside the Playbooks of Digital Hustlers - Blacks In Cyber Village
The AppSec Poverty Line: Minimal Viable Security - AppSec Village
The AppSec Program I Regret Building - AppSec Village
The Ars0n Framework V2 Beta - Bug Bounty Village
The Art of Creating Vulnerable Machines - Operating Systems Community
The Beauty of Reversing Swift Malware - Malware Village
The Challenge with Designing Challenging Challenges - Artificial Intelligence Cyber Challenge (AIxCC)
The challenges of Sub-dermal Payments - Payment Village
The CMS.gov OSPO One Year Later: Launching the Agency’s First Bug Bounty! - Artificial Intelligence Cyber Challenge (AIxCC)
The Cookie Heist: How Cybercriminals Are Outsmarting Chrome's Latest Defenses - Malware Village
The cost of deepfakes: expanding on the implications of generated and manipulated media - AI Village
The creation of the Malmongotchi badge - Malware Village
The CVE – Hunters Project: From Curiosity to Impact - DC NextGen
The Death of XSS? Browser Security Features that Eliminate Bug Classes - AppSec Village
The DEF CON Pool Party - Social Gatherings/Events
The depths that marketers will plummet to - Crypto Privacy Village
The Devil Wears Headsets - Social Engineering Community Village
The Diana Initiative's Quiet Room - The Diana Initiative's Quiet Room
The Diana Initiative's Quiet Room - The Diana Initiative's Quiet Room
The Diana Initiative's Quiet Room - The Diana Initiative's Quiet Room
The Diana Initiative's Quiet Room - The Diana Initiative's Quiet Room
The DOMino Effect: Automated Detection and Exploitation of DOM Clobbering Vulnerability at Scale - DEF CON Talks
The Gang Recycles It’s Trash: Upcycling old IoT into new capabilities. - IOT Village
The Hidden Path to Root: Shadow Resources, Roles, and AWS Service Exploits - Cloud Village
The Human Vulnerability: Social Engineering in a Hyper Connected World - Social Engineering Community Village
The Human's Guide to Understanding AIxCC - Artificial Intelligence Cyber Challenge (AIxCC)
The Illuminati Party - Social Gatherings/Events
The Importance of State Certification Programs for Election Technology; Uncovering and Remediating Compliance Issues - Voting Village
The Jasmine Dragon - Social Gatherings/Events
The KEVOPS Sellout Pool Party - Social Gatherings/Events
The Misconfig Matrix: From Chaos to Control - Cloud Village
The Missing Link: Draytek’s New RCEs Complete the Chain - Hardware Hacking and Soldering Skills Village (HHV-SSV)
The Nexus of Security for Quantum Systems: Spy Qubits and beyond - Quantum Village
The One Bitcoin Heist: Making a custom Hashcat module to solve a decade-old puzzle challenge - DEF CON Talks
The Path Towards Self-Defending Systems - Artificial Intelligence Cyber Challenge (AIxCC)
The Power(Point) Glove - Hardware Hacking and Soldering Skills Village (HHV-SSV)
The Price of Progress: Ethical Cybersecurity in Tech-Driven Communities - Blacks In Cyber Village
The Prompt is Lava: Architecting Secure Boundaries for LLM Integrations with Google Workspace. - AI Village
The Quantum Shift: Practical Post-Quantum Risk: Algorithms, Infrastructure, and Transition - Malware Village
The Small Packet of Bits That Can Save (or Destabilize) a City - Radio Frequency Village
The Things know What You Did Last Session - IOT Village
The Truth, The whole Truth and Nothing but the Truth about Cybersecurity - Blacks In Cyber Village
The Ultimate Hack: Applying Lessons Learned from the loss of TITAN to Maritime Cybersecurity - DEF CON Talks
The Upgrade Lottery: The Odds Are Against You - AppSec Village
The Upgrade Lottery: The Odds Are Against You - AppSec Village
The Worst ICS/OT Love Story Ever Told - ICS Village
The Year of the Bounty Desktop: Bugs from Binaries - Bug Bounty Village
There and Back Again: Discovering OT devices across protocol gateways - ICS Village
TheTimeMachine - Demo Labs
TheTimeMachine - Demo Labs
They deployed Health AI on us. We’re bringing the rights & red teams. - Biohacking Village
Thinking Like a Hacker in the Age of AI - DEF CON Talks
Third-Party Access Granted: A Postmortem on Student Privacy and the Exploit That’s Still in Production - Policy @ DEF CON
Threat Dynamics on the Seas - Maritime Hacking Village
Threat Hunting 101: Beyond the Alerts - Blue Team Village (BTV)
Threat Modelling at Scale: Breaking Down Cloud Complexity - Cloud Village
Timeline Analysis in Timesketch with Sec-Gemini - AI Village
To Pay or Not to Pay? The Battle Between Bug Bounty & Vulnerability Disclosure Programs - Bug Bounty Village
TotalTest 2.Oh!: Unleashing a Testing Program to Break Smarter, Measure Better, and Fund Your Fixes - Adversary Village
Toxic BBQ - Social Gatherings/Events
Tracking 300k+ drives: What we’ve learned after 13 years - Data Duplication Village
Tracking 300k+ drives: What we’ve learned after 13 years - Data Duplication Village
Traditional Pentest Meets AI: New Challenges in Android Security - Mobile Hacking Community
Train How We Fight: Finding CVEs to Enhance Competition Skills - AppSec Village
Trans in Tech - Queercon Community Lounge
Transforming Identity Protection: Innovating with AI and Attack Paths - Cloud Village
Trivia - Badgelife Community
TryHackMe - Azure Purple Teaming: Emulating and Detecting Cloud TTPs - Cloud Village
TSPU: Russia's Firewall and Defending Against the Future of Digital Repression - DEF CON Talks
Tunnel Snipers - Telecom Village
Tunnelpocalypse - DDoS Community
Turning Camera Surveillance on its Axis - DEF CON Talks
Turning Microsoft's Login Page into our Phishing Infrastructure - DEF CON Talks
Turning your Active Directory into the attacker’s C2: modern Group Policy Objects enumeration and exploitation - DEF CON Talks
Um, ACKtually... - Social Gatherings/Events
Uncovering and Combating Brazil's Largest Financial APT: A Journey of Collaborative Intelligence (POR) - La Villa
Uncovering Hidden Threats: The Risks of Dangling Issuers in Federated Credentials - Cloud Village
Unexpected Connections: How a vulnerability in obscure dealer software could have unlocked your car from anywhere - DEF CON Talks
Unleashing the Cookie Monster: How we removed all the trackers and cookies - Crypto Privacy Village
Unmanned Wireless Penetration Testing Device - Demo Labs
Unmanned Wireless Penetration Testing Device - Demo Labs
Unmasking the Snitch Puck: the creepy IoT surveillance tech in the school bathroom - DEF CON Talks
Unpacking Go Malware: Challenges, EDR Blind Spots, and Real-World Cases (ESP) - La Villa
Untitled Talk by Elie Burzstein - AI Village
Unveiling IoT Vulnerabilities: From Backdoors to Bureaucracy - IOT Village
Unveiling the shadows: Digital Forensics evidence in AI-Driven CyberCrime - Malware Village
Up and Down Technique: Exposing Hidden Data from RAG Systems - Bug Bounty Village
Using ChatGPT to Hack ICS/OT Vol.2 - ICS Village
Using Evil Human Digital Twins for Fun and Profit - Adversary Village
Using SELinux and Podman to secure local Model Context Protocol resources - Operating Systems Community
Using Stardew Valley mods as a C2 and infostealer - Malware Village
VDP in Aviation - How it shouldn't be done! - Aerospace Village
Veilid la revoluçion : Your data is yours to own - Crypto Privacy Village
VETCON 2025 Party - Social Gatherings/Events
Vibe Coding: Security Crisis or Opportunity - OWASP Community
Vibe School: Making dumb devices smart with AI - IOT Village
Virtualization-Based (In)security - Weaponizing VBS Enclaves - DEF CON Talks
Voice Cloning Air Traffic Control: Vulnerabilities at Runway Crossings - DEF CON Talks
Voices from the Frontlines: Managing Bug Bounties at Scale - Bug Bounty Village
Voices of the Industry: A Fireside Chat with Payment Leaders - Payment Village
Voting Systems Lab - Voting Village
Voting Systems Lab - Voting Village
Voting Systems Lab - Voting Village
VRP @ Google -- a look inside a large self-hosted VRP - Bug Bounty Village
Vulnerability Hunt - The Snippets Edition - AppSec Village
Vulnerability Hunt - The Snippets Edition - AppSec Village
Vulnerability Hunt - The Snippets Edition - AppSec Village
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
Walking Tour Groups - Social Gatherings/Events
WalkThrough Workshops - Packet Hacking Village
WalkThrough Workshops - Packet Hacking Village
WalkThrough Workshops - Packet Hacking Village
Wall Of Sheep - Packet Hacking Village
Wall Of Sheep - Packet Hacking Village
Wall Of Sheep - Packet Hacking Village
Wap Droper Case Study - Telecom Village
WarDriver Meetup - Radio Frequency Village
Warflying in a Cessna - Part II - Upping Our Game - Radio Frequency Village
WarHead - Demo Labs
WarHead - Demo Labs
We Know What You Did (in Azure) Last Summer - Cloud Village
Weaponizing Kestrel: Red Team Tradecraft for Hunting - Red Team Village
Weaponizing SageMaker AI: Real-World Offense in Machine Learning Platforms - Cloud Village
Weaponizing SSM: Practical Exploits and Hardening Techniques for AWS. - Cloud Village
Weaponizing Trust: Investigating a Threat Actor Targeting Security Researchers and Academics - DEF CON Talks
Welcome / Badge & Swag Pick Up - DC NextGen
Welcome to DEF CON 33! - DEF CON Talks
Welcome to the Symposium/Introductions - Voting Village
What Game Hackers teach us about Offensive Security and Red Teaming - GameHacking.GG
What is Dead May Never Die: The Ghost of Internet Explorer in Windows: MapUrlToZone - DEF CON Talks
What is Dead May Never Die: The Immortality of SDK Bugs - IOT Village
What's new in amateur radio digital modes? - Ham Radio Village
What’s Really in the Box? The Case for Hardware Provenance and HBOMs - IOT Village
What’s the Matter with my smart home? - IOT Village
What’s the Matter with my smart home? - IOT Village
What’s the Matter with my smart home? - IOT Village
When boot vectors turn into attack vectors: Overcoming RP2350's secure boot chain with fault injection - Embedded Systems Village
When boot vectors turn into attack vectors: Overcoming RP2350's secure boot chain with fault injection - Embedded Systems Village
When Insiders Become the Threat: Details on the Past and Ongoing Multistate Plot by Trump Allies to Obtain Proprietary Voting Software and How it Impacts Election Security - Voting Village
When the Paper Trail Leads Nowhere, by Design; the Los Angeles County VSAP Voting System - Voting Village
Where’s My Crypto, Dude? The Ultimate Guide to Crypto Money Laundering (and How to Track It) - DEF CON Talks
Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking - Red Team Village
Whitehats Secret Weapon: OWASP - OWASP Community
whoAMI: Discovering and exploiting a large-scale AMI name confusion attack - Cloud Village
Whose Slide Is It Anyway? - Contests
Wi-Fi Self Defense & Hacker Hunting & For Beginners - IOT Village
Wi-Fi Self Defense & Hacker Hunting & For Beginners - IOT Village
Wifi security - IOT Village
Win-DoS Epidemic: A crash course in abusing RPC for Win-DoS & Win-DDoS - DEF CON Talks
WipeOut XL hi-score tournament - Hackers.town Community
WISP + Blue Team Village Movie Night and Mixer - Social Gatherings/Events
WISP Group Photo - Women in Security and Privacy (WISP)
Women of Queercon - Queercon Community Lounge
Women, gender non-conforming and non-binary meetup with The Diana Initiative - Social Gatherings/Events
Women, gender non-conforming and non-binary meetup with The Diana Initiative - The Diana Initiative
Work Smarter, Pivot Faster: Threat Intelligence Workflows that Scale - Blue Team Village (BTV)
You Can Mix but You Can’t Hide: Uncovering Node Behaviors in Nym Network - Crypto Privacy Village
You Can Mix but You Can’t Hide: Uncovering Node Behaviors in Nym Network - Crypto Privacy Village
You Might Be A Wardriver If… - Radio Frequency Village
You snooze you lose: RPC-Racer winning RPC endpoints against services - DEF CON Talks
Your Cyber Career - Noob Community
Your First Conference Talk - Noob Community
Your First CVE - Noob Community
Your Passkey is Weak: Phishing the Unphishable - Physical Security Village
Your Static Tools Are Cute - My AI Ripped ZebLoader Apart - Malware Village
Z80 Badge Talk - Badgelife Community
Zero Trust, Total Bust - Breaking into thousands of cloud-based VPNs with one bug - DEF CON Talks

DEF CON News


DCTV is Live!

dctv

DCTV is online! Jump on dctv.defcon.org for links to the DEF CON 33 live streams on YouTube and Twitch.

Get that DEF CON however works best for you.

Badge Shipment Delay

badge delay

As you’ve likely heard, attendees in the cash line are getting paper badges right now. This is due to a badge shipment delay. We’re sorry for the inconvenience. We will share updates as soon we have them, and we’ll do our best to make it right. Thanks for your understanding.

Stay in touch with DEF CON socials and Hacker Tracker for updates as soon as they arrive.

Pool Party Thursday at Sahara!

Sahara Pool

Greetings, luminous humans of DEF CON! Welcome to the week of DEF CON 33!

Make sure to join us Thursday from 7:30 to 10:30 at the Sahara Pool for the KEVOPS Sellout Pool Party! Refreshing pool, delicious tacos, and DEF CON DJ’s on the ones and twos. DEF CON badge required for entry.

See you there!

Workshops Registration announced!

lawsuit update

Registration for DEF CON workshops will open at precisely noon Pacific Daylight Time on July 15. It's a good idea to have your clicking device oiled up and sighted in - spaces get snapped up very quickly.

The full lineup is on the Workshops Page . Get your faves and alts all lined up for maximum efficiency.

It's happening, people. Feel free to get amped.

Speakers and Workshops are Live!

speakers and workshops

Who's speaking on the main stages at DEF CON ? What DEF CON Workshops are going to be available? Inquiring minds want to know!

Lucky day for you, curious netizens. The listings for both are live now on the #dc33 website. Familiarize yourself with the lineup, and make your plans accordingly.

Final stretch people. DEF CON positively LOOMS on the horizon!

Workshops submission responses are out!

Workshops update

Friendly reminder to all Workshops CFP submitters: Responses have gone out! If you don't see a response to your submission in your inbox, please check your spam folder.

Thanks to everyone who sent in a submission and congratulations to everyone that's been selected.

Parties, Meetups, & Events Page is live!

Parties, Meetups, and events page screen cap

Less than two months until DEF CON 33! Time to start planning to make the most of your DEF CON experience.

One of the best parts of DEF CON is meeting other humans and bonding over shared interests. On the Parties, Meetups and Events page you'll find a shockingly comprehensive list of group hangs. Whether you're into Running or Ham Radio, Blanket Forts or Karaoke, we've got you covered.

Set aside some time for fun and connection. Your people are waiting.

Jedi Training Registration Open

May the 4th be with you DEF CON Training

We sense a disturbance in the force… registration is open for DEF CON Training Las Vegas 2025 !

Whether you're a Rebel Red Teamer or a True Blue Defender, there is training for all, from any world in the galaxy!

Pack up your droids and join us in Vegas! Register today and take advantage of this opportunity to train with our Jedi Masters - uh, we mean instructors.

DEF CON 33 Lodging Update

DEF CON 33 logo with lodging update underneath

DC33 planning alert - The DEF CON room block at the Fontainebleau is sold out. The blocks at the Sahara and Venetian are filling up. To lock down your own deep DEF CON 33 discounts visit defcon.org for the reg links.

August will be here before you know it. Make sure you plan accordingly.

See you soon!

Call for Authors!

stack of books glitched with DEF CON 33 logo

Attention independent authors! DEF CON 33 is offering a space for book signings in the Vendor area . If you've got a book that will appeal to the DEF CON Community, we encourage you to submit it for consideration.

Get your work (and yourself) in front of a vibrant, engaged community of enthusiastic readers.

DEF CON 33 Short Story Contest!

Short story contest open with hands typing

Attention all scribes and tale-weavers of the DEF CON community - the DEF CON 33 Short Story Contest is open for business! It takes place entirely online - you can find the details at https://forum.defcon.org/node/252691 .

The theme is Access Everywhere. In addition to literary glory, you can also win free human badges for DC33.

let's GO.

DEF CON 33 Deadline Alert!

deadline alert DEF CON 33

Friendly DEF CON reminder: the deadline for the DEF CON 33 Call for Papers , Call for Workshops and Call for Demo Labs is now less than a month away! Get your submissions in ahead of the mad rush at the May 1 deadline for maximum attention. We can't wait to see what you're working on.

DEF CON Training Las Vegas Registration Now Open!

DEF CON Las Vegas Training Registration

DEF CON Training Las Vegas Registration is officially open! Expanded menu includes dozens of course options, new 4-day trainings and a $200 earlybird discount. Join us in August for DEF CON style hands-on technical training from our world-class trainers. Information and signup at training.defcon.org . Reserve your spot now!

DEF CON 33 Deadline Alert!

DEF CON 33 deadline alert

Friendly reminder to #defcon people everywhere 🚨

The open calls for DEF CON 33 Contests, Villages and Communities close March 15. If you've got a cool idea to propose, now is the time!

Fortune favors the bold. Let's GO.

DEF CON 33 Theme Drop!

DEF CON 33 theme

"Access Everywhere."

This year we're thinking about how to make information and services available to everyone. Available wherever you are, whoever you are, and usable no matter how you need to connect.

Less walled gardens, more sunlight.

You can read the theme story and get some visual inspiration on the DEF CON 33 Theme and Style Guide page . You can get it in a PDF on media.defcon.org . Homework assignments to get you into the vibe coming soon.

We can't wait to see where you'll take it.

See you at DEF CON!

Pre-reg for DEF CON 33 opens 3/5!

laptop with DEF CON 33 ticket on screen

DEF CON 33 is building steam. Planning is in full swing. In fact, a glance at any nearby calendar will tell you we're already halfway there!

We know you need to plan, too. That's why we're opening up Early Bird Online Registration. For the go-getters who register early, weve got our lowest online price. And just like in years past, registering online guarantees your badge, no matter what the attendance numbers turn out to be.

Starting Wednesday you'll be able to hit up shop.defcon.org to get your ticket. Are you ready?

The Early Reg price is $540 ($520 +$20 processing fee.) Early Bird season ends May 23.

Regular Pricing is $560 ($540 + $20 processing) and is available until July 18.

Late Pricing is $580 ($560 +$20 processing) from July 19 to the close of Online Registration.

As always, online registration is not required. The cash-at-the-door price is just $500, and it comes with the bonus of our world-famous LineCon.

We're very excited about how DEF CON 33 is shaping up. We hope you are too.Past the halfway point, people. Let's GO.

New Calls Open! CFP, Workshops, Demo Labs, and Policy!

DEF CON 33

The DEF CON 33 Call Season is now almost complete! The Call for Papers is LIVE. We're also ready to accept submissions for Demos, Workshops, and Policy. Things are well and truly underway. Time to breathe deep, gather your ideas and get busy proposing.

For the comprehensive list of open calls, visit the DEF CON 33 Call Index . Rules, guidance, deadlines – it's all there.

Participation is the cheat code that unlocks the secret DEF CON levels. We can't wait to see what you've got in mind.

DEF CON 33 Open Calls!

DEF CON 33 Open Calls

The moment has arrived - the DEF CON 33 Call Season is officially afoot! Time to get thinking on how you want to participate. Whether you've got ideas to start a new Village, or have the tunes to rock the crowd after hours, the doors are open. There are a bunch of Calls you can peruse at leisure from Contests to Soundtrack to Vendors, and all the info you need to get started is on the DEF CON 33 Call Index .

Don't let your dreams be dreams! Make this the year your idea makes headlines at DEF CON.

DEF CON season is underway, people. Let's get after it.

DEF CON CTF Quals Dates Announced!

CTF qualifier dates

DEF CON 33 CTF Qualifcations have a date! "Packet sorcerers, make room in your calendar for the official qualifier event for #defcon 33 CTF! Our esteemed colleagues at the Nautilus Institute are hard at work building the challenges - can you afford to do less?"

Further information available at https://nautilus.institute . The long season of preparation begins.

New Room Block for DEF CON 33: Fontainebleau!

Fontainebleau Hotel

Another discounted room block for DEF CON 33 has dropped! This time it's at the ultra-swanky Fontainebleau, just a short walk from the LVCC.To book yourself into the Fontainebleau, you can call (833) 702-7272 between 6am to 10pm (PST) or use this link: https://book.passkey.com/go/DefCon2025FBLV . You can also reach the link from defcon.org.Maybe it's time to treat yourself. 2025 will be here before you know it.

DEF CON 2025 Call for Trainers is Open!

DEF CON Training logo

Attention DEF CON educators ! The DEF CON Training 2025 Call for Trainers is live!

We're looking for unique, technical, and practical presentations from trainers with deep knowledge of their subject. If that's you, let's talk!

All the info you need to apply is at training.defcon.org .

Room block now open at the Venetian for DEF CON 33!

Sahara and Venetian hotels

Good news, everyone! We've already got some discounted room blocks you can use to lock down your lodgings for DEF CON 33.

DC33 doesn't kick off until August 7, 2025, but that's no reason to lollygag. If you're a high-octane go-getter you already know how good it feels to get those To-Do items checked off early. If not, this is far enough ahead to forget you booked and give yourself a nice surprise when there's one less thing to do at crunch time.

You can book at the Venetian now and get the DC33 ball rolling. We'll keep you posted as additional options become available.

We're already 2 months closer to the next DEF CON. Be prepared.


Return to Index
© 1992-2025 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information

DEF CON FAQ


Frequently asked questions about DEF CON



What is DEF CON?

DEF CON is one of the oldest continuously running hacker conventions around, and also one of the largest.



How did DEF CON start?

Originally started in 1993, it was a meant to be a party for member of "Platinum Net", a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I'll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can't remember. Why not invite everyone on #hack? Good idea!



Where did the name come from?

The short answer is a combination of places. There as a SummerCon in the summer, a HoHoCon in the winter, a PumpCon during Halloween, etc. I didn't want any association with a time of year. If you are a Phreak, or just use your phone a lot you'll notes "DEF" is #3 on the phone. If you are into military lingo DEF CON is short for "Defense Condition." Now being a fan of the movie War Games I took note that the main character, David Lightman, lived in Seattle, as I do, and chose to nuke Las Vegas with W.O.P.R. when given the chance. Well I knew I was doing a con in Vegas, so it all just sort of worked out.

There are several resources that will give you an idea of what DEF CON is all about.

DEF CON Press: through the prism of the media
DEF CON Groups: Local groups that meet
DEF CON Media Server: DC 1 to the present, captured
Google: always a good research starting point
Just remember, DEF CON is what you make of it.



When and where is DEF CON?

DEF CON is generally in the last week of July or first week of August in Las Vegas. DEF CON 33 will be held August 7th through August 10th, 2025. Many people arrive a day early, and many stay a day later.


Isn't there a DEF CON FAQ already?

Yes, an unofficial one. It's quite humorous, sometimes informative, and DEF CON takes no responsibility for its content. It is archived here.



What are the rules of DEF CON?

Physical violence is prohibited. Harassment of any kind is prohibited. We don't support illegal drug use. Minors should be accompanied by their parent(s) or guardian(s). Please refrain from doing anything that might jeopardize the conference or attendees such as lighting your hair on fire or throwing lit road flares in elevators. DEF CON Goons are there to answer your questions and keep everything moving. Hotel security is there to watch over their property. Each has a different mission, and it is wise to not anger the hotel people. Please be aware that if you engage in illegal activities there is a large contingency of feds that attend DEF CON. Talking about how you are going to bomb the RNC convention in front of an FBI agent is a Career Limiting Move!

You can view the DEF CON Code of Conduct at https://defcon.org/html/links/dc-code-of-conduct.html.



Is DEF CON cancelled?

No.



What is there to do at DEF CON?

DEF CON is a unique experience for each con-goer. If you google around you'll find dozens of write-ups that will give you an idea of what people have experienced at DEF CON. Trust write-ups more than media articles about the con. Some people play capture the flag 24x7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of. Half the fun is learning what happened at DEF CON after the fact!



I'm not a hacker, should I go to DEF CON?

Many people have different definitions of what is a ‘hacker’. I would recommend looking at previous years speeches, and write-ups from past attendees - this should give you a good idea if DEF CON is for you. This hacker FAQ might give you some insight into the matter as well. If you do not have any technical interests, DEF CON is probably not for you. Sure there is a lot of socializing you can do, but technology and hacking is the core of the con.



Do criminals go to DEF CON?

Yes. They also go to high school, college, work in your workplace, and the government. There are also lawyers, law enforcement agents, civil libertarians, cryptographers, and hackers in attendance. Ssshhh. Don't tell anyone.



What are Goons?

They are the staff at DEF CON. They have many roles including safety, speaker coordination, vendor room coordination, network operations, et cetera... Please try to be helpful to them if they make requests of you. If any goon tells you to move, please do so immediately as there may be safety issues they are attempting to address.



How can I help out or become a Goon?

The staff at DEF CON has grown organically. All positions have some degree of trust associated with them, so typically new goons are ‘inducted’ by friends of existing goons. There are many random points when goons need help and may ask people for help, generally for helping move stuff or other tasks that don't require high amounts of trust or unsupervised work. Just because you help out doesn't make you a goon. If you really want to be a goon, talk with one and see how much work they actually do (Hint: you may want to enjoy being at DEF CON, not working full-time at it). One year the network group got a new Goon when a networking engineer was needed, and he came to the rescue. The intent behind the goons is not to be elitist, but to have a network of trusted people who can help run the conference - please do not feel upset if you are not chosen to be a goon.



How can I help or participate?

DEF CON is not a spectator sport! Before the con, during, and after there are chances for you to get involved. Before the con you can read about the contests and maybe sign up for one like Capture the Flag. There are artwork contests for shirts and posters. You can practice your lock pick skills, or just get your laptop all locked down and ready to do battle. Organize your .mp3s. Check out the DEF CON Forums to see what other people are up to. If you want to create your own event, you can do that as well - you will not get official space or sanctions, but virtually every official event at DEF CON started out as an unofficial event.



I would love to see XYZ event, how do I make this happen?

Virtually all events at DEF CON were conceived by the attendees. The DEF CON forums are a great place for recruiting help for an event you want to put on, and making sure your efforts aren't being duplicated. If it doesn't require resources from DEF CON (space, namely) you generally don't have to ask anyone’s permission. Most events are unofficial until they've been going on for a couple of years. Please let us know if you have an idea for an event, we may help facilitate or promote it. Email [suggestions at DEF CON dot org] to keep us in the loop.



How can I speak at DEF CON?

You can submit a response to our CFP (opening soon). All entries are read and evaluated by a selection committee. We would love to have your submission. The call for papers usually opens in January and closes mid-May.



I'm press, how do I sign up, why can't I get in for free (I'm just doing my job)?

Please email press[at]defcon[d0t]org if you wish press credentials. Lots of people come to DEF CON and are doing their job; security professionals, federal agents, and the press. It wouldn't be fair to DEF CON attendees if we exempted one group from paying. If you are a major network and plan on doing a two minute piece showing all the people with blue hair, you probably shouldn't bother applying for a press pass - you won't get one. If you are a security writer or from a real publication please submit, and someone will respond with an answer.



I want to sell stuff, how do I do this?

If you want a space in our vendor area, you need to apply. Because of limited space and our attempt to have a diversity of vendors, you may not be able to get a booth. It is wise to think of staffing issues - if you are one person do you want to spend your entire time behind a vendors booth?



What are the different price rates?

Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script kiddies. The only discount is for Goons and speakers, who get to work without paying for the privilege.



How much is admission DEF CON, and do you take credit cards?

Online pricing at shop.defcon.org ( where you can pay with a credit card) is as follows:

The Early Reg price is $540 ($520 +$20 processing fee.) Early Bird season ends May 23.

Regular Pricing is $560 ($540 + $20 processing) and is available until July 18.

Late Pricing is $580 ($560 +$20 processing) from July 19 to the close of Online Registration.

As always, online registration is not required. The cash-at-the-door price is just $500, and it comes with the bonus of our world-famous LineCon.



Does my underage child need a badge?

Children under the age of 8 will not need to purchase a badge.



Can I get a discount on DEF CON badges?

DEF CON charges one price regardless of your social status or affiliation. Please know that we depend on attendee income to pay the costs of the conference and don't have sponsors to help defray the expenses.

We sometimes get requests for discounts [students, veterans, children], unfortunately we don't want to try and validate if you are a current student, look at your ID to determine your age, decode military discharge papers, etc.

If you really want to attend DEF CON for free then do something for the con.

You could:
Submit a CFP and be an accepted speaker or workshop instructor.
Work on a contest, event, or village.
Qualify for CTF/Contests that include entry.
Find a team to become a Goon newbie.
Contribute to content, or perform some entertainment.


I need a letter of invite for my visa application, how do I get that?

In most cases, DEF CON can send a signed letter of invite, usually within a few short business days once we have all the info. If you also require verification of housing, we can put you in touch with someone to help you get your hotel stay organized, let us know if you need that.

Along with your request, please email us the following to info(at)defcon(.)org

Name as is on passport:
Passport number:
Country of issue:
Date of issue:
Date of expiration:
Country of origin:


DEF CON is too expensive, how can I afford it?

Many people have made an art and science out of coming to DEF CON very cheaply. Here are a couple of tips.

Travel: Buy airfare in advance, go Greyhound, Carpool, hitch-hike. (Note: this may be dangerous and/or illegal.)
Lodging: Share rooms - some people have up to 10 people they share a room with, find a hotel cheaper than the one that the conference is scheduled at, stay up for three days, etc. (note: this can be hazardous to your health.)
Food: Pack food for your trip, go off site to find food, eat in your hotel rooms, and look for cheap Vegas food at Casinos. (Look for deals and specials that are trying to get you in the door to gamble.)
Booze: You don't need to drink. Brew your own and bring it. (It's been done.)
Entrance: Admission can be saved, mow some lawns. Try to go to another 4 day event for cheaper than this that offers so much. We have increased the fees slowly over the years, but also the amount and quality of events have increased.

Inevitably people will try to do some math and pretend that DT gets rich each DEF CON - they seem to lack the ability to subtract.



How many people typically attend DEF CON?

There have been roughly 25-28k attendees in the last few (pre-COVID) years of DEF CON. DEF CON 27 had a record showing with approximately 30,000.



Is there a network at DEF CON?

Why yes, DEF CON is FULLY network-enabled. Now that we've perfected the art of a stable hacker con network, we're ascending to a higher level - we're providing you a network that you feel SAFE in using! Since DEF CON 18 we're WPA2 encrypted over-the-air, with a direct trunk out to the Internet. No peer-to-peer, no sniffing, just straight to the net (and internal servers). We'll provide login credentials at Registration. We know the LTE airwaves will be saturated so we're putting our own cred on the line to give you a net that even we would put our own mobile phones on.

If you're feeling frisky, we'll still have the traditional "open" network for you - bring your laptop (we'd recommend a clean OS, fully patched--you know the procedure) because we don't police what happens on that net. Share & enjoy!



What is the age limit?

People have brought children to DEF CON - it is not recommended to do this unless you are going to constantly supervise them. It is generally an ‘adult’ atmosphere (language, booze, et cetera). If you've never been to DEF CON, you may want to refrain from bringing your children (unless they are demanding that you bring them). While there are no age limits, we have consistently cooperated with parents and/or private investigators who are looking for children that ‘ran away from home’ to go to DEF CON. You will have to be 21 to reserve a room.



What is a DEF CON "Black Badge"?

The Black Badge is the highest award DEF CON gives to contest winners of certain events. CTF winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.



How can I get a hold of DT? I tried to mail him and haven't seen a response yet.

DT doesn't dislike you, isn't trying to hurt your feelings, and bears you no ill will. The fact is he gets an unmanageable load of mail continually. Mailing him again may elicit a response. Try mailing FAQ (at) DEFCON.ORG if you have a general question that isn't answered here or in the forums.



Is it hot in Vegas?

Yes. Bring sunscreen (high SPF), do not fall asleep near the pool (lest you wake up to sunburn), and do not walk far in the sun unless you are experienced in dealing with extreme heat. The sun is dangerous in Las Vegas. Sleeping in lawn chairs is a sure way to wake up to severe burns in the morning when that bright yellow thing scorches your skin. Drink plenty of water and liquids - remember that alcohol will dehydrate you.



What should I bring?

It depends on what you're going to do at DEF CON. This is discussed in quite some depth on the unofficial DC FAQ, as well as a thread in the DC Forums. You may want to bring fancy (or outrageously silly) clothes for the official Music events, on Friday and Saturday nights, where everyone shows off nifty attire.



How much do rooms cost, and how do I reserve a room?

Currently we have room blocks at Venetian, and Sahara

Check the the DEF CON 33 venue page periodically for more as we add them


How much is internet access?

We are looking into this. Free (and possibly more dangerous) internet access is available in the convention area.



Will the hotels broadcast the speeches on their cable system?

DEF CON TV has succcessfully streamed all tracks to all the hotels in the past, and a couple of tracks out to the internet, for several years now. We are navigating a new venue and new hotels, so stay tuned. If we can, we probably will!



Will we have DEF CON branded poker chips?

You will have to attend DEF CON to find out.



Will conference attendees have entire floors of hotel rooms to themselves?

Probably not. Hotels have been very cooperative in attempting to centralize the DEF CON attendees, for their convenience and ours, but there will be non-DEF CON attendees in hotel rooms next to us.



This FAQ didn't answer my questions, or was unclear, how can I get further information?

Check out the DEF CON Forums to ask follow up questions.


Return to Index
© 1992-2025 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information

DEF CON Villages Table

Each Village, as it’s name may imply, specializes in a topic or aspect of security or computers.

One Page All Villages list with descriptions

defcon.org Villages page

You may need to scroll to the right to see all info

Village Name
Home Page
Map Schedule Village
Desc
Social Media
Links
Adversary Village Map Sched Desc TW @AdversaryVillag
      https://defcon.social/@AdversaryVillage
YT https://youtube.com/AdversaryVillage
DC http://adversaryvillage.org/discord
TI @AdversaryVillage
FB @AdversaryVillage
LI @adversaryvillage
Aerospace Village Map Sched Desc TW @secureaerospace
LI @aerospace-village
TW @hack_a_sat
DC https://discord.gg/gV4EWuk
YT https://www.youtube.com/c/AerospaceVillage
      https://defcon.social/@aerospacevillage
AI Village Map Desc TW @aivillage_dc
TI @aivillage
YT link
DC https://discord.com/invite/GX5fhfT
AppSec Village Map Sched Desc TW @AppSec_Village
LI @appsecvillage
YT https://www.youtube.com/c/AppSecVillage
DC https://discord.gg/5XY8qYXd7R
Artificial Intelligence Cyber Challenge Map Sched Desc TW @DARPA
Biohacking Village Map Sched Desc TW @dc_bhv
LI @biohacking-village
YT http://youtube.com/biohackingvillage
TI @biohackingvillage
DC https://discord.gg/Q8ubDb5
IG @biohacking_village
      link
Blacks in Cyber Village Map Sched Desc TW @BlackInCyberCo1
      https://defcon.social/@blacksincyber
TI @blacksincybersecurity
YT link
LI @blackincyberconference
PT @blacksincybersecurity
FB @blackincyberconf
Blue Team Village Map Sched Desc TW @BlueTeamVillage
TI @blueteamvillage
YT https://www.youtube.com/c/blueteamvillage
DC https://discord.gg/blueteamvillage
      https://defcon.social/@blueteamvillage
Bug Bounty Village Map Sched Desc TW @BugBountyDEFCON
YT https://www.youtube.com/BountyTalks
TW @arl_rose
TW @infinitelogins
YT https://www.youtube.com/infinitelogins
Car Hacking Village Map Sched Desc TW @CarHackVillage
YT http://youtube.com/@carhackingvillage
LI @car-hacking-village
DC https://discord.gg/JWCcTAM
Cloud Village Map Sched Desc TW @cloudvillage_dc
YT https://www.youtube.com/cloudvillage_dc
DC https://discord.gg/EygUDJABee
Contests Map Sched       link
Crypto Privacy Village Map Desc TW @cryptovillage
SL https://cryptovillage.slack.com/
YT link
TI @cryptovillage
      https://defcon.social/@cryptovillage
Data Duplication Village Map Sched Desc TW @DDV_DC
DEF CON Groups (DCG) Map
DEF CON Groups VR (DCGVR) Map TW @DCGVR
TI @defcon_groups
DC https://discord.gg/bsX4QXf3rD
YT link
DEF CON Hackers with Disabilities TW @HDA_DEFCON
DEF CON Talks Map Sched TW @defcon
FB @defcon
YT https://www.youtube.com/user/DEFCONConference
      http://www.reddit.com/r/defcon
IG @wearedefcon
DC https://discord.gg/defcon
DEF CON Training
DEF CON Workshops Sched
Demo Labs Map Sched
Embedded Systems Village Map Desc TW @EmbeddedVillage
GameHacking.GG Map Sched Desc
Ham Radio Village Map Sched Desc TW @HamRadioVillage
TI @HamRadioVillage
DC https://discord.gg/hrv
      https://defcon.social/@HamRadioVillage
Hardware Hacking
Soldering Skills Village (HHV-SSV)
Map Sched Desc TW @DC_HHV
      https://defcon.social/@DC_HHV
ICS Village Map Desc TW @ICS_Village
LI @icsvillage
YT link
TI @ics_village
IOT Village Map Sched Desc TW @iotvillage
TW @ISEsecurity
TW @Villageidiotlab
      https://defcon.social/@IoTVillage/
TI @iotvillage
YT https://www.youtube.com/c/IoTVillage/videos
DC https://discord.gg/EFKbNFrFaN
Lock Pick Village Map Desc TW @toool
TI @toool_us
YT https://youtube.com/c/TOOOL-US
      https://techhub.social/@TOOOL
Malware Village Map Desc       https://x.com/MalwareVillage
LI @malwarevillage
DC https://discord.com/invite/xQwqY48SrJ
Maritime Hacking Village Map Sched Desc       https://x.com/maritimevillage
LI @maritimehackingvillage
Packet Hacking Village Map Sched Desc TW @wallofsheep
FB @wallofsheep
YT https://youtube.com/wallofsheep
TI @wallofsheep
PS https://www.periscope.tv/wallofsheep
      https://defcon.social/@wallofsheep
IG @wallofsheep
Payment Village Map Sched Desc TW @paymentvillage
TI @paymentvillage
YT link
      https://t.me/paymentvillage
Physical Security Village Map Desc TW @physsec
TI @bypassvillage
LI @physsec
      https://defcon.social/@physsec
Policy @ DEF CON Map Desc TW @DEFCONPolicy
      link
      https://defcon.social/@defconpolicy
Quantum Village Map Desc TW @quantum_village
DC https://discord.gg/6WUjH5cBXu
LI @quantumvillage
YT https://youtube.com/@quantum_village/
Radio Frequency Village Map Desc TW @rfhackers
TW @rf_ctf
      link
DC https://discordapp.com/invite/JjPQhKy
Recon Village Map Sched Desc TW @ReconVillage
FB @reconvillage
YT https://www.youtube.com/reconvillage/
Red Team Village Map Sched Desc TW @RedTeamVillage_
YT https://www.youtube.com/redteamvillage
TI @redteamvillage
DC https://discord.gg/redteamvillage
Social Engineering Community Village Map Sched Desc TW @sec_defcon
YT link
TI @se_community
LI @social-engineering-community
FB @Social-Engineering-Community-108883855139272
Social Gatherings/Events
Tamper Evident Village Map Desc
Telecom Village Map Sched Desc TW @TelecomVillage
Voting Village Map Sched Desc TW @votingvillagedc
YT link
TI @votingvillagedc
LI @election-integrity-foundation
IG @votingvillage?igsh=MWJreTh6dGl3eDEzNg==

DEF CON Contests Table

Various contests, some lasting all 4 days of DEF CON, some short time on stage

One Page All Contests list with descriptions

defcon.org Contests page

You may need to scroll to the right to see all info

? Cube
Contest Info
.ssh/ Social Scavenger Hunt
Contest Info
[CANCELED] Hacking Boundary Ship Terminal
Contest Info
$$$$$_<CAPTURE_THE_COIN>_$$$$$
Contest Info
$unL1ght Sh4d0w5
Contest Info
5N4CK3Y
Contest Info
Adversary Wars CTF
Contest Info
AI Art Battle
Contest Info
Aw, man…pages!
Contest Info
Band Camp: Hacker My Music
Contest Info
Battle of the Bots: Vishing Edition
Contest Info
Betting on Your Digital Rights: 4th Annual EFF Benefit Poker Tournament at DEF CON 33
Contest Info
Beverage Cooling Contraption Contest
Contest Info
Blacks In Cybersecurity Village Capture The Flag Competition
Contest Info
Blue Team Village CTF
Contest Info
Bug Bounty Village CTF
Contest Info
Call Center Village Contest
Contest Info
Can it Ham?
Contest Info
Capture The Packet
Contest Info
Car Hacking Village Capture the Flag (CTF)
Contest Info
Cloud Village CTF
Contest Info
CMD+CTRL Cloud Cyber Range
Contest Info
Code Breaker Challenge
Contest Info
Code CRIMSON: Healthcare in Trauma
Contest Info
Creative Writing Short Story Contest
Contest Info
Cryptocurrency Challenge
Contest Info
Cyber Defender – The Game
Contest Info
Cyber Wargames
Contest Info
Cycle Override
Contest Info
Darknet-NG
Contest Info
DARPA’s Artificial Intelligence Cyber Challenge (AIxCC)
Contest Info
DC Sticker Design Contest
Contest Info
DC’s Next Top Threat Model
Contest Info
DEF CON Beard and Mustache Contest
Contest Info
DEF CON CTF
Contest Info
DEF CON MUD
Contest Info
DEF CON Scavenger Hunt
Contest Info
Dozier Drill Lockpicking Challenge
Contest Info
Dungeons@Defcon
Contest Info
EFF Tech Trivia
Contest Info
Embedded CTF
Contest Info
Feet Feud (Hacker Family Feud)
Contest Info
GenSec CTF
Contest Info
Hac-Man
Contest Info
Hack3r Runw@y Contest
Contest Info
Hacker Jeopardy
Contest Info
Hardware Hacking Village CTF
Contest Info
HardWired
Contest Info
HTB CTF: Data Dystopia
Contest Info
ICS Village CTF
Contest Info
Kubernetes CTF
Contest Info
Octopus Game 4: The Order of the White Tentacle
Contest Info
Password Village Contest
Contest Info
Phish Stories
Contest Info
PhreakMe
Contest Info
Pinball High Score Contest
Contest Info
PROJECT ACCESS: A Fox Hunt in the Shadows
Contest Info
Pub Quiz at DEF CON
Contest Info
Radio Frequency Capture the Flag
Contest Info
Raitlin’s Challenge presented by the Illuminati Party®
Contest Info
REALI7Y OVERRUN
Contest Info
Red Alert ICS CTF
Contest Info
Red Team Village CTF
Contest Info
Scambait Village Contest
Contest Info
Silk’s Roadhouse
Contest Info
Social Engineering Community Vishing Competition (SECVC)
Contest Info
spyVspy
Contest Info
Taskmooster
Contest Info
TeleChallenge
Contest Info
The Gold Bug
Contest Info
The Pwnie Awards
Contest Info
Tin Foil Hat Contest
Contest Info
venator aurum
Contest Info
warl0ck gam3z CTF
Contest Info
Whose Slide Is It Anyway?
Contest Info

DEF CON DemoLabs Table

Brief demonstrations for people to show off their project.

One Page All Demolabs list with descriptions

defcon.org DemoLabs page

You may need to scroll to the right to see all info

AIMaL – Artificially Intelligent Malware Launcher
Demolabs Info
AirBleed – Covert Bluetooth Plist Payload Injection
Demolabs Info
Angry Magpie – DLP Bypass Simulator
Demolabs Info
Attack Flow and Root Cause Discovery – No LLMs, No Queries, Just Explainable ML
Demolabs Info
Audience Picked By Popular Demand Demo Lab – TheTimeMachine
Demolabs Info
Audience Picked By Popular Demand Demo Lab
Demolabs Info
Beaconator C2 Framework
Demolabs Info
Blackdagger – Cyber Workflow Automation Framework
Demolabs Info
BOAZ – A Multilayered Approach to AV/EDR Evasion Engineering
Demolabs Info
C4 – Cross Compatible Command and Control
Demolabs Info
Caldera for OT – Oops! All Software
Demolabs Info
Copycat – Identity Stealer Extension
Demolabs Info
Cryptosploit
Demolabs Info
DVBE – Damn Vulnerable Browser Extension
Demolabs Info
Dyna – Automating the OWASP MASTG with Offensive Android Tactics
Demolabs Info
Empire 6.0
Demolabs Info
EntraGoat – A Deliberately Vulnerable Entra ID Environment
Demolabs Info
FLARE-VM
Demolabs Info
Garuda Threat Hunting Framework
Demolabs Info
GlytchC2 – Command Execution and Data Exfiltration of Any Kind Through Live Streaming Platforms
Demolabs Info
Have I Been Ransomed?
Demolabs Info
Lex Sleuther
Demolabs Info
Messenger – Proxies Here There and Everywhere
Demolabs Info
Metasploit’s Latest Attack Capability and Workflow Improvements
Demolabs Info
MPIT – Matrix Prompt Injection Tool and ShinoLLMApps
Demolabs Info
nRootTag – Exploiting Find My and Transforming Computers Into Unauthorized Trackers
Demolabs Info
OAuthSeeker
Demolabs Info
PAPRa
Demolabs Info
PatchLeaks
Demolabs Info
promptmap2
Demolabs Info
RETCON – Reticulum Embedded Turnkey Connection Operating Node
Demolabs Info
RETINA – Realtime Electronic Threat and Intrusion Neutralization Apparatus
Demolabs Info
rev.ng Decompiler
Demolabs Info
Robin – The Archaeologist of the Dark Web
Demolabs Info
SAMLSmith
Demolabs Info
Spotter – Universal Kubernetes Security Scanner and Policy Enforcer
Demolabs Info
Tengu Marauder v2
Demolabs Info
TheTimeMachine
Demolabs Info
Unmanned Wireless Penetration Testing Device
Demolabs Info
WarHead
Demolabs Info

DEF CON Workshops Table

Longer, more detailed, hands on, lasting half a day.
These have limited seating. These will fill up VERY quickly!

One Page All Workshops list with descriptions

defcon.org Workshops page

You may need to scroll to the right to see all info

Sold Out – 64-bit Intel Assembly Language Programming for Hackers
Workshop Info
Sold Out – Accelerating Malware Analysis with WinDbg Time Travel Debugging
Workshop Info
Sold Out – Advanced Ghidra Scripting & Automation
Workshop Info
Sold Out – Analyzing and Creating Windows Shellcode for Hackers
Workshop Info
Sold Out – Cloud Forensics Workshop: Smart Grid Edition
Workshop Info
Sold Out – Contextualizing alerts with relevant logs and events without queries or LLMs
Workshop Info
Sold Out – Creating malicious functional app on Android
Workshop Info
Sold Out – Deep-dive into modern network fingerprinting
Workshop Info
Sold Out – Defeating Malware Evasion: Techniques and Countermeasures
Workshop Info
Sold Out – Disrupting Digital Dataflows: A 101 on how 2 detect, analyze, & disrupt digital systems by reverse engineering real-world Electronic Warfare techniques from Ukraine at the hardware level
Workshop Info
Sold Out – Dive into Windows Library Loading
Workshop Info
Sold Out – DIY Malware Emulation: Build It, Break It, Detect It
Workshop Info
Sold Out – Effectively Detecting Modern Malware with Volatility 3
Workshop Info
Sold Out – Eliminating Bug Classes at Scale: Leveraging Browser Features for Proactive Defense
Workshop Info
Sold Out – EMMC BGA Secrets, hack bga memory, no reballing necessary: Learn how to safely remove EMMC memory modules, hack them and then reinstall, without the difficult process of trying to reball the BGA.
Workshop Info
Sold Out – Fine Tune your personal LLM assistant to Secure coding
Workshop Info
Sold Out – Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems
Workshop Info
Sold Out – From Prompt to Protection: A Practical Guide to Building and Securing Generative AI Applications
Workshop Info
Sold Out – Hacker VPN
Workshop Info
Sold Out – Hacking the connected plant: AI edition!
Workshop Info
Sold Out – Hacking The Metal: Into the GPU
Workshop Info
Sold Out – Hands-on IoT firmware extraction and flash forensics
Workshop Info
Sold Out – Hands-on Kubernetes Attack & Defense Masterclass
Workshop Info
Sold Out – Hands-On Threat Hunting with Wireshark
Workshop Info
Sold Out – Inside the Threat: Designing and Deploying Malicious Browser Extensions to Understand Their Risk
Workshop Info
Sold Out – Introduction to Cryptographic Attacks
Workshop Info
Sold Out – K8sploitation: Hacking Kubernetes the Fun Way
Workshop Info
Sold Out – Learning to Hack Bluetooth Low Energy with BLE CTF
Workshop Info
Sold Out – Medical Device Hacking: 201
Workshop Info
Sold Out – Obfuscation Reloaded: Modern Techniques for Evading Detection
Workshop Info
Sold Out – Open Source Malware 101 – Everything you always wanted to know about npm malware (and more)
Workshop Info
Sold Out – Pen-testing Cloud REST APIs
Workshop Info
Sold Out – PLC Playground: Hands-On Industrial Control Systems Attacks
Workshop Info
Sold Out – Practical YARA: Crafting Custom Rules for Targeted Malware Defense
Workshop Info
Sold Out – Provably exfiltrating data by breaking TLS in the right ways
Workshop Info
Sold Out – Putting EDRs in Their Place: Killing and Silencing EDR Agents
Workshop Info
Sold Out – Reach the Nirvana
Workshop Info
Sold Out – SnowGoat: Exposing Hidden Security Risks and Leaking Data Like a Threat Actor
Workshop Info
Sold Out – Whitebox Web Exploit Dev (WWED)
Workshop Info
Sold Out – Wi-Fi-So-Serious
Workshop Info

DC Paid Training Table

2 day training sessions on the Mon and Tue after DEF CON. There will be an additional cost for these.

One Page All Paid Training list with descriptions

DEF CON 33 Training Signup Pages

You may need to scroll to the right to see all info

A Complete Practical Approach to Malware Analysis & Threat Hunting Using Memory Forensics
Training Info
A Practical Approach to Breaking & Pwning Kubernetes Clusters
Training Info
Active Directory Attacks for Red and Blue Teams – Advanced Edition
Training Info
Advanced Cloud Incident Response in Azure and Microsoft 365
Training Info
Adversarial Thinking: The Art of Dangerous Ideas
Training Info
AI SecureOps: Attacking & Defending AI Applications and Services
Training Info
Attack and Defend Software Supply Chain
Training Info
Attacking & Securing CI/CD Pipeline Certification (ASCPC) by White Knight Labs
Training Info
Azure Cloud Attacks for Red & Blue Teams – Beginner Edition
Training Info
Beginner’s Guide to Attacks and Defenses
Training Info
BRIDGING THE GAP – An Introduction to IoT Security from Serial to Bluetooth
Training Info
Deep Dive into Fuzzing
Training Info
Dodging the EDR bullet: A Training on Malware Stealth Tactics
Training Info
Everyday Ghidra: Practical Windows Reverse Engineering
Training Info
Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access
Training Info
Hack the Connected Plant!
Training Info
Hacking Cryptography: Attacks, Tools, and Techniques
Training Info
Hacking Modern Web Apps: Master the Future of Attack Vectors
Training Info
Hands-on Car Hacking & Automotive Cybersecurity
Training Info
Harnessing LLMs for Application Security
Training Info
Hunting for Hackers by Deloitte
Training Info
Influence Operations: Tactics, Defense, and Exploitation
Training Info
Loudmouth Security – Offensive IoT Exploitation
Training Info
Medical Device Penetration Testing
Training Info
Offensive Cyber Security Operations: Mastering Breach and Adversarial Attack Simulation Engagements
Training Info
Offensive Development Practitioner Certification (On-Site) by White Knight Labs
Training Info
RFID and Electronic Physical Access Control System Hacking
Training Info
Simulated Adversary: Tactics & Tools Training
Training Info
SOC 101 – SOC 1 Analyst Bootcamp
Training Info
Software Defined Radios 101
Training Info
Solving Modern Cybersecurity Problems with AI
Training Info
Windows Payload Development: EDR Evasion and Initial Access Tradecraft
Training Info

DC Party,Gather,Event Table

Various Parties, Gatherings, and Events

One Page All Parties, Gatherings, Events list with descriptions

defcon.org Parties, Meetups, and Events page

You may need to scroll to the right to see all info

+61: the Australian Embassy
Event Info
Arcade Party
Event Info
BlanketFort Con
Event Info
Book Signing – Adversary Emulation with MITRE ATT&CK – Drinor Selmanaj
Event Info
Book Signing – Alex Matrosov/No Starch Press
Event Info
Book Signing – Alfie Champion/No Starch Press
Event Info
Book Signing – Breaking IN: A Practical Guide To Starting a Career In Information Security Cybersecurity Essentials For Startups : A Practical Guide – Ayman Elsawah
Event Info
Book Signing – Casey Erdman/No Starch Press
Event Info
Book Signing – Corey Ball/No Starch Press
Event Info
Book Signing – Cyber Calendar 2026 – Chris DeCarmen/Squared Away LLC
Event Info
Book Signing – Daniel Reilly/No Starch Press
Event Info
Book Signing – Eugene Lim/ No Starch Press
Event Info
Book Signing – Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (5th ed) – Carey Parker
Event Info
Book Signing – Fotis Chantizis/ No Starch Press
Event Info
Book Signing – Future of Hacking: The Rise of Cybercrime and the Fight to Keep Us Safe – Laura S. Scherling, EdD / Bloomsbury
Event Info
Book Signing – Ghost Hacker : How to hack human spirit – Jun Kawasaki
Event Info
Book Signing – Hunter Scott/No Starch Press
Event Info
Book Signing – Jason Andress/ No Starch Press
Event Info
Book Signing – Jon DiMaggio/ No Starch Press
Event Info
Book Signing – JP Ausmasson/No Starch Press
Event Info
Book Signing – Kara Nance/No Starch Press
Event Info
Book Signing – Kurtis Minder
Event Info
Book Signing – Kyle Cucci/No Starch Press
Event Info
Book Signing – Lindsay Kay / No Strach Press
Event Info
Book Signing – Micah Lee/ No Starch Press
Event Info
Book Signing – Nick Aleks/No Starch Press
Event Info
Book Signing – Patrick Wardle/ No Starch Press
Event Info
Book Signing – Paulino Calderon/No Starch Press
Event Info
Book Signing – Philip Dursey/No Starch Press
Event Info
Book Signing – Phrack / No Starch Press
Event Info
Book Signing – Practical Lock Picking; Keys to the Kingdom – Deviant Ollam/Red Team Tools
Event Info
Book Signing – Supply Chain Software Security-AI, IoT and Application Security – Aamiruddin Syed/Apres Media LLC
Event Info
Book Signing – The Browser Security Field Manual Adeline – Audrey Adeline
Event Info
Book Signing – The Hacker Mindset: A 5-Step Methodology for Cracking the System and Achieving Your Dreams – Garrett Gee/Hacker Warehouse
Event Info
Book Signing – Travis Goodspeed/No Starch Press
Event Info
Call Center Village Party
Event Info
Conference Planners Meetup
Event Info
Cyberdelia Rave
Event Info
Darknet Diaries x DCG Meet up
Event Info
Day of the Dead Hacker Party
Event Info
DC Book Club Discussion
Event Info
DC NextGen
Event Info
DC404/DC678/DC770/DC470 (Atlanta Metro) Meetup
Event Info
DC702 Meetup
Event Info
DCG312 Meetup: Windy City Hackers Take Vegas
Event Info
DEF CON Holland Group Presents: 
Drinking with the Dutch
Event Info
Defcon.run
Event Info
Free Ham Radio Exams
Event Info
Friends of Bill W
Event Info
GOTHCON
Event Info
Hacker Karaoke
Event Info
Human Registration Open
Event Info
IoT Village: 10 Years. 1,000 Devices. Infinite Vulns. (IoT Village 10th Birthday Party)
Event Info
Jack Rhysider, Ray [REDACTED] and more 1337 hackers! DXNextGen Meet and Greet
Event Info
Lawyers Meet
Event Info
Linecon
Event Info
Lost & Found
Event Info
Merch (formerly swag) Area Open — README
Event Info
Movie Night
Event Info
Music Set / Entertainment (Chillout Stage, Friday)
Event Info
Music Set / Entertainment (Chillout Stage, Saturday)
Event Info
Music Set / Entertainment (Chillout Stage, Thursday)
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Packet Hacking Village Music
Event Info
Policy @ DEF CON Mixer
Event Info
Queercon Mixer
Event Info
Spades Tournament & Game Night Social
Event Info
Sticker Swap at DEF CON 33
Event Info
The DEF CON Pool Party
Event Info
The Illuminati Party
Event Info
The Jasmine Dragon
Event Info
The KEVOPS Sellout Pool Party
Event Info
The Unofficial DEF CON Shoot
Event Info
Toxic BBQ
Event Info
Um, ACKtually…
Event Info
VETCON 2025 Party
Event Info
Walking Tour Groups
Event Info
WISP + Blue Team Village Movie Night and Mixer
Event Info
Women, gender non-conforming and non-binary meetup with The Diana Initiative
Event Info

DEF CON Vendors Table

List by name of the Vendors that will be in the Vendor area at DEF CON 33

One Page All Vendors list with descriptions

defcon.org Vendors page

Arts and Ent.
Vendor Info
Cryptocurrency Advocate
Vendor Info
deepnet LLC
Vendor Info
Electronic Cats
Vendor Info
Electronic Frontier Foundation (EFF)
Vendor Info
EXPLIoT
Vendor Info
FREE WiLi – Intrepid Control Systems Inc
Vendor Info
HackerBoxes
Vendor Info
HackerWarehouse
Vendor Info
Hak5 LLC
Vendor Info
iFixit
Vendor Info
Keyport
Vendor Info
Killchainz Clothing
Vendor Info
M2 Powered Partners LLC
Vendor Info
Mar Williams
Vendor Info
Midwest Gadgets LLC
Vendor Info
Miscreants, LLC
Vendor Info
No Starch Press, Inc
Vendor Info
Nuand LLC
Vendor Info
Octopwn GmbH
Vendor Info
PhysSec Education
Vendor Info
Rabbit-Labs
Vendor Info
Red Team Tools
Vendor Info
REKCAH Publishing
Vendor Info
Rogue’s Roost, LLC
Vendor Info
Rokland LLC
Vendor Info
Salty Security
Vendor Info
Shadowvex Industries
Vendor Info
SOK
Vendor Info
Sparrows Manufacturing Co
Vendor Info
The Calyx Institute
Vendor Info
The Open Organisation of Lockpickers (TOOOL)
Vendor Info
The Tor Project, Inc.
Vendor Info
Women in Security and Privacy
Vendor Info
Xcape, Inc.
Vendor Info

DEF CON Exhibitors Table

List by name of the Exhibitors that will be in the Exhibitor area at DEF CON 33

One Page All Exhibitors list with descriptions

defcon.org Exhibitors page

You may need to scroll to the right to see all info

Altered Security
Exhibitor Info
Authentik
Exhibitor Info
Black Hills
Exhibitor Info
Bugcrowd
Exhibitor Info
Capitol Technology University
Exhibitor Info
Formal
Exhibitor Info
Hack The Box
Exhibitor Info
Promptfoo
Exhibitor Info
The SecOps Group
Exhibitor Info
Triad Secure
Exhibitor Info
US Army xTech
Exhibitor Info

DEF CON Communities Table

A group of people with common interests, but don’t qualify as a Village, is a Community,

One Page All Communities list with descriptions

defcon.org Communities page

You may need to scroll to the right to see all info

.edu Community
Community Info
Badgelife
Community Info
BBWIC Foundation
Community Info
Code Breaker
Community Info
Cryptocurrency Community
Community Info
DC Maker’s Community
Community Info
DC NextGen
Community Info
DDoS Community
Community Info
DEF CON Academy
Community Info
DEF CON Groups (DCG)
Community Info
DEF CON Groups VR (DCGVR)
Community Info
Friends of Bill W
Community Info
Hackers With Disabilities (HDA)
Community Info
Hackers.town
Community Info
Hard Hat Brigade
Community Info
Illumicon
Community Info
La Villa
Community Info
Lonely Hackers Club
Community Info
Loong Community
Community Info
Memorial Chamber
Community Info
Mobile Hacking Community
Community Info
Nix Vegas Community
Community Info
NMDP (formerly Be The Match)
Community Info
Noob Community
Community Info
Operating Systems Community
Community Info
OWASP
Community Info
Queercon Community Lounge
Community Info
Retro Tech Community
Community Info
The Diana Initiative
Community Info
The Diana Initiative’s Quiet Room
Community Info
VETCON
Community Info
Women in Security and Privacy (WISP)
Community Info

Links to DEF CON 33 related pages


Links

DEF CON . org Links

DEF CON Main page
DEF CON 33 Home Page
DEF CON FAQ
DEF CON Recent News
DEF CON 33 Venue
DEF CON 33 Training Signup
DEF CON 33 Contests
DEF CON CTF Nautilus Institute, Twitter @Nautilus_CTF
DEF CON 33 Villages
DEF CON 33 Communities
DEF CON 33 Parties, Meets, Events
DEF CON YouTube channel, prev years talks

DEF CON 33 Planning Forum page ( limited official use )


Thanks to the NFO Node crew for providing access to their backend database. <claps> to their hard work!

Combined Schedules of DEF CON, Villages, and everything else DC33


Hacker Tracker - Android and IOS - the official DEF CON schedule app
The ONE! - A consolidated DEFCON 33 schedule in multiple file formats - html, PDF, CSV, ICAL, epub, mobi, Google calendar
info.defcon.org - the official DEF CON NFO Node site


Other Interesting Links

DEF CON 33 Planning Highlights (URLs of note)
DEF CON Hackers with Disabilities Forum Topic - DC33 HDA for DC33 thread
@defconparties - calendar
defconmusic - Schedule/News from the DC Artists & Entertainment ( A&E ) Department
Official SoundTrack
DEFCONorg Twitch stream
defconmusic DEF CON Entertainment Twitch stream
defconmusic YouTube channel
DCTV - DEF CON TV: Twitch streams and Hotel TV channels
#badgelife spreadsheet of unofficial badges for DC33
@qumqats Twitter List of Village accounts to assist in watching Village happenings

Other cons during #SummerHackerCamp
Blackhat BS @BlackHatEvents @BlackHatEvents FB Black Hat Events
BSides Las Vegas BS @BSidesLV @BSidesLV FB @BSidesLV
The Diana Initiative BS @Dianainitiative @Dianainitiative FB @dianainitiative

Guides/Tips/FAQs

The Definitive Guide to DEF CON
DEF CON A&E - Resources - Rough Distances and Maps
DEF CON A&E - Resources - Packing List
Guide to Attending DEF CON 31
How to Survive Def Con 2022
OpSec For DEF CON 30
DCG 201 Hacker Double Summer 2023 Guides
Birds of a Feather-Resources for 2022 Hacker Summer Camp
Lonely Hackers Club - DEF CON n00b guide  -  reddit thread
The Lost Policymaker's Guide to Hacker Summer Camp
Holon DEF CON 30 Preparation
DEF CON: The Survival Guide
Preparing for "Hacker Summer Camp"

General / previous years
DEF CON for N00bs
JK-47 - BSidesLV & DEFCON Conference Tips
Just another DEF CON guide
HACKER SUMMER CAMP 2018 GUIDE
On Attending DefCon