PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:30 |
Secret Life of an Automationist: Engineering the H . . .
|
Gunnar "g0lden" Andrews |
10:00 - 10:59 |
Prompt. Scan. Exploit: AI’s Journey Through Zero . . .
|
Diego "djurado" Jurado,Jo . . . |
10:00 - 10:59 |
Becoming a Caido Power User
|
Justin "rhynorater" Gardn . . . |
11:00 - 11:59 |
Attacking AI
|
Jason "jhaddix" Haddix |
12:00 - 12:59 |
Voices from the Frontlines: Managing Bug Bounties . . .
|
Gabriel Nitu,Jay Dancer,T . . . |
12:00 - 12:59 |
Nuclei: Beyond The Basic Templates
|
Ben "nahamsec" Sadeghipou . . . |
13:30 - 14:30 |
Creator Panel Discussion
|
Ben "nahamsec" Sadeghipou . . . |
14:00 - 14:59 |
Securing Intelligence: How hackers are breaking mo . . .
|
Dane Sherrets,Shlomie Lib . . . |
14:30 - 15:30 |
Testing Trust Relationships: Breaking Network Boun . . .
|
Michael Gianarakis,Jordan . . . |
15:30 - 15:59 |
The Year of the Bounty Desktop: Bugs from Binaries
|
Parsia "CryptoGangsta" Ha . . . |
16:00 - 16:30 |
To Pay or Not to Pay? The Battle Between Bug Bount . . .
|
Aaron "scriptingxss" Guzm . . . |
16:30 - 16:59 |
Hacking the Edge: Real-World ESI Injection Exploit . . .
|
Robert "nytr0gen" Vulpe |
17:00 - 17:30 |
VRP @ Google -- a look inside a large self-hosted . . .
|
Sam "erbbysam" Erb |
17:30 - 17:59 |
Exploiting the Off-chain ecosystem in Web 3 Bug Bo . . .
|
Bruno "BrunoModificato" H . . . |
| | |
Saturday |
|
|
10:00 - 10:59 |
Nuclei: Beyond The Basic Templates
|
Ben "nahamsec" Sadeghipou . . . |
10:00 - 10:59 |
The Ars0n Framework V2 Beta
|
Harrison "rs0n" Richardso . . . |
11:00 - 11:59 |
Magical Hacks
|
Inti "intidc" De Ceukelai . . . |
12:00 - 12:30 |
Sometimes you find bugs, sometimes bugs find you
|
Jasmin "JR0ch17" Landry |
12:00 - 12:59 |
From Component to Compromised: XSS via React creat . . .
|
Nick Copi |
13:00 - 13:59 |
Breaking the Chain: Advanced Offensive Strategies . . .
|
Roni "lupin" Carta,Adnan . . . |
13:00 - 14:30 |
Surfing through the Stream: Advanced HTTP Desync e . . .
|
Martin "tincho_508" Doyhe . . . |
15:00 - 15:30 |
Referral Beware, Your Rewards Are Mine
|
Whit "un1tycyb3r" Taylor |
15:00 - 16:30 |
Platform Panel about Triage
|
Michelle Lopez,Michael "c . . . |
16:30 - 17:30 |
Hacking the Graph: Advanced Target Discovery with . . .
|
Jeff "caffix" Foley |
17:30 - 17:59 |
Cheat Code for Hacking on T-Mobile: From Inside th . . .
|
Elisa Gangemi |
| | |
Sunday |
|
|
10:00 - 10:59 |
Bug Bounty Village Social Hour
|
|
11:00 - 11:59 |
Hacker vs. Triage: Inside the Bug Bounty Battlegro . . .
|
Richard "richeeta" Hyunho . . . |
11:00 - 11:30 |
Hacking at Scale with AI Agents: Building an Auton . . .
|
Vanshal Gaur |
11:00 - 11:30 |
Full Disclosure, Full Color: Badge-making story of . . .
|
Abhinav Pandagale |
11:30 - 11:59 |
Portswigger Awards: Top 10 web hacking techniques . . .
|
Portswigger |
12:00 - 12:59 |
Bug Bounty Village CTF Walkthrough
|
CTF.ae |
13:00 - 13:30 |
Bug Bounty Village CTF Awards
|
Bug Bounty Village Staff, . . . |
13:30 - 13:59 |
Bug Bounty Village Closing Ceremony
|
Bug Bounty Village Staff |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:50 |
AML Cryptocurrency Compliance
|
Joseph,Chelsea Button |
10:00 - 17:59 |
WipeOut XL hi-score tournament
|
|
10:00 - 17:59 |
Career Fair: Interview Tips and Referral
|
Krity Kharbanda,Aastha Sa . . . |
10:15 - 10:59 |
Silent Sabotage: How Nation-State Hackers Turn Hum . . .
|
Nathan Case,Jon McCoy |
10:00 - 17:59 |
Memorial Chamber Open
|
|
11:00 - 11:59 |
Cryptocurrency Opening Keynote
|
Michael "MSvB" Schloh von . . . |
12:00 - 13:50 |
Red Teaming Financial Defenses
|
Wei Hong,Chloe Chong |
12:00 - 12:59 |
Tunnelpocalypse
|
Rich Compton |
13:00 - 13:59 |
Rebuild The World: Access to secure software depen . . .
|
Tom Berek,Farid Zakaria,D . . . |
14:00 - 15:50 |
Evolution and History of Drain and Approval Attack . . .
|
utvecklas,George |
14:00 - 14:30 |
Off-Grid Datarunning in Oppresive Regimes: Sneaker . . .
|
Robert "LambdaCalculus" M . . . |
14:45 - 15:30 |
Introduction of Loong Community & Financial Identi . . .
|
Noel Wong,KC Wong |
15:30 - 16:30 |
EFF/Hackers.town RayHunter build clinic
|
|
15:30 - 15:59 |
Grind vs Gleam: Building Reddit's DDoS Resilience
|
Pratik Lotia,Spencer Koch |
16:00 - 17:50 |
Applied Cryptocurrency Hardware
|
Param D Pithadia,Michael . . . |
16:30 - 16:59 |
Quiet Confidence: An Introvert's Journey to Techni . . .
|
Emma Fang |
17:00 - 17:59 |
Badgelife: Lessons from Years of Do’s, Don’ts, . . .
|
Abhinav Pandagale,MakeItH . . . |
| | |
Saturday |
|
|
10:00 - 11:50 |
Cryptocurrency Enforcement Actions
|
Veronika,Chelsea Button |
10:00 - 17:59 |
Career Fair: Resume Review
|
Ruchira Pokhriyal,Harini . . . |
10:15 - 10:59 |
Private, Private, Private: Access Everywhere
|
Meghan Jacquot |
10:00 - 17:59 |
Memorial Chamber Open
|
|
11:00 - 11:59 |
Cryptocurrency Weekend Keynote
|
Chelsea Button,Nick "c7fi . . . |
12:00 - 13:50 |
Hacking Custody and Exchanges
|
Sky Gul,Andrea |
12:00 - 12:59 |
Rayhunter Internals
|
oopsbagel,Cooper "CyberTi . . . |
12:00 - 12:59 |
DDoS: The Next Generation
|
Andrew Cockburn |
14:00 - 15:50 |
Oblivious Access to Blockchains
|
Elaine Shi,Afonso Tinoco |
14:30 - 14:59 |
#ReclaimTech - A community movement
|
Janet Vertesi,Andy Hull |
14:00 - 14:30 |
Surviving the Dataclysm: Resistance through Resili . . .
|
Rebecah Miller |
14:00 - 14:30 |
Tech Reclaimers
|
|
16:00 - 17:50 |
Cryptocurrency Nodes and Relays
|
Diego "rehrar" Salazar,Da . . . |
17:00 - 17:59 |
Breaking In: Real Paths Into Cybersecurity from Ha . . .
|
Eva Benn,Rosie "Lady Cybe . . . |
| | |
Sunday |
|
|
10:00 - 11:50 |
Let's Break Enigma!
|
Rigo Salazar,Luke Szramow . . . |
10:00 - 13:59 |
Memorial Chamber Open
|
|
11:00 - 11:45 |
Creating Integrated Threat Surveillance: AI + OSIN . . .
|
Desiree Wilson |
12:00 - 13:50 |
Self Custodial Wallet Use
|
HalFinneyIsMyHomeBoy |
12:00 - 12:59 |
Passing the Torch: Mentoring and Protecting Our St . . .
|
Sam Comini,Navaar Johnson |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:20 |
Welcome to DEF CON 33!
|
Jeff "The Dark Tangent" M . . . |
10:30 - 11:15 |
DC101 Panel
|
|
10:00 - 10:45 |
Remote code execution via MIDI messages
|
Anna portasynthinca3 Anto . . . |
10:00 - 10:45 |
BitUnlocker: Leveraging Windows Recovery to Extrac . . .
|
Alon "alon_leviev" Leviev . . . |
10:00 - 10:20 |
Paywall Optional: Stream for Free with a New Techn . . .
|
Farzan Karimi |
10:30 - 11:15 |
No VPN Needed? Cryptographic Attacks Against the O . . .
|
Tom Tervoort |
10:00 - 10:45 |
The One Bitcoin Heist: Making a custom Hashcat mod . . .
|
Joseph "stoppingcart" Gab . . . |
11:00 - 11:45 |
Virtualization-Based (In)security - Weaponizing VB . . .
|
Ori David |
11:30 - 12:15 |
ChromeAlone: Transforming a Browser into a C2 Plat . . .
|
Michael "bouncyhat" Weber |
11:00 - 11:45 |
Inside Look at a Chinese Operational Relay Network
|
Michael "mtu" Torres,Zane . . . |
12:30 - 13:15 |
Ghosts in the Machine Check - Conjuring Hardware F . . .
|
Christopher "xoreaxeaxeax . . . |
12:00 - 12:45 |
Ghost Calls: Abusing Web Conferencing for Covert C . . .
|
Adam "UNC1739" Crosser |
12:00 - 12:45 |
Safe Harbor or Hostile Waters: Unveiling the Hidde . . .
|
Ji'an "azraelxuemo" Zhou, . . . |
12:30 - 13:15 |
Cash, Drugs, and Guns: Why Your Safes Aren't Safe
|
Mark Omo,James Rowley |
12:00 - 12:20 |
The Ultimate Hack: Applying Lessons Learned from t . . .
|
Rear Admiral John Mauger |
12:30 - 13:15 |
Edge of Tomorrow: Foiling Large Supply Chain Attac . . .
|
Maksim Shudrak |
13:30 - 14:15 |
Recording PCAPs from Stingrays With a $20 Hotspot
|
Cooper "CyberTiger" Quint . . . |
13:00 - 13:45 |
What is Dead May Never Die: The Ghost of Internet . . .
|
George Hughey,Rohit Mothe |
13:00 - 13:45 |
Advanced Active Directory to Entra ID lateral move . . .
|
Dirk-jan Mollema |
13:30 - 14:15 |
Dead Made Alive Again: Bypassing Intent Destinatio . . .
|
Qidan "flanker_hqd" He |
13:30 - 14:15 |
Weaponizing Trust: Investigating a Threat Actor Ta . . .
|
Christophe Tafani-Dereepe . . . |
14:00 - 14:45 |
DisguiseDelimit: Exploiting Synology NAS with Deli . . .
|
Ryan Emmons |
14:00 - 14:45 |
You snooze you lose: RPC-Racer winning RPC endpoin . . .
|
Ron Ben Yizhak |
14:30 - 15:15 |
Siri-ously Leaky: Exploring Overlooked Attack Surf . . .
|
Richard "richeeta" Hyunho . . . |
14:30 - 15:15 |
Firewalls Under Fire: China's 5+ year campaign to . . .
|
Andrew "Spike" Brandt |
15:30 - 16:15 |
Mastering Apple's Endpoint Security for Advanced m . . .
|
Patrick Wardle |
15:00 - 15:45 |
Gateways to Chaos - How We Proved Modems Are a Tic . . .
|
Chiao-Lin "Steven Meow" Y . . . |
15:00 - 15:45 |
From Spoofing to Tunneling: New Red Team's Network . . .
|
Shu-Hao, Tung 123ojp |
15:30 - 16:15 |
Unmasking the Snitch Puck: the creepy IoT surveill . . .
|
Reynaldo "buh0",nyx |
15:30 - 16:15 |
So Long, and Thanks for All the Phish
|
Harrison Sand,Erlend Leik . . . |
16:30 - 17:15 |
HTTP/1.1 Must Die! The Desync Endgame
|
James "albinowax" Kettle |
16:00 - 16:45 |
The (Un)Rightful Heir: My dMSA Is Your New Domain . . .
|
Yuval Gordon |
16:00 - 16:45 |
Infecting the Boot to Own the Kernel: Bootkits and . . .
|
Alejandro "TheMalwareGuar . . . |
16:30 - 17:15 |
Escaping the Privacy Sandbox with Client-Side Dean . . .
|
Eugene "spaceraccoon" Lim |
16:30 - 16:50 |
Killing Killnet
|
Alex Holden |
17:30 - 17:50 |
Rusty pearls: Postgres RCE on cloud databases
|
Tal "TLP" Peleg,Coby Abra . . . |
17:00 - 17:45 |
Orion - fuzzing workflow automation
|
Max Bazalii,Marius Fleisc . . . |
17:00 - 17:45 |
Emulating Embedded Linux Devices at Scale with Lig . . .
|
Sigusr Polke |
17:30 - 17:50 |
Silent Leaks: Harvesting Secrets from Shared Linux . . .
|
Cernica Ionut Cosmin |
17:00 - 17:45 |
Building a Malware Museum
|
Mikko Hypponen |
| | |
Saturday |
|
|
10:00 - 10:45 |
AppleStorm - Unmasking the Privacy Risks of Apple . . .
|
Yoav Magid |
10:00 - 10:20 |
Turning Camera Surveillance on its Axis
|
Noam Moshe |
10:30 - 11:15 |
One Modem to Brick Them All: Exploiting Vulnerabil . . .
|
Marcell Szakály,Jan "SP3 . . . |
10:00 - 10:20 |
Binary Facades: Reversing approaches to extract em . . .
|
Patrick Wardle |
10:30 - 11:15 |
Kill Chain Reloaded: Abusing legacy paths for stea . . .
|
Alejandro "0xedh" Hernand . . . |
10:00 - 10:45 |
Where’s My Crypto, Dude? The Ultimate Guide to C . . .
|
Thomas "fr0gger_" Roccia |
11:00 - 11:45 |
How to secure unique ecosystem shipping 1 billion+ . . .
|
Adam "pi3" Zabrocki,Marko . . . |
11:00 - 11:45 |
The DOMino Effect: Automated Detection and Exploit . . .
|
Zhengyu Liu,Jianjia Yu |
11:30 - 12:15 |
Breakin 'Em All – Overcoming Pokemon Go's Anti-C . . .
|
Tal Skverer |
11:30 - 12:15 |
Original Sin of SSO: macOS PRT Cookie Theft & Entr . . .
|
Shang-De "HackerPeanutJoh . . . |
11:00 - 11:45 |
Man-in-the-Malware: Intercepting Adversarial Commu . . .
|
Ben "polygonben" Folland |
12:00 - 12:45 |
Client or Server? The Hidden Sword of Damocles in . . .
|
Ji'an "azraelxuemo" Zhou, . . . |
12:00 - 12:45 |
Help! Linux in my Webcam! (•_•)
|
Mickey Shkatov,Jesse Mich . . . |
12:30 - 13:15 |
Claude--Climbing a CTF Scoreboard Near You
|
Keane Lucas |
12:30 - 13:15 |
Diamonds Are For Hackers - Building the first full . . .
|
Mark "LargeCardinal" Carn . . . |
12:00 - 12:45 |
Not Just a Pipeline Leak: Reconstructing the Real . . .
|
Aviad Hahami |
13:00 - 13:45 |
Hackers Dropping Mid-Heist Selfies: LLM Identifies . . .
|
Olivier Bilodeau,Estelle . . . |
13:00 - 13:45 |
Thinking Like a Hacker in the Age of AI
|
Richard "neuralcowboy" Th . . . |
13:30 - 14:15 |
One Key, Two Key, I Just Stole Your goTenna Key
|
Erwin "Dollarhyde" Karinc . . . |
13:30 - 14:15 |
CTRAPS: CTAP Impersonation and API Confusion Attac . . .
|
Marco Casagrande,Daniele . . . |
13:00 - 13:45 |
Stories from a Tor dev
|
Roger "arma" Dingledine |
14:00 - 14:20 |
RATs & Socks abusing Google Services
|
Valerio "MrSaighnal" Ales . . . |
14:30 - 14:50 |
HaKCing OBD-II Emissions Testing
|
Archwisp |
14:00 - 14:45 |
Rebadged, Relabeled, and Rooted: Pwnage via the So . . .
|
Anthony "Coin" Rose,Jake . . . |
14:30 - 15:15 |
ReVault! Compromised by your Secure SoC
|
Philippe "phLaul" Laulher . . . |
14:30 - 16:15 |
Ask EFF
|
Hannah Zhao,Alexis Hancoc . . . |
14:00 - 14:45 |
TSPU: Russia's Firewall and Defending Against the . . .
|
Benjamin "bmixonbaca" Mix . . . |
15:00 - 15:45 |
Browser Extension Clickjacking: One Click and Your . . .
|
Marek Tóth |
15:00 - 15:20 |
Shaking Out Shells with SSHamble
|
HD Moore |
15:30 - 16:15 |
Metal-as-a-Disservice: Exploiting Legacy Flaws in . . .
|
Bill Demirkapi |
15:30 - 16:15 |
Zero Trust, Total Bust - Breaking into thousands o . . .
|
David "johnnyspandex" Cas . . . |
15:00 - 15:45 |
Ghosts of REvil: An Inside Look with the Hacker Be . . .
|
Jon DiMaggio,John Fokker |
16:00 - 16:45 |
Turning Microsoft's Login Page into our Phishing I . . .
|
Keanu "RedByte" Nys |
16:30 - 17:15 |
Direct Memory, Access Everywhere
|
Joe "securelyfitz" FitzPa . . . |
16:30 - 17:15 |
De-Virtualizing the Dragon: Automated Unpacking an . . .
|
Agostino "Van1sh" Panico |
16:30 - 17:15 |
7 Vulns in 7 Days: Breaking Bloatware Faster Than . . .
|
Leon "leonjza" Jacobs |
16:00 - 16:45 |
"We are currently clean on OPSEC": The Signalgate . . .
|
Micah "micahflee" Lee |
17:00 - 17:45 |
Blind Trailer Shouting
|
Ben Gardiner |
17:30 - 17:50 |
Hacking Hotspots: Pre-Auth Remote Code Execution, . . .
|
Edward "Actuator" Warren |
17:30 - 17:50 |
Voice Cloning Air Traffic Control: Vulnerabilities . . .
|
Andrew "Helicopters of DC . . . |
17:30 - 17:50 |
OverLAPS: Overriding LAPS Logic
|
Antoine Goichot |
17:00 - 17:45 |
Amber64: Mining Hacker History from Over Half a Mi . . .
|
Wesley McGrew |
| | |
Sunday |
|
|
10:00 - 10:45 |
Invitation Is All You Need! Invoking Gemini for Wo . . .
|
Ben Nassi,Or "oryair1999" . . . |
10:00 - 10:45 |
SSH-nanigans: Busting Open the Mainframes Iron For . . .
|
Philip "Soldier of FORTRA . . . |
10:00 - 10:20 |
From Shanghai to the Shore: The Silent Threat in G . . .
|
Kenneth Miltenberger,Nich . . . |
10:30 - 11:15 |
Can't Stop the ROP: Automating Universal ASLR Bypa . . .
|
Bramwell Brizendine |
10:00 - 10:20 |
Mind the Data Voids: Hijacking Copilot Trust to De . . .
|
Tobias "ItsSixtyNein" Die . . . |
10:30 - 11:15 |
Jailbreaking the Hivemind: Finding and Exploiting . . .
|
Agostino "Van1sh" Panico |
10:00 - 10:45 |
Cyber Volunteering and Community Defense - DEF CON . . .
|
Sarah Powazek,Jake Braun, . . . |
11:00 - 11:45 |
Playing Dirty Without Cheating - Getting Banned fo . . .
|
Sam Collins,Marius Muench . . . |
11:00 - 11:45 |
Journey to the center of the PSTN: How I became a . . .
|
Enzo Damato |
11:30 - 12:15 |
Passkeys Pwned: Turning WebAuthn Against Itself
|
Shourya Pratap Singh,Jonn . . . |
11:30 - 12:15 |
Breaking Wi-Fi Easy Connect: A Security Analysis o . . .
|
George "sophron" Chatziso . . . |
11:00 - 11:45 |
Kill List: Hacking an Assassination Site on the Da . . .
|
Carl Miller,Chris Monteir . . . |
12:00 - 12:45 |
Phrack Panel
|
|
12:00 - 12:45 |
Turning your Active Directory into the attacker’ . . .
|
Quentin "croco_byte" Rola . . . |
12:30 - 13:15 |
Win-DoS Epidemic: A crash course in abusing RPC fo . . .
|
Or "oryair1999" Yair,Shah . . . |
12:30 - 13:15 |
Silent Signals: Exploiting Security and Privacy Si . . .
|
Gabriel Gegenhuber,Maximi . . . |
12:00 - 12:45 |
Carding, Sabotage & Survival: A Darknet Market Vet . . .
|
Godman666 |
13:30 - 13:50 |
Planting C4: Cross-Compatible External C2 for All . . .
|
Scott "ScottCTaylor12" Ta . . . |
13:30 - 14:15 |
SCCM: The tree that always bears bad fruits
|
Mehdi "kalimer0x00" Elyas . . . |
13:00 - 13:45 |
Unexpected Connections: How a vulnerability in obs . . .
|
Eaton Zveare,Roshan Piyus . . . |
13:30 - 14:59 |
Contest Closing Ceremonies & Awards
|
|
14:00 - 14:20 |
Loading Models, Launching Shells: Abusing AI File . . .
|
Cyrus Parzian |
14:00 - 14:20 |
How to Fake a Badge like a Pro: 11 Tips to Counter . . .
|
Russell Phillips |
15:00 - 17:59 |
DEF CON Closing Ceremonies & Awards
|
Jeff "The Dark Tangent" M . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
09:00 - 12:59 |
Whitebox Web Exploit Dev (WWED)
|
Cale "calebot" Smith,Luke . . . |
09:00 - 12:59 |
Effectively Detecting Modern Malware with Volatili . . .
|
Andrew Case,Lauren Pace,D . . . |
09:00 - 12:59 |
Open Source Malware 101 - Everything you always wa . . .
|
Paul "6mile" McCarty |
09:00 - 12:59 |
Introduction to Cryptographic Attacks
|
Matt Cheung |
09:00 - 12:59 |
Inside the Threat: Designing and Deploying Malicio . . .
|
Or Eshed,Aviad Gispan |
09:00 - 12:59 |
Accelerating Malware Analysis with WinDbg Time Tra . . .
|
Joshua "jstrosch" Strosch . . . |
09:00 - 12:59 |
SnowGoat: Exposing Hidden Security Risks and Leaki . . .
|
Lior Adar,Chen Levy Ben A . . . |
09:00 - 12:59 |
Medical Device Hacking: 201
|
Michael "v3ga" Aguilar,Al . . . |
14:00 - 17:59 |
Contextualizing alerts with relevant logs and even . . .
|
Ezz Tahoun |
14:00 - 17:59 |
64-bit Intel Assembly Language Programming for Hac . . .
|
Wesley McGrew |
14:00 - 17:59 |
PLC Playground: Hands-On Industrial Control System . . .
|
Anthony "Coin" Rose,Danie . . . |
14:00 - 17:59 |
Hands-on Kubernetes Attack & Defense Masterclass
|
Madhu "madhuakula" Akula |
14:00 - 17:59 |
Analyzing and Creating Windows Shellcode for Hacke . . .
|
Bramwell Brizendine,Austi . . . |
14:00 - 17:59 |
Obfuscation Reloaded: Modern Techniques for Evadin . . .
|
Jake "Hubble" Krasnov,Vin . . . |
14:00 - 17:59 |
Dive into Windows Library Loading
|
Yoann "OtterHacker" DEQUE . . . |
14:00 - 17:59 |
Fine Tune your personal LLM assistant to Secure co . . .
|
Or Sahar,Yariv Tal |
| | |
Saturday |
|
|
09:00 - 12:59 |
Fortifying AI: Hands-On Training in Adversarial At . . .
|
Vishal "Vish" Thakur,John . . . |
09:00 - 12:59 |
Hands-On Threat Hunting with Wireshark
|
Chris Greer |
09:00 - 12:59 |
Eliminating Bug Classes at Scale: Leveraging Brows . . .
|
Javan Rasokat |
09:00 - 12:59 |
Pen-testing Cloud REST APIs
|
Rodney Beede |
09:00 - 12:59 |
Wi-Fi-So-Serious
|
James Hawk,Brian Burnett |
09:00 - 12:59 |
Practical YARA: Crafting Custom Rules for Targeted . . .
|
Joshua "jstrosch" Strosch . . . |
09:00 - 12:59 |
Reach the Nirvana
|
Yoann "OtterHacker" DEQUE . . . |
09:00 - 12:59 |
Advanced Ghidra Scripting & Automation
|
Max "Libra" Kersten |
14:00 - 17:59 |
Learning to Hack Bluetooth Low Energy with BLE CTF
|
Ryan Holeman,Alek Amrani |
14:00 - 17:59 |
Putting EDRs in Their Place: Killing and Silencing . . .
|
Ryan "rj_chap" Chapman,Aa . . . |
14:00 - 17:59 |
From Prompt to Protection: A Practical Guide to Bu . . .
|
Ashwin Iyer,Ritika Verma |
14:00 - 17:59 |
K8sploitation: Hacking Kubernetes the Fun Way
|
Marcelo Ribeiro,Jeff Jord . . . |
14:00 - 17:59 |
Hacking The Metal: Into the GPU
|
eigentourist |
14:00 - 17:59 |
Hacker VPN
|
Eijah,Benjamin "Cave Twin . . . |
14:00 - 17:59 |
Defeating Malware Evasion: Techniques and Counterm . . .
|
Kyle "d4rksystem" Cucci,R . . . |
14:00 - 17:59 |
Deep-dive into modern network fingerprinting
|
Vlad Iliushin |
| | |
Sunday |
|
|
09:00 - 12:59 |
DIY Malware Emulation: Build It, Break It, Detect . . .
|
Sebastian Tapia,Ricardo S . . . |
09:00 - 12:59 |
Provably exfiltrating data by breaking TLS in the . . .
|
AtHeartEngineer,Sinu |
09:00 - 12:59 |
Hacking the connected plant: AI edition!
|
Arnaud Soullié,Alexandri . . . |
09:00 - 12:59 |
Creating malicious functional app on Android
|
HackeMate |
09:00 - 12:59 |
Cloud Forensics Workshop: Smart Grid Edition
|
Kerry "Professor Kilroy" . . . |
09:00 - 12:59 |
Disrupting Digital Dataflows: A 101 on how 2 detec . . .
|
Preston Zen |
09:00 - 12:59 |
Hands-on IoT firmware extraction and flash forensi . . .
|
Dennis Giese,Braelynn Lue . . . |
09:00 - 12:59 |
EMMC BGA Secrets, hack bga memory, no reballing ne . . .
|
Patrick "Gigstorm" Kiley |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
09:00 - 09:45 |
Dyna - Automating the OWASP MASTG with Offensive A . . .
|
Arjun "T3R4_KAAL" Chaudha . . . |
09:00 - 09:45 |
Spotter - Universal Kubernetes Security Scanner an . . .
|
Madhu "madhuakula" Akula |
09:00 - 09:45 |
RETCON - Reticulum Embedded Turnkey Connection Ope . . .
|
Daniel "Varx" Beard |
09:00 - 09:45 |
TheTimeMachine
|
Arjun "T3R4_KAAL" Chaudha . . . |
09:00 - 09:45 |
SAMLSmith
|
Eric Woodruff,Tomer Nahum |
10:00 - 10:45 |
AIMaL - Artificially Intelligent Malware Launcher
|
Endrit Shaqiri,Natyra Sha . . . |
10:00 - 10:45 |
AirBleed - Covert Bluetooth Plist Payload Injectio . . .
|
Ray "CURZE$" Cervantes,Yv . . . |
10:00 - 10:45 |
RETCON - Reticulum Embedded Turnkey Connection Ope . . .
|
Daniel "Varx" Beard |
10:00 - 10:45 |
Attack Flow and Root Cause Discovery - No LLMs, No . . .
|
Ezz Tahoun,Kevin Shi |
10:00 - 10:45 |
SAMLSmith
|
Eric Woodruff,Tomer Nahum |
11:00 - 11:45 |
Blackdagger - Cyber Workflow Automation Framework
|
Mahmut "ErdemOzgen" Erdem . . . |
11:00 - 11:45 |
BOAZ - A Multilayered Approach to AV/EDR Evasion E . . .
|
Thomas "XM20" Xuan Meng |
11:00 - 11:45 |
C4 - Cross Compatible Command and Control
|
Scott "ScottCTaylor12" Ta . . . |
11:00 - 11:45 |
Caldera for OT - Oops! All Software
|
Devon Colmer,Tony Webber |
11:00 - 11:45 |
rev.ng Decompiler
|
Pietro Fezzardi,Alessandr . . . |
12:00 - 12:45 |
Copycat - Identity Stealer Extension
|
Dakshitaa Babu,Shourya Pr . . . |
12:00 - 12:45 |
DVBE - Damn Vulnerable Browser Extension
|
Abhinav Khanna |
12:00 - 12:45 |
Empire 6.0
|
Vincent "Vinnybod" Rose,J . . . |
12:00 - 12:45 |
EntraGoat - A Deliberately Vulnerable Entra ID Env . . .
|
Tomer Nahum,Jonathan Elka . . . |
12:00 - 12:45 |
FLARE-VM
|
Joshua "jstrosch" Strosch . . . |
13:00 - 13:45 |
Cryptosploit
|
Matt Cheung |
13:00 - 13:45 |
Have I Been Ransomed?
|
Juanma "M4C" Tejada |
13:00 - 13:45 |
Lex Sleuther
|
Aaron "KNOX" James |
13:00 - 13:45 |
Messenger - Proxies Here There and Everywhere
|
Skyler Knecht,Kevin Clark |
13:00 - 13:45 |
Unmanned Wireless Penetration Testing Device
|
Ayaan Qayyum,Omar Hamoude . . . |
14:00 - 14:45 |
Metasploit's Latest Attack Capability and Workflow . . .
|
Spencer "ZeroSteiner" McI . . . |
14:00 - 14:45 |
MPIT - Matrix Prompt Injection Tool and ShinoLLMAp . . .
|
Shota "Sh1n0g1" Shinogi,S . . . |
14:00 - 14:45 |
Nebula - 4 Years and Still Kicking *aaS
|
Bleon "Gl4ssesbo1" Proko |
14:00 - 14:45 |
nRootTag - Exploiting Find My and Transforming Com . . .
|
Junming "Chapoly1305" Che . . . |
14:00 - 14:45 |
OAuthSeeker
|
Adam "UNC1739" Crosser |
15:00 - 15:45 |
WarHead
|
Vishal "Vish" Thakur,Davi . . . |
15:00 - 15:45 |
GlytchC2 - Command Execution and Data Exfiltration . . .
|
Anil Celik,Emre Odaman |
15:00 - 15:45 |
Angry Magpie - DLP Bypass Simulator
|
Jeswin Mathai,Xian Xiang . . . |
15:00 - 15:45 |
Robin - The Archaeologist of the Dark Web
|
Apurv "ASG_Sc0rpi0n" Sing . . . |
15:00 - 15:45 |
Beaconator C2 Framework
|
Mike "CroodSolutions" Man . . . |
16:00 - 16:45 |
PAPRa
|
Sean Marquez,Melanie "Gol . . . |
16:00 - 16:45 |
PatchLeaks
|
Huseyn "Khatai" Gadashov |
16:00 - 16:45 |
promptmap2
|
Utku Sen |
16:00 - 16:45 |
RETINA - Realtime Electronic Threat and Intrusion . . .
|
Cesare "Red5heep" Pizzi |
16:00 - 16:45 |
Tengu Marauder v2
|
Lexie "L3xic0n" Thach,Mun . . . |
| | |
Saturday |
|
|
09:00 - 09:45 |
Cryptosploit
|
Matt Cheung |
09:00 - 09:45 |
TheTimeMachine
|
Arjun "T3R4_KAAL" Chaudha . . . |
09:00 - 09:45 |
AIMaL - Artificially Intelligent Malware Launcher
|
Endrit Shaqiri,Natyra Sha . . . |
09:00 - 09:45 |
AirBleed - Covert Bluetooth Plist Payload Injectio . . .
|
Ray "CURZE$" Cervantes,Yv . . . |
09:00 - 09:45 |
Angry Magpie - DLP Bypass Simulator
|
Jeswin Mathai,Xian Xiang . . . |
10:00 - 10:45 |
Attack Flow and Root Cause Discovery - No LLMs, No . . .
|
Ezz Tahoun,Kevin Shi |
10:00 - 10:45 |
Beaconator C2 Framework
|
Mike "CroodSolutions" Man . . . |
10:00 - 10:45 |
Blackdagger - Cyber Workflow Automation Framework
|
Mahmut "ErdemOzgen" Erdem . . . |
10:00 - 10:45 |
BOAZ - A Multilayered Approach to AV/EDR Evasion E . . .
|
Thomas "XM20" Xuan Meng |
10:00 - 10:45 |
WarHead
|
Vishal "Vish" Thakur,Davi . . . |
11:00 - 11:45 |
Caldera for OT - Oops! All Software
|
Devon Colmer,Tony Webber |
11:00 - 11:45 |
Copycat - Identity Stealer Extension
|
Dakshitaa Babu,Shourya Pr . . . |
11:00 - 11:45 |
DVBE - Damn Vulnerable Browser Extension
|
Abhinav Khanna |
11:00 - 11:45 |
Empire 6.0
|
Vincent "Vinnybod" Rose,J . . . |
11:00 - 11:45 |
Unmanned Wireless Penetration Testing Device
|
Ayaan Qayyum,Omar Hamoude . . . |
12:00 - 12:45 |
EntraGoat - A Deliberately Vulnerable Entra ID Env . . .
|
Tomer Nahum,Jonathan Elka . . . |
12:00 - 12:45 |
FLARE-VM
|
Joshua "jstrosch" Strosch . . . |
12:00 - 12:45 |
GlytchC2 - Command Execution and Data Exfiltration . . .
|
Anil Celik,Emre Odaman |
12:00 - 12:45 |
Have I Been Ransomed?
|
Juanma "M4C" Tejada |
12:00 - 12:45 |
Lex Sleuther
|
Aaron "KNOX" James |
13:00 - 13:45 |
Messenger - Proxies Here There and Everywhere
|
Skyler Knecht,Kevin Clark |
13:00 - 13:45 |
Robin - The Archaeologist of the Dark Web
|
Apurv "ASG_Sc0rpi0n" Sing . . . |
13:00 - 13:45 |
MPIT - Matrix Prompt Injection Tool and ShinoLLMAp . . .
|
Shota "Sh1n0g1" Shinogi,S . . . |
13:00 - 13:45 |
Nebula - 4 Years and Still Kicking *aaS
|
Bleon "Gl4ssesbo1" Proko |
13:00 - 13:45 |
nRootTag - Exploiting Find My and Transforming Com . . .
|
Junming "Chapoly1305" Che . . . |
14:00 - 14:45 |
OAuthSeeker
|
Adam "UNC1739" Crosser |
14:00 - 14:45 |
PAPRa
|
Sean Marquez,Melanie "Gol . . . |
14:00 - 14:45 |
PatchLeaks
|
Huseyn "Khatai" Gadashov |
14:00 - 14:45 |
promptmap2
|
Utku Sen |
14:00 - 14:45 |
RETINA - Realtime Electronic Threat and Intrusion . . .
|
Cesare "Red5heep" Pizzi |
15:00 - 15:45 |
Dyna - Automating the OWASP MASTG with Offensive A . . .
|
Arjun "T3R4_KAAL" Chaudha . . . |
15:00 - 15:45 |
Metasploit's Latest Attack Capability and Workflow . . .
|
Spencer "ZeroSteiner" McI . . . |
15:00 - 15:45 |
rev.ng Decompiler
|
Pietro Fezzardi,Alessandr . . . |
15:00 - 15:45 |
Garuda Threat Hunting Framework
|
Monnappa "Monnappa22" K A . . . |
15:00 - 15:45 |
RETINA - Realtime Electronic Threat and Intrusion . . .
|
Cesare "Red5heep" Pizzi |
16:00 - 16:45 |
Tengu Marauder v2
|
Lexie "L3xic0n" Thach,Mun . . . |
16:00 - 16:45 |
Metasploit's Latest Attack Capability and Workflow . . .
|
Spencer "ZeroSteiner" McI . . . |
16:00 - 16:45 |
C4 - Cross Compatible Command and Control
|
Scott "ScottCTaylor12" Ta . . . |
16:00 - 16:45 |
Garuda Threat Hunting Framework
|
Monnappa "Monnappa22" K A . . . |
16:00 - 16:45 |
Spotter - Universal Kubernetes Security Scanner an . . .
|
Madhu "madhuakula" Akula |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:30 |
Break Systems, Not Promises: I promised to do a ke . . .
|
Lena "LambdaMamba" Yu |
10:00 - 12:59 |
Getting started in Malware Analysis with Ghidra
|
Wesley McGrew |
10:40 - 11:10 |
Malware Matryoshka: Nested Obfuscation Techniques
|
Brian Baskin |
11:20 - 11:50 |
Cryptography is hard: Breaking the DoNex ransomwar . . .
|
Gijs Rijnders |
12:00 - 12:30 |
KeePass, weaponized
|
Juho Jauhiainen |
12:40 - 13:10 |
Grandoreiro & friends: brazilian banking trojans t . . .
|
Josep Albors |
13:40 - 13:55 |
Using Stardew Valley mods as a C2 and infostealer
|
Gecko |
14:30 - 14:59 |
Compromising Threat Actor Communications
|
Ben "polygonben" Folland |
14:00 - 14:15 |
The creation of the Malmongotchi badge
|
Austin Worline |
14:00 - 17:59 |
Binary exploitation basics
|
Leigh Trinity |
15:50 - 16:20 |
Silent Sigma: Unraveling Iranian APT's 0-Day Warf . . .
|
Christopher Dio Chavez |
15:10 - 15:40 |
North Korea's Fur Shop: Poaching for Otters, Beave . . .
|
Mauro Eldritch,José Góm . . . |
16:30 - 16:59 |
ClickFix: The Malware Delivery Technique Enabling . . .
|
Arda Büyükkaya |
17:50 - 18:20 |
Domain Fronting in 2025: a retro analysis
|
Tom Cope |
17:10 - 17:40 |
The Beauty of Reversing Swift Malware
|
Chistopher Lopez |
| | |
Saturday |
|
|
10:00 - 10:30 |
Making Dirty Pictures - The Issue with DICOM
|
Michael "v3ga" Aguilar |
10:00 - 12:59 |
Malware and Monsters
|
Klaus Agnoletti |
10:40 - 11:10 |
Your Static Tools Are Cute - My AI Ripped ZebLoade . . .
|
Anna Pham,Edward Crowder |
11:20 - 11:50 |
Smashing the Sandbox: Inside DBatLoader's Unique E . . .
|
Kyle "d4rksystem" Cucci |
12:00 - 12:10 |
I Can't RE (and You Can Too!)
|
Johnny Xmas |
13:40 - 14:15 |
Enshittification: It's Over 9000
|
Lena "LambdaMamba" Yu,And . . . |
14:30 - 14:59 |
The Cookie Heist: How Cybercriminals Are Outsmarti . . .
|
Mrigakshi Goel |
14:00 - 17:59 |
Mac Malware Analysis
|
Patrick Wardle |
15:50 - 16:20 |
Deconstructing Malware Lineage with Graph Neural N . . .
|
David Rushmer |
15:10 - 15:40 |
Unveiling the shadows: Digital Forensics evidence . . .
|
Neumann "scsideath" Lim,J . . . |
16:00 - 16:30 |
Exposing Infosec Frauds and Foreign Agents Behind . . .
|
Cthulhu |
17:50 - 18:20 |
NO-HAVOC today, NO-HAVOC tomorrow
|
Lena "LambdaMamba" Yu,Sam . . . |
17:10 - 17:40 |
The Quantum Shift: Practical Post-Quantum Risk: Al . . .
|
Sean Prescott,Ted Carefoo . . . |
| | |
Sunday |
|
|
16:00 - 16:30 |
Exposing Infosec Frauds and Foreign Agents Behind . . .
|
Cthulhu |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
08:30 - 09:59 |
Cyber Wargames: King of the Hill
|
|
09:00 - 14:59 |
Cyber Wargames: Strategic Operations
|
|
11:00 - 11:50 |
Mind vs. Machine: Finding the Sweet Spot in Modern . . .
|
Ben "nahamsec" Sadeghipou . . . |
12:00 - 13:50 |
AIMaL: Artificially Intelligent Malware Launcher
|
Endrit Shaqiri,Natyra Sha . . . |
12:00 - 13:50 |
GlytchC2: Command execution and data exfiltration . . .
|
Anıl Çelik,Emre Odaman |
12:00 - 15:50 |
Instant API Hacker!
|
Corey Ball |
12:00 - 13:50 |
Vector Space Manipulation in LLMs
|
Muhammad Mudassar Yamin |
12:00 - 13:50 |
Bridge to Nowhere Good: When Azure Relay becomes a . . .
|
Edward Landers,Josh Huff, . . . |
12:00 - 12:50 |
Don't be LLaMe - The basics of attacking LLMs in y . . .
|
Alex Bernier,Brent Harrel . . . |
12:00 - 12:50 |
Stealing Browser Cookies: Bypassing the newest Chr . . .
|
Rafael Felix |
12:00 - 13:50 |
OSINT for Hackers
|
Lee McWhorter,Sandra Stib . . . |
13:00 - 13:50 |
Weaponizing Kestrel: Red Team Tradecraft for Hunti . . .
|
Daniel Benavides,Ronald G . . . |
13:00 - 13:50 |
Red Teaming Kubernetes: From App-Level CVEs to Ful . . .
|
Lenin Alevski |
14:00 - 15:50 |
Initial Access Tactics on MacOS
|
Adwiteeya Agrawal,Jianqia . . . |
14:00 - 15:50 |
Stealing Browser Cookies: Bypassing the newest Chr . . .
|
Rafael Felix |
14:00 - 15:50 |
A Look into Using Native Godot Calls to Create Mal . . .
|
Aaron Hogan |
14:00 - 14:50 |
Hack the Clock: Automating CVE Exploit searches to . . .
|
Jordan Bonagura |
14:00 - 14:50 |
Leveraging AI and MCP Servers for Automated Extern . . .
|
Shane Krause |
14:00 - 14:50 |
ModuleOverride – Changing a Tyre Whilst Driving
|
Alessandro Grisa,Ibai Cas . . . |
14:00 - 14:50 |
Adversary Intel Lab: Build Your First Threat Emula . . .
|
Fredrik Sandström |
15:00 - 16:59 |
Cyber Wargames: Redteam Rumble
|
|
15:00 - 15:50 |
Hybrid Attack
|
Jonathan Coradi |
15:00 - 15:50 |
From USB to C2
|
Will McGraw |
15:00 - 15:50 |
AI-Powered Web Applications: A New Era in Security . . .
|
Ilkin Javadov |
15:00 - 15:50 |
EncryptedClientHelloWorld: TLSv1.3 ECH As A Covert . . .
|
Jose Plascencia |
| | |
Saturday |
|
|
08:30 - 09:59 |
Cyber Wargames: King of the Hill
|
|
09:00 - 14:59 |
Cyber Wargames: Strategic Operations
|
|
10:00 - 10:55 |
Growing Red Team Village: What We’ve Learned Bui . . .
|
Barrett Darnell,Mike Lisi . . . |
11:00 - 16:50 |
BloodHound Enterprise CTF
|
Hugo van den Toorn,Joey D . . . |
11:00 - 14:50 |
Hacker Troll House
|
James Rice |
11:00 - 16:50 |
DNS-Based OSINT Tactics for Product and Service Di . . .
|
Rishi "rxerium" Chudasama |
11:00 - 16:50 |
Ransomware vs EDR: Inside the Attacker's Mind
|
Zoziel Freire |
11:00 - 11:50 |
Creating an AI Agent to Hack a Web Application
|
Omar Santos |
11:00 - 11:50 |
Malware Exploitation in PDFs: A Red Team Perspecti . . .
|
Filipi Pires |
11:00 - 11:50 |
Old Tactics, New Weapons: Abusing Modern Software . . .
|
Roberto Soares |
11:00 - 11:50 |
Whispers Through the Firewall: Data Exfiltration a . . .
|
Hubert Lin |
12:00 - 12:50 |
Getting Caught in Offensive Security
|
Graham Helton,Kevin Clark . . . |
13:00 - 14:50 |
Introduction to Operationalizing & Using C2 (w/ so . . .
|
Gabi Joseph,Josh Millsap |
13:00 - 14:50 |
StealthToken: Exploiting Identity Providers the Se . . .
|
Manish Gupta,Yash Bharadw . . . |
13:00 - 14:50 |
Building Your First Windows Malware Loader
|
Royce Yaezenko |
15:00 - 16:59 |
Cyber Wargames: Redteam Rumble
|
|
15:00 - 16:50 |
Mythic, Ghostwriter, Nemesis, and Tying the Room T . . .
|
Michael Donley |
15:00 - 15:50 |
From Prey to Playbook: Learning about victim behav . . .
|
Megan Squire |
15:00 - 16:50 |
Redteam Infrastructure Vibez Edition
|
Moses Frost |
15:00 - 16:50 |
Go Hack Yourself: API Hacking for Beginners
|
Katie "InsiderPhD" Paxton . . . |
15:00 - 15:50 |
Level UP OSINT
|
Mishaal Khan |
16:00 - 16:50 |
Don the Mantle: Red Team Campaign Planning and Exe . . .
|
William Giles |
16:00 - 16:50 |
Tales from the NIST AI Pen Test Challenge - AI Pe . . .
|
Lee McWhorter |
| | |
Sunday |
|
|
10:00 - 11:55 |
Attacking Kubernetes: Tools and Tactics to Comprom . . .
|
Lenin Alevski |
10:00 - 11:55 |
OSINT Challenges
|
Alex Ackerman,Lee McWhort . . . |
10:00 - 11:45 |
Ask a Hiring Manager with Troy Fridley
|
Troy Fridley |
10:00 - 11:45 |
Ask a Hiring Manager with Cory Wolff
|
Cory Wolff |
10:00 - 11:45 |
Ask a Hiring Manager with Peter Hefley
|
Peter Hefley |
PDT Times |
Title |
speaker |
| | |
Saturday |
|
|
08:00 - 16:59 |
Beginner's Guide to Attacks and Defenses
|
Sam Bowne,Kaitlyn Handelm . . . |
08:00 - 16:59 |
Medical Device Penetration Testing
|
|
08:00 - 16:59 |
Influence Operations: Tactics, Defense, and Exploi . . .
|
Tom Cross,Greg Conti |
| | |
Sunday |
|
|
08:00 - 16:59 |
Influence Operations: Tactics, Defense, and Exploi . . .
|
Tom Cross,Greg Conti |
| | |
Monday |
|
|
08:00 - 16:59 |
Dodging the EDR bullet: A Training on Malware Stea . . .
|
Giorgio "gbyolo" Bernardi . . . |
08:00 - 16:59 |
Adversarial Thinking: The Art of Dangerous Ideas
|
Tom Cross,Greg Conti |
08:00 - 16:59 |
Hacking Modern Web Apps: Master the Future of Atta . . .
|
Abraham Aranguren,Anirudh . . . |
08:00 - 16:59 |
Loudmouth Security - Offensive IoT Exploitation
|
Loudmouth Security |
08:00 - 16:59 |
Active Directory Attacks for Red and Blue Teams - . . .
|
Nikhil,Manthan |
08:00 - 16:59 |
Advanced Cloud Incident Response in Azure and Micr . . .
|
Korstiaan Stam |
08:00 - 16:59 |
Azure Cloud Attacks for Red & Blue Teams - Beginne . . .
|
Nikhil |
08:00 - 16:59 |
Windows Payload Development: EDR Evasion and Initi . . .
|
Rey "Privesc" Bango,Kevin . . . |
08:00 - 16:59 |
Hack the Connected Plant!
|
Arnaud Soullié |
08:00 - 16:59 |
Hands-on Car Hacking & Automotive Cybersecurity
|
Kamel Ghali |
08:00 - 16:59 |
Attack and Defend Software Supply Chain
|
Anant Shrivastava |
08:00 - 16:59 |
Everyday Ghidra: Practical Windows Reverse Enginee . . .
|
John McIntosh |
08:00 - 16:59 |
Full-Stack Pentesting Laboratory: 100% Hands-On + . . .
|
Dawid Czagan |
08:00 - 16:59 |
Simulated Adversary: Tactics & Tools Training
|
Kenny Hess,Jayson E. Stre . . . |
08:00 - 16:59 |
Deep Dive into Fuzzing
|
Zubin Devnani,Dhiraj Mish . . . |
08:00 - 16:59 |
Offensive Development Practitioner Certification ( . . .
|
Jake Mayhew,Greg Hatcher |
08:00 - 16:59 |
AI SecureOps: Attacking & Defending AI Application . . .
|
Abhinav Singh |
08:00 - 16:59 |
Offensive Cyber Security Operations: Mastering Bre . . .
|
Abhijith "Abx" B R |
08:00 - 16:59 |
A Practical Approach to Breaking & Pwning Kubernet . . .
|
Madhu "madhuakula" Akula |
08:00 - 16:59 |
Hacking Cryptography: Attacks, Tools, and Techniqu . . .
|
Ruben Gonzalez,Benjamin W . . . |
08:00 - 16:59 |
Solving Modern Cybersecurity Problems with AI
|
“K” Singh,Michael "Bl . . . |
08:00 - 16:59 |
Harnessing LLMs for Application Security
|
Seth Law,Ken Johnson |
08:00 - 16:59 |
A Complete Practical Approach to Malware Analysis . . .
|
Sajan Shetty,Monnappa "Mo . . . |
08:00 - 16:59 |
BRIDGING THE GAP - An Introduction to IoT Security . . .
|
Will McCardell,Garrett Fr . . . |
08:00 - 16:59 |
Attacking & Securing CI/CD Pipeline Certification . . .
|
Raunak Parmar |
08:00 - 16:59 |
RFID and Electronic Physical Access Control System . . .
|
Deviant Ollam,Bryan Black . . . |
08:00 - 16:59 |
Software Defined Radios 101
|
Richard Shmel |
08:00 - 16:59 |
Hunting for Hackers by Deloitte
|
Kyle Smathers,Bobby Thoma . . . |
08:00 - 16:59 |
SOC 101 - SOC 1 Analyst Bootcamp
|
Rod Soto |
| | |
Tuesday |
|
|
08:00 - 16:59 |
Software Defined Radios 101
|
Richard Shmel |
08:00 - 16:59 |
SOC 101 - SOC 1 Analyst Bootcamp
|
Rod Soto |
08:00 - 16:59 |
Hacking Cryptography: Attacks, Tools, and Techniqu . . .
|
Ruben Gonzalez,Benjamin W . . . |
08:00 - 16:59 |
Beginner's Guide to Attacks and Defenses
|
Sam Bowne,Kaitlyn Handelm . . . |
08:00 - 16:59 |
Beginner's Guide to Attacks and Defenses
|
Sam Bowne,Kaitlyn Handelm . . . |
08:00 - 16:59 |
RFID and Electronic Physical Access Control System . . .
|
Deviant Ollam,Bryan Black . . . |
08:00 - 16:59 |
Beginner's Guide to Attacks and Defenses
|
Sam Bowne,Kaitlyn Handelm . . . |
08:00 - 16:59 |
Attacking & Securing CI/CD Pipeline Certification . . .
|
Raunak Parmar |
08:00 - 16:59 |
Medical Device Penetration Testing
|
|
08:00 - 16:59 |
BRIDGING THE GAP - An Introduction to IoT Security . . .
|
Will McCardell,Garrett Fr . . . |
08:00 - 16:59 |
Medical Device Penetration Testing
|
|
08:00 - 16:59 |
A Complete Practical Approach to Malware Analysis . . .
|
Sajan Shetty,Monnappa "Mo . . . |
08:00 - 16:59 |
Medical Device Penetration Testing
|
|
08:00 - 16:59 |
Solving Modern Cybersecurity Problems with AI
|
“K” Singh,Michael "Bl . . . |
08:00 - 16:59 |
Harnessing LLMs for Application Security
|
Seth Law,Ken Johnson |
08:00 - 16:59 |
A Practical Approach to Breaking & Pwning Kubernet . . .
|
Madhu "madhuakula" Akula |
08:00 - 16:59 |
Hunting for Hackers by Deloitte
|
Kyle Smathers,Bobby Thoma . . . |
08:00 - 16:59 |
AI SecureOps: Attacking & Defending AI Application . . .
|
Abhinav Singh |
08:00 - 16:59 |
Adversarial Thinking: The Art of Dangerous Ideas
|
Tom Cross,Greg Conti |
08:00 - 16:59 |
Offensive Cyber Security Operations: Mastering Bre . . .
|
Abhijith "Abx" B R |
08:00 - 16:59 |
Dodging the EDR bullet: A Training on Malware Stea . . .
|
Giorgio "gbyolo" Bernardi . . . |
08:00 - 16:59 |
Deep Dive into Fuzzing
|
Zubin Devnani,Dhiraj Mish . . . |
08:00 - 16:59 |
Offensive Development Practitioner Certification ( . . .
|
Jake Mayhew,Greg Hatcher |
08:00 - 16:59 |
Full-Stack Pentesting Laboratory: 100% Hands-On + . . .
|
Dawid Czagan |
08:00 - 16:59 |
Simulated Adversary: Tactics & Tools Training
|
Kenny Hess,Jayson E. Stre . . . |
08:00 - 16:59 |
Attack and Defend Software Supply Chain
|
Anant Shrivastava |
08:00 - 16:59 |
Everyday Ghidra: Practical Windows Reverse Enginee . . .
|
John McIntosh |
08:00 - 16:59 |
Hack the Connected Plant!
|
Arnaud Soullié |
08:00 - 16:59 |
Hands-on Car Hacking & Automotive Cybersecurity
|
Kamel Ghali |
08:00 - 16:59 |
Azure Cloud Attacks for Red & Blue Teams - Beginne . . .
|
Nikhil |
08:00 - 16:59 |
Windows Payload Development: EDR Evasion and Initi . . .
|
Rey "Privesc" Bango,Kevin . . . |
08:00 - 16:59 |
Active Directory Attacks for Red and Blue Teams - . . .
|
Nikhil,Manthan |
08:00 - 16:59 |
Advanced Cloud Incident Response in Azure and Micr . . .
|
Korstiaan Stam |
08:00 - 16:59 |
Hacking Modern Web Apps: Master the Future of Atta . . .
|
Abraham Aranguren,Anirudh . . . |
08:00 - 16:59 |
Loudmouth Security - Offensive IoT Exploitation
|
Loudmouth Security |