AI-powered Bughunting by Alfredo Ortega

This course aims to equip students with the necessary skills to leverage modern AI tools for enhancing and automating vulnerability discovery and code analysis. The primary focus of the course will be on code analysis and auditing, with a particular emphasis on vulnerability research. Read more...

Exploiting the Linux Kernel by Andrey Konovalov

A 4-day Linux kernel exploitation frenzy! This training guides researchers through the field of Linux kernel exploitation. In a series of practical labs, the training explores the process of exploiting kernel bugs in a modern Linux distribution on the x86-64 architecture. Read more...

Windows Exploit Engineering Foundation by Cedric Halbronn

This class is meant to show the approach an exploit developer or bug hunter should take in attacking a previously unknown component in the Windows kernel. The training is primarily focused around labs to teach the students what it takes to exploit a real-world vulnerability. Read more...

Static Analysis of C++ with Hex-Rays by Rolf Rolles

This 4 day class is designed to teach students the features of C++ that are most commonly encountered in binaries, their implementation details, and how to cope with them in Hex-Rays while reverse engineering. The class also covers Hex-Rays as a tool in great detail. Read more...

Practical Web Browser Fuzzing by Patrick Ventuzelo & Tanguy Duhamel

Web browsers are among the most widely used and essential software globally. With millions of lines of code, they manage, sanitize, and interpret various types of untrusted web data. This training will focus on applying various fuzzing techniques to uncover critical vulnerabilities in different web browser implementations. Read more...

Windows Internals for Security Engineers by Yarden Shafir

Join the esteemed senior security researcher and endpoint security engineer, as she takes you along a deep dive into the internals of the Windows 11 Operating System. Covering Windows 11 “24H2”, the upcoming “25H2”, and Server 2022 and 2025, you’ll unravel the secrets of how GRU bootkits, PLA software supply chain implants, NSA backdoors, and other kernel and firmware malware work. Read more...

Attacking Instant Messaging Applications by Iddo Eldor & Jacob Bech

Few publicly-known hacks have inspired the imagination of security researchers as much as exploits against IM (instant messaging) applications. 0-click attacks aimed against applications such as WhatsApp, iMessage, and Telegram have raised unprecedented interest and have often caused political turmoil. Yet, in sharp contrast with the curiosity that IM exploitation generates, public information about this surface remains scant. This training is our bid to bridge the gap. Read more...

Limited Seats - Remember to reserve your ticket!

register now