- Vulnerability discovery
- Advanced exploitation techniques
- Browsers Exploitation
- OS Kernel Exploitation
- Mobile Exploitation
- Revolutionary Web Hacking Technique
- Mitigation bypass techniques
- Hardware reverse engineering
- Software reverse engineering
- Protocol reverse engineering
- Attacks on cryptography in hardware and/or software
Your submission should include the following details;
- Name, last name and contact details
- Brief bio
- Place of residence
- Past speaking experience
- Presentation topic and description
Talks will be 45 minutes including questions.
Training will be 3 days.
Talks and training must be in english.
Email for submission: email@example.com