• Vulnerability discovery
  • Advanced exploitation techniques
    • Browsers Exploitation
    • OS Kernel Exploitation
    • Mobile Exploitation
    • Revolutionary Web Hacking Technique
  • Mitigation bypass techniques
  • Hardware reverse engineering
  • Software reverse engineering
  • Protocol reverse engineering
  • Attacks on cryptography in hardware and/or software


Your submission should include the following details;

  • Name, last name and contact details
  • Brief bio
  • Place of residence
  • Past speaking experience
  • Presentation topic and description

Talks will be 45 minutes including questions.

Training will be 3 days.

Talks and training must be in english.

Email for submission: