Conference Speakers
All Speakers
Technical Speakers
iOS and macOS Track
BountyCraft Track
Winja Track
Developer Track
Workshop and Villages
Bridging the Gap: Enhancing OT Security with an Affordable Testbed
Learn more
Broken isolation - draining your credentials from popular macOS password managers
Learn more
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
Learn more
Drawing parallels between iOS and macOS Pentesting with DVMA
Learn more
Fuzzing Rust Smart Contracts: Writing A Bug Printer Engine From Scratch
Learn more
Google Give Me Vulnz
Learn more
Guilt by Association: Pwning Millions of Smart Weighing Machines with API and Hardware Hacking
Learn more
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
Learn more
How Ecovacs robots got hacked and what we can learn
Learn more
How to Teach Threading to a Dolphin
Learn more
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell
Learn more
MacOS Lockdown Mode: A Forensic Deep Dive
Learn more
Predator Malware: Trust Broken at the Core
Learn more
Project Dusseldorf: finding out-of-band vulnerabilities at cloud scale
Learn more
Reversing Large Deep learning AI Models
Learn more
Satellite Communications: Analyzing and Protecting Space-Based Assets
Learn more
Securing the chains: Building defensive layers for software supply chains
Learn more
State of iOS Jailbreaking in 2025
Learn more
Surfing the Wild Wild West of Open Source Software Supply Chain Risks
Learn more
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
Learn more
The hidden ART of rolling shellcode decryption
Learn more
Trapped by the CLI
Learn more
Unlocking The Secret - Lock Picking
Learn more
What the PHUZZ?! Finding 0-days in PHP Apps with Coverage-guided Fuzzing
Learn more
Will It Run? Fooling EDRs with command lines using empirical data
Learn more
Windows Keylogger Detection: Targeting Past and Present Keylogging Techniques
Learn more
Your Identity is Mine: Techniques and Insights from OS Identity Providers Research
Learn more