BOOTSTRAP25 Logo
Austin's best cybersecurity training and conference event is back for 2025. March 18-22 at Thompson Conference Center, UT Austin.
Ringzer0
BOOTSTRAP 25
Welcome To BOOTSTRAP25!

Welcome To BOOTSTRAP25!

Welcome To BOOTSTRAP25 Thompson Conference Center, Austin TX // March 18-21 BOOK NOW Keep Austin reverse-engineering and learn with Ringzer0 this…
3 min read
BOOTSTRAP25 In-Person Training

BOOTSTRAP25 In-Person Training

BOOTSTRAP25 brings the best reverse engineering and debugging training to Austin Texas. March 18-21, 2025.
5 min read
BOOTSTRAP25 Virtual Training

BOOTSTRAP25 Virtual Training

Can't make it to Austin? BOOTSTRAP25's Virtual Trainings may be just the thing for you! You can study with our amazing trainers from the comfort of your own home! March 9-15.
4 min read
Virtual Courses
TEEPwn: Breaking TEE By Experience

TEEPwn: Breaking TEE By Experience

Trusted Execution Environments (TEEs) are challenging to secure due to complex hardware and large trusted code bases. Vulnerabilities have been exploited via the less-secure Rich Execution Environment (REE). TEEPwn features a CTF experience to explore TEE vulnerabilities and exploits.
3 min read
Exploiting the Linux Kernel

Exploiting the Linux Kernel

This training guides through the field of Linux kernel exploitation. In a series of practical labs, the training explores the process of exploiting kernel bugs in a modern Linux distribution on the x86-64 architecture.
3 min read
macOS 15 and iOS 18 Kernel Internals for Security Researchers

macOS 15 and iOS 18 Kernel Internals for Security Researchers

This course introduces you to the low level internals of the iOS and macOS kernels from the perspective of a security researcher interested in vulnerability analysis, kernel rootkit/malware analysis/detection or kernel exploit development.
3 min read
Machine Learning for Reverse Engineers

Machine Learning for Reverse Engineers

In this course, students will gain the necessary hands-on experience, knowledge, and confidence to conduct automated program analysis at scale using machine learning.
4 min read
The ARM64 Exploit Laboratory

The ARM64 Exploit Laboratory

An ideal introduction to vulnerability exploitation on 64-bit ARM Linux platform, spanning from ARM64 assembly all the way to ARM64 Return Oriented Programming (ROP). An ideal step up from the 32-bit ARM Exploit Laboratory.
4 min read
Windows Kernel Exploitation: Foundation and Advanced

Windows Kernel Exploitation: Foundation and Advanced

Gain hands-on experience in a wide range of topics, including Windows and driver internals, various memory corruption types, exploit development techniques, mitigation bypass techniques, pool internals, and Feng-Shui and then test your skills in a CTF challenge!
4 min read
Rust Reverse Engineering in Practice

Rust Reverse Engineering in Practice

This training equips you with essential skills in Rust reverse engineering. You’ll learn to analyze Rust binaries, understand the language’s compilation and runtime intricacies, utilize tools and plugins, and tackle advanced challenges such as obfuscation and malware analysis.
5 min read
In-Person Courses
Practical Firmware Implants and Bootkits

Practical Firmware Implants and Bootkits

Master low-level firmware security in this hands-on course focused on BIOS/UEFI manipulation, bypassing Secure Boot and Intel® BootGuard, and creating BIOS implants and Bootkits. Learn Intel hardware debugging, exploit development, and enhance your offensive and defensive firmware security skills.
3 min read
Practical Car Hacking - A Hands-On Approach

Practical Car Hacking - A Hands-On Approach

This course covers a wide variety of topics - from automotive networks, diagnostic protocols, firmware extraction and wireless attack surfaces. The course is very hands-on, with many real ECUs to practice on.
5 min read
5G Hacking for Red and Blue Teams

5G Hacking for Red and Blue Teams

Learn how to identify and counter threats in 5G networks. Dive into 5G core security, protocols, assess vulnerabilities and develop exploits. The training features hands-on exercises simulating real-world attacks and defenses on a local, isolated 5G network.
5 min read
VoidStar Security - Hardware Hacking for Reverse Engineers

VoidStar Security - Hardware Hacking for Reverse Engineers

This course teaches hardware reverse engineering fundamentals, focusing on low-level protocols like SPI, I2C, JTAG, and SWD in embedded systems. Students develop tools to interface with these protocols. All hardware is provided, and students keep the tools after completing the course.
4 min read
Bluetooth Low Energy - Full Stack Attack

Bluetooth Low Energy - Full Stack Attack

It's pretty fun to hack things wirelessly. And hey, it turns out there's literally *billions* of Bluetooth Low Energy (BLE) things sold per year, so let's learn how to hack those!
4 min read
Patch Diffing In The Dark: Reverse Engineering Modern CVEs

Patch Diffing In The Dark: Reverse Engineering Modern CVEs

This course teaches patch diffing to analyze real-world Windows and Android vulnerabilities. Students use open-source tools like Ghidra to reverse engineer recent CVEs, gaining the skills and confidence to discover complex vulnerabilities with tools they already have.
6 min read
Fuzzing and Attacking Custom Embedded Systems

Fuzzing and Attacking Custom Embedded Systems

This training covers analyzing, fuzz testing, and exploiting devices with custom embedded OS. It dives into Arm Firmware, teaches reverse engineering with Ghidra, and offers hands-on exercises to build proficiency with tools like Unicorn, AFL++, and Fuzzware.
3 min read
The Art of Fault Injection: Advanced Techniques and Attacks

The Art of Fault Injection: Advanced Techniques and Attacks

Fault Injection attacks are increasingly used to break into devices, especially when software vulnerabilities are unknown. Students will use NewAE’s ChipWhisperer-Lite or Husky, along with hardware tools (debugger, oscilloscope), to create Fault Injection exploits on the Espressif ESP32 SoC.
4 min read
Great! Next, complete checkout for full access to Ringzer0
Welcome back! You've successfully signed in
You've successfully subscribed to Ringzer0
Success! Your account is fully activated, you now have access to all content
Success! Your billing info has been updated
Your billing was not updated