Learn how to analyze Android and iOS mobile apps with R2Frida. Bypass jailbreak protections, SSL pinning, anti-debugging and even Frida detections using Frida itself.
Participants will research and exploit vulnerabilities on a real-world embedded edge device in Fortune 500 environments, advancing from restrictive shells to fuzzing, crash triage, root-cause analysis, and weaponizing memory-corruption bugs for remote code execution.
Developed by the FLARE team at Google Cloud Security, this immersive six-day virtual training provides a comprehensive deep dive into the complex world of modern Windows malware.
Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical upskill in your ability to analyze Rust binaries.
This course teaches Ghidra usage, covering fundamental to advanced techniques with hands-on exercises on real-world Windows applications. It is designed for those with foundational Windows and security knowledge.
Join this 32-hour course to master reverse engineering in the Agentic Era. Build private AI stacks, develop custom MCP servers, and orchestrate workflows with LLMs as autonomous collaborators. Gain skills to design agentic workflows for analysing binaries and validating results.
In this course, students will gain the necessary hands-on experience, knowledge, and confidence to conduct automated program analysis at scale using machine learning.
This training guides security researchers and software engineers through the field of Linux kernel fuzzing. In a series of lectures and practical labs, the training explores using fuzzing for finding kernel memory corruption bugs and analyzing their security impact.
Ringzer0 returns with the best of offence and defense back to Canada’s capital in 2026. World-class trainers, internationally recognized speakers, cutting edge security research, government focus, community. March 22-31, Ottawa, Canada.
Ringzer0 brings the best of offence and defense back to Canada’s capital in 2026. World-class trainers, internationally recognized speakers, cutting edge security research, government focus, community.
Ringzer0 COUNTERMEASURE25 Archive
Ottawa Conference and Event Center, Ottawa 🇨🇦 // November 3-7
COUNTERMEASURE25 Virtual Training
Windows Vulnerability Research - A CVE…
Learn to build a private, modular RE stack with GhidraMCP, pyghidra-mcp, Ollama & OpenWebUI. This workshop shows how to set up local LLMs, integrate with Ghidra, and customize workflows—enabling offline, privacy-first analysis of malware, firmware & binaries.