
Latest posts





COUNTERMEASURE25 Advisory Board Members
COUNTERMEASURE25 Advisory Board Members…
Ringzer0 Event Archives
Past Events
BOOTSTRAP25 ArchiveRingzer0 BOOTSTRAP25 Archive Thompson Conference Center, Austin TX // March 18-22 BOOTSTRAP25 Virtual Training macOS 15 and iOS…

DOUBLEDOWN24 Archive
Ringzer0 DOUBLEDOWN24 Archive
Virtual // August 2024
DOUBLEDOWN24 Virtual Training
Reverse Engineering – Binary Program AnalysisLearn the fundamentals of reverse engineering from…

BOOTSTRAP25 Archive
Ringzer0 BOOTSTRAP25 Archive
Thompson Conference Center, Austin TX // March 18-22
BOOTSTRAP25 Virtual Training
macOS 15 and iOS 18 Kernel Internals…

Black Hat Python For Hackers and Pentesters
This course is a companion to Black Hat Python, 2nd Edition, covering major subject areas through hands-on labs and exercises. It is beneficial for both seasoned and new Python programmers.

Windows Enterprise Incident Response
Led by Mandiant, this course teaches fundamental investigative techniques for responding to cyber threats, including rapid triage, identifying attack vectors, and investigating incidents.

Malware Analysis and Reversing
Explore both dynamic and static approaches to dissecting malware, learn the tools and platforms used for deep malware inspection. At the core of the training we placed reverse-engineering, which is essential for thorough understanding of malicious intent and various conditions.

Everyday Ghidra: Intro to Windows Reverse Engineering and Vulnerability Research
This course teaches Ghidra usage, covering fundamental to advanced techniques with hands-on exercises on real-world Windows applications. It is designed for those with foundational Windows and security knowledge.