Can't make it to Ottawa? No problem. With Ringzer0 Countermeasure's Virtual Training, you can learn from top-tier instructors from the comfort of your own home. Oct 26 - Nov 1
Countermeasure's in-person training delivers hands-on courses to match your experience and goals. Led by world-class instructors from the private sector, academia, and beyond, our training covers a wide spectrum of topics in both offensive and defensive security. Nov 3-6.
Ringzer0 brings the best of offence and defense back to Canada’s capital in 2025. World-class trainers, internationally recognized speakers, cutting edge security research, government focus, community. Nov 3 – 7, Ottawa, Canada.
Welcome To BOOTSTRAP25
Thompson Conference Center, Austin TX // March 18-22
BOOK NOW
Keep Austin reverse-engineering and learn with Ringzer0! Ringzer0…
Can't make it to Austin? BOOTSTRAP25's Virtual Trainings may be just the thing for you! You can study with our amazing trainers from the comfort of your own home! March 9-15.
Fuzz testing is great for finding vulnerabilities, but embedded, bare-metal, and RTOS firmware pose unique challenges. This hands-on workshop explores firmware rehosting, a modern technique for analyzing and fuzz testing deeply embedded firmware.
Right now you are enveloped in the warming glow of dozens to hundreds of Bluetooth devices. Aren’t you curious what all those little critters are?! In this workshop we’ll use the Blue2thprinting tools to poke at these apparitions and get a sense of what they are and what they want from us!
This workshop covers security aspects of compiler internals, enabling students via guided examples to modify code through a compiler. Students will analyze code through compilation stages and perform early code injection. We will conclude by demonstrating the security relevance of a build chain.
In this workshop we will cover the basics of reverse engineering automotive firmware. An ECU firmware can consist of millions of lines of code which would take a long time to fully reverse engineer. Tips and tricks will be taught to quickly identify parts of the firmware that are of interest.
Automate reverse engineering with Ghidra’s CLI tools in this hands-on workshop. Set up a productive environment using the Ghidra Python VSCode Devcontainer Skeleton, automate tasks, script analyses, and integrate Ghidra’s powerful decompilation and disassembly features into your CLI workflow
This workshop introduces modern binary (de)obfuscation. After a brief lecture on key concepts, we’ll walk through practical examples, using symbolic execution to extract and simplify obfuscated expressions. Finally, we’ll apply program synthesis to recover the semantics of obfuscated code.