offensivecon
@offensive_con
OffensiveCon Berlin is a technical international security conference focused on offensive security only. Organised by @Binary_Gecko. Stay tuned #OffensiveCon26.
#OffensiveCon25 videos are now up! youtube.com/playlist?list=…
A big thank you to Brian (@MaliciousInput) and the whole @thezdi team! It was a pleasure hosting you at Offensivecon and we look forward to our next cooperation! #Pwn2OwnBerlin
#Pwn2Own Berlin 2025 is complete! In total, we awarded $1,078,750 for 28 unique 0-days. Join Brian Gorenc and Dustin Childs as they recap the highlights (and some lowlights) from this year's event. youtu.be/G7McB7L7sIs #P2OBerlin
For the second time, we attended the legendary @offensive_con — top-tier talks, flawless organization, and unforgettable parties. Huge thanks to the organizers; it truly lives up to the hype! You can find a quick review of what we liked the most. blog.randorisec.fr/conference-off…
Slides and video of our talk at @offensive_con are already online ! Thanks to @Binary_Gecko for the amazing event reversetactics.com/publications/2…
♦️ Thank you @offensive_con for several days of great content and connection! ♦️ Congrats @RolfRolles on a successful training, your attendees walked away with so much knowledge. ♦️ And HUGE thanks to everyone who took the time to have feedback sessions with us about #IDA -…
Congrats to @gerrard_tai , @hi_im_d4rkn3ss and the @starlabs_sg team for winning the first #Pwn2OwnBerlin!
They were surprisingly good, tasted like pistachios! They were handing them out so I figured I’d complete the chain: ✅ Find bugs ✅ Exploit bugs ✅ Eat bugs
3/ Why did we join? • We’ve been deep in AI security & offensive AI. • Already found bugs in @ollama this year. • Team was 🔥 motivated. • And #Pwn2Own was hosted at one of our favorite cons: @offensive_con.
🔥 First time at #Pwn2Own, first win — and $15,000 later, we’re just getting started. Last week at @OffensiveCon, we trained, fuzzed, and pwned hard. Here’s the story 👇
My keynote at @offensive_con 2025, "How Offensive Security Made Me Better at Defense": Video: youtu.be/60BcjiChncE Slides: docs.google.com/presentation/d…
I feel like this is a good time to remind everyone: we’re hiring! Disclaimer: OffensiveCon prep involves moving boxes, laying down kilometres of cable, and a liver of steel… but the rest of the time, you’ll be free to focus on research 😉 @binary_gecko @offensive_con
The video for my talk at @offensive_con with @saidelike is out! It was an absolute pleasure working with Cedric on this dream of mine! youtu.be/goEb7eKj660
#OffensiveCon25 videos are now up! youtube.com/playlist?list=…
Huge thanks to @offensive_con! Such a high-quality security event, I’m truly impressed. Met and made new friends. For the past one year, I’ve been focused on team hiring and ignored my own security research. This event has truly reignited my passion for mobile security!
We posted our slides! entrysign.top
"Entrysign: Create Your Own x86 Microcode for Fun and Profit" by @_MatteoRizzo, @__spq__, @sirdarckcat & Josh Eads! Now on stage!
The recording is up now at youtube.com/watch?v=Dq_KVL…
"Parser Differentials: When Interpretation Becomes a Vulnerability" by @joernchen !
Was that a new record? Next year maybe the videos might be online even before the talks are presented.
#OffensiveCon25 videos are now up! youtube.com/playlist?list=…
Apparently @offensive_con worked their asses off to get their talks up on YouTube Go check them out And here's the coolest talk, my talk: youtu.be/LAIr2laU-So?si… And with that, the full chain used to exploit the S24 is released. Yay!
#OffensiveCon25 videos are now up! youtube.com/playlist?list=…
Congratulations to everyone who attended our @offensive_con party! We know that some of you need more bugs ... so we gave them away for free! It turns out you ate them all! 🦗🦗🦗 #hungry #proteins
this was my first @offensive_con and what a blast! had so much fun catching up with old friends and making new ones - not to mention the level of technical content and convos, what an awesome community :)