From Vibe Coding to Vibe Decoding
Using AI to decompile a binary and reverse engineer functions including S-boxes.
From Vibe Coding to Vibe Decoding
Using AI to decompile a binary and reverse engineer functions including S-boxes.
DEFCON 33 CTF Write-Up Series #1: jxl4fun2 (pwn):
https://blog.cykor.kr/2025/04/DEFCON-33-Series-jxl4fun-pwn
DEFCON 33 CTF Write-Up Series #2: tinii (rev):
Hey folks, the next DC215 meetup will be coinciding with Philly Tech Week! We're going to be hosting a mini-con at Netrality on Thursday, May 8th. Get your tickets now!
https://www.ticketleap.events/tickets/dc-215/dc215-meetup-1408337717
After many years of battles with @mhackeroni, I'm blown away to announce that we've qualified for the #DEFCON CTF finals with KuK Hofhackerei this year!
New friends, same love. Couldn't be prouder of this team.
Thanks to @nautilusinstitute for organizing and see you in Vegas!
Congratulations to the top teams who competed in the #DEFCON #CTF hosted by the fantastic @nautilusinstitute !!
I've never had a chance to look at Rust, but DEFCON CTF Qualifications got me to make a few first steps. No flag, but some experience what works how in (remote) code execution and in finding fake flags. Looking forward for the write-ups to learn how to do privilege escalation!
Calling all international voices! We're curating our virtual tracks with talks from around the globe. Got insights to share? We'd love to hear from you!
blacksincyberconf.com/call-for-papers
Calling all international voices! We're curating our virtual tracks with talks from around the globe. Got insights to share? We'd love to hear from you!
blacksincyberconf.com/call-for-papers
@alice So last year on my way to Defcon my bag got pulled. Lockpicks, flippers, proxmarks, Mag stripe encoders, about 500 blank PVC credentials. you know what they wanted to text for explosives... my half used stick of OldSpice.
The #defcon33 CTF qualifiers are almost upon us! Keep up with the action at https://quals.2025.nautilus.institute. Thanks to the good folks of @nautilusinstitute for building and running the contest. Godspeed to the competitors. Glory awaits.
Spring has sprung. Birds are singing, flower buds are budding and the #DEFCON33 website is open for business. Bookmark https://defcon.org/html/defcon-33/dc-33-index.html for all the latest info on everything #DC33. August will be here before you know it and you’ll want to be in the loop as things develop.
Stay in touch, and we’ll see you at #defcon.
Can someone share any number about how Black Hat (and DEF CON) negotiates the instructor's share for Trainings? On the website:
https://www.blackhat.com/call-for-training.html
Is written:
"Payment is negotiated directly with each individual Trainer."
So, say that I propose a course for 1000 USD / student and I get 20 students registered and paying. What share of those 20'000 USD does BH/DC offer me usually?
The Lonely Hackers Club has been officially invited back to DEF CON 33 as an official community!
#defcon #defconcommunities #defcon33 #cybersecurity #infosec
The #DEFCON #MeshTastic MQTT server is in early testing. Soon we will open it up for beta testing and will be asking for people to help, then we will do our full reveal of our plans!
A lot of great community support and organizing in the background we will talk about when ready.
This week’s #defconmovienight selection is Scarface (1932). Classic pre-code gangster flick based loosely on Al Capone and directed by the great Howard Hawks. Join us at 8pm PDT Saturday in the movie-night-text channel of the #defcon discord (discord.gg/defcon). The world is yours.