Every year we try to bring something new to the table—literally. This year it’s five DEF CON editions, 20 author sigings, Rudy in shirt form, and a huge lineup of titles you’ll actually want to read.
Come flip through the weird, the sharp, and everything we couldn’t wait to share.
Always an honor to build for this community--thanks for keeping it brilliantly strange. See you next week @defcon
#DEFCON32 #infosec #redteam #cybersecurity #hackers #programming #books #bookstodon
“IoT PenTest Blitz” is coming to #DEFCON32!
Join us in the #AppSecVillage to:
🔍 Analyze real firmware
🛠️ Build your attack chain
🏆 Rack up points like a pro
Swing by & show us what you’ve got.
The #wallofsheep has come a long way since the days when offenders were scrawled on paper plates stapled to a wall.
Monté mi propio laboratorio con OWASP Juice Shop en Docker y Kali ARM64 en UTM/QEMU — sin límites de tiempo ni restricciones de plataforma.
Hoy decidí pasarme a TryHackMe Pro. Costo bajo, acceso completo a los módulos de red team y más tiempo para practicar de verdad.
Preparándome para #DEFCON32 con laboratorios controlados y objetivos claros.
#RedTeam #TryHackMe #KaliLinux #Ciberseguridad #AppSec #DFIR
Spun up my own OWASP Juice Shop target with Docker and a Kali ARM64 lab via UTM/QEMU — no more waiting on free-tier limits.
Decided to go Pro on TryHackMe. Low cost, high return — access to full red team paths and fewer blockers to deep work.
Gearing up for #DEFCON32 with controlled labs and real practice.
🚀 First steps in my red team lab today:
Set up Burp Suite locally
Hit TryHackMe’s OWASP Juice Shop
Worked around free-tier browser limitations by switching to OpenVPN + local tools
Small step, but important — building a real offensive workflow from scratch.
#RedTeam #TryHackMe #BurpSuite #AppSec #LearningInPublic #DEFCON32 #HackerJourney