And with that, another #DEFC0N is in the past! This is always so much fun!

Goodbye #DEFCON32

looking for this guy. dm me with details. i got shit to trade. boost if you want to help #SPYvsSPY #DEFCON #defcon32
Last Year's AI Art a Battle Competitions depiction of LineCon at #defcon32 . Think you can do better?
Join the AI Art Battle Friday (yes TOMORROW) at 7pm in the Atrium East Contest Stage. See you there!
#defcon #defcon33

Every year we try to bring something new to the table—literally. This year it’s five DEF CON editions, 20 author sigings, Rudy in shirt form, and a huge lineup of titles you’ll actually want to read.

Come flip through the weird, the sharp, and everything we couldn’t wait to share.

Always an honor to build for this community--thanks for keeping it brilliantly strange. See you next week @defcon

#DEFCON32 #infosec #redteam #cybersecurity #hackers #programming #books #bookstodon

Last Year's Winner of AI Art Battle at DEFCON32!
Join us for DEFCON33 on the Contest Stage Friday Aug 8th @7PM! Prelim registration opens 6:30. See ya there! @defcon
#defcon #defcon33 #defcon32

“IoT PenTest Blitz” is coming to #DEFCON32!

Join us in the #AppSecVillage to:
🔍 Analyze real firmware
🛠️ Build your attack chain
🏆 Rack up points like a pro

Swing by & show us what you’ve got.

#IoTSecurity #PenTestBlitz #FirmwareSecurity #Cybersecurity

The #wallofsheep has come a long way since the days when offenders were scrawled on paper plates stapled to a wall.

#ThrowbackThursday #defcon32 #defcon

Monté mi propio laboratorio con OWASP Juice Shop en Docker y Kali ARM64 en UTM/QEMU — sin límites de tiempo ni restricciones de plataforma.

Hoy decidí pasarme a TryHackMe Pro. Costo bajo, acceso completo a los módulos de red team y más tiempo para practicar de verdad.

Preparándome para #DEFCON32 con laboratorios controlados y objetivos claros.

#RedTeam #TryHackMe #KaliLinux #Ciberseguridad #AppSec #DFIR

Spun up my own OWASP Juice Shop target with Docker and a Kali ARM64 lab via UTM/QEMU — no more waiting on free-tier limits.

Decided to go Pro on TryHackMe. Low cost, high return — access to full red team paths and fewer blockers to deep work.

Gearing up for #DEFCON32 with controlled labs and real practice.

#RedTeam #TryHackMe #KaliLinux #BurpSuite #AppSec #DFIR

🚀 First steps in my red team lab today:

Set up Burp Suite locally

Hit TryHackMe’s OWASP Juice Shop

Worked around free-tier browser limitations by switching to OpenVPN + local tools

Small step, but important — building a real offensive workflow from scratch.

#RedTeam #TryHackMe #BurpSuite #AppSec #LearningInPublic #DEFCON32 #HackerJourney