Sponsors help cover the costs of keeping #OST2 free for everyone and helping us grow. Thanks to AMI for joining the cause!
From: @OpenSecurityTraining2
https://infosec.exchange/@OpenSecurityTraining2/115882007929854239
OpenSecurityTraining2 (@[email protected])

Attached: 1 image We are happy to announce that AMI has become a 🥇Gold-level sponsor of #OST2! Learn about their work creating firmware across the industry here: https://ost2.fyi/Sponsor_AMI_SM

Infosec Exchange

We are happy to announce that AMI has become a 🥇Gold-level sponsor of #OST2!

Learn about their work creating firmware across the industry here: https://ost2.fyi/Sponsor_AMI_SM

RE: https://infosec.exchange/@OpenSecurityTraining2/115802818424446652

We're always looking for more sponsors for #OST2! If your company wants to support creating better security engineers everywhere in the world, get in touch!

We also want to thank everyone who volunteered for #OST2. From completing classes as a beta student, to submitting subtitle fixes, to running our Discord, helping with the next version of the website, contributing graphics, etc, OST2 wouldn't be successful without our volunteers!
A sincere thank you to everyone who donated to #OST2 as an individual in 2025 (and especially those who took advantage of corporate non-profit donation matching)! Your donations always go directly to instructors as an honorarium, and show them that you value what they do for OST2 and you want them to keep helping the world!

#OST2 has a deep, and growing, amount of material that's relevant to learning reverse engineering. And our https://ost2.fyi/Dbg1101 introduction to IDA as a debugger class instructor, Christina Johns @bitmaize is working on the "Reverse Engineering 2001: Introductory Static Analysis of C-based programs" class, which will unlock opportunities for many new classes!

Also thanks to folks like Justine Benjamin for recognizing the value in supporting OST2!
From: @OpenSecurityTraining2
https://infosec.exchange/@OpenSecurityTraining2/115723298586141719

We are happy to announce that Hex-Rays @HexRaysSA makers of IDA, have become a 🥇Gold-level sponsor of #OST2!

Learn all the latest about their software reverse engineering tools here: https://ost2.fyi/Sponsor_HexRays_SM

I was invited to give a talk at @vusec while I was in AMS for HWIO. So of course I talked to the students about the value of grabbing some vocational skills from @OpenSecurityTraining2 , to boost their resumes. And I got to meet #OST2 instructor Sina Karvandi @intel80x86 (of HyperDbg fame -> https://ost2.fyi/Dbg3301) in person, as he's doing a PhD there.

As VUSec is one of the places that found some of the early "named/logo bugs" for microarchitectural attacks, I liked that they had an emulation cabinet with a "LOGO INVADERS" design on it :)

@jeppojeps @OpenSecurityTraining2

That's great! Thanks for confirming.

#emulation #emudev #OST2

We are happy to announce that Binarly has renewed their 🥇Gold-level sponsorship of #OST2!

Learn more about what they do in firmware & supply chain security here: https://ost2.fyi/Sponsor_Binarly_SM