
Emil
@emil0xa
Cybersecurity Community Leader | @Infosec_City πΈπ¬ #SINCON, @Div0_SG, @44CON π¬π§ & @ProjectHoneynet πΈπ¬ | Love βοΈπ βοΈ π₯ | A sociable geek π¨π»βπ»
ID: 332311947
https://www.linkedin.com/in/emiltan/ 09-07-2011 15:43:26
7,7K Tweet
1,1K Followers
1,1K Following



Huge thanks to all the #44CON 2022 speakers : haroon meer James Forshaw Kevin Sheldrake Andrew Ruddick @pallwright Cybergibbons π²π²π² Pavel Melissa Jake_$ πΎ Guy Barnhart-Magen @[email protected] Klaus Schmeh Yekki Erlend Andreas GjΓ¦re The CFP for 44CON 2023 will open Q1 next year.



Excited to host our Conference Talk on βExperiences In Developing a Defensive Challenge Lab", featuring the new #KaliLinux! π²π Witness first-hand, exclusively and only at ππππΎππ πππππΌπΏππΏ, from 5-6 Jan 2023. π Secure your tickets TODAY: infosec-city.com/event-details-β¦


Presenting to you one of our highly-anticipated hands-on workshops β Offensive Security Defense Analyst (OSDA) β facilitated by expert trainers from OffSec π§βπ» π Exclusively at ππππΎππ πππππΌπΏππΏ, from 5 to 6 Jan 2023. Tickets on sale: infosec-city.com/event-details-β¦


1 hr left at #singapore πΈπ¬ #cyber #ctf #eSports Division Zero (Div0) Cyber League Singapore #cyberleague



Don't miss #SINCON the annual #cybersecurity conference in #Singapore next week 5-6 January. Sign up now infosec-city.com/sinrlcon FOSSASIA Summit Infosec In the City (IIC)





Itβs a wrap. Great con THOTCON! #thotcon0xC! Fantastically done Nick Percoco Jonathan Tomek ππΌππΌππΌ #thotcon



Last chance to snag Early Bird tickets for Corelanβs Advanced Exploit Development for Windows Training, led by expert Peter Van Eeckhoutte himself (ΟΰΉΠ³ΡΙΰΈΰΈ Ο0ΰΉ3Π³ ([email protected]))! Sale ends on 17 Feb, 12 AM sharp. π infosec-city.com/event-details-β¦ #InfoSecIntheCity #SINCON2024 Corelan Consulting & Training


Releasing full 2+hr video of my browser exploitation workshop from VXCON 2024: youtube.com/live/b9OhamkAY⦠In which I show what goes inside the mind of a skilled hacker while exploiting a highly non-trivial vulnerability in v8, from zero to exploit concept. Especially this workflow