Sponsors
POC Conference is made possible thanks to the support of our sponsors. Their continued partnership has played a vital role in sustaining and growing POC over the years. We sincerely thank them for their contribution.
FuzzingLabs
This 3-day training combines two comprehensive modules, focusing on reverse engineering Rust binaries and Golang binaries. Participants will gain hands-on experience with tools, techniques, and advanced malware analysis, concluding with a capstone project to reinforce their skills. Designed for malware analysts, reverse engineers, and security professionals, this course provides the knowledge needed to tackle real-world reverse engineering challenges in modern programming languages.
Nabih is the COO of FuzzingLabs. Over the last 3½ years he’s moved from intern to security engineer, team lead, and now operations lead. His work focuses on fuzzing and vulnerability research, writing and maintaining tools in C, Python, Rust, and Go. He earned his cybersecurity-engineering degree from EPITA.
Daniel Frederic is a security researcher at Fuzzinglabs and the current head of the CTF team at LSE. Originally a kernel and low-level developer with a passion for reverse engineering, he merges these interests by focusing on low-level targets. His research primarily involves developing low-level fuzzing tools through in-depth exploration of often obscure targets.
POC Conference is made possible thanks to the support of our sponsors. Their continued partnership has played a vital role in sustaining and growing POC over the years. We sincerely thank them for their contribution.