Round 1 tickets now available - conference and training seats limited!

TRAININGS

RE//verse offers world-class training courses from March 2-5, 2026. Each 4-day intensive course is designed to advance your reverse engineering skills through hands-on labs and expert instruction.

All trainings include breakfast and lunch daily. Classes are limited in size to ensure quality interaction with instructors. Price: $4,800 per course.

Richard Johnson

AI AGENTS FOR CYBERSECURITY

Trainer: Richard Johnson

Learn to harness the power of AI agents for advanced cybersecurity operations. This course covers building autonomous security tools, implementing LLM-powered vulnerability analysis, and creating intelligent fuzzing frameworks that adapt and evolve during testing campaigns.

DETAILS
Silvio La Porta and Antonio Villani

MODERN MALWARE OPSEC & ANTI-REVERSE TECHNIQUES

Trainers: Silvio La Porta / Antonio Villani

Dive deep into cutting-edge malware operational security and anti-analysis techniques. Learn how modern malware evades detection, implements anti-debugging and anti-virtualization tricks, and employs sophisticated obfuscation to thwart reverse engineering efforts.

DETAILS
Anuj Soni

REVERSE ENGINEERING WINDOWS MALWARE

Trainer: Anuj Soni

Master the art of Windows malware analysis through hands-on reverse engineering. This course dives into malicious loaders, evasion techniques, encryption in malware, and automating both static and dynamic analysis using Python, Frida, Binary Ninja, and emulators.

DETAILS
Jiska Classen

iOS APP, USER-, KERNEL-SPACE, AND FIRMWARE REVERSE-ENGINEERING

Trainer: Jiska Classen

This training provides you with a comprehensive toolkit for analyzing apps, system daemons, the XNU kernel, firmware, and system logs on Apple's mobile devices. It caters to beginner, intermediate, and advanced reverse engineers working on iOS security research.

DETAILS
Brandon Miller

FIRMWARE REVERSE ENGINEERING

Trainer: Brandon Miller

Explore the world of embedded systems and firmware analysis. Learn to extract, analyze, and modify firmware from various devices, understand bootloaders and update mechanisms, and discover vulnerabilities in IoT devices through systematic reverse engineering approaches.

DETAILS
Tim Blazytko

SOFTWARE DEOBFUSCATION TECHNIQUES

Trainer: Tim Blazytko

Get to know state-of-the-art code obfuscation techniques, how they complicate reverse engineering, and how to use different deobfuscation techniques to break them. Participants will deepen their knowledge of program analysis and learn when and how (not) to use different techniques.

DETAILS
Kyle Martin

AUTOMATED REVERSE ENGINEERING

Trainer: Kyle Martin

Learn to scale your reverse engineering efforts through automation. This course teaches fundamental concepts of program analysis and how to build tools that automatically analyze binaries, identify patterns, and extract meaningful information from large codebases.

DETAILS

Contact
Phone: +1-866-983-3135
Address: PO Box 971, Melbourne,
FL 32902-0971

© 2025-2026 Vector 35 Inc.
All Rights Reserved // Code of Conduct