RomHack Training

RomHack Training 2025

The 3rd edition of RomHack Training takes place in Rome from Tue, 23 to Fri, 26 September 2025 at Polo Didattico, a facility located within a historic palace in the picturesque Roman neighborhood  Garbatella.

Dirk-jan Mollema

Offensive Entra ID (Azure AD) and Hybrid AD security training

23-26 Sep. 2025

09:00 - 18:00

analyze, attack, and secure
Entra ID

Red teamers, blue teamers, security architects

training materials, lab guides, certificate of attendance

About the author
 
Trainer PictureTrainer Picture

Dirk-jan Mollema is a hacker and researcher of Active Directory and Microsoft Entra (Azure AD) security. In 2022 he started his own company, Outsider Security, where he performs penetration tests and reviews of enterprise networks and cloud environments. He blogs at dirkjanm.io, where he publishes his research, and shares updates on the many open source security tools he has written over the years. He presented previously at TROOPERS, DEF CON, Black Hat and BlueHat and has been awarded as one of Microsoft’s Most Valuable Researchers multiple times.

€ 3,600.00
€ 4,000.00

Nicolas Grégoire

Burp Suite Pro, 100% hands-on

This is a training for Web hackers who want to master their toolbox. Burp Suite Pro is the leading tool for auditing Web applications at large, but also a complex beast where new features get added every few weeks. Mastering Burp Suite Pro, including its newest features, allows testers to get the most out of the tool, optimizing time spent auditing and testing. Work will be faster (hotkeys!) and much more efficient (more tools, more possibilities!). Attendees will also learn to measure and assess the quality of their attacks, a crucial skill in real-life engagements that can make the difference between a false-negative and a critical finding.

23-26 Sep. 2025

9:00 - 18:00

Mastering Burp Pro

bug hunters / vulnerability researchers / penetration testers

course material
lifetime lab access

About the author
 
Trainer PictureTrainer Picture
Nicolas Grégoire has been auditing web apps for 20 years. He is an official Burp Suite Pro trainer since 2015, and has trained more than a thousand people since then, either privately or at public events. Other of that, he runs Agarri, a one-man business where he looks for security vulnerabilities for clients and for fun. His public talks (covering SSRF, XSLT, Burp Suite, ...) have been presented at numerous conferences around the world.
€ 3.600,00
€ 4.000,00

Sina Kheirkhah

Advanced .NET Exploitation Training

This 4 day training course will teach you how to exploit advanced .NET enterprise targets, bypass mitigations, chain bugs and pop shellz!

23-26 Sep. 2025

9:00 - 18:00

.NET reverse engineering

bug hunters / vulnerability researchers

course material
virtual machine

About the author
 
Trainer PictureTrainer Picture

Meet Sina Kheirkhah, widely recognized as @SinSinology in the cybersecurity community! Sina is a dedicated full-time vulnerability researcher with a passion for breaking into various systems.

From cracking server-side enterprise solutions to targeting hardware and delving into reverse engineering, Sina‘s expertise covers a wide spectrum. He specializes in low-level exploitation, attacking .NET/Java stacks, bypassing security measures, and chaining bugs seamlessly.

Notably, Sina has competed in Pwn2Own for four consecutive years and has won the “Master of Pwn” title as a solo researcher in pwn2own 2025, demonstrating his dedication to the field.

€ 3.600,00
€ 4.000,00

Raelize - Cristofaro Mune & Niek Timmers

The Art of Fault Injection: Advanced Techniques & Attacks

While Fault Injection attacks are nowadays common, typical concepts, methodologies, techniques, and attacks are often not sufficiently understood. While achieving success by simply glitching a target can yield results, it’s important to note that this approach alone doesn’t facilitate the creation of innovative attacks. In this training, students will experience and appreciate the Art of Fault Injection (TAoFI) to exploit the full potential of Fault Injection attacks.

23-26 Sep. 2025

9:00 - 18:00

Identify and exploit advanced vulnerabilities
using advanced Fault Injection techniques like an expert

Security analysts, researchers & enthusiasts,
Forensic investigators

course material
virtual machine
access to required hardware

About the author
 
Trainer PictureTrainer Picture

Cristofaro Mune has been in the security field for 20+ years. He has 15+ years of experience with evaluating the software and hardware security of secure devices, as well as 10+ years of experience in testing and assessing the security of Trusted Execution Environments (TEEs).

Niek Timmers has been analyzing and testing the security of software and hardware of secure devices for over a decade. His interest is typically sparked by technologies where the hardware of the device is fundamentally part of the equation.

€ 3.600,00
€ 4.000,00

Pedro Ribeiro & Radek Domanski

Hunting Zero-Days In Embedded Devices

Hands-on training course that teaches students how to find and exploit vulnerabilities in embedded devices such as routers, cameras, industrial devices, televisions, microcontrollers, automotive, etc. The course will go in depth into several classes of vulnerabilities, with practical exercises on real and emulated devices of different CPU architectures. Each vulnerability class will be described, studied and then exploited in a variety of different ways. This course aims to bridge the gap between hardware hacking and exploitation, giving students the necessary knowledge they need to become product security experts.

23-26 Sep. 2025

9:00 - 18:00

hacking
hardware devices

developers
bug hunters / pentesters

slides/workbook
laboratories (VM)

About the author
 
Trainer PictureTrainer Picture

Pedro Ribeiro is a vulnerability researcher and reverse engineer with over 10 years of commercial experience. Pedro has found and exploited hundreds of vulnerabilities in software and hardware products. He has over 150 CVE ID’s attributed to his name (most of which related to remote code execution vulnerabilities) and has authored over 60 Metasploit modules that have been released publicly. Besides his vulnerability research activities, he is the founder and director of a penetration testing and reverse engineering consultancy based in London (Agile Information Security), with a variety of clients worldwide. More information about Pedro’s publicly disclosed vulnerabilities can be found at https://github.com/pedrib/PoC

Radek Domanski started his professional career 12 years ago securing large networks and systems and transitioned afterwards into offensive security. He worked on high profile projects within the largest Internet Service Provider in Europe and in the research center of one of the world’s largest telecommunications equipment companies. Radek found a number of critical vulnerabilities in real products and systems that are used by millions of users worldwide. Throughout the years of working on offensive product security Radek developed a unique methodology and honed his skills of vulnerability hunting. At the moment Radek is focusing on hardware, automotive hacking, exploitation and reverse engineering of embedded systems.

€ 3.600,00
€ 4.000,00
If you have any question or need information drop us an email and don’t forget to follow us.