𝕏

POC Crew

[#Zer0Con2026] Announcements

Zer0Con2026 CFP / CFT is officially "OPENED"

🔒Date: April 2~3, 2026
🏨Venue: Fairmont Ambassador Seoul, South Korea

🌕CFT: ~ Jan 1, 2026
🌕CFP: ~ Feb 22, 2026
🌕Sponsor: ~ Feb 28, 2026

For more: https://t.co/61Vh1ld9pM
[POC2025] Talks are now UP ONLINE!

Talks from #POC2025 are now publicly available on YouTube!
Enjoy the sessions - see you again at POC2026!
#POC2025 Slides are up NOW!
Those slides currently in private and will be uploaded later by the speakers 😆
Thank you so much for being with us at POC2025 ✨
Your time and presence truly meant a lot 🙏
Hope to meet you all again next year! 💫
Wishing everyone a safe and restful flight home ✈️💙

#POC2025
The Drinking Hell trophy was lifted by Si*** 🏆

We sincerely hope that everyone who challenged him still managed to catch their flights on time. 🫡 ✈️

#POC2025
Huge thanks to @SAFATeamApS and @prdgmshift for sponsoring our Closing party, The ENDS!

Your support didn’t just level up the event — it made the whole night unforgettable.
Appreciate you both for bringing the energy, the vibe, and the magic. ✨

#POC2025
Such a fun vibe 😄

Bocheng Xiang (@crispr_x) & HeeChan Kim (@heegong123) – Follow the Link: Building Full-Chain Local Privilege Escalation on Windows 🔗🪟

#POC2025
Sweet talk, enjoyed it!

Xingyu Jin (@1ce0ear) & Martijn Bogaard (@jmartijnb) – Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers 🐧🛠️

#POC2025
Fuzzing, Fuzzing!

Innokentii Sennovskii (@Rumata888) – Zero Knowledge, Full Coverage: A Fuzzing Paradox ⛓️🔍

#POC2025
Big thumbs up for this one 👍

Alfie CG (@alfiecg_dev) – Trigon: developing a deterministic iOS kernel exploit 📱

#POC2025
#POC2025 x @FlagYard CTF is going great so far! 🔥
Shoutout to all players grinding through the challenges.
Keep hacking and stay tuned for the final result soon!
Nice flow, nice talk 😎

Yongkang Jia (@j_kangel) & Xiao Lei (@N0p_Orz) – Bug Tamer: Turning Limited Heap Overflow into Full VMware Escape 🖥️

#POC2025
Enjoyed every minute 😄

Hyunwoo Kim (@v4bel) & Wongi Lee (@_qwerty_po) – Race Condition Symphony: From Tiny Idea to Pwnie 🐧🎶

#POC2025
Good vibes from this one ✨

Cedric Halbronn (@saidelike) & Jael Koh (@_jaelkoh) – Revisiting Windows 11 KTM: Lessons Learnt from New Vulnerabilities 🪟

#POC2025
Yup, that was awesome 😎

Xuangan Xiao (@xgxiao66) & Zikai Xu (@N7utbN) – The Biometric AuthToken Heist: Cracking PINs and Bypassing CE via a Long Ignored Attack Surface 🔐

#POC2025
I hope you guys enjoyed today and see you tomorrow 😘

#POC2025
Loved this one, seriously 😆

Christine Fossaceca (@x71n3) – (Sploit)Lights, Camera, Action! Exploiting Spotlight to Bypass TCC and Leak Data from Apple Intelligence 🍎🎬

#POC2025
Big fan of this session 😎

Yong Wang (@ThomasKing2014) – A tale of challenging MTE: Rooting Google Pixel with kernel MTE enabled in one shot 🔧

#POC2025
Such a good presentation 🤙

Igor Sak-Sakovskiy (@psych0tr1a) – Internet explorer isn't forgotten 🕸️

#POC2025
Great talk! Loved it 😄

Mikhail Evdokimov (@konatabrk) – PerfektBlue: Universal 1-click Exploit to Pwn Automotive Industry — Mercedes-Benz, Volkswagen, Škoda, and others 🚗

#POC2025

Offensive Insight,
Defensive Strength

Services

Cyber Security Service

We are running nonprofit events to nurture young talents who will lead future security.

Conference organizer

We are building various communities by organizing multiple conferences.

Social contribution

We are running nonprofit events to nurture young talents who will lead future security.

Contact Us We Are Hiring! 👋

You can contact us to be our client / to be our researcher / to be our partner with us.

contact@pocsec.com

PGP Key