> home

[ALL_EVENTS]

all_talks

All talks from Recon Village across all DEF CON events

155 total talks
9 years
122 videos available

2025

23 talks

Autonomous Video Hunter: AI Agents for Real-Time OSINT

Kevin Dela Rosa

Building Local Knowledge Graphs for OSINT: Bypassing Rate Limits and Maintaining OPSEC

Donald Pellegrino

CTI-Agent: Automated battlecards from CTI reports

Mohamed Nabeel

Discord OSINT: An Empathic Banana and a Data Scraper Walk into a Search Bar

Zach Malinich

enumeraite: AI assisted web attack surface enumeration

Özgün Kültekin

From Dare to Discovery: How OSINT and Modern Recon Techniques Uncovered a Global VPN Infrastructure

Vladimir Tokarev

How to Become One of Them: Deep Cover Operations in Cybercriminal Communities

Sean Jones +1 more

Inside the Shadows: Tracking RaaS Groups and Evolving Cyber Threats

John Dilgen

Investigating Foreign Tech from Online Retailers

Michael Portera

KEYNOTE: Attack Surface in Motion: Why Today’s Threats Don’t Knock First

Muslim Koser

Mapping the Shadow War - From Estonia to Ukraine

Evgueni Erchov

OSINT Signals Pop Quiz!

Master Chen

Plug and Prey: Scanning and Scoring Browser Extensions

Nishant Sharma +1 more

Plumbing The Plumber: A Playbook for Integration Servers

Ryan Bonner +1 more

Pretty Good Pivot: Examining the PGP Key Pair Creation Habits of Dark Net Vendors

Sinwindie ‎

Robin: The Archaeologist of the Dark Web - Because Manual Dark Web OSINT is So Last Season

Apurv Singh Gautam

Connected Car Attack Surface Mapping: OSINT Techniques for Automotive Threat Intelligence

Reuel Magistrado

Legal Entity-Driven Reconnaissance with OWASP Amass: Enhancing Bottom-Up Discovery Using RDAP

Jeff Foley

OSINT Against the Machine: Fighting AI-Generated Disinformation

Zoey Selman

Panel Discussion - Recon First Thinking: Winning Bounties Without Telling the Firewalls

Rohit Grover +3 more

Panel Discussion - The State of OSINT in 2025: The Technical Arms Race

Ram Ganesh

People as the Payload: OSINT Tactics for Identity Tracing, Social Graphing, and Executive Recon

Ankit Gupta +1 more

Pre-Identifying DNS Wildcards: A New Standard of Care

Daniel Schwalbe

2023

20 talks

Azure AD recon with OSINT tools

Dr Nestori Syynimaa

Bug Bounty Recon - Bypassing Geographic DNS with Ensemble

Anthony Russell

Bugs, Bounties, & Breaches - Insider Tales from the Trenches

Jason Haddix

Crushing crumbs of information to eat a whole cake.

Felipe Pr0teus

Easy EASM - the zero dollar attack surface management tool

Jason Haddix

Finding Hidden Gems In Temporary Mail Services

Berk Can Geyikci

Getting ahead of the bad guys with Internet Scanning data.

Vitor Ventura

How I Built Recon to Scale with Serverless Architecture

Gunnar Andrews (g0lden)

How I Found Your Password, and Other Advanced Data Hoarding Techniques

M4x 5yn74x

I Am The Disinformation Campaign

Master Chen

Keynote - Reshaping Reconnaissance: AI's Role in Open Source Intelligence

Matt Edmondson

Leakonomics 101: The Last Year in Data Leaks

Nick Ascoli

Mastering OSINT: Advanced Techniques in the Realm of Big Data

Seyfullah KILIÇ

Nosy Cops: Exposing the Hidden Potential of Police Radio

sally, who makes yachts

Oh The Places You'll Guo: Using Media Variants to Trace the Organization and Behavior of an Coordinated Inauthentic Influence Operation

Patrick Warren

Oh! The OSINT You Can Do!

Joe Gray

OSINT Privacy Unmasked: Taking Control of Your Digital Footprint in a Hyper-Connected World

Zoey Selman (aka V3rbaal)

Riding with the Chollimas: Our 100-Day Quest to Identify a North Korean State-Sponsored Threat Actor

Mauro Eldritch

The Perils of Generative AI: Implications for Open Source Intelligence Research

Andy Dennis

Unlocking the Power of OWASP Amass: Introducing the Open Asset Model for Comprehensive Attack Surface Mapping

Jeff Foley

2019

21 talks

“Can you add a conference line, please?” - Using Cloud Services for Dial-In Reconnaissance Automation

Alina Dorina

A URL Shortened By Any Other Name

Master Chen

Advanced Recon with OWASP Amass

Jeff Foley

Asset Discovery: Making Sense of the Ocean of OSINT

Richard Gold

Building an OSINT and Recon Program to address Healthcare Information Security issues

MITCHELL PARKER

DECEPTICON: OPSEC to Slow the OSINT

Joe Gray

Derevolutionizing OS Fingerprinting: the cat and mouse game

Jaime Sanchez - aka @segofensiva -

Finding the needle in the twitter haystack.

Wicked Clown

From email address to phone number

Martin Vigo

Generating Personalized Wordlists by Analyzing Target's Tweets

Utku Sen

Hack the Planet! Hackers Influencing Positive Change

Robert Sell

Hack to Basics - Adapting Exploit Frameworks to Evade Microsoft ATP

Anthony "C01И" Rose +1 more

OSINT Approach in Big-Data

Seyfullah KILIÇ

PIE - A hardware based Prebellico Intelligence Exfiltration Botnet

William Suthers

Social Media: The New Court of Public opinion (exploring the effects of social media and out unconscious bias)

Susan

The OSINT space is Growing Are we Ready

Adrian Korn

Use Responsibly: Recon Like an insider threat for Best User Training ROI

Kala Kinyon

Using OSINT for Competitive Intelligence

Chris Kirsch

AttackSurfaceMapper: Automate and Simplify the OSINT Process

Andreas Georgiou & Jacob Wilkin

Manhunting 101 - OSINT Crash Course vs Human Targets

Jason Edison

Mining for Gold: A Framework for Accessing Pastebin’s Hidden Treasures

Mike Landeck

2018

23 talks

1983: I’m born. 2018: I’m taking on the bad guys

Jennifer Roderick

Adventures in the dark web of government data

Marc DaCosta

Applied OSINT For Politics: Turning Open Data Into News

Lloyd Miller

Bug Bounty Hunting on Steroids

Anshuman Bhartiya

Building visualisation platforms for OSINT data using open source solutions

Bharath Kumar +1 more

Core OSINT: Keeping Track of and Reporting All the Things

Micah Hoffman

Emergent Recon - fresh methodology and tools for hackers in 2018

Jason Haddix

Hacking the international RFQ Process #killthebuzzwords

Dino Covotsos

How WHOIS Data Uncovered $32 Billion Connected to the Mormon Church

Ethan Dodge

I fought the law and law lost

Mauro Caseres

Introducing YOGA: Your OSINT Graphical Analyzer

Micah Hoffman

Mapping Social Media with Facial Recognition

Jacob Wilkin

Mapping wifi networks and triggering on interesting traffic patterns

Caleb Madrigal

OpenPiMap - Hacking the hackers with OSINT, Raspberry Pis, and Data Analysis

Mark Klink

Prebellico - 100% Passive Pre-Engagement and Post Compromise Network Reconnaissance Tool

William Suthers

skiptracer - ghetto OSINT for broke hackers

illwill

Stalker In A Haystack

Master Chen

Supercharge Your Web Recon With Commonspeak and Evolutionary Wordlists

Michael Gianarakis +1 more

Targeted User Analytics and Human Honeypotss

Mbis0n Shadorū

WhiteRabbit: Combining Threat Intelligence Public Blockchain Data and Machine Learning to go Down the "Dirty Money" Rabbit Hole

Olivia Thet +1 more

Winning a SANS 504 CTF without winning a SANS CTF

Wbbigdave

Cartoons, Sketchnotes, Bullet Journals and Other Data Visualization Tricks

Raye Keslensky

Using Deep Learning to uncover darkweb malicious actors and their close circle

Rod Soto