Every @opensectraining.bsky.social training I’ve taken has had an amazing level of quality.
Posts by OpenSecurityTraining2
Your CPU speaks assembly. Shouldn't you? Master x86-64 with the most common instructions and unlock reverse engineering, exploit dev & OS internals. ~28h on average (not counting the final lab). Take Architecture 1001: x86-64 Assembly ost2.fyi/Arch1001 by @XenoKovah today for mad skillz tomorrow!
If you're serious about reverse engineering, you need to master a powerful debugger. Dbg1103 walks you through Binary Ninja's debugger hands-on, so you can hit the ground running on real targets. ost2.fyi/Dbg1103 by Xusheng Li
Why would anyone learn about Windows kernel exploitation?! Take ost2.fyi/Exp4011 by Cedric Halbronn and learn about Windows kernel internals, vulnerability exploitation engineering, heap grooming, race condition, UAF, and what it takes to find your own exploitation primitives!
📣New OST2 class release!📣
The TPM trilogy is complete! "TC1103: Advanced TPM usage" by Dimi Tomov is now public at ost2.fyi/TC1103! Learn about advanced TPM policy access controls, protecting external keys in a TPM, implementing maximum security TPM-backed FDE, and more!
Why spend time on fake vulnerabilities at a CTF when you could learn 38 *real* CVEs? Take "C-Family Software Implementation Vulnerabilities " ost2.fyi/Vulns1001 by @xenokovah.bsky.social and Kc Udonsi today!
Why read about TPM 2.0 in a spec when you can drive it with Python? 🐍 TC2202 teaches real-world TPM programming with tpm2-pytss, taught by its author, Bill Roberts. Hardware-backed crypto, hands-on labs, no fluff. ost2.fyi/TC2202
Move from basic fuzzing to a high-performance workflow. Fuzzing 1001 ost2.fyi/Fuzz1001 bridges the gap between theory and practical research. Master AFL++, PCGUARD, LTO, and ASAN using real CVEs from Xpdf and tcpdump.
Tired of guessing inputs? Let the computer do the work! Learn about symbolic execution from @barbieauglend.bsky.social in "Reverse Engineering 3201" ost2.fyi/RE3201 and use SMT solvers to find the exact inputs to reach vulnerable code. Stop guessing, start solving!
We're happy to say that we're now over 34k students at OST2! 🙌🥳🚀
But any topic is welcomed and encouraged! HMU at that email below if you're interested in getting funded to create a class and make it freely available to the world!
We're in discussion to form a partnership with the UEFI Forum. But as part of that we need to propose classes that can be taught on the topics they're involved with. Things like UEFI Measured Boot in particular would make a lot of sense now that we have robust TPM classes at OST2.
OST2 is putting out a request for proposals for an opportunity to be funded to create classes on UEFI and/or ACPI. If you are interested, please reach out to teach🌀ost2.fyi with a proposed class syllabus.
ost2.fyi/Training-RFP...
Final call for beta testers! The class will begin later today!
We are happy to announce that AMI has become a 🥇Gold-level sponsor of #OST2!
Learn about their work creating firmware across the industry here: ost2.fyi/Sponsor_AMI_SM
Our Trusted Computing "Advanced TPM usage" class will begin this week. Sign up below.
- Advanced TPM Policy usage using tpm2-tools and tpm2-tss
- Policy using locality
- Policy using the TPM clock and reset
- Policy using the TPM's internal NVRAM
- Handling external keys using a TPM
The topics for TC1103 are:
- Introduction to the Feature API (FAPI)
- Creating keys using FAPI
- Policy using FAPI
- Full-disk encryption primitive (FDE) using a TPM
- TPM operations for FDE
...
🧵Like TC1101 & TC1102, TC1103 has the goal of helping developers get bootstrapped on using TPMs more quickly than if they were to just rely on reading the spec or API documents alone.
📢Call for beta testers!📢
forms.gle/9QgwVSstXi7n...
The beta for Trusted Computing 1103: Advanced TPM Usage will start Jan 16th. It will take ~7 hours to complete. Sign up above if you're interested in participating. (Note: ost2.fyi/TC1101 & ost2.fyi/TC1102 are strongly recommended prerequisites.)
In 2026 we will be fundraising to add a gamification plugin to our Open edX servers. This will add a leaderboard for learners, and provide a new way to track your sub-class-granularity skills that you're picking up on the site. To help early, donate here: www.every.org/ost2/f/lets-...
We're always looking for more sponsors for #OST2! If your company wants to support creating better security engineers everywhere in the world, get in touch!
We've got a decent number of instructors in the queue to create new classes in 2026 too, but we can always use more! Classes are a significant investment of time, but they also pay off in a significant way for the number of people you will help over many years!
#OST2 has a ton of material that's relevant to RE. And our ost2.fyi/Dbg1101 introduction to IDA as a debugger class instructor, Christina Johns, is working on the "Reverse Engineering 2001: Introductory Static Analysis of C-based programs" class, which will unlock opportunities for many new classes!
* Xeno Kovah - Bluetooth 2222: Bluetooth reconnaissance with Blue2thprinting - ost2.fyi/BT2222
If you've got an idea for a class that you want to share with 33k friends, reach out at teach 🌀 ost2.fyi!
* Bill Roberts - Trusted Computing 2202: TPM 2.0 Programming using Python and the tpm2-pytss libraries - ost2.fyi/TC2202
...
🧵A special thanks to the instructors who stepped up in 2025 to release new classes:
* Francesco Pollicino - Fuzzing 1001: Introductory white-box fuzzing with AFL++ - ost2.fyi/Fuzz1001
...
and Bronze Sponsor Cyber5W @cyber5w.bsky.social, all of whom help keep the servers running, and contribute towards instructor honorariums.
And also thanks to our Gold Sponsors, 3mdeb, Binarly @binarly.bsky.social, Dark Mentor @darkmentor.com, Hex-Rays @hex-rays.bsky.social, NCCGroup @nccgroupinfosec.bsky.social ...