Background

RTV OVERFLOW

What is RTV Overflow?

Did you miss a session at DEF CON 33 because the room was at capacity? Or maybe you were busy diving into a CTF and couldn't make the talk? We've got you covered.

RTV Overflow is our annual "second chance" streaming event. We invite some of our top-tier speakers to take the stage once more. It's our official kickoff for the road to DEF CON 34, bringing the elite technical insights of the Village directly to your screen, no badge required!

RTV Overflow Schedule

Filipi Pires
Feb. 21, 2026 10:00AM EST

Malware Exploitation in PDFs

~ # Filipi Pires

Uncover the hidden dangers within the world’s most common document format by dissecting real-world PDF exploits, from heap spray attacks to covert data exfiltration. This deep dive equips offensive security professionals with the technical knowledge to master shellcode injection and memory manipulation, staying one step ahead of sophisticated adversaries.
Zoziel P. Freire
Feb. 21, 2026 11:00AM EST

Ransomware vs EDR

~ # Zoziel P. Freire

Challenge the perceived invincibility of Endpoint Detection and Response (EDR) by examining cross-platform ransomware tactics designed to exploit telemetry gaps and behavioral blind spots. Through live demonstrations and technical walkthroughs of evasion strategies on Windows, macOS, and Linux, this session provides blue teamers and threat hunters with a pragmatic roadmap for building resilient, attacker-aware defenses.
Anıl Çelik & Emre Odaman Second presenter for Glytch C2
Feb. 21, 2026 12:00PM EST

Glytch C2

~ # Anıl Çelik & Emre Odaman

Discover the future of stealthy post-exploitation with GlytchC2, a tool that leverages live streaming platforms to create a near-undetectable Command-and-Control (C2) channel. This session explores how to bypass traditional network defenses by using Twitch to execute OS commands and exfiltrate data, complete with a live demo of the framework’s covert capabilities.
Itsik Mantin & Itay Hazan Second presenter for Red-for-Blue: Fortifying Applications Through Actionable Red-Teaming
Feb. 21, 2026 1:00PM EST

Red-for-Blue: Fortifying Applications Through Actionable Red-Teaming

~ # Itsik Mantin & Itay Hazan

Step into the front lines of GenAI defense by exploring a novel red-teaming approach designed to fortify LLM applications against rapidly evolving attack surfaces. This session introduces a powerful “security triangle”—combining threat-wise prompt red-teaming, automated prompt patching, and security-steerable models—to transform offensive insights into actionable application hardening.
Alex Bernier & Brent Harrel Second presenter for Don't Be LLame - The Basics of Attacking LLMs
Feb. 21, 2026 2:00PM EST

Don't Be LLame - The Basics of Attacking LLMs

~ # Alex Bernier & Brent Harrel

Demystify the mechanics of Large Language Models to uncover high-impact attack surfaces that often bypass traditional monitoring and security controls. This session bridges the gap between theoretical LLM behavior and practical Red Team operations, focusing on prompt injection strategies that achieve critical objectives like lateral movement and privilege escalation.
Royce Yaezenko
Feb. 21, 2026 3:00PM EST

Building Your First Windows Malware Loader

~ # Royce Yaezenko

Demystify the construction of malicious binaries in this hands-on workshop that guides participants through building a fully functional Windows 11 process-injection loader from scratch. By mastering the “classic three-call” technique and implementing essential evasion tactics like XOR obfuscation and file bloating, attendees will gain practical experience in both malware assembly and defensive bypass strategies.
Lee McWhorter
Feb. 21, 2026 4:00PM EST

OSINT for Hackers

~ # Lee McWhorter

Master the art of turning public data into a powerful offensive advantage through high-impact reconnaissance techniques and immersive, hands-on exercises. This interactive workshop dives into the most effective OSINT tools and methodologies, empowering attendees to uncover actionable intelligence and significantly increase their value within any security organization.
Fredrik Sandstorm
Feb. 21, 2026 5:00PM EST

Adversary Intel Lab

~ # Fredrik Sandstorm

Transform raw threat intelligence into actionable operations by analyzing real-world adversary behaviors and identifying critical TTPs. Participants will leverage the ATT&CK Navigator to bridge the gap between intelligence and execution, walking away with a completed adversary worksheet and a functional red team emulation playbook.
Frank Victory
Feb. 21, 2026 6:00PM EST

Hiring or Triangle of Pain

~ # Frank Victory

Frank Victory has spent 30 years navigating the gray areas between breaking and building. A firm believer that shells matter more than titles, Frank’s career spans the full spectrum of the craft—from deep-dive incident response and threat hunting to offensive adversary simulation. When he is not securing enterprise environments, he is training the next generation of hackers, teaching Social Engineering and Ethical Hacking at the University level. As the President of Denver OWASP and the force behind the SnowFROC conference, Frank is a pillar of the Colorado security scene and host of the interview portion of the Colorado = Security Podcast, where he’s spent years asking one question: What is the biggest challenge in cybersecurity today?