
RTV OVERFLOW
What is RTV Overflow?
Did you miss a session at DEF CON 33 because the room was at capacity? Or maybe you were busy diving into a CTF and couldn't make the talk? We've got you covered.
RTV Overflow is our annual "second chance" streaming event. We invite some of our top-tier speakers to take the stage once more. It's our official kickoff for the road to DEF CON 34, bringing the elite technical insights of the Village directly to your screen, no badge required!
Live Stream:
youtube.com/redteamvillageRTV Overflow Schedule

Feb. 21, 2026 10:00AM EST
Malware Exploitation in PDFs
~ # Filipi Pires
Uncover the hidden dangers within the world’s most common document format by dissecting real-world PDF exploits, from heap spray attacks to covert data exfiltration. This deep dive equips offensive security professionals with the technical knowledge to master shellcode injection and memory manipulation, staying one step ahead of sophisticated adversaries.

Feb. 21, 2026 11:00AM EST
Ransomware vs EDR
~ # Zoziel P. Freire
Challenge the perceived invincibility of Endpoint Detection and Response (EDR) by examining cross-platform ransomware tactics designed to exploit telemetry gaps and behavioral blind spots. Through live demonstrations and technical walkthroughs of evasion strategies on Windows, macOS, and Linux, this session provides blue teamers and threat hunters with a pragmatic roadmap for building resilient, attacker-aware defenses.

Feb. 21, 2026 12:00PM EST
Glytch C2
~ # Anıl Çelik & Emre Odaman
Discover the future of stealthy post-exploitation with GlytchC2, a tool that leverages live streaming platforms to create a near-undetectable Command-and-Control (C2) channel. This session explores how to bypass traditional network defenses by using Twitch to execute OS commands and exfiltrate data, complete with a live demo of the framework’s covert capabilities.

Feb. 21, 2026 1:00PM EST
Red-for-Blue: Fortifying Applications Through Actionable Red-Teaming
~ # Itsik Mantin & Itay Hazan
Step into the front lines of GenAI defense by exploring a novel red-teaming approach designed to fortify LLM applications against rapidly evolving attack surfaces. This session introduces a powerful “security triangle”—combining threat-wise prompt red-teaming, automated prompt patching, and security-steerable models—to transform offensive insights into actionable application hardening.

Feb. 21, 2026 2:00PM EST
Don't Be LLame - The Basics of Attacking LLMs
~ # Alex Bernier & Brent Harrel
Demystify the mechanics of Large Language Models to uncover high-impact attack surfaces that often bypass traditional monitoring and security controls. This session bridges the gap between theoretical LLM behavior and practical Red Team operations, focusing on prompt injection strategies that achieve critical objectives like lateral movement and privilege escalation.

Feb. 21, 2026 3:00PM EST
Building Your First Windows Malware Loader
~ # Royce Yaezenko
Demystify the construction of malicious binaries in this hands-on workshop that guides participants through building a fully functional Windows 11 process-injection loader from scratch. By mastering the “classic three-call” technique and implementing essential evasion tactics like XOR obfuscation and file bloating, attendees will gain practical experience in both malware assembly and defensive bypass strategies.

Feb. 21, 2026 4:00PM EST
OSINT for Hackers
~ # Lee McWhorter
Master the art of turning public data into a powerful offensive advantage through high-impact reconnaissance techniques and immersive, hands-on exercises. This interactive workshop dives into the most effective OSINT tools and methodologies, empowering attendees to uncover actionable intelligence and significantly increase their value within any security organization.

Feb. 21, 2026 5:00PM EST
Adversary Intel Lab
~ # Fredrik Sandstorm
Transform raw threat intelligence into actionable operations by analyzing real-world adversary behaviors and identifying critical TTPs. Participants will leverage the ATT&CK Navigator to bridge the gap between intelligence and execution, walking away with a completed adversary worksheet and a functional red team emulation playbook.

Feb. 21, 2026 6:00PM EST
Hiring or Triangle of Pain
~ # Frank Victory
Frank Victory has spent 30 years navigating the gray areas between breaking and building. A firm believer that shells matter more than titles, Frank’s career spans the full spectrum of the craft—from deep-dive incident response and threat hunting to offensive adversary simulation. When he is not securing enterprise environments, he is training the next generation of hackers, teaching Social Engineering and Ethical Hacking at the University level. As the President of Denver OWASP and the force behind the SnowFROC conference, Frank is a pillar of the Colorado security scene and host of the interview portion of the Colorado = Security Podcast, where he’s spent years asking one question: What is the biggest challenge in cybersecurity today?