x33fcon 2026 - Practical Linux Attack Paths and DFIR/Hunting v2.0
Over three intensive days in Gdynia, you'll work through real Linux attack paths, hands-on DFIR workflows, and adversary hunting techniques used in modern purple team operations. No slides-only theory - just practical, lab-driven content built from real-world scenarios. “Practical Linux Attack Paths and DFIR/Hunting for Red and Blue Team v2.0" training often called as "Modern Linux Purple Teaming Exercises" has been created with a focus on realistic hands-on experience in analyzing user space, kernel space and eBPF Linux rootkits, covering recent persistence, defense evasion techniques and C2 behaviors vs active detection, hunting and DFIR tooling in Linux ecosystem. The entire material is based on a custom EDRmetry Linux Matrix (400+ offensive techniques), which is a central hands-on Linux knowledge base in the friendly search-copy-paste-run format. The hunting, detection, and forensics layers are modular and stackable, allowing you to build your own detection paths required in detection engineering and incident handling procedures.
Registration is open now. Review the agenda, grab your seat early, and join us in Gdynia this year: