Registration + Tea/Coffee
Introduction to THREAT CON
Automation for Manual Bug Bounty Hunters by Eugene Lim
Attacking Access Control Model in Modern Web Apps by Imran Parray
Tea / Networking Break
Discovering the hidden treasures in Mobile Apps by Rahul Kankrale & Akshansh Jaiswal
Frida Unleashed - Scratching beneath the surface of bug bounties by Bharath Kumar & Akshay Jain
Lunch Break
Tour of Common Web3 Vulnerabilities by Rudra & Arbaz Hussain
XSS Curioxssity by Ahmad Ashraff Ahmad
Networking Break
Account hijacking chaining abnormal flows in OAuth combined with URL-leaking gadgets by Frans Rosen
Closing/token of love presentation/CTF winner
Closing Session