Next Meetup

[0x6E] - The Meet
[0x6E] - The Meet Summertime is almost over. So all you half-naked people reading this on the beach need to start thinking about returning to the daily grind. Hopefully, you have fully recharged your batteries and ready to consider joining our next gathering. We are already working on some goodies to get you prepared for the cyber battlefield. As usual, we are preparing the agenda with plenty of TLC and soon we'll have all the details to fill you in on the 7th meetup of 2018. Here's a taste of what's coming up - "Bug Bounties: The other side". We'd also like to remind you that the Summer Challenge is still on. The clock is ticking, so try your best and don't miss the opportunity to join the wall of fame full of ninjas, pirates, and masters. In the meantime, you can join our Slack chat ( to discuss all kind of hackish stuff and, of course, interact with others members. Hope to see you soon. [Goals] Learn something new, get to know other g33ks, build an information security community/group in the Porto area and, the most important thing, have fun. [Agenda] - Who are you? (New participants small introduction) - Designing and delivering a Bug Bounty program by João Lima (@joaolima) - Lets play a game by Ricardo Almeida (@vibrio) * Social drinks on the house 😉 [Challenge] The Summer Challenge is up and running and if you didn't try it, you should! No excuses ;)


Avenida Camilo, nº 94, 4300-095 · Porto

    Past Meetups (23)

    What we're about

    Based in Porto, the ØxOPOSɆC group was started by g33ks who are passionate about security. Our primary mission is to discuss and tackle upsurging security issues by leveraging the expertise and know-how of members of the group. During our gatherings, we address topics as diverse as web, network, crypto, legal, reverse, physical, IoT, mobile and pretty much anything related to security. Participants of all skills level are welcome inasmuch as they have a will to share and learn something new.

    Members (861)

    Photos (12)

    Find us also at