Skip to content

Details

⚠️ REGISTRATION IS REQUIRED VIA THIS GOOGLE FORM ⚠️

ABSTRACT
SHELLgym is the regular cybersecurity workout you have been looking for! Whether you're just starting out and need some exercises, studying for a cert (hint: OSCP), looking at CTF challenges, or developing something cybersecurity-related (maybe your own automated tools?), SHELLgym aims to help you progress in picking up practical cybersecurity knowledge and skills. Come and go as you please, work on your own stuff with like-minded individuals, or just have fun during the workout!

AGENDA
Thematic activities for this session

  • Triaging in Windows (sysinternals)
  • Step-by-step windbg
  • Guided walkthrough on selected real-life binary

⚠️ NOTE
Bring your own laptops (and laptop chargers) with pre-installed Windows VM. Please also download windbg (Link to Guide) before the session.

VIRTUAL SHELLgyms in MARCH
Hosted on Discord, do approach KK or the Div0 Crew for access!

  • 7 Mar 2026, 1pm-3pm (SGT)
  • 21 Mar 2026, 1pm-3pm (SGT)
  • 28 Mar 2026, 1pm-3pm (SGT)

TRAINER
KK "Jim" Tan — Founder, counterShell
As a mid-careerist convert to cybersecurity, Jim picked up his practical skills through getting OSCP certified and by participating in a variety of CTFs. In his career at CSIT, he performed a variety of red-teaming and vulnerability research roles and established the Cyber Training School at CSIT as the Lead Instructor. Besides the OSCP certification, Jim is also OSCE and OSEE certified, and has a Bachelor's degree in Social Science (Psychology). He now sees psychology as a field of study where you fuzz humans until they produce unexpected behaviour.

SPONSORS

IMPORTANT NOTICES

Related topics

Events in Singapore, SG
Computer Security
Cybersecurity
Ethical Hacking
Hacking
Information Security

Sponsors

IIC Productions Pte Ltd

IIC Productions Pte Ltd

Manager & Sustaining Sponsor

Red Alpha

Red Alpha

Sustaining Sponsor

CyberSG TIG Collaboration Centre

CyberSG TIG Collaboration Centre

Sustainable Partner

You may also like