The security research workflow for IM applications has changed. Large language models can now read and classify thousands of decompiled functions in minutes, build protocol clients from documentation, and map attack surfaces across entire applications. But they also hallucinate about code paths that don't exist and confidently recommend exploit strategies against unreachable targets. Knowing where to trust them and where to verify is the new core skill.
This four-day course teaches a methodology for IM vulnerability research and exploitation that generalizes across targets. We use Telegram and WhatsApp as case studies because together they cover the two main scenarios a researcher faces: an open-source application where the challenge is scale, and a closed-source, heavily obfuscated application where the challenge is understanding. Students build an LLM-powered vulnerability research pipeline in Python against both the OpenAI API and the Claude Agent SDK, then turn it against Telegram's animated sticker processing to independently rediscover a real, recently-disclosed vulnerability class.
The pipeline is model-agnostic by design. Inference runs against multiple backends: a dedicated GPU server hosting leading open-weight models (currently GLM-5.1 and Kimi K2.5, subject to change as the field moves), and commercial APIs including Claude via the Agent SDK. Students use multiple models throughout the course. The course treats model selection as a first-class research decision: which model to use for which task, when to switch, and why.

Nitay Artenstein is a senior security researcher and the leader of an international research group.
He has been a speaker at various security conferences, including Black Hat and Recon, and has conducted training sessions in Linux kernel exploitation and baseband research.
He suffers from a severe addiction to IDA Pro (at least until he gets used to Ghidra’s GUI), and generally gets a kick out of digging around where he’s not supposed to.
Day 1: Reverse Engineering and LLM-Assisted Analysis
Day 2: Dynamic Analysis and Protocol Dissection
Day 3: LLM-Powered Vulnerability Research
Day 4: Exploiting a Live Vulnerability
Silvio La Porta & Antonio Villani