Introduction
At the AI Resilience Hub Village, we explore the latest developments in artificial intelligence and its application in cybersecurity. Our goal is to build resilient AI models and systems that defend against modern-day threats.
Join us at Ekoparty for a series of engaging talks and hands-on workshops where you can learn about AI applied to both attack and defense strategies. We're committed to sharing knowledge and pushing the boundaries of what's possible in the field of AI security.
Workshops & Talks
Our workshops cover a range of topics, from building robust AI systems to understanding how AI can be applied in penetration testing and defense. Speakers will share insights on securing machine learning models and detecting threats in real-time environments.
Schedule
| Talk Title |
Speaker(s) |
Day, Time & Room |
| Hackeando Agentes: Seguridad y Resiliencia en Sistemas AI con MCP y Tooling Real |
Christian Urcuqui |
DIA 1, 9:45 - 10:15 HS · SALA S2 |
| From LLM to Agent Security: how risk scales with autonomy |
Emilio Oropeza |
DIA 2, 9:30 - 10:00 HS · SALA S2 |
| Lost in Disassembly: Building an LLM-Powered Toolkit for Reverse Engineering |
Asher Davila |
DIA 2, 13:30 - 14:00 · SALA S2 |
| Mitigating the OWASP Top 10 LLM Risks |
Jeremy Snyder |
DIA 2, 14:00 - 14:30 · SALA S2 |
| Malware en tiempos de AI |
Insaurralde Nelson David |
DIA 1, 11:15 - 11:45 · SALA M1 |
| El fin de la confianza: Cómo la IA automatiza el engaño |
Jaime Restrepo |
DIA 1, 11:45 - 12:30 · SALA M1 |
| Presentation CATO Networks |
Team CATO Networks |
DIA 1, 13:30 - 14:00 · SALA M1 |
About AI Resilience Hub
The AI Resilience Hub Village is part of Ekoparty, bringing together experts and enthusiasts from around the world to discuss the intersection of artificial intelligence and security. Our mission is to advance the understanding and application of AI in creating more secure systems.
The Statement
This is not a demo. This is live.
The Statement is not a traditional CTF and not a sales pitch. It's a live experiment where real AI systems face real attacks, real defenses, and real consequences — all happening in front of you.
We brought TokioAI — a full autonomous security platform built from Patagonia — and we're putting it to the test on stage. Everything you see is running live: the monitoring, the attacks, the defense, the patching, the robots. Nothing is pre-recorded. Nothing is scripted.
What's happening on the floor:
- Live WAF under attack: A real Web Application Firewall with 26 signatures, behavioral rules, honeypot traps, and IP reputation scoring. We will attack it live — SQLi, XSS, path traversal, log4j, zero-day payloads — and watch TokioAI detect, classify, correlate, and block in real time. Every request. Every decision. On screen.
- Real-time monitoring dashboards: Live panels showing attack traffic, threat classification, multi-phase correlation (recon → probe → exploit → exfiltration), and autonomous blocking decisions. You see the AI think.
- Infrastructure patching in real time: When we find a vulnerability, TokioAI patches it live — SSHing into servers, editing configs, restarting services, verifying the fix. One prompt, multiple tool calls, zero human intervention.
- Robot fleet control: Two robots on the floor — a PiDog and a PiCar-X — both controlled by TokioAI through natural language. Patrol commands, camera feeds, sensor telemetry, all orchestrated by the AI agent. Speak to it, and the robot moves.
- Bug hunting session: We pick a target (with authorization), point TokioAI at it, and let the AI scan, enumerate, probe, and report. Live vulnerability assessment driven by AI tool calling — not a wrapper around nmap, but an AI that decides what to scan, interprets results, and chains tools intelligently.
- WiFi defense: A live wireless defense system monitoring the airspace — detecting deauth attacks, evil twins, probe floods, and rogue access points. If someone tries something funny on the WiFi, the screen lights up.
- AI vs AI — The Trial: An attacking AI agent tries to compromise an IoT device. A defending AI agent protects it, reacting and adapting in real time. Humans can jump in with their own tools, scripts, SDRs, fuzzers, or LLMs. Whoever establishes Command & Control wins the round.
- Computer vision + face recognition: A Raspberry Pi with a Hailo AI accelerator running real-time object detection and face identification — the AI identifies who's standing at the booth and reacts accordingly.
- Drone control: DJI Tello flight control via natural language — takeoff, patrol patterns (square, triangle, circle, zigzag, sweep), camera feed, telemetry. Tell the AI to fly, and it flies.
The engine behind it all: TokioAI
Everything running on stage is powered by TokioAI — an open source AI engine with native tool calling. Not regex parsing. Not prompt hacking. Real structured function calls through Claude, GPT, and Gemini APIs. The AI decides what tool to use, executes it, reads the result, and decides the next step. Up to 25 rounds of autonomous action per task.
38 tools in production: shell execution, SSH into any server, file operations, network scans, Docker management, WAF control, robot commands, drone flight, vision analysis, and more. One brain, many hands.
It's open source. You can install it right here.
Try it yourself:
- Install TokioAI at the booth: Bring your laptop, we'll help you set it up in 2 minutes. Works with any API key — Claude, GPT, Gemini, or run it free with Ollama locally.
- Attack the WAF: We'll give you a target and let you try to bypass the defenses. Can you evade 26 signatures and a behavioral AI? Bring your payloads.
- Control the robots: Walk up to the terminal, type a command in natural language, and watch the robot execute it. No programming required.
- Join The Trial: Just stop by the AI Resilience Hub booth and jump in. No registration needed. Bring your tools, your scripts, your creativity.
- Learn to build: We'll show you how TokioAI works under the hood — how to add tools, connect providers, and build your own AI-powered security platform.
Practical info:
- When & where: May 21–22 — Ekoparty Miami, Loews Miami Beach Hotel (1601 Collins Ave, Miami Beach) — AI Resilience Hub Village.
- Bring your laptop and your tools. SDRs, boards, frameworks, LLMs — whatever you work with.
- Rounds are timed and moderated. Safety rules enforced. Everything stays inside the Statement environment.
- No attacking external infrastructure. Play hard, play smart, play fair.
Why come?
Because you won't see this anywhere else. Not a slideshow. Not a keynote about what AI “could” do. This is an AI defending real infrastructure against real attacks, controlling real robots, patching real servers — live, in front of you. And you can be part of it.
Come break things. Come build things. Come see what happens when AI stops being a buzzword and starts being a weapon.
GET TOKIOAI → GITHUB
Call for Papers
We are accepting submissions for papers to be presented at AI Resilience Hub Village. Whether your focus is on AI security, offensive and defensive applications, or securing machine learning models, we want to hear from you. Submit your talk proposal for a chance to present at Ekoparty by filling out this form: AI Resilience Call for Papers Form. Always check your spam, just in case 😉.
Topics:
- AI Applied to Cyber Defense and Attack (Purple Team AI): Focus on how AI is used both to attack and defend security infrastructures.
- Adversarial Attack Techniques: Exploiting AI Models: How adversarial attacks can alter machine learning models.
- Prompt Injection in Generative Models: Challenges and Solutions: Technical insights on exploiting and defending against prompt injections.
- Attacks and Defense of AI-Powered Computer Vision Systems: Defending neural-powered computer vision systems in critical scenarios.
- Risk Mitigation in Machine Learning: Building Robust AI Systems: Strategies for securing machine learning models.
- Ethical Use and Concerns Regarding AI in Cybersecurity: Discussing the ethical implications of AI in cybersecurity.
- Detection and Prevention of Attacks on AI Models through Self-Learning: How self-learning models can prevent future attacks.
- Prompt Injection: Crafting Challenges and Defending Against Language Model Manipulation: Creating challenges and defending against prompt injection.
- Challenges of Using AI for Real-Time Vulnerability Detection: Using AI for continuous, real-time vulnerability detection.
- Deploying AI Systems in Offensive and Defensive Environments: Hands-on deployment of AI in real-world offensive and defensive scenarios.
- Automating CTFs with Artificial Intelligence: How AI can automate challenges in CTFs, enabling scalability.
- Strengthening AI Models Against Prompt Injection and Other Emerging Attacks: Techniques to secure AI models from new threats.
- AI for Detecting Advanced Threats in IoT Networks: Using AI to detect threats in IoT environments.
- AI vs. AI: Competitions of Intelligent Models in Simulated Attacks and Defenses: Competitive AI-driven offensive and defensive simulations.
- Security in the AI Data Supply Chain: Securing data inputs to prevent vulnerabilities in AI systems.
Contact Us
Email: contact@airesiliencehub.space