There’s a popular myth that ostriches bury their heads in the sand to avoid danger. At Ostrich Lab, we respect that level of unbothered confidence. But if we’ve got our heads buried, it’s probably because we’re halfway through a 48-hour caffeine binge, reverse-engineering firmware, or trying to brute-force enlightenment with a soldering iron.
We don’t avoid challenges. We collect them like rare Pokémon. The mundane? We welcome it with open arms and a packet sniffer. While others are busy optimizing spreadsheets, we’re busy turning chaos into functional prototypes.
We're engineers, researchers, hackers, tinkerers, and the occasional sleep-deprived maniac. We’re united by a love of figuring stuff out, breaking things (on purpose), and putting them back together in even stranger ways. No bug is too sneaky. No protocol is too obscure. No toaster is too smart to be turned into a Linux box.
Join us. Together we'll question reality, bend rules (mostly ethically), and yell "it's not a bug, it's a feature" with unsettling confidence.
This is Ostrich Lab. Sticking your head in the sand is just step one of the penetration test.
SecretFarm made its chaotic debut at DEFCON 32, where hundreds of hackers, hobbyists, and people who wandered in looking for the bathroom tried to break in, break out, or just break something. It was glorious.
Since then, we’ve turned SecretFarm into a hands-on training environment for various groups, because apparently learning works better when it's wrapped in confusion, frustration, and vague threats from outdated hardware.
The goal? Make education not suck. SecretFarm teaches practical skills through exploration, strange puzzles, and a few deliberately questionable design choices. It's part CTF, part digital escape room, part farm. There is livestock involved. You’ll figure it out.
Still live at secretfarm.ostrichlab.io, open to anyone curious (or stubborn) enough to take it on. No signups. No leaderboard. Just you, a shell, and the growing realization that you should’ve read that one hint more closely.
“I thought it was broken. Turns out I was just bad at it.”
— Some guy, three hours in, yelling at a log file
Ostrich Lab showed up and showed out at the Biohacking Capture The Flag (CTF), taking second place out of 142 participants across 66 teams. Not bad for a crew that treats medical devices like digital escape rooms.
This was our second year competing in the BHV CTF, and once again we proved that biomedical cybersecurity isn't just a side project for us. It's what we do. From poking at pacemakers to figuring out what makes hospital hardware tick, we dig into the weird, the wired, and the medically misunderstood.
Curious about the Biohacking Village and why we keep coming back? Head over to villageb.io and see for yourself. Just don’t blame us if you start looking sideways at your fitness tracker.
Need something from the team? Go ahead and email [email protected]. The address says "no-reply" but we like to keep things unpredictable.