Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Twitter
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my Twitter
.
►
WICCON 2024
Building An Appsec Program From Scratch
- Mireia Cano
►
WICCON 2024
Abacus: Software For Secure And Transparent Voting Results
- Marjolein Tamis and Ellen Van Leeuwen
►
WICCON 2024
Charting The Course: Navigating Maritime Cybersecurity
- Anna Prudnikova
►
WICCON 2024
Mission: Impossible - Chatcontrol
- Helma De Boer
►
WICCON 2024
How To Navigate The Cyber Resilience Act
- Raluca Viziteu
►
WICCON 2024
AirDrop Forensics
- Kinga Kieczkowska
►
WICCON 2024
Turning Neurodiversity Into A Strength
- Tirza Dijkstra
►
WICCON 2024
Hacking The Vote: Why The Paper Trail Matters In Elections
- Fleur Van Leusden
►
WICCON 2024
Opening
- Jaimy Thepass
►
Hack.lu 2024
CTF Prizegiving Ceremony
- Hack.lu
►
Hack.lu 2024
Disconnecting Games With A Single Packet: An Unreal Untold Story
- Hugo Bertin
►
Hack.lu 2024
Mercator: Mapping The Information System
- Didier Barzin
►
Hack.lu 2024
Detection And Response For Linux Without EDR
- Hilko Bengen
►
Hack.lu 2024
Reverse Engineering Android Apps With ACVTool
- Aleksandr Pilgun
►
Hack.lu 2024
Internal Domain Name Collision 2.0
- Philippe Caturegli
►
Hack.lu 2024
Luks Full Disk Encryption Upside-Down
- Michael Hamm
►
Hack.lu 2024
Learn Anything - Reload
- Pauline Bourmeau (Cookie)
►
Hack.lu 2024
Pentests Using LLMs
- Al Mochkin
►
Hack.lu 2024
AIL Project: Secrets In Squares - QR Codes
- Aurelien Thirion
►
Hack.lu 2024
Sigma Unleashed: A Realistic Implementation
- Mathieu Le Cleach
►
Hack.lu 2024
New Features In The Zeek Network Monitor
- Christian Kreibich
►
Hack.lu 2024
The XE Files: Trust No Router
- James Atack
►
Hack.lu 2024
The Ouroboros Of Cybercrime: Witnessing Threat Actors Go From Pwn To Pwn'd
- Estelle Ruellan & Stuart Beck
►
Hack.lu 2024
Understanding File Type Identifiers & Scanners
- Ange Albertini
►
Hack.lu 2024
Keys To The City: The Dark Trade-Off Between Revenue And Privacy In Monetizing SDKs
- Dimitrios Valsamaras
►
Hack.lu 2024
SQL Injection Isn't Dead: Smuggling Queries At The Protocol Level
- Paul Gerste
►
Hack.lu 2024
Ghosts'n'Gadgets: Common Buffer Overflows That Still Haunt Our Networks
- Stanislav Dashevskyi
►
Hack.lu 2024
Making IOT Great Again
- David Durvaux & Marc Durvaux
►
Hack.lu 2024
Quantum Cybersecurity: Pioneering A Secure Future
- Samira Chaychi & Sharif Shahini
►
Hack.lu 2024
MISP Playbooks, Proving The Value Of Cyber Threat Intelligence And ICS-CSIRT.io
- Koen Van Impe
►
Hack.lu 2024
Vulnerability Lookup
- Cédric Bonhomme
►
Hack.lu 2024
Analysis And Forecasting Of Exploits With AI
- Roman Graf
►
Hack.lu 2024
Future Of Websites Without DDoS
- Lukáš Kršek
►
Hack.lu 2024
Using LLM Locally
- Pauline Bourmeau (Cookie)
►
Hack.lu 2024
Running Circles Around Threat Actor Tooling Using Javascript Data Visualisation
- Chris Horsley
►
Hack.lu 2024
From 0 To Millions: Protecting Against AitM Phishing At Scale
- Jacob Torrey
►
Hack.lu 2024
Scam As A Service Powered By Telegram
- Aurimas Rudinskis
►
Hack.lu 2024
The Good, The Bad, And The Ugly: Microsoft Copilot
- Inbar Raz & Michael Bargury
►
Hack.lu 2024
Blowing Up Gas Stations For Fun And Profit
- Pedro Umbelino
►
Hack.lu 2024
Back To The Failure: Did Your Physical Security Really Evolve In The Last 40 Years?
- Simon Geusebroek
►
Hack.lu 2024
Sharing IoC - Wrong Answers Only
- Deborah Servili
►
Hack.lu 2024
Unlocking BEAM's Pandora's Box: Security Pitfalls In Distributed Erlang And Elixir Systems
- Jean-Louis Huynen
►
Hack.lu 2024
DFIQ: Codifying Digital Forensic Intelligence
- Thomas Chopitea
►
Hack.lu 2024
Securing The Stars: Comprehensive Analysis Of Modern Satellite Vulnerabilities And Emerging Attack Surfaces
- Vic Huang
►
Hack.lu 2024
Spicy — Generating Robust Parsers For Protocols & File Formats
- Benjamin Bannier
►
Hack.lu 2024
Artemis: How CERT PL Improves The Security Of The Polish Internet
- Krzysztof Zając
►
Hack.lu 2024
Empowering Cybersecurity Outreach And Learning Through Collaborative Challenge Building, Sharing, And Execution
- David Durvaux & Alexandre Dulaunoy
►
Hack.lu 2024
I Need Access: Exploit Password Management Software To Obtain Credential From Memory
- Efstratios Chatzoglou
►
Hack.lu 2024
How Much Time We Had For IPv6 Preparation?
- Nicol Dankova
►
Hack.lu 2024
Any Sufficiently Advanced Technology Indistinguishable From 01 January 1970
- Trey Darley
►
Hack.lu 2024
How I Learned To Stop Worrying And Love The NLF
- Fukami
►
Hack.lu 2024
Flowintel - Flow Your Management
- David Cruciani
►
Hack.lu 2024
A Quick Monologue On Global Inefficiency
- Claus Cramon Houmann
►
Hack.lu 2024
The Web Of Cognitive Warfare
- Jindrich Karasek
►
Hack.lu 2024
KubeHound: Identifying Attack Paths In Kubernetes Clusters At Scale With No Hustle
- Julien Terriac
►
Hack.lu 2024
IoT Hacks Humans: Unexpected Angles Of Human Process Compromise
- Vladimir Kropotov
►
Hack.lu 2024
The Gist Of Hundreds Of Incident Response Cases
- Stephan Berger
►
Hack.lu 2024
Decoding Galah: An LLM Powered Web Honeypot
- Adel Karimi
►
Hack.lu 2024
In-Depth Study Of Linux Rootkits: Evolution, Detection, And Defense
- Stephan Berger
►
Hack.lu 2024
Trying Gateway Bugs: Breaking Industrial Protocol Translation Devices Before The Research Begins
- Claire Vacherot
►
Hack.lu 2024
Malware And Hunting For Persistence: How Adversaries Exploit Your Windows?
- Cocomelonc
►
Hack.lu 2024
You Just Got A CTI Program Funded. Now What?
- Lukas Vytautas Dagilis
►
Hack.lu 2024
Dredge: An Open Source Framework For Cloud Incident Response
- Santi Abastante
►
Hack.lu 2024
Automating Dark Web CTI Reports With RAG Insight For MISP Sharing
- Shing-Li Hung
►
Hack.lu 2024
Nothing To See Here! On The Awareness Of And Preparedness And Defenses Against Cloaking Malicious Web Content Delivery
- Jeroen Pinoy
►
Hack.lu 2024
Running Exercises With SkillAegis
- Sami Mokaddem
►
Hack.lu 2024
Latest Updates On Kunai
- Quentin JEROME
►
Hack.lu 2024
Cyrus - The Story Of No Cloud
- Guillaume Ginis
►
Hack.lu 2024
Catching Phish Using Publicly Accessible Information
- Aurimas Rudinskis
►
Hack.lu 2024
Lessons Learned From (Almost) 8 Years Of Sigma Development
- Thomas Patzke
►
Hack.lu 2024
Integrating New Tools In Your Workflows Within Minutes In MISP
- Sami Mokaddem
►
Hack.lu 2024
NeuroCTI - A Custom LLM For CTI: Benchmarking, Successes, Failures And Lessons Learned (Updates)
- Aaron Kaplan
►
OrangeCon 2024
Closing Ceremony
- Fish_ and Cherry & Stef
►
OrangeCon 2024
Confusion Attacks: Exploiting Hidden Semantic Ambiguity In Apache HTTP Server!
- Orange Tsai
►
OrangeCon 2024
Graph API Mastery: Logs To Real World Attacks
- Shiva P & Parthiban R
►
OrangeCon 2024
Attacking Primary Refresh Tokens Using Their MacOS Implementation
- Dirk-Jan Mollema & Olaf Hartong
►
OrangeCon 2024
How To Crack Seven Billion Passwords?
- Jeroen Van Beek
►
OrangeCon 2024
Offensive Development In Modern Languages
- Cas Van Cooten
►
OrangeCon 2024
All Cops Are Broadcasting: Breaking TETRA After Decades In The Shadows
- Wouter Bokslag
►
OrangeCon 2024
Protecting Organizations Against AITM: Lessons Learned
- Rik Van Duijn & Wesley
►
OrangeCon 2024
An Angel, Python, Root And Config Walked Into A Bar...
- Timothy Hjort
►
OrangeCon 2024
Securing OT, Too Hard Or Not For Me?
- Erwin Paternotte
►
OrangeCon 2024
Exploiting The Core: A Deep Dive Into Kernel Driver Vulnerability Hunting
- Jan-Jaap Korpershoek
►
OrangeCon 2024
The Registry Rundown
- Cedric Van Bockhaven & Max Grim
►
OrangeCon 2024
From COM Object Fundamentals To UAC Bypasses
- Tijme Gommers
►
OrangeCon 2024
Making Penetration Testing Auditable
- Brenno De Winter
►
OrangeCon 2024
Securing Devices Or Profits? Examining The Device Security Of A Network Appliance Vendor
- Hal Martin
►
OrangeCon 2024
Low Energy To High Energy: Hacking Nearby EV-Chargers Over Bluetooth
- Daan Keuper
►
OrangeCon 2024
Cybersecurity’s New Imperative: Metawar Defending The Cognitive Infrastructure
- Winn Schwartau
►
OrangeCon 2024
Orange Is The New Black
- Fish_ and Cherry & Stef