Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Bluesky
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my BlueSky.
.
►
WICCON 2025
Unsafe Code Lab: How Modern Web Frameworks Fail (And How To Fix Them)
- Irina Iarlykanova
►
WICCON 2025
When Nostalgia Hacks Back: A Forensic Autopsy Of A Trojanized Flash Game
- Ankshita Maunthrooa
►
WICCON 2025
We've Gathered 4000 Hackers On A Field And Here's What Happened
- Nancy Beers
►
WICCON 2025
Crack, Communicate, Change: Turning Password Failures Into Security Wins
- Nynke Damstra
►
WICCON 2025
Hooray, I Failed!
- Tess Sluijter-Stek
►
WICCON 2025
Embedded AI: Evolving Attack Surface And Ways To Defend Them
- Prithvi Bhat
►
WICCON 2025
Breaking In: A Journey Through The Cybersecurity Hiring Maze
- Lianne Klaver
►
Hack.lu 2025
French Stealer Ecosystem: The Resurgence Skid Gangs In Cybercrime Space
- 0xSeeker
►
Hack.lu 2025
CLI Ambush
- William Robinet
►
Hack.lu 2025
Beyond Post-quantum Stereotypes
- Antoine Gicquel & Benjamin Sepe
►
Hack.lu 2025
DCOM Turns 20: Revisiting A Legacy Interface In The Modern Threatscape
- Julien Bedel
►
Hack.lu 2025
Automotive Security Analyzer For Exploitability Risks: An Automated And Attack Graph-Based Evaluation Of On-Board Networks
- Martin Salfer
►
Hack.lu 2025
Revisiting RAND’s Lost Monte Carlo Simulations: Sharla Perrine, Paul Baran, And The True Business Case For The Internet
- Trey Darley
►
Hack.lu 2025
Threat Actor Tripping On The Finish Line
- Rasmus
►
Hack.lu 2025
Pwn2Own: Hacking IoT Devices
- Adam
►
Hack.lu 2025
4-Byte Hell: When Unicode Enters The Stage
- Jonas Hess
►
Hack.lu 2025
Reverse Engineering, For Real
- Henri Ahola
►
Hack.lu 2025
Bugs In The Human Code: Help Timo
- Paul Hirtz
►
Hack.lu 2025
Fake Likes, Real Risks: Mapping Fake Social Activity Shops in Europe
- Sviatlana Höhn & Anastasia "Asya" Sergeeva
►
Hack.lu 2025
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations
- Cocomelonc
►
Hack.lu 2025
Lethal Language Models: From Bit Flip To RCE In Ollama
- Paul Gerste
►
Hack.lu 2025
Russian-speaking Underground:- Changes In
- Vladimir Kropotov
►
Hack.lu 2025
From YAML To Root: CI/CD Pipeline Attacks And Countermeasures
- Hugo
►
Hack.lu 2025
Palo Alto GlobalProtect: Remote Full Compromise Exploit Chain
- Maxime Escourbiac
►
Hack.lu 2025
Breaking Android IPC: A Deep Dive Into AIDL Fuzzing
- Rajanish Pathak & Hardik Kamlesh Mehta
►
Hack.lu 2025
Hacking For Hoodies: MISP Edition
- Jeroen Pinoy
►
Hack.lu 2025
How To Better Identify (Weaponized) File Formats With Ftguess
- Philippe Lagadec
►
Hack.lu 2025
What's New In Suricata 8: Enhanced Detection And Performance
- Peter Manev & Eric Leblond
►
Hack.lu 2025
Wyse Management Subversion: Taking Over Dell's Wyse Management Suite
- Alain Mowat
►
Hack.lu 2025
2038 Is Gonna Be Epoch!
- Trey Darley & Pedro Umbelino
►
Hack.lu 2025
Livewire: Remote Command Execution Through Unmarshalling
- Rémi Matasse & Pierre Martin
►
Hack.lu 2025
Revisiting Widevine L3: DRM As A Playground For Hackers
- Felipe Custodio Romero
►
Hack.lu 2025
5 Years Collecting CyberSecurity Tools
- Jonathan Scoupreman
►
Hack.lu 2025
Tools To Streamline Creation Of Technical Presentations
- Kirils Solovjovs
►
Hack.lu 2025
OpenTIDE: When TI Made Actionable Drives Your Threat Detection
- Remi Seguy
►
Hack.lu 2025
ICRC's Trust And Safety: Armed Conflict
- Vitaly Savenkov
►
Hack.lu 2025
Building A Pipeline To Analyse IOS Devices At Scale
- David Durvaux & Christophe Vandeplas
►
Hack.lu 2025
My Other ClassLoader Is Your ClassLoader: Creating Evil Twin Instances Of A Class
- Dimitrios Valsamaras
►
Hack.lu 2025
Field Guide To Physical Attacks Against Full-disk Encryption
- Edouard D'hoedt & Hayk Gevorgyan
►
Hack.lu 2025
One Day At The Internet Storm Center
- Xavier Mertens
►
Hack.lu 2025
Attacking The Developer Environment Through Drive-by Localhost Attacks
- Joseph Beeton
►
Hack.lu 2025
Instrumenting Software Builds To Detect Stealth Backdoors And Other Curiosities
- Hilko Bengen
►
Hack.lu 2025
Compromising Threat Actor Communications
- Ben (@polygonben)
►
Hack.lu 2025
Nightmare On NTLM Street: Legacy’s Revenge
- Marina Bochenkova
►
Hack.lu 2025
The Heavy Shadow Of Imposter Syndrome
- Tammy Harper
►
Hack.lu 2025
The CVE-Search Design Failure(s)
- Alexandre Dulaunoy & Cédric Bonhomme
►
Hack.lu 2025
The Beauty Of Vibe Coding
- Andras Iklody
►
Hack.lu 2025
Suricata Lua Support
- Eric Leblond
►
Hack.lu 2025
Analysing The 1991 Lips Eloctro Mechatronic Lock
- Walter Belgers
►
Hack.lu 2025
Phish Perfect: How I Broke The Thing While Trying To Protect It
- Melina Phillips
►
Hack.lu 2025
A Quick Retrospective Of A Student Discovering Programming & Other Failures
- Sami Mokaddem
►
Hack.lu 2025
101: How To Break IPS & SIEM
- Nicol Dankova
►
Hack.lu 2025
Kaitai Struct: A Tool For Dealing With Binary Formats
- Petr Pucil & Mikhail Yakshin
►
Hack.lu 2025
Integrating Zeek With Third-Party Applications
- Christian Kreibich
►
Hack.lu 2025
What Malware Leaves Behind: Analysing Forensic Traces Of Ransomware
- Ankshita Maunthrooa
►
Hack.lu 2025
Digic8 Oracle
- Laurent Clevy
►
Hack.lu 2025
Security Monitoring And Response In Large Linux Environments
- Hilko Bengen & Hendrik Schmidt
►
Hack.lu 2025
Open Source Is A Virus
- Philippe Ombredanne & Prabhu Subramanian
►
Hack.lu 2025
Meet Plum, The Challenge Of Your Own ASR For Free
- Paul Jung
►
Hack.lu 2025
RANGE42: An Open Source Cyber Range
- Benjamin Collas
►
Hack.lu 2025
Smack My LLM Up!
- Jindrich Karasek
►
Hack.lu 2025
Silent Killers: Unmasking A Large-Scale Legacy Driver Exploitation Campaign
- Jiří Vinopal
►
Hack.lu 2025
Slipping Through The Cracks: How Malicious Emails Evade Detection
- Elyssa Boulila
►
Hack.lu 2025
Reversing A Pay Phone For Fun But No Profit
- Inbar Raz
►
Hack.lu 2025
Exploring Threats Leveraging Blockchains
- Paul Rascagneres
►
Hack.lu 2025
A Pragmatic Approach To Build A Threat Landscape
- Thomas Patzke
►
Hack.lu 2025
From Achilles To NIS2: Slovakian Lessons On Proactive Cybersecurity And Vulnerability Disclosure
- Michal Rampášek & Alexander Valach
►
Hack.lu 2025
Phishing Detection Using Various Parts Of DNS Ecosystem
- Piotr Białczak & Michał Hałoń
►
Hack.lu 2025
OverLAPS: Overriding LAPS Logic
- Antoine Goichot
►
Hack.lu 2025
Oops, I Hacked It Again: Tales And Disclosures
- Ignacio Navarro
►
Hack.lu 2025
No Way To Enable SSH Access To Your New Router? The Vendor Might Have Something To Hide
- Stanislav Dashevskyi & Francesco La Spina
►
Hack.lu 2025
intelmq.ai - Adding ML Model Support To Intelmq
- Aaron Kaplan and Sebastian Wagner & Jürgen Brandl
►
Hack.lu 2025
Fake Jobs, Real Malware. Uncovering How Cybercriminals Are Exploiting The Employment Market
- Ionuț Baltariu
►
Hack.lu 2025
From Buzzword To Battlefield: The Cybersecurity Challenges Of Smart Cities
- Marina Bochenkova
►
Hack.lu 2025
Incident Reporting Made Easy, Using Draugnet
- Andras Klody
►
Hack.lu 2025
Hunting For Linux Extended File Attributes
- Xavier Mertens
►
Hack.lu 2025
Fearless File Identification
- Quentin Jerome
►
Hack.lu 2025
Detection Coverage In Today's Blue Team World
- Claus
►
Hack.lu 2025
Red Team Story: Offline SCCM Backup Secrets Decryption
- Martino
►
Hack.lu 2025
B.o.D.: Bytes Over DNS
- Didier Stevens
►
Hack.lu 2025
LOLBlue : Living Off The Land With Blue Team Tools
- Maxence Fossat & Antoine C
►
Hack.lu 2025
Containing The Threat: Analyzing Cryptomining Campaigns
- Bogdan Trufanda & Mihai Vasilescu
►
Hack.lu 2025
Confessions Of A Linux Drama Queen: Incident Response When Hackers Try To Steal Your Spotlight
- Melina Phillips
►
Hack.lu 2025
Anti-Forensics - You Are Doing It Wrong (Believe Me, I'm An IR Consultant)
- Stephan Berger
►
BSides Bristol 2025
From Payloads To People: The Other Half Of The Job
- Dumisani Masimini
►
BSides Bristol 2025
The Dangers Of OT Malware: Hacking A Nuclear Power Station
- Matt Mckenzie
►
BSides Bristol 2025
Container Internals And Privilege Escalation
- Prabhsimran
►
BSides Bristol 2025
Using Machine Learning For Risk Analysis In RBAC For IOT Applications
- Benjamin
►
BSides Bristol 2025
Level Up Your SE Game: An Intro To Basic Psychology
- Chris Pritchard
►
BSides Bristol 2025
The Psychology Of Cyber: Navigating A Crisis Like A Pilot
- George Chapman