Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Bluesky
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my BlueSky.
.
►
BSides Munich 2024
Closing
- BSides Munich Orga
►
BSides Munich 2024
Empowering Pentesters: Strategies For Team Motivation, Purpose And Success
- Bettina Haas
►
BSides Munich 2024
Help, My Application Is Vulnerable, But How Bad Is It? Practical Vulnerability Analysis For Development Teams
- Michael Helwig and Alvaro Martinez
►
BSides Munich 2024
Z/OS For GenZ - Hack The Mainframe
- Jonathan Prince
►
BSides Munich 2024
Becoming The Evil Maid: Hacking Android Disk Encryption For Fun And Profit
- David Gstir
►
BSides Munich 2024
Let's Get Physical: Stories From Behind Your Company's Gate
- Moritz Thomas and Firat Acar
►
BSides Munich 2024
Beyond Manual: Enhancing And Scaling Security With Automation
- Christian Bauer
►
BSides Munich 2024
Demystifying Cloud Infrastructure Attacks
- Alexander
►
BSides Munich 2024
Reverse Engineering And Control Flow Analysis With Intel Processor Trace
- Hagen Paul Pfeifer
►
BSides Munich 2024
Some Thoughts On Penetration Test Reports
- Hans-Martin Muench
►
BSides Munich 2024
Kobold Letters And Other Mischief: How Emails Can Deceive You
- Konstantin Weddige
►
BSides Munich 2024
A Security Champion's Journey: How To Make Things A Bit More Secure Than Yesterday Every Day
- Lisi Hocke
►
BSides Munich 2024
Mystical Vulnerabilities: Exploring The Oddities In Cybersecurity
- Massimo Morello
►
BSides Munich 2024
Ground Control To Major Threat: Hacking The Space Link Extension Protocol
- Andrzej Olchawa
►
BSides Munich 2024
From Boot To Root: Identifying And Mitigating Security Issues In Bootloaders
- Richard Weinberger
►
BSides Munich 2024
Building And Leading Advanced Red Teams
- Bjoern Trappe
►
BSides Munich 2024
Demystifying The First Few Minutes After Compromising A Container
- Stuart McMurray
►
BSides Munich 2024
/proc For Security Analysts: Unveiling Hidden Threats And Forensic Treasures
- Stephan Berger and Asger Strunk
►
BSides Munich 2024
Real-Time Threat Intelligence With ML Feedback Loops
- Tomer Doitshman
►
BSides Munich 2024
Leaking Kakao: How I Found A 1-Click Exploit In Korea's Biggest Chat App
- Dawin Schmidt
►
BSides Munich 2024
8 Bits Wisdom To Secure The Code Of Life
- Desiree Sacher-Boldewin
►
BSides Munich 2024
Welcome
- BSides Munich Orga
►
IRISSCon 2024
Cyber Burnout
- Eleanor Dallaway
►
IRISSCon 2024
Cybersecurity and AI
- Craig Balding
►
IRISSCon 2024
Phishing characterization and mitigation across ccTLDs
- Sebastián Castro
►
IRISSCon 2024
The Ransomware Threat
- Dick O’Brien
►
IRISSCon 2024
It's not you, it's me: Breaking up with panic mode
- Rik Ferguson
►
IRISSCon 2024
Javvad Malik’s Emporium of Cybersecurity Awareness Wonders and Bad Advice
- Javvad Malik
►
IRISSCon 2024
The Rise of the Clones
- Jake Moore
►
IRISSCon 2024
Update on the Network Information Security Directive 2 (NIS2)
- Paul Stanley
►
IRISSCon 2024
Adversary uses of AI & why the technology will hurt them more than help them
- Robert McArdle
►
IRISSCon 2024
Cybercrime: A Group Effort.
- DSI Michael Mullen
►
IRISSCon 2024
Cybersecurity in the C-Suite: Leadership Strategies for Managing Cyber Risks in Emerging Technologies
- Onur Korucu
►
IRISSCon 2024
Digital Doomsday: Building Resilience for Cyber Black Swans
- Dave Lewis & Rich Mogull
►
IRISSCon 2024
Security Through a Data Breach Lens – Utilising Verizon’s Data Breach Investigations Report
- Phillip Larbey
►
IRISSCon 2024
Conference Opening
- Gordon Smith
►
WICCON 2024
Who Watches The Watchmen? Stealing Credentials From Policy-as-Code Engines (And Beyond)
- Shelly Raban
►
WICCON 2024
A Glimpse Into The World Of ICS Monitoring
- Dominika Rusek Jonkers
►
WICCON 2024
IR To CTI - The Other Side Of The Coin
- Daniela
►
WICCON 2024
Building An Appsec Program From Scratch
- Mireia Cano
►
WICCON 2024
Abacus: Software For Secure And Transparent Voting Results
- Marjolein Tamis and Ellen Van Leeuwen
►
WICCON 2024
Charting The Course: Navigating Maritime Cybersecurity
- Anna Prudnikova
►
WICCON 2024
Build Your Own Role-playing Game: The Business Continuity Drill
- Janna Brummel
►
WICCON 2024
When Artificial Becomes Authentic, How Do I Prove I Am Me?
- Nicole Van Der Meulen
►
WICCON 2024
Mission: Impossible - Chatcontrol
- Helma De Boer
►
WICCON 2024
From Galactic Hacker Party 1989 To WHY2025: The History, Future And Importance Of Dutch Hacker Camps
- Boekenwuurm
►
WICCON 2024
How To Navigate The Cyber Resilience Act
- Raluca Viziteu
►
WICCON 2024
Metrics Matter In Effective Human Risk Management
- Gerine Lodder
►
WICCON 2024
AirDrop Forensics
- Kinga Kieczkowska
►
WICCON 2024
Turning Neurodiversity Into A Strength
- Tirza Dijkstra
►
WICCON 2024
Inside Job: Tackling Insider Risk From All Angles
- Diana Makienko and Lucile Renhas
►
WICCON 2024
Hacking The Vote: Why The Paper Trail Matters In Elections
- Fleur Van Leusden
►
WICCON 2024
Opening
- Jaimy Thepass
►
Hack.lu 2024
CTF Prizegiving Ceremony
- Hack.lu
►
Hack.lu 2024
Disconnecting Games With A Single Packet: An Unreal Untold Story
- Hugo Bertin
►
Hack.lu 2024
Mercator: Mapping The Information System
- Didier Barzin
►
Hack.lu 2024
Detection And Response For Linux Without EDR
- Hilko Bengen
►
Hack.lu 2024
Reverse Engineering Android Apps With ACVTool
- Aleksandr Pilgun
►
Hack.lu 2024
Internal Domain Name Collision 2.0
- Philippe Caturegli
►
Hack.lu 2024
Luks Full Disk Encryption Upside-Down
- Michael Hamm
►
Hack.lu 2024
Learn Anything - Reload
- Pauline Bourmeau (Cookie)
►
Hack.lu 2024
Pentests Using LLMs
- Al Mochkin
►
Hack.lu 2024
AIL Project: Secrets In Squares - QR Codes
- Aurelien Thirion
►
Hack.lu 2024
Sigma Unleashed: A Realistic Implementation
- Mathieu Le Cleach
►
Hack.lu 2024
New Features In The Zeek Network Monitor
- Christian Kreibich
►
Hack.lu 2024
The XE Files: Trust No Router
- James Atack
►
Hack.lu 2024
The Ouroboros Of Cybercrime: Witnessing Threat Actors Go From Pwn To Pwn'd
- Estelle Ruellan & Stuart Beck
►
Hack.lu 2024
Understanding File Type Identifiers & Scanners
- Ange Albertini
►
Hack.lu 2024
Keys To The City: The Dark Trade-Off Between Revenue And Privacy In Monetizing SDKs
- Dimitrios Valsamaras
►
Hack.lu 2024
SQL Injection Isn't Dead: Smuggling Queries At The Protocol Level
- Paul Gerste
►
Hack.lu 2024
Ghosts'n'Gadgets: Common Buffer Overflows That Still Haunt Our Networks
- Stanislav Dashevskyi
►
Hack.lu 2024
Making IOT Great Again
- David Durvaux & Marc Durvaux
►
Hack.lu 2024
Quantum Cybersecurity: Pioneering A Secure Future
- Samira Chaychi & Sharif Shahini
►
Hack.lu 2024
MISP Playbooks, Proving The Value Of Cyber Threat Intelligence And ICS-CSIRT.io
- Koen Van Impe
►
Hack.lu 2024
Vulnerability Lookup
- Cédric Bonhomme
►
Hack.lu 2024
Analysis And Forecasting Of Exploits With AI
- Roman Graf
►
Hack.lu 2024
Future Of Websites Without DDoS
- Lukáš Kršek
►
Hack.lu 2024
Using LLM Locally
- Pauline Bourmeau (Cookie)
►
Hack.lu 2024
Running Circles Around Threat Actor Tooling Using Javascript Data Visualisation
- Chris Horsley
►
Hack.lu 2024
From 0 To Millions: Protecting Against AitM Phishing At Scale
- Jacob Torrey
►
Hack.lu 2024
Scam As A Service Powered By Telegram
- Aurimas Rudinskis
►
Hack.lu 2024
The Good, The Bad, And The Ugly: Microsoft Copilot
- Inbar Raz & Michael Bargury
►
Hack.lu 2024
Blowing Up Gas Stations For Fun And Profit
- Pedro Umbelino
►
Hack.lu 2024
Back To The Failure: Did Your Physical Security Really Evolve In The Last 40 Years?
- Simon Geusebroek
►
Hack.lu 2024
Sharing IoC - Wrong Answers Only
- Deborah Servili
►
Hack.lu 2024
Unlocking BEAM's Pandora's Box: Security Pitfalls In Distributed Erlang And Elixir Systems
- Jean-Louis Huynen
►
Hack.lu 2024
DFIQ: Codifying Digital Forensic Intelligence
- Thomas Chopitea
►
Hack.lu 2024
Securing The Stars: Comprehensive Analysis Of Modern Satellite Vulnerabilities And Emerging Attack Surfaces
- Vic Huang
►
Hack.lu 2024
Spicy — Generating Robust Parsers For Protocols & File Formats
- Benjamin Bannier
►
Hack.lu 2024
Artemis: How CERT PL Improves The Security Of The Polish Internet
- Krzysztof Zając