• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2019
  • 2018
  • 2017
  • 2016
Edition logo

Hack.lu 2023

2023-10-16 - 2023-10-19
  • Thumbnail for the video - click to play

    ►

    Sbud: Infovis In Infosec
    - Ange Albertini
  • Thumbnail for the video - click to play

    ►

    Detecting VPNs/Proxies By Analyzing Their Attack Patterns Over Time
    - Emanuel Seemann
  • Thumbnail for the video - click to play

    ►

    SBOMs: Are They A Threat Or A Menace?
    - Philippe Ombredanne
  • Thumbnail for the video - click to play

    ►

    Token Smart Contract Analyzer
    - Thierry Grandjean
  • Thumbnail for the video - click to play

    ►

    Cloaking Malicious Web Content Delivery
    - Jeroen Pinoy
  • Thumbnail for the video - click to play

    ►

    The Composition Analysis Of Binary Java, ELF, Go, And JavaScript Apps
    - Philippe Ombredanne
  • Thumbnail for the video - click to play

    ►

    Case Management
    - Cruciani
  • Thumbnail for the video - click to play

    ►

    GeoOpen And MMDB-Server: A Comprehensive Open Source Solution For IP Address Geolocation
    - Alexandre Dulaunoy
  • Thumbnail for the video - click to play

    ►

    CTI Is Dead, Long Live CTI!
    - David
  • Thumbnail for the video - click to play

    ►

    FOSStering An ISAC: Enabling A Community With Open-Source Tools
    - JJ Josing
  • Thumbnail for the video - click to play

    ►

    Kunai: Your New Threat Hunting Tool For Linux
    - Quentin Jerome
  • Thumbnail for the video - click to play

    ►

    Why Does The CTI Industry Struggle With Communicating Uncertainties?
    - Ondra Rojcik
  • Thumbnail for the video - click to play

    ►

    Ensuring IoC Quality At CERT-FR
    - Victor Barrault
  • Thumbnail for the video - click to play

    ►

    MISP Updates
    - Andras Iklody
  • Thumbnail for the video - click to play

    ►

    Malware AV Evasion Tricks: Cryptography In Malware
    - Cocomelonc
  • Thumbnail for the video - click to play

    ►

    Cratos: Use Your Bloody Indicators
    - Dennis Rand
  • Thumbnail for the video - click to play

    ►

    IPFS Unveiled: Exploring Data Collection, Analysis, And Security
    - Patrick Ventuzelo and Tanguy Laucournet
  • Thumbnail for the video - click to play

    ►

    He Is Everywhere: A Tale Of Lazarus And His Family
    - JeongGak Lyu and @lazarusholic
  • Thumbnail for the video - click to play

    ►

    Cerebrate - Learning To Run
    - Andras Iklody
  • Thumbnail for the video - click to play

    ►

    Digital Tug Of War: Unraveling The Cyber Battle Between Ukraine And Russia
    - Ondrej Nekovar and Jan
  • Video will not be published
    How To Operationalize CTI: A Real World Example
    - Melanie Niethammer
  • Thumbnail for the video - click to play

    ►

    Liberate The CSAM Hashsets!
    - Andras Iklody
  • Thumbnail for the video - click to play

    ►

    Cobalt Striked?
    - Vincent Hinderer
  • Thumbnail for the video - click to play

    ►

    Are Leaked Credentials Dumps Used By Attackers?
    - Xavier Mertens
  • Thumbnail for the video - click to play

    ►

    Lessons Learned From Sharing Intel About Potential Fraud # Compomise
    - Jeroen Pinoy
  • Thumbnail for the video - click to play

    ►

    Sigma Project News
    - Thomas Patzke
  • Video will not be published
    Do We Consider This As A Risks Already?
    - Vladimir Kropotov
  • Thumbnail for the video - click to play

    ►

    JTAN - Data Sharing Network
    - Paweł Pawliński and Alexandre Dulaunoy
  • Thumbnail for the video - click to play

    ►

    Turbocharging IOC Validation: Become A More Efficient CTI Analyst
    - Arwa Alomari
  • Thumbnail for the video - click to play

    ►

    Modern IOCs Matching With Suricata
    - Eric Leblond and Peter Manev
  • Video will not be published
    PXF-X - A Modular Python Framework To Hunt, Extract And Enrich Post-Exploitation Framework Artifacts
    - Joel Doenne
  • Thumbnail for the video - click to play

    ►

    Pyrrha: Navigate Easily Into Your System Binaries
    - Eloïse Brocas
  • Video will not be published
    Threat Actors & Surveillance Companies Targeting Telecom Operators
    - Alexandre De Oliveira
  • Thumbnail for the video - click to play

    ►

    How Crowdsec Is Building A Collaborative, Trustable, And Crowdsourced CTI To Change The Cybersecurity Landscape
    - Matthieu Mazzolini
  • Thumbnail for the video - click to play

    ►

    MISP42: Connecting CTI And SOC Teams
    - Remi Seguy
  • Thumbnail for the video - click to play

    ►

    Yeti: Old Dog, New Tricks
    - Sébastien Larinier and Thomas Chopitea
  • Thumbnail for the video - click to play

    ►

    How Digital Technologies Are Redefining Warfare And Why It Matters
    - Mauro Vignati
  • Thumbnail for the video - click to play

    ►

    Ongoing EvilEye Campaigns Targeting CCP Adversaries
    - Rascagneres Paul
  • Thumbnail for the video - click to play

    ►

    Defeating VPN Always-On
    - Maxime Clementz
  • Thumbnail for the video - click to play

    ►

    The Renaissance Of Cyber Physical Offensive Capabilities
    - Daniel Kapellmann Zafra
  • Thumbnail for the video - click to play

    ►

    Introduction To Cyberwarfare: Theory And Practice
    - Lukasz Olejnik
  • Thumbnail for the video - click to play

    ►

    You Can Learn Anything
    - Cookie
  • Thumbnail for the video - click to play

    ►

    Velocity Raptor: Accelerating Velociraptor Hunting With Tenzir Pipelines
    - Matthias Vallentin
  • Thumbnail for the video - click to play

    ►

    TIDeMEC : A Detection Engineering Platform Homegrown At The European Commission
    - Amine Besson
  • Thumbnail for the video - click to play

    ►

    Deming - ISMS Open Source
    - Didier Barzin
  • Thumbnail for the video - click to play

    ►

    Belgian Cyber Reserve Forces
    - Christophe Vandeplas
  • Thumbnail for the video - click to play

    ►

    Non Vulnerable Package Dependency Resolution
    - Philippe Ombredanne
  • Thumbnail for the video - click to play

    ►

    Embedded Threats: A Deep Dive Into The ESIM World
    - Markus Vervier
  • Thumbnail for the video - click to play

    ►

    Building An Evil Phone Charging Station
    - Stef Van Dop and Tomás Philippart
  • Thumbnail for the video - click to play

    ►

    Do's And Don'ts In File Formats
    - Ange Albertini
  • Thumbnail for the video - click to play

    ►

    ACME: Benefits Of Deploying An Internet Security Protocol Inside Your Corporate Network
    - Christophe Brocas
  • Thumbnail for the video - click to play

    ►

    Your Unknown Twins: Identity In The Era Of Deepfakes, AI And Mass Biometrics Exposure
    - Vladimir Kropotov
  • Thumbnail for the video - click to play

    ►

    PHP Filter Chains: How To Use It
    - Rémi Matasse (@_remsio_)
  • Thumbnail for the video - click to play

    ►

    MISP <=> LLM Automating Free Form CTI Reports
    - Sami Mokkadem,Andras Iklody and Aaron Kaplan
  • Video will not be published
    Internet Exposure Of Satellite Modems, And Their Vulnerabilities
    - Patrice Auffret and Arnaud Girault
  • Video will not be published
    Almost 2 Years After Log4J .. If Your PSIRT Has Survived, Are The Lessons Learned Or Not Learned On Security Incident & Vulnerability Management?
    - FrederiqueD
  • Thumbnail for the video - click to play

    ►

    Avoiding The Basilisk's Fangs: State-of-the-art In AI LLM Detection
    - Jacob Torrey
  • Thumbnail for the video - click to play

    ►

    Permissionless Universal Overlays
    - Dimitrios Valsamaras
  • Thumbnail for the video - click to play

    ►

    Raiders Of The Lost Arts
    - Stefan Hager
  • Thumbnail for the video - click to play

    ►

    Token Smart Contract Analyzer
    - Thierry Grandjean
  • Thumbnail for the video - click to play

    ►

    Suricata Language Server
    - Eric Leblond
  • Thumbnail for the video - click to play

    ►

    Wintermute: An LLM Pen-Testing Buddy
    - Aaron Kaplan
  • Thumbnail for the video - click to play

    ►

    SLP DoS Amplification: Someone Is Having Fun
    - Pedro Umbelino
  • Thumbnail for the video - click to play

    ►

    DER Editing, Easy-Peasy With asn1template
    - William Robinet
  • Thumbnail for the video - click to play

    ►

    Supply Chain Resilience: Challenges & Solutions
    - Saâd Kadhi
  • Thumbnail for the video - click to play

    ►

    Open Wounds: The Last 5 Years Have Left Bluetooth To Bleed
    - Xeno Kovah
  • Thumbnail for the video - click to play

    ►

    The Rise Of Malicious MSIX File
    - Rintaro Koike and Shogo Hayashi
  • Thumbnail for the video - click to play

    ►

    Reviving Our Oldest Tool: Using Bayesian Inference To Detect Cyber Attacks
    - Emanuel Seemann
  • Thumbnail for the video - click to play

    ►

    Using Apple Sysdiagnose For Mobile Forensics And Integrity Checks
    - David Durvaux and Aaron Kaplan
  • Video will not be published
    A Deep Dive Into Maritime Cybersecurity
    - Olivier Jacq
  • Thumbnail for the video - click to play

    ►

    Operation Duck Hunt: A Peak Behind The Curtain Of DuckTail
    - Pol Thill
  • Video will not be published
    Kunai: Your New Threat Hunting Tool For Linux
    - Quentin Jerome
  • Video will not be published
    Closing & Prize Giving Ceremony
    - Hack.lu