• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2019
  • 2018
  • 2017
  • 2016
Edition logo

Hack.lu 2024

2024-10-22 - 2024-10-25
  • Video will not be published
    Insights From Modern Botnets
    - Miguel
  • Thumbnail for the video - click to play

    ►

    NeuroCTI - A Custom LLM For CTI: Benchmarking, Successes, Failures And Lessons Learned (Updates)
    - Aaron Kaplan
  • Video will not be published
    Tales Of The Future Past
    - Saâd Kadhi
  • Thumbnail for the video - click to play

    ►

    Integrating New Tools In Your Workflows Within Minutes In MISP
    - Sami Mokaddem
  • Thumbnail for the video - click to play

    ►

    Lessons Learned From (Almost) 8 Years Of Sigma Development
    - Thomas Patzke
  • Thumbnail for the video - click to play

    ►

    Catching Phish Using Publicly Accessible Information
    - Aurimas Rudinskis
  • Thumbnail for the video - click to play

    ►

    Cyrus - The Story Of No Cloud
    - Guillaume Ginis
  • Thumbnail for the video - click to play

    ►

    Latest Updates On Kunai
    - Quentin JEROME
  • Video will not be published
    Hacking EV Charging Points, For Fun... And Fixing The Firmware
    - Simon Petitjean
  • Thumbnail for the video - click to play

    ►

    Running Exercises With SkillAegis
    - Sami Mokaddem
  • Video will not be published
    QKD - Is It Worth It?
    - Mihai Carabas
  • Thumbnail for the video - click to play

    ►

    Nothing To See Here! On The Awareness Of And Preparedness And Defenses Against Cloaking Malicious Web Content Delivery
    - Jeroen Pinoy
  • Thumbnail for the video - click to play

    ►

    Automating Dark Web CTI Reports With RAG Insight For MISP Sharing
    - Shing-Li Hung
  • Thumbnail for the video - click to play

    ►

    Dredge: An Open Source Framework For Cloud Incident Response
    - Santi Abastante
  • Thumbnail for the video - click to play

    ►

    You Just Got A CTI Program Funded. Now What?
    - Lukas Vytautas Dagilis
  • Thumbnail for the video - click to play

    ►

    Malware And Hunting For Persistence: How Adversaries Exploit Your Windows?
    - Cocomelonc
  • Thumbnail for the video - click to play

    ►

    Trying Gateway Bugs: Breaking Industrial Protocol Translation Devices Before The Research Begins
    - Claire Vacherot
  • Thumbnail for the video - click to play

    ►

    In-Depth Study Of Linux Rootkits: Evolution, Detection, And Defense
    - Stephan Berger
  • Thumbnail for the video - click to play

    ►

    Decoding Galah: An LLM Powered Web Honeypot
    - Adel Karimi
  • Video will not be published
    CSIRT And The Chocolate Factory
    - Didier Stevens
  • Thumbnail for the video - click to play

    ►

    The Gist Of Hundreds Of Incident Response Cases
    - Stephan Berger
  • Thumbnail for the video - click to play

    ►

    IoT Hacks Humans: Unexpected Angles Of Human Process Compromise
    - Vladimir Kropotov
  • Thumbnail for the video - click to play

    ►

    KubeHound: Identifying Attack Paths In Kubernetes Clusters At Scale With No Hustle
    - Julien Terriac
  • Thumbnail for the video - click to play

    ►

    The Web Of Cognitive Warfare
    - Jindrich Karasek
  • Video will not be published
    It Has Been [0] Days Since The Last Edge-Device Security Incident
    - Paul Rascagneres
  • Thumbnail for the video - click to play

    ►

    A Quick Monologue On Global Inefficiency
    - Claus Cramon Houmann
  • Thumbnail for the video - click to play

    ►

    Flowintel - Flow Your Management
    - David Cruciani
  • Thumbnail for the video - click to play

    ►

    How I Learned To Stop Worrying And Love The NLF
    - Fukami
  • Thumbnail for the video - click to play

    ►

    Any Sufficiently Advanced Technology Indistinguishable From 01 January 1970
    - Trey Darley
  • Thumbnail for the video - click to play

    ►

    How Much Time We Had For IPv6 Preparation?
    - Nicol Dankova
  • Thumbnail for the video - click to play

    ►

    I Need Access: Exploit Password Management Software To Obtain Credential From Memory
    - Efstratios Chatzoglou
  • Thumbnail for the video - click to play

    ►

    Empowering Cybersecurity Outreach And Learning Through Collaborative Challenge Building, Sharing, And Execution
    - David Durvaux & Alexandre Dulaunoy
  • Thumbnail for the video - click to play

    ►

    Artemis: How CERT PL Improves The Security Of The Polish Internet
    - Krzysztof Zając
  • Thumbnail for the video - click to play

    ►

    Spicy — Generating Robust Parsers For Protocols & File Formats
    - Benjamin Bannier
  • Thumbnail for the video - click to play

    ►

    Securing The Stars: Comprehensive Analysis Of Modern Satellite Vulnerabilities And Emerging Attack Surfaces
    - Vic Huang
  • Thumbnail for the video - click to play

    ►

    DFIQ: Codifying Digital Forensic Intelligence
    - Thomas Chopitea
  • Video will not be published
    Cyber Threats To Advanced Intelligent Connected Vehicle Systems
    - Yuqiao Ning & Shihao Xue
  • Video will not be published
    APT28: Following Bear Tracks Back To The Cave
    - Golo
  • Video will not be published
    A New (free) Internet Listener In Town
    - Mathieu Le Cleach
  • Thumbnail for the video - click to play

    ►

    Unlocking BEAM's Pandora's Box: Security Pitfalls In Distributed Erlang And Elixir Systems
    - Jean-Louis Huynen
  • Thumbnail for the video - click to play

    ►

    Sharing IoC - Wrong Answers Only
    - Deborah Servili
  • Thumbnail for the video - click to play

    ►

    Back To The Failure: Did Your Physical Security Really Evolve In The Last 40 Years?
    - Simon Geusebroek
  • Thumbnail for the video - click to play

    ►

    Blowing Up Gas Stations For Fun And Profit
    - Pedro Umbelino
  • Thumbnail for the video - click to play

    ►

    The Good, The Bad, And The Ugly: Microsoft Copilot
    - Inbar Raz & Michael Bargury
  • Thumbnail for the video - click to play

    ►

    Scam As A Service Powered By Telegram
    - Aurimas Rudinskis
  • Thumbnail for the video - click to play

    ►

    From 0 To Millions: Protecting Against AitM Phishing At Scale
    - Jacob Torrey
  • Thumbnail for the video - click to play

    ►

    Running Circles Around Threat Actor Tooling Using Javascript Data Visualisation
    - Chris Horsley
  • Thumbnail for the video - click to play

    ►

    Using LLM Locally
    - Pauline Bourmeau (Cookie)
  • Thumbnail for the video - click to play

    ►

    Future Of Websites Without DDoS
    - Lukáš Kršek
  • Thumbnail for the video - click to play

    ►

    Analysis And Forecasting Of Exploits With AI
    - Roman Graf
  • Thumbnail for the video - click to play

    ►

    Vulnerability Lookup
    - Cédric Bonhomme
  • Thumbnail for the video - click to play

    ►

    MISP Playbooks, Proving The Value Of Cyber Threat Intelligence And ICS-CSIRT.io
    - Koen Van Impe
  • Thumbnail for the video - click to play

    ►

    Quantum Cybersecurity: Pioneering A Secure Future
    - Samira Chaychi & Sharif Shahini
  • Thumbnail for the video - click to play

    ►

    Making IOT Great Again
    - David Durvaux & Marc Durvaux
  • Thumbnail for the video - click to play

    ►

    Ghosts'n'Gadgets: Common Buffer Overflows That Still Haunt Our Networks
    - Stanislav Dashevskyi
  • Thumbnail for the video - click to play

    ►

    SQL Injection Isn't Dead: Smuggling Queries At The Protocol Level
    - Paul Gerste
  • Thumbnail for the video - click to play

    ►

    Keys To The City: The Dark Trade-Off Between Revenue And Privacy In Monetizing SDKs
    - Dimitrios Valsamaras
  • Thumbnail for the video - click to play

    ►

    Understanding File Type Identifiers & Scanners
    - Ange Albertini
  • Thumbnail for the video - click to play

    ►

    The Ouroboros Of Cybercrime: Witnessing Threat Actors Go From Pwn To Pwn'd
    - Estelle Ruellan & Stuart Beck
  • Thumbnail for the video - click to play

    ►

    The XE Files: Trust No Router
    - James Atack
  • Thumbnail for the video - click to play

    ►

    New Features In The Zeek Network Monitor
    - Christian Kreibich
  • Thumbnail for the video - click to play

    ►

    Sigma Unleashed: A Realistic Implementation
    - Mathieu Le Cleach
  • Video will not be published
    Predictive Analytics For Adversary Techniques In The MITRE ATT&CK Framework Using Rule Mining
    - Tristan Madani
  • Video will not be published
    Introducing The ACTOR Model: Adversary Simulation Is Dead, Long Live Adversary Simulation!
    - Tristan Madani
  • Thumbnail for the video - click to play

    ►

    AIL Project: Secrets In Squares - QR Codes
    - Aurelien Thirion
  • Thumbnail for the video - click to play

    ►

    Pentests Using LLMs
    - Al Mochkin
  • Thumbnail for the video - click to play

    ►

    Learn Anything - Reload
    - Pauline Bourmeau (Cookie)
  • Thumbnail for the video - click to play

    ►

    Luks Full Disk Encryption Upside-Down
    - Michael Hamm
  • Video will not be published
    Phantom DLL Hijacking In Powershell.exe (aka Backdooring Powershell For Fun And Profit)
    - Tristan Madani
  • Thumbnail for the video - click to play

    ►

    Internal Domain Name Collision 2.0
    - Philippe Caturegli
  • Video will not be published
    Lucky Leaks: 400+ Mln Files Are Worth A Thousand Words
    - Lorenzo Nicolodi
  • Thumbnail for the video - click to play

    ►

    Reverse Engineering Android Apps With ACVTool
    - Aleksandr Pilgun
  • Thumbnail for the video - click to play

    ►

    Detection And Response For Linux Without EDR
    - Hilko Bengen
  • Thumbnail for the video - click to play

    ►

    Mercator: Mapping The Information System
    - Didier Barzin
  • Thumbnail for the video - click to play

    ►

    Disconnecting Games With A Single Packet: An Unreal Untold Story
    - Hugo Bertin
  • Thumbnail for the video - click to play

    ►

    CTF Prizegiving Ceremony
    - Hack.lu