• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2019
  • 2018
  • 2017
  • 2016
Edition logo

Hack.lu 2025

2025-10-21 - 2025-10-24
  • Video will not be published
    Hacking - 30+ Years Ago
    - Walter Belgers
  • Thumbnail for the video - click to play

    ►

    Anti-Forensics - You Are Doing It Wrong (Believe Me, I'm An IR Consultant)
    - Stephan Berger
  • Thumbnail for the video - click to play

    ►

    Confessions Of A Linux Drama Queen: Incident Response When Hackers Try To Steal Your Spotlight
    - Melina Phillips
  • Thumbnail for the video - click to play

    ►

    Containing The Threat: Analyzing Cryptomining Campaigns
    - Bogdan Trufanda & Mihai Vasilescu
  • Thumbnail for the video - click to play

    ►

    LOLBlue : Living Off The Land With Blue Team Tools
    - Maxence Fossat & Antoine C
  • Thumbnail for the video - click to play

    ►

    B.o.D.: Bytes Over DNS
    - Didier Stevens
  • Thumbnail for the video - click to play

    ►

    Red Team Story: Offline SCCM Backup Secrets Decryption
    - Martino
  • Thumbnail for the video - click to play

    ►

    Detection Coverage In Today's Blue Team World
    - Claus
  • Thumbnail for the video - click to play

    ►

    Fearless File Identification
    - Quentin Jerome
  • Thumbnail for the video - click to play

    ►

    Hunting For Linux Extended File Attributes
    - Xavier Mertens
  • Thumbnail for the video - click to play

    ►

    Incident Reporting Made Easy, Using Draugnet
    - Andras Klody
  • Thumbnail for the video - click to play

    ►

    From Buzzword To Battlefield: The Cybersecurity Challenges Of Smart Cities
    - Marina Bochenkova
  • Thumbnail for the video - click to play

    ►

    Fake Jobs, Real Malware. Uncovering How Cybercriminals Are Exploiting The Employment Market
    - Ionuț Baltariu
  • Thumbnail for the video - click to play

    ►

    intelmq.ai - Adding ML Model Support To Intelmq
    - Aaron Kaplan and Sebastian Wagner & Jürgen Brandl
  • Thumbnail for the video - click to play

    ►

    No Way To Enable SSH Access To Your New Router? The Vendor Might Have Something To Hide
    - Stanislav Dashevskyi & Francesco La Spina
  • Thumbnail for the video - click to play

    ►

    Oops, I Hacked It Again: Tales And Disclosures
    - Ignacio Navarro
  • Thumbnail for the video - click to play

    ►

    OverLAPS: Overriding LAPS Logic
    - Antoine Goichot
  • Thumbnail for the video - click to play

    ►

    Phishing Detection Using Various Parts Of DNS Ecosystem
    - Piotr Białczak & Michał Hałoń
  • Video will not be published
    RomCom Exploits Firefox And Windows Zero Days In The Wild
    - Damien Schaeffer
  • Thumbnail for the video - click to play

    ►

    From Achilles To NIS2: Slovakian Lessons On Proactive Cybersecurity And Vulnerability Disclosure
    - Michal Rampášek & Alexander Valach
  • Video will not be published
    Tracking And Documenting Threat Actors Using MISP - A Slightly Different Approach
    - Csaba Barta
  • Thumbnail for the video - click to play

    ►

    A Pragmatic Approach To Build A Threat Landscape
    - Thomas Patzke
  • Thumbnail for the video - click to play

    ►

    Exploring Threats Leveraging Blockchains
    - Paul Rascagneres
  • Thumbnail for the video - click to play

    ►

    Reversing A Pay Phone For Fun But No Profit
    - Inbar Raz
  • Thumbnail for the video - click to play

    ►

    Slipping Through The Cracks: How Malicious Emails Evade Detection
    - Elyssa Boulila
  • Thumbnail for the video - click to play

    ►

    Silent Killers: Unmasking A Large-Scale Legacy Driver Exploitation Campaign
    - Jiří Vinopal
  • Thumbnail for the video - click to play

    ►

    Smack My LLM Up!
    - Jindrich Karasek
  • Video will not be published
    Malware Investigation Pipeline: From Honeypot To Threat Intel
    - Andreia-Irina Ocanoaia
  • Video will not be published
    May The World Ever Again Experience Such A Christmas Night!
    - Christophe Vandeplas
  • Video will not be published
    Nmap Scanning, Fast And Slow
    - Luc Gommans
  • Video will not be published
    Port Mimic: It's A Trap! (And So Is Every Other Port)
    - Jürgen Brandl
  • Thumbnail for the video - click to play

    ►

    RANGE42: An Open Source Cyber Range
    - Benjamin Collas
  • Thumbnail for the video - click to play

    ►

    Meet Plum, The Challenge Of Your Own ASR For Free
    - Paul Jung
  • Thumbnail for the video - click to play

    ►

    Open Source Is A Virus
    - Philippe Ombredanne & Prabhu Subramanian
  • Thumbnail for the video - click to play

    ►

    Security Monitoring And Response In Large Linux Environments
    - Hilko Bengen & Hendrik Schmidt
  • Thumbnail for the video - click to play

    ►

    Digic8 Oracle
    - Laurent Clevy
  • Video will not be published
    The “S” In IoT: Tales From Inside The IoT Industry
    - Will Moffat
  • Video will not be published
    The Parking Chronicles: A DIY Guide To Agents Detection
    - David Sopas
  • Thumbnail for the video - click to play

    ►

    What Malware Leaves Behind: Analysing Forensic Traces Of Ransomware
    - Ankshita Maunthrooa
  • Thumbnail for the video - click to play

    ►

    Integrating Zeek With Third-Party Applications
    - Christian Kreibich
  • Video will not be published
    The Cloud Journey 2013-2025 Of The European Commission
    - Claus
  • Thumbnail for the video - click to play

    ►

    Kaitai Struct: A Tool For Dealing With Binary Formats
    - Petr Pucil & Mikhail Yakshin
  • Video will not be published
    Utilman & CMD
    - Didier Stevens
  • Thumbnail for the video - click to play

    ►

    101: How To Break IPS & SIEM
    - Nicol Dankova
  • Thumbnail for the video - click to play

    ►

    A Quick Retrospective Of A Student Discovering Programming & Other Failures
    - Sami Mokaddem
  • Video will not be published
    All Your CCTV’s Are Belong To Us
    - Xavier Mertens
  • Thumbnail for the video - click to play

    ►

    Phish Perfect: How I Broke The Thing While Trying To Protect It
    - Melina Phillips
  • Thumbnail for the video - click to play

    ►

    Analysing The 1991 Lips Eloctro Mechatronic Lock
    - Walter Belgers
  • Thumbnail for the video - click to play

    ►

    Suricata Lua Support
    - Eric Leblond
  • Thumbnail for the video - click to play

    ►

    The Beauty Of Vibe Coding
    - Andras Iklody
  • Thumbnail for the video - click to play

    ►

    The CVE-Search Design Failure(s)
    - Alexandre Dulaunoy & Cédric Bonhomme
  • Video will not be published
    BurningPanda
    - Ben (@polygonben)
  • Thumbnail for the video - click to play

    ►

    The Heavy Shadow Of Imposter Syndrome
    - Tammy Harper
  • Thumbnail for the video - click to play

    ►

    Nightmare On NTLM Street: Legacy’s Revenge
    - Marina Bochenkova
  • Thumbnail for the video - click to play

    ►

    Compromising Threat Actor Communications
    - Ben (@polygonben)
  • Thumbnail for the video - click to play

    ►

    Instrumenting Software Builds To Detect Stealth Backdoors And Other Curiosities
    - Hilko Bengen
  • Thumbnail for the video - click to play

    ►

    Attacking The Developer Environment Through Drive-by Localhost Attacks
    - Joseph Beeton
  • Thumbnail for the video - click to play

    ►

    One Day At The Internet Storm Center
    - Xavier Mertens
  • Thumbnail for the video - click to play

    ►

    Field Guide To Physical Attacks Against Full-disk Encryption
    - Edouard D'hoedt & Hayk Gevorgyan
  • Thumbnail for the video - click to play

    ►

    My Other ClassLoader Is Your ClassLoader: Creating Evil Twin Instances Of A Class
    - Dimitrios Valsamaras
  • Thumbnail for the video - click to play

    ►

    Building A Pipeline To Analyse IOS Devices At Scale
    - David Durvaux & Christophe Vandeplas
  • Thumbnail for the video - click to play

    ►

    ICRC's Trust And Safety: Armed Conflict
    - Vitaly Savenkov
  • Thumbnail for the video - click to play

    ►

    OpenTIDE: When TI Made Actionable Drives Your Threat Detection
    - Remi Seguy
  • Video will not be published
    These Hackers Fucking Suck
    - Ben (@polygonben)
  • Thumbnail for the video - click to play

    ►

    Tools To Streamline Creation Of Technical Presentations
    - Kirils Solovjovs
  • Video will not be published
    Decrypting IIS Backdoor Traffic
    - Didier Stevens
  • Thumbnail for the video - click to play

    ►

    5 Years Collecting CyberSecurity Tools
    - Jonathan Scoupreman
  • Thumbnail for the video - click to play

    ►

    Revisiting Widevine L3: DRM As A Playground For Hackers
    - Felipe Custodio Romero
  • Video will not be published
    The Human Factor: Psychological Safety In Cybersecurity Frontlines
    - Cris Brafman Kittner
  • Thumbnail for the video - click to play

    ►

    Livewire: Remote Command Execution Through Unmarshalling
    - Rémi Matasse & Pierre Martin
  • Thumbnail for the video - click to play

    ►

    2038 Is Gonna Be Epoch!
    - Trey Darley & Pedro Umbelino
  • Thumbnail for the video - click to play

    ►

    Wyse Management Subversion: Taking Over Dell's Wyse Management Suite
    - Alain Mowat
  • Thumbnail for the video - click to play

    ►

    What's New In Suricata 8: Enhanced Detection And Performance
    - Peter Manev & Eric Leblond
  • Thumbnail for the video - click to play

    ►

    How To Better Identify (Weaponized) File Formats With Ftguess
    - Philippe Lagadec
  • Thumbnail for the video - click to play

    ►

    Hacking For Hoodies: MISP Edition
    - Jeroen Pinoy
  • Thumbnail for the video - click to play

    ►

    Breaking Android IPC: A Deep Dive Into AIDL Fuzzing
    - Rajanish Pathak & Hardik Kamlesh Mehta
  • Thumbnail for the video - click to play

    ►

    Palo Alto GlobalProtect: Remote Full Compromise Exploit Chain
    - Maxime Escourbiac
  • Video will not be published
    Audit And Retrospective Of An Automotive Application: Carplay
    - Etienne Charron & Khadim
  • Thumbnail for the video - click to play

    ►

    From YAML To Root: CI/CD Pipeline Attacks And Countermeasures
    - Hugo
  • Video will not be published
    Persōna Theory: Infiltration And Deception Of Emerging Threat Groups
    - Tammy Harper
  • Thumbnail for the video - click to play

    ►

    Russian-speaking Underground:- Changes In
    - Vladimir Kropotov
  • Thumbnail for the video - click to play

    ►

    Lethal Language Models: From Bit Flip To RCE In Ollama
    - Paul Gerste
  • Thumbnail for the video - click to play

    ►

    Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations
    - Cocomelonc
  • Thumbnail for the video - click to play

    ►

    Fake Likes, Real Risks: Mapping Fake Social Activity Shops in Europe
    - Sviatlana Höhn & Anastasia "Asya" Sergeeva
  • Thumbnail for the video - click to play

    ►

    Bugs In The Human Code: Help Timo
    - Paul Hirtz
  • Thumbnail for the video - click to play

    ►

    Reverse Engineering, For Real
    - Henri Ahola
  • Thumbnail for the video - click to play

    ►

    4-Byte Hell: When Unicode Enters The Stage
    - Jonas Hess
  • Thumbnail for the video - click to play

    ►

    Pwn2Own: Hacking IoT Devices
    - Adam
  • Thumbnail for the video - click to play

    ►

    Threat Actor Tripping On The Finish Line
    - Rasmus
  • Thumbnail for the video - click to play

    ►

    Revisiting RAND’s Lost Monte Carlo Simulations: Sharla Perrine, Paul Baran, And The True Business Case For The Internet
    - Trey Darley
  • Thumbnail for the video - click to play

    ►

    Automotive Security Analyzer For Exploitability Risks: An Automated And Attack Graph-Based Evaluation Of On-Board Networks
    - Martin Salfer
  • Thumbnail for the video - click to play

    ►

    DCOM Turns 20: Revisiting A Legacy Interface In The Modern Threatscape
    - Julien Bedel
  • Thumbnail for the video - click to play

    ►

    Beyond Post-quantum Stereotypes
    - Antoine Gicquel & Benjamin Sepe
  • Thumbnail for the video - click to play

    ►

    CLI Ambush
    - William Robinet
  • Video will not be published
    THAT PICTURE IS A LIE: SMUGGLING BINARIES WITH STYLE
    - Harpreet Singh
  • Video will not be published
    Breaking The Signal: Red Teaming Mobile Networks In 2025
    - Ali Abdollahi
  • Thumbnail for the video - click to play

    ►

    French Stealer Ecosystem: The Resurgence Skid Gangs In Cybercrime Space
    - 0xSeeker