• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2019
  • 2018
Edition logo

Insomni'hack 2024

2024-04-25 - 2024-04-26
  • Thumbnail for the video - click to play

    ►

    It’s Time For (R)evolution
    - Charl Van Der Walt
  • Thumbnail for the video - click to play

    ►

    FuzzyAI: Attacking LLMs With Coverage-Guided Fuzzing
    - Eran Shimony & Mark Cherp
  • Thumbnail for the video - click to play

    ►

    You Gotta Fight For Your Right To Third-Party
    - Mat Caplan
  • Thumbnail for the video - click to play

    ►

    Your NVMe Had Been Syz'ed
    - Alon Zahavi
  • Thumbnail for the video - click to play

    ►

    How (Not) To Implement Secure Digital Identity: Case Study Of Poland's Digital ID System
    - Szymon Chadam
  • Video will not be published
    Malware Development And Abusing .NET For Initial Access
    - Suraj Khetani
  • Thumbnail for the video - click to play

    ►

    Why So Optimized?
    - Ege Balci
  • Thumbnail for the video - click to play

    ►

    Enhancing AWS Security: A Holistic Approach To Organization Management
    - Bogdan Nicorici
  • Thumbnail for the video - click to play

    ►

    Don’t Flatten Yourself: Restoring Malware With Control-Flow Flattening Obfuscation
    - Geri Revay
  • Thumbnail for the video - click to play

    ►

    Uncommon Process Injection Pattern
    - Yoann Dequeker
  • Thumbnail for the video - click to play

    ►

    Standing On The Shoulders Of Giant(Dog)s: A Kubernetes Attack Graph Model
    - Julien Terriac
  • Thumbnail for the video - click to play

    ►

    Operation Triangulation: Attacks On IPhones/iPads
    - Marco Preuss
  • Thumbnail for the video - click to play

    ►

    Hijacking The Java Virtual Machine (JVM) And Bypassing Runtime Application Self-Protection (RASP)
    - Mouad Kondah
  • Video will not be published
    How To Break Into Organizations With Style: Hacking Access Control Systems
    - Julia Zduńczyk
  • Thumbnail for the video - click to play

    ►

    Diving Into JumpServer: The Public Key Unlocking Your Whole Network
    - Oskar Zeino-Mahmalat
  • Thumbnail for the video - click to play

    ►

    Smart Toy Vulnerabilities Can Put Your Child At Risk Of Abuse By Strangers
    - Nikolay Frolov
  • Video will not be published
    Introduction
    - Raphaël Conz
  • Thumbnail for the video - click to play

    ►

    Threats And Mitigations Landscape In The Age Of Generative AI
    - Andrei Kucharavy
  • Video will not be published
    The Tale Of Rhadamanthys And The 40 Thieves: The Nuts, Bolts, And Lineage Of A Multimodular Stealer
    - Hasherezade & Ben Herzog
  • Thumbnail for the video - click to play

    ►

    From Keyless To Careless: Abusing Misconfigured OIDC Authentication In Cloud Environments
    - Christophe Tafani-Dereeper
  • Thumbnail for the video - click to play

    ►

    When Malware Becomes Creative: A Survey Of Advanced Android Detection Evasion Tactics
    - Dimitrios Valsamaras
  • Thumbnail for the video - click to play

    ►

    Microsoft 365's BEC-Detection Engineering Challenges And Opportunities
    - Eliraz Levi
  • Thumbnail for the video - click to play

    ►

    ADDS Persistance - Burn It, Burn It All
    - Charlie "Shutdown" Bromberg & Volker
  • Video will not be published
    What Can We Do About Cryptocurrency Scams?
    - Keven Hendricks
  • Thumbnail for the video - click to play

    ►

    Meet The Latest Innovations And Startups In Cybersecurity And How To Become A Cyber Entrepreneur?
    - Trust Valley Startups
  • Thumbnail for the video - click to play

    ►

    The Accessibility Abyss: Navigating Android Malware Waters
    - Axelle Apvrille
  • Thumbnail for the video - click to play

    ►

    Patch Different On *OS
    - John McIntosh
  • Thumbnail for the video - click to play

    ►

    Beating The Sanitizer: Why You Should Add MXSS To Your Toolbox
    - Paul Gerste & Yaniv Nizry
  • Thumbnail for the video - click to play

    ►

    Secret Web Hacking Knowledge: CTF Authors Hate These Simple Tricks
    - Philippe Dourassov
  • Thumbnail for the video - click to play

    ►

    Current Affairs: IoT Security 101
    - Iana Peix
  • Video will not be published
    Choose Your Own Adventure-Red Team Edition
    - Nicolas Heiniger
  • Thumbnail for the video - click to play

    ►

    An Uninvited House Guest: How PROXYLIB Overstayed Its Welcome On Android Devices
    - Lindsay Kaye
  • Thumbnail for the video - click to play

    ►

    Living Off The Land And Attacking Operational Technology With Surgical Precision
    - Ric Derbyshire
  • Thumbnail for the video - click to play

    ►

    MFT: Malicious Fungible Tokens
    - Mauro Eldritch