• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2019
  • 2018
Edition logo

Insomni'hack 2025

2025-03-13 - 2025-03-14
  • Video not yet published
    Advanced Android Archaeology: Baffled By Bloated Complexity
    - Mathias Payer
  • Video not yet published
    Beyond LSASS: Cutting-Edge Techniques For Undetectable Threat Emulation
    - Priyank Nigam
  • Video will not be published
    Captain MassJacker Sparrow: Uncovering The Malware's Buried Treasure
    - Ari Novick
  • Video not yet published
    You Can't Touch This: Secure Enclaves For Offensive Operations
    - Matteo Malvica & Cedric Van Bockhaven
  • Video will not be published
    Ghost In The RaaS: Ransomware-as-a-Service From The Perspective Of An Affiliate
    - Carlos Ishimaru
  • Video not yet published
    What If I Told You That Security Is Here To Help? (A.K.A. The 7 Habits Of Highly Effective Security Leaders)
    - Sebastian Avarvarei
  • Video not yet published
    Demystifying Automated City Shuttles: Blessing Or Cybersecurity Nightmare?
    - Anastasija Collen
  • Video will not be published
    Code To Cloud: Exploiting Modern Web Applications To Breach Cloud Environments
    - Christophe Tafani-Dereeper
  • Video not yet published
    Next-Gen Hiring Meets AI, Cybersecurity, And Inclusion
    - Nathalie Brodard,Line Pillet and Lennig Pedron & Nagib Aouini
  • Video not yet published
    Pioneering Zero Days At Pwn2Own Automotive 2024
    - Alex Plaskett & McCaulay Hudson
  • Video will not be published
    Double Agent: Exploiting Pass-through Authentication Credential Validation In Azure AD
    - Ilan Kalendarov & Elad Beber
  • Video not yet published
    Cyber Innovation
    - Laurent Balmelli & Hugo Flayac & Aziz Belkhiria & Olivier Crochat & Lennig Pedron
  • Video not yet published
    Access Granted: Uncovering RFID Readers Vulnerabilities & Bypassing Physical Access Controls
    - Julia Zduńczyk
  • Video will not be published
    EL3XIR: Fuzzing COTS Secure Monitors
    - Marcel Busch & Christian Lindenmeier
  • Video not yet published
    Stop Making Nonsense: Cutting Through Compliance Complexity
    - Mat Caplan
  • Video not yet published
    Unlocking The Cybersecurity Secrets Of Modern Vehicles
    - Yuqiao Ning
  • Video will not be published
    Hack, Patch, Repeat: Insider Tales From Android’s Bug Bounty
    - Maria Uretsky & Olivier Tuchon
  • Video not yet published
    Introduction
    - Raphaël Conz
  • Video not yet published
    The AI Paradox: Safety Vs Performance
    - Rachid Guerraoui
  • Video not yet published
    The Rise Of AI-Driven Malware: Threats, Myths, And Defenses
    - Candid Wuest
  • Video not yet published
    The Spy Who Flashed Me: Exploring And Defeating Physical Access Control Systems
    - Michael Rodger
  • Video not yet published
    20 Years Of Cybersecurity Automation: Has AI Restored Balance To The Force?
    - Raphaël Marichez
  • Video not yet published
    Good Models Gone Bad: Visualizing Data Poisoning
    - Maria Khodak
  • Video not yet published
    Cache Me If You Can: Smuggling Payloads Via Browser Caching Systems
    - Aurélien Chalot
  • Video not yet published
    "A Slice Of" Modern Program Analysis
    - Kyle Martin
  • Video not yet published
    The Art Of Malware Smuggling: Unmasking SVG-Based Attack Techniques
    - Dhiraj Mishra
  • Video not yet published
    Don't Let Jia Tan Have All The Fun: Hacking Into Fedora And OpenSUSE
    - Thomas Chauchefoin & Maxime Rinaudo
  • Video not yet published
    Malware Analysis With R2AI
    - Axelle Apvrille
  • Video not yet published
    Your Identity Is Mine: Techniques And Insights From OS Identity Providers Research
    - Maor Abutbul
  • Video not yet published
    Data Sets That Can Make A Difference: Improving Your Hunting And Detection In Entra ID And O365
    - John Stoner
  • Video not yet published
    Go Parser Footguns
    - Vasco Franco
  • Video not yet published
    Beyond The Surface: Exploring Attacker Persistence Strategies In Kubernetes
    - Rory McCune