Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Twitter
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my Twitter
.
►
OWASP BeNeLux Day 2023
OWASP Juice Shop - An Open Source Software (And Security) Fairytale
- Björn Kimminich
►
OWASP BeNeLux Day 2023
Down The Rabbit Hole: Exploring GraphQL Exploitation
- Himanshu Mehta
►
OWASP BeNeLux Day 2023
How To Implement With DevSecOps In Large Complex Organizations
- Stefan Simenon
►
OWASP BeNeLux Day 2023
Secure Defaults: A Scalable Security Approach For Modern Development
- Pieter De Cremer
►
OWASP BeNeLux Day 2023
Using WebAssembly To Run, Extend, And Secure Your Application
- Niels Tanis
►
OWASP BeNeLux Day 2023
A Quest To Tame DevOps Unicorns
- Jeroen Prinse
►
OWASP BeNeLux Day 2023
Far From Green Fields - Introducing Threat Modelling To Established Teams
- Sarah-Jane Madden
►
OWASP BeNeLux Day 2023
Everything-as-Code: Pushing The Boundaries Of SAST
- Frans Van Buul
►
OWASP BeNeLux Day 2023
The State Of The Art In AI Security
- Rob Van Der Veer
►
Elbsides 2023
Closing Remarks
- Florian Junge
►
Elbsides 2023
Broadcom Router SDK Vulnerabilities: The Uncomfortable Reality Of The IoT Linux Kernel Space
- Attila Szasz
►
Elbsides 2023
Reverse Engineering Of Intel's Branch Prediction
- Nick Mahling
►
GreHack 2023
Closing Remarks
- Adam Larabi
►
GreHack 2023
Backstage
- Bastien Becarie
►
GreHack 2023
InfoSec Streaming 101
- Laluka
►
GreHack 2023
FUN
- Pascal Lafourcade
►
GreHack 2023
LOGOS And BOOKS
- Pascal Lafourcade
►
GreHack 2023
Codix Ramp Prompt Engineering
- Baptiste Roussel
►
Elbsides 2023
You Are (Not) Prepared: A Ransomware Story
- Christian Kollee
►
GreHack 2023
Ubuntu Shiftfs: Unbalanced Unlock Exploitation Attempt (CVE-2023-2612)
- Jean-Baptiste Cayrou
►
Elbsides 2023
A Beginner's Guide To SSO (Mis)Configuration
- Adina Bogert-O’Brien
►
GreHack 2023
Won't You Please, Please --Help Me?
- Thomas Chauchefoin
►
GreHack 2023
System Introspection Applied To Micro-Services Pentests In K8S Clusters
- Laluka And Christophe Biguereau
►
Elbsides 2023
My CI/CD Pipeline Contains All Security Tools Available! Now What…?
- Jasmin Mair
►
Elbsides 2023
40 Years Census Decision: The Census And Understanding Privacy Protection In The Transition Of Time
- Simone Fischer-Hübner
►
Elbsides 2023
Conference Opening
- Morton Swimmer
►
GreHack 2023
Unlocking The Drive: Exploiting Tesla Model 3
- David Berard & Vincent Dehors
►
GreHack 2023
Vulnerability In The QR Code Of The Izly Phone Application
- Clément Gindrier
►
GreHack 2023
Virtualization From An Attacker Point-Of-View
- Corentin Bayet & Thomas Bouzerar
►
GreHack 2023
Google Apps Script: This Talk Requires Access To Your E-mails
- Nicolas Kovacs & Sébastien Rolland
►
Hardwear.io 2023
Closing Ceremony & Prize
- Antriksh Shah
►
Black Alps 2023
Infiltrating Kubernetes: A Comprehensive Study Of Attack Scenarios And Security Measures
- Magno Logan
►
Hardwear.io 2023
Breaking Secure Boot On The Silicon Labs Gecko Platform
- Benoît Forgette & Sami Babigeon
►
Black Alps 2023
Defeating VPN Always-On
- Maxime Clementz
►
Hardwear.io 2023
Protect Your Screen From Eavesdropping: Don’t Forget Its Power Supply
- Emmanuel Cottais
►
Hardwear.io 2023
Hacking A Smart Doorbell: An IoT Hacking Guide
- Daniel Schwendner
►
Hardwear.io 2023
Understanding Physics To Break AES Encryption With Custom Side-channel Hardware
- Stephan Mathieu & Roman Korkikian
►
Black Alps 2023
Command-line Obfuscation Detection Using Large Language Models
- Michael Adam Polak and Vojtech Outrata
►
Hardwear.io 2023
TEEzz: Fuzzing Trusted Applications On COTS Android Devices
- Marcel Busch
►
Black Alps 2023
A Security Research Journey: How The Mobile Industry Met Hackers In The Middle
- David Rogers MBE
►
Hardwear.io 2023
Attacking Vehicle Fleet Management Systems
- Yashin Mehaboobe & Ramiro Pareja Veredas
►
Black Alps 2023
Unraveling The Challenges Of Reverse Engineering Flutter Applications
- Axelle Apvrille
►
Hardwear.io 2023
Basebanheimer: Now I Am Become Death, The Destroyer Of Chains
- Daniel Komaromy
►
Black Alps 2023
Unleash The Engineer Within: Culture Eats Policy For Breakfast
- Fred Blaise
►
Hardwear.io 2023
Automated Fault Injection Attacks On Embedded Devices
- Enrico Pozzobon & Nils Weiss
►
Black Alps 2023
Sideloading Serenade: A Symphony Of .NET Payload Techniques
- Nick Powers and Steven Flores
►
Hardwear.io 2023
A New Future For IoT Security: Better Solutions And What Did Not Work So Far
- Panel
►
Black Alps 2023
Quantum Computing Doomsday Planning: Is Your Organisation Ready?
- JP Aumasson and Farida Aclimandos
►
Hardwear.io 2023
Dissecting The Modern Android Data Encryption Scheme
- Maxime Rossi Bellom & Damiano Melotti
►
Black Alps 2023
Ghidriff: Ghidra Binary Diffing Engine
- John Mac
►
Hardwear.io 2023
How Deep Is The Rabbit Hole? A Deep Dive Into Exploitation Of A Popular Smart Speaker
- Sergei Volokitin
►
Hardwear.io 2023
CSI:Rowhammer - Cryptographic Security And Integrity Against Rowhammer
- Jonas Juffinger
►
Black Alps 2023
XORtigate: Zero-Effort, Zero-Expense, 0-Day On Fortinet SSL VPN
- Charles Fol
►
Hardwear.io 2023
Triple Exploit Chain With Laser Fault Injection On A Secure Element
- Olivier Heriveaux
►
Hardwear.io 2023
Blue2thprinting (blue-[tooth)-printing]: Answering The Question Of 'WTF Am I Even Looking At?!'
- Xeno Kovah
►
Black Alps 2023
Needles In The Haystack: A Hueristics-based Approach To Vulnerability Discovery
- Matt Hand and Jack Ullrich
►
Hardwear.io 2023
Hacking With AI: Our Journey Through The Perils & Promises
- Dhinesh Manoharan
►
Black Alps 2023
Unveiling The Express Lane To Catastrophe: Insights From Extensive Security Testing
- Florian Badertscher
►
Black Alps 2023
Opening Words
- Sylvain Pasini
►
WICCON 2023
Closing Note
- Valentine Mairet & Chantal Stekelenburg
►
WICCON 2023
We May Have Been Hacked, And All We Got Was This Lousy Actor
- Sanne Maasakkers
►
WICCON 2023
Adversaries Of The Future: The Dynamic Red Teaming Landscape
- Eva Tanaskoska
►
WICCON 2023
Creating A Cyber Strategy Based On The Threat Landscape
- Dorrit Sliepen
►
WICCON 2023
Threat Modeling Your Personal Digital Footprint
- Daniëlle Wagemakers
►
WICCON 2023
Cyber-Attack Detection In Water Distribution Networks
- Rosanne Aartman
►
WICCON 2023
Tools Vs Rules: Why Technical Based Measures Work Better Than Behavior Based Approaches In Infosec
- Fleur Van Leusden
►
WICCON 2023
What If Hacking Were A Sport?
- Maja Reissner
►
WICCON 2023
Revolutionizing Cybersecurity: Unleashing The Power Of AI
- Catherine De Weever
►
WICCON 2023
Cybersecurity In The Automotive Industry: Compliance And Beyond
- Anna Prudnikova
►
WICCON 2023
Anti Surveillance Knitting
- Ottilia Westerlund
►
WICCON 2023
Tales From The Trenches: Implementing An Appsec Program
- Tess Sluijter-Stek
►
WICCON 2023
Tackling The Hidden Impact Of Ransomware Attacks
- Inge Van Der Beijl and Gerine Lodder
►
WICCON 2023
Spooky Action
- Jaya Baloo
►
OWASP NL Chapter Meetings 2023-10-19
Unveiling The Secrets In Your Code: Detecting And Triaging Exposed Credentials At Scale
- Ingmar Vis
►
OWASP NL Chapter Meetings 2023-10-19
Hacking CI/CD Pipelines: Some Use Cases For Hacking CI/CD Orchestrators
- Mauricio Cano
►
Hack.lu 2023
Operation Duck Hunt: A Peak Behind The Curtain Of DuckTail
- Pol Thill
►
Hack.lu 2023
Using Apple Sysdiagnose For Mobile Forensics And Integrity Checks
- David Durvaux and Aaron Kaplan
►
Hack.lu 2023
Reviving Our Oldest Tool: Using Bayesian Inference To Detect Cyber Attacks
- Emanuel Seemann
►
Hack.lu 2023
The Rise Of Malicious MSIX File
- Rintaro Koike and Shogo Hayashi
►
Hack.lu 2023
Open Wounds: The Last 5 Years Have Left Bluetooth To Bleed
- Xeno Kovah
►
Hack.lu 2023
Supply Chain Resilience: Challenges & Solutions
- Saâd Kadhi
►
Hack.lu 2023
DER Editing, Easy-Peasy With asn1template
- William Robinet
►
Hack.lu 2023
SLP DoS Amplification: Someone Is Having Fun
- Pedro Umbelino
►
Hack.lu 2023
Wintermute: An LLM Pen-Testing Buddy
- Aaron Kaplan
►
Hack.lu 2023
Suricata Language Server
- Eric Leblond
►
Hack.lu 2023
Token Smart Contract Analyzer
- Thierry Grandjean
►
Hack.lu 2023
Raiders Of The Lost Arts
- Stefan Hager
►
Hack.lu 2023
Permissionless Universal Overlays
- Dimitrios Valsamaras
►
Hack.lu 2023
Avoiding The Basilisk's Fangs: State-of-the-art In AI LLM Detection
- Jacob Torrey
►
Hack.lu 2023
MISP <=> LLM Automating Free Form CTI Reports
- Sami Mokkadem,Andras Iklody and Aaron Kaplan