Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Twitter
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my Twitter
.
►
BSides Prague 2024
Closing
- Martin Hron
►
BSides Prague 2024
Unmask The Bastards: Malice And Fraud In Mobile Ads
- Abdullah Joseph
►
BSides Prague 2024
SIEM Slam: Tricking Modern SIEMs With Fake Logs And Confusing Blue Teams
- Özgün Kültekin
►
BSides Prague 2024
Hack To The Future: Using LLMs As Attacking Agents In Real Networks
- Maria Rigaki & Sebastian Garcia
►
BSides Prague 2024
File Infectors Are (Not) Dead: What's Spreading And How To Detect It Using YARA
- Ladislav Zezula
►
BSides Prague 2024
Digital Scorched Earth: Understanding APT-Driven Cyber Destruction
- Or Chechik
►
BSides Prague 2024
GPT-like Pre-Training On Unlabeled System Logs For Malware Detection
- Dmitrijs Trizna
►
BSides Prague 2024
Industrial Robots And Machines Under Attack
- Marco Balduzzi
►
BSides Prague 2024
A Two-part Saga: Continuing The Journey Of Hacking Malware C2S
- Vangelis Stykas
►
BSides Prague 2024
Securing Our Post-Quantum Future
- Jaya Baloo
►
BSides Prague 2024
Welcome
- Martin Hron
►
OWASP Manchester 2024-01-15
Basic Assembly And Memory
- Tom Blue
►
OWASP Manchester 2024-01-15
Appsec In The Enterprise: In-Flight Testing And Shifting Left
- Stuart Crawford
►
OWASP BeNeLux Day 2023
OWASP Juice Shop - An Open Source Software (And Security) Fairytale
- Björn Kimminich
►
OWASP BeNeLux Day 2023
Down The Rabbit Hole: Exploring GraphQL Exploitation
- Himanshu Mehta
►
OWASP BeNeLux Day 2023
How To Implement With DevSecOps In Large Complex Organizations
- Stefan Simenon
►
OWASP BeNeLux Day 2023
Secure Defaults: A Scalable Security Approach For Modern Development
- Pieter De Cremer
►
OWASP BeNeLux Day 2023
Using WebAssembly To Run, Extend, And Secure Your Application
- Niels Tanis
►
OWASP BeNeLux Day 2023
A Quest To Tame DevOps Unicorns
- Jeroen Prinse
►
OWASP BeNeLux Day 2023
Far From Green Fields - Introducing Threat Modelling To Established Teams
- Sarah-Jane Madden
►
OWASP BeNeLux Day 2023
Everything-as-Code: Pushing The Boundaries Of SAST
- Frans Van Buul
►
OWASP BeNeLux Day 2023
The State Of The Art In AI Security
- Rob Van Der Veer
►
Elbsides 2023
Closing Remarks
- Florian Junge
►
Elbsides 2023
Broadcom Router SDK Vulnerabilities: The Uncomfortable Reality Of The IoT Linux Kernel Space
- Attila Szasz
►
Elbsides 2023
Reverse Engineering Of Intel's Branch Prediction
- Nick Mahling
►
GreHack 2023
Closing Remarks
- Adam Larabi
►
GreHack 2023
Backstage
- Bastien Becarie
►
GreHack 2023
InfoSec Streaming 101
- Laluka
►
GreHack 2023
FUN
- Pascal Lafourcade
►
GreHack 2023
LOGOS And BOOKS
- Pascal Lafourcade
►
GreHack 2023
Codix Ramp Prompt Engineering
- Baptiste Roussel
►
Elbsides 2023
You Are (Not) Prepared: A Ransomware Story
- Christian Kollee
►
GreHack 2023
Ubuntu Shiftfs: Unbalanced Unlock Exploitation Attempt (CVE-2023-2612)
- Jean-Baptiste Cayrou
►
Elbsides 2023
A Beginner's Guide To SSO (Mis)Configuration
- Adina Bogert-O’Brien
►
GreHack 2023
Won't You Please, Please --Help Me?
- Thomas Chauchefoin
►
GreHack 2023
System Introspection Applied To Micro-Services Pentests In K8S Clusters
- Laluka And Christophe Biguereau
►
Elbsides 2023
My CI/CD Pipeline Contains All Security Tools Available! Now What…?
- Jasmin Mair
►
Elbsides 2023
40 Years Census Decision: The Census And Understanding Privacy Protection In The Transition Of Time
- Simone Fischer-Hübner
►
Elbsides 2023
Conference Opening
- Morton Swimmer
►
GreHack 2023
Unlocking The Drive: Exploiting Tesla Model 3
- David Berard & Vincent Dehors
►
GreHack 2023
Vulnerability In The QR Code Of The Izly Phone Application
- Clément Gindrier
►
GreHack 2023
Virtualization From An Attacker Point-Of-View
- Corentin Bayet & Thomas Bouzerar
►
GreHack 2023
Google Apps Script: This Talk Requires Access To Your E-mails
- Nicolas Kovacs & Sébastien Rolland
►
Hardwear.io 2023
Closing Ceremony & Prize
- Antriksh Shah
►
Black Alps 2023
Infiltrating Kubernetes: A Comprehensive Study Of Attack Scenarios And Security Measures
- Magno Logan
►
Hardwear.io 2023
Breaking Secure Boot On The Silicon Labs Gecko Platform
- Benoît Forgette & Sami Babigeon
►
Black Alps 2023
Defeating VPN Always-On
- Maxime Clementz
►
Hardwear.io 2023
Protect Your Screen From Eavesdropping: Don’t Forget Its Power Supply
- Emmanuel Cottais
►
Hardwear.io 2023
Hacking A Smart Doorbell: An IoT Hacking Guide
- Daniel Schwendner
►
Hardwear.io 2023
Understanding Physics To Break AES Encryption With Custom Side-channel Hardware
- Stephan Mathieu & Roman Korkikian
►
Black Alps 2023
Command-line Obfuscation Detection Using Large Language Models
- Michael Adam Polak and Vojtech Outrata
►
Hardwear.io 2023
TEEzz: Fuzzing Trusted Applications On COTS Android Devices
- Marcel Busch
►
Black Alps 2023
A Security Research Journey: How The Mobile Industry Met Hackers In The Middle
- David Rogers MBE
►
Hardwear.io 2023
Attacking Vehicle Fleet Management Systems
- Yashin Mehaboobe & Ramiro Pareja Veredas
►
Black Alps 2023
Unraveling The Challenges Of Reverse Engineering Flutter Applications
- Axelle Apvrille
►
Hardwear.io 2023
Basebanheimer: Now I Am Become Death, The Destroyer Of Chains
- Daniel Komaromy
►
Black Alps 2023
Unleash The Engineer Within: Culture Eats Policy For Breakfast
- Fred Blaise
►
Hardwear.io 2023
Automated Fault Injection Attacks On Embedded Devices
- Enrico Pozzobon & Nils Weiss
►
Black Alps 2023
Sideloading Serenade: A Symphony Of .NET Payload Techniques
- Nick Powers and Steven Flores
►
Hardwear.io 2023
A New Future For IoT Security: Better Solutions And What Did Not Work So Far
- Panel
►
Black Alps 2023
Quantum Computing Doomsday Planning: Is Your Organisation Ready?
- JP Aumasson and Farida Aclimandos
►
Hardwear.io 2023
Dissecting The Modern Android Data Encryption Scheme
- Maxime Rossi Bellom & Damiano Melotti
►
Black Alps 2023
Ghidriff: Ghidra Binary Diffing Engine
- John Mac
►
Hardwear.io 2023
How Deep Is The Rabbit Hole? A Deep Dive Into Exploitation Of A Popular Smart Speaker
- Sergei Volokitin
►
Hardwear.io 2023
CSI:Rowhammer - Cryptographic Security And Integrity Against Rowhammer
- Jonas Juffinger
►
Black Alps 2023
XORtigate: Zero-Effort, Zero-Expense, 0-Day On Fortinet SSL VPN
- Charles Fol
►
Hardwear.io 2023
Triple Exploit Chain With Laser Fault Injection On A Secure Element
- Olivier Heriveaux
►
Hardwear.io 2023
Blue2thprinting (blue-[tooth)-printing]: Answering The Question Of 'WTF Am I Even Looking At?!'
- Xeno Kovah
►
Black Alps 2023
Needles In The Haystack: A Hueristics-based Approach To Vulnerability Discovery
- Matt Hand and Jack Ullrich
►
Hardwear.io 2023
Hacking With AI: Our Journey Through The Perils & Promises
- Dhinesh Manoharan
►
Black Alps 2023
Unveiling The Express Lane To Catastrophe: Insights From Extensive Security Testing
- Florian Badertscher
►
Black Alps 2023
Opening Words
- Sylvain Pasini
►
WICCON 2023
Closing Note
- Valentine Mairet & Chantal Stekelenburg
►
WICCON 2023
We May Have Been Hacked, And All We Got Was This Lousy Actor
- Sanne Maasakkers
►
WICCON 2023
Adversaries Of The Future: The Dynamic Red Teaming Landscape
- Eva Tanaskoska
►
WICCON 2023
Creating A Cyber Strategy Based On The Threat Landscape
- Dorrit Sliepen
►
WICCON 2023
Threat Modeling Your Personal Digital Footprint
- Daniëlle Wagemakers
►
WICCON 2023
Cyber-Attack Detection In Water Distribution Networks
- Rosanne Aartman
►
WICCON 2023
Tools Vs Rules: Why Technical Based Measures Work Better Than Behavior Based Approaches In Infosec
- Fleur Van Leusden
►
WICCON 2023
What If Hacking Were A Sport?
- Maja Reissner
►
WICCON 2023
Revolutionizing Cybersecurity: Unleashing The Power Of AI
- Catherine De Weever
►
WICCON 2023
Cybersecurity In The Automotive Industry: Compliance And Beyond
- Anna Prudnikova
►
WICCON 2023
Anti Surveillance Knitting
- Ottilia Westerlund
►
WICCON 2023
Tales From The Trenches: Implementing An Appsec Program
- Tess Sluijter-Stek
►
WICCON 2023
Tackling The Hidden Impact Of Ransomware Attacks
- Inge Van Der Beijl and Gerine Lodder
►
WICCON 2023
Spooky Action
- Jaya Baloo
►
OWASP NL Chapter Meetings 2023-10-19
Unveiling The Secrets In Your Code: Detecting And Triaging Exposed Credentials At Scale
- Ingmar Vis
►
OWASP NL Chapter Meetings 2023-10-19
Hacking CI/CD Pipelines: Some Use Cases For Hacking CI/CD Orchestrators
- Mauricio Cano
►
Hack.lu 2023
Operation Duck Hunt: A Peak Behind The Curtain Of DuckTail
- Pol Thill
►
Hack.lu 2023
Using Apple Sysdiagnose For Mobile Forensics And Integrity Checks
- David Durvaux and Aaron Kaplan