Version 0.9 Aug. 26, 2025
We released a new schedule version!
Version 0.8 Aug. 25, 2025
We released a new schedule version!
We have a new session: “Hacking for hoodies: MISP edition” by Jeroen Pinoy.
Version 0.7 Aug. 13, 2025
We released a new schedule version!
We had to move some sessions, so if you were planning on seeing them, check their new dates or locations:
- “Integrating Zeek With Third-Party Applications” by Christian Kreibich (Oct. 23, 2025, 5 p.m. → Oct. 22, 2025, 5:30 p.m.)
- “What's New in Suricata 8: Enhanced Detection and Performance” by Peter Manev, Eric Leblond (Oct. 22, 2025, 5:30 p.m. → Oct. 23, 2025, 5 p.m.)
Version 0.6 Aug. 8, 2025
We released a new schedule version!
We have new sessions!
- “Instrumenting software builds to detect stealth backdoors and other curiosities” by Hilko Bengen
- “Tracking and documenting Threat Actors using MISP - A slightly different approach” by Csaba Barta
- “2038 is gonna be epoch!” by Trey Darley, Pedro Umbelino
- “How to better identify (weaponized) file formats with ftguess” by Philippe Lagadec
- “Signals of Conflict: The Rise of OSINT in Cyber and Information Warfare.” by Shubham Kumar, Sagar Tiwari
We had to move some sessions, so if you were planning on seeing them, check their new dates or locations:
- “Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations” by cocomelonc (Oct. 24, 2025, 11:15 a.m. → Oct. 24, 2025, 11:45 a.m.)
- “Lethal Language Models: From Bit Flip to RCE in Ollama” by Paul Gerste (Oct. 23, 2025, 5:30 p.m. → Oct. 24, 2025, 11:15 a.m.)
Version 0.5 Aug. 6, 2025
We released a new schedule version!
We sadly had to cancel a session: “From RMM to RATs: Malware Delivery Through ScreenConnect Abuse” by Rohit Chaturvedi
Version 0.4 Aug. 6, 2025
We released a new schedule version!
We have new sessions!
- “Digic8 Oracle” by laurent clevy
- “Persōna Theory: Infiltration & Deception of Emerging Threat Groups” by Tammy Harper
- “Building a pipeline to analyse iOS devices at scale” by David Durvaux, Christophe Vandeplas
- “Kunai: From Zero to Ninja” by Quentin JEROME
- “Open source is a virus” by Philippe Ombredanne
We had to move some sessions, so if you were planning on seeing them, check their new dates or locations:
- “Payload Obfuscation for Red Teams” by Duncan Ogilvie (Oct. 21, 2025, 4:30 p.m. → Oct. 21, 2025, 2:15 p.m.)
- “THAT PICTURE IS A LIE: SMUGGLING BINARIES WITH STYLE” by Harpreet Singh (Oct. 22, 2025, 2:15 p.m. → Oct. 24, 2025, 4:30 p.m.)
- “Automate Your Hacking: Writing New Tools & Extending Existing Ones” by Rahul Binjve (Oct. 21, 2025, 4:30 p.m. → Oct. 23, 2025, 2:15 p.m.)
- “Web forensic with Lookyloo” by Raphaël Vinot (Oct. 23, 2025, 10:15 a.m., Vianden & Wiltz → Oct. 21, 2025, 10:15 a.m., Hollenfels)
- “Back to basics - Exploring OpenSSH: hands-on workshop for beginners” by William Robinet (Oct. 21, 2025, 2:15 p.m. → Oct. 22, 2025, 10:15 a.m.)
- “Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain” by Maxime Escourbiac (Oct. 22, 2025, 3:15 p.m. → Oct. 24, 2025, 8:30 a.m.)
- “Hands-On Hardware Hacking: Extracting Keys and Owning Encrypted Laptops” by Edouard D'hoedt, Hayk Gevorgyan (Hollenfels → Vianden & Wiltz)
Version 0.3 Aug. 5, 2025
We released a new schedule version!
We have new sessions!
- “RomCom exploits Firefox and Windows zero days in the wild” by Damien Schaeffer
- “Slipping Through the Cracks: How Malicious Emails Evade Detection” by Elyssa Boulila
- “Field guide to physical attacks against full-disk encryption” by Edouard D'hoedt, Hayk Gevorgyan
- “Exploring Threats Leveraging Blockchains” by Rascagneres Paul
- “From YAML to Root: CI/CD Pipeline Attacks and Countermeasures” by Hugo
- “Kaitai Struct: a tool for dealing with binary formats” by Petr Pucil, Mikhail Yakshin
- “From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities” by Marina Bochenkova
- “Practical Maldoc Analysis Workshop” by Didier Stevens
- “Security Monitoring and Response in Large Linux Environments” by Hilko Bengen, Hendrik Schmidt
- “OverLAPS: Overriding LAPS Logic” by Antoine Goichot
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Hacking Kubernetes” by Benjamin Koltermann
- “Reversing a Pay Phone for Fun but No Profit” by Inbar Raz
- “Nightmare on NTLM street: Legacy’s Revenge” by Marina Bochenkova
- “Threat detection engineering with Suricata” by Eric Leblond, Peter Manev
- “No way to enable SSH access to your new router? The vendor might have something to hide” by Stanislav Dashevskyi
- “DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape” by Julien Bedel
- “Malware Development for Ethical Hackers (Windows, Linux, Android)” by cocomelonc
- “What Malware Leaves Behind: Analysing Forensic Traces of Ransomware” by Ankshita Maunthrooa
- “What's New in Suricata 8: Enhanced Detection and Performance” by Peter Manev, Eric Leblond
- “Wyse Management Subversion : Taking over Dell's Wyse Management Suite” by Alain Mowat
- “Automate Your Hacking: Writing New Tools & Extending Existing Ones” by Rahul Binjve
- “Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations” by cocomelonc
- “Payload Obfuscation for Red Teams” by Duncan Ogilvie
- “Payload Obfuscation for Red Teams” by Duncan Ogilvie
- “Crafting an Infoleak exploit - A Hands On tutorial” by Saumil Shah
- “Breaking Android IPC: A Deep Dive into AIDL Fuzzing” by Rajanish Pathak, Hardik Kamlesh Mehta
- “My other ClassLoader is your ClassLoader: Creating evil twin instances of a class” by Dimitrios Valsamaras
- “Detection Engineering with Sigma” by Thomas Patzke
- “Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain” by Maxime Escourbiac
- “Audit and retrospective of an automotive application: Carplay” by Etienne CHARRON, Khadim
- “CLI ambush” by William Robinet
- “Compromising Threat Actor Communications” by Ben (@polygonben)
- “When Netflow meets Pcap - A network forensic approach.” by Peter
- “yoga for geeks” by Georges Kesseler
- “yoga for geeks” by Georges Kesseler
- “A pragmatic approach to build a threat landscape” by Thomas Patzke
- “In bed with Qubes OS - tips & tricks exchange party” by William Robinet
- “Revisiting Widevine L3: DRM as a playground for Hackers” by Felipe Custodio Romero
- “Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks” by Martin Salfer
- “API Underworld: Red Team Hacking Secrets” by Parth Shukla
- “Fake Jobs, Real Malware. Uncovering How Cybercriminals are Exploiting the Employment Market” by Ionuț Baltariu
- “Hands-On Hardware Hacking: Extracting Keys and Owning Encrypted Laptops” by Edouard D'hoedt, Hayk Gevorgyan
- “The Human Factor: Psychological Safety in Cybersecurity Frontlines” by Cris Brafman Kittner
- “Reverse Engineering Ransomware: Hands-On Malware Analysis & IOCs Extraction” by Ankshita Maunthrooa
- “Krash Kourse: Intro to KQL for Defenders” by Dom Lutz
- “THAT PICTURE IS A LIE: SMUGGLING BINARIES WITH STYLE” by Harpreet Singh
- “French stealer ecosystem: the resurgence skid gangs in cybercrime space” by 0xSeeker
- “Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign” by Jiří Vinopal
- “The cloud journey 2013-2025 of the European Commission” by Claus
- “LOLBlue : Living Off the Land with Blue Team tools” by Maxence Fossat, Antoine C
- “From RMM to RATs: Malware Delivery Through ScreenConnect Abuse” by Rohit Chaturvedi
- “iOS analysis using the Sysdiagnose analysis framework workshop - advanced session” by Christophe Vandeplas, David Durvaux
- “Livewire : remote command execution through unmarshalling” by Rémi Matasse (@_remsio_), Pierre Martin (@_Worty), Pierre MARTIN
- “Integrating Zeek With Third-Party Applications” by Christian Kreibich
- “Attacking The Developer Environment Through Drive-by Localhost Attacks” by Joseph Beeton
- “Phishing detection using various parts of DNS ecosystem” by Piotr Białczak
- “Practical intro to deeplearning: chihuahuas vs muffins” by Pauline Bourmeau (Cookie), William Robinet
- “Web forensic with Lookyloo” by Raphaël Vinot
- “Confessions of a Linux Drama Queen: Incident Response When Hackers Try to Steal Your Spotlight” by Melina Phillips
- “iOS analysis using the Sysdiagnose analysis framework workshop - beginners guide” by Christophe Vandeplas, David Durvaux
- “Anti-Forensics - You are doing it wrong (Believe me, I'm an IR consultant)” by Stephan Berger
- “So you're interested in social engineering? The very first steps” by Kirils Solovjovs
- “Russian-speaking underground - changes in the risks, attack surface and modus operandi” by Vladimir Kropotov
- “intelmq.ai - adding ML model support to intelmq” by Aaron Kaplan, Sebastian Wagner
- “From Achilles to NIS2: Slovakian Lessons on Proactive Cybersecurity and Vulnerability Disclosure” by Michal Rampášek, Alexander Valach
- “The “S” in IoT: Tales from inside the IoT industry” by Will Moffat
- “Breaking the Signal: Red Teaming Mobile Networks in 2025” by Ali Abdollahi
- “One day at the Internet Storm Center” by Xavier Mertens
- “Smack my LLM up!” by Jindrich Karasek
- “Hack your brain” by Pauline Bourmeau (Cookie)
- “The Parking Chronicles - A DIY Guide to Agents Detection” by David Sopas
- “Integrating secure coding to DevSecOps cycle” by Gopika Subramanian
- “Hacking - 30+ years ago” by Walter Belgers
- “Beyond post-quantum stereotypes” by Antoine Gicquel, Benjamin SEPE
- “Oops, I Hacked It Again: Tales and disclosures” by Ignacio Navarro
- “Back to basics - Exploring OpenSSH: hands-on workshop for beginners” by William Robinet
- “New advanced network detection with Suricata 8” by Peter Manev, Eric Leblond
- “Containing the Threat: Analyzing cryptomining campaigns” by Bogdan Trufanda, Mihai Vasilescu
- “Lethal Language Models: From Bit Flip to RCE in Ollama” by Paul Gerste
Version 0.2 Dec. 3, 2024
We released a new schedule version!
Version 0.1 Dec. 3, 2024
We released our first schedule!