Version 0.5 Aug. 6, 2025
We released a new schedule version!
We sadly had to cancel a session: “From RMM to RATs: Malware Delivery Through ScreenConnect Abuse” by Rohit Chaturvedi
Version 0.4 Aug. 6, 2025
We released a new schedule version!
We have new sessions!
- “Digic8 Oracle” by laurent clevy
- “Persōna Theory: Infiltration & Deception of Emerging Threat Groups” by Tammy Harper
- “Building a pipeline to analyse iOS devices at scale” by David Durvaux
- “Kunai: From Zero to Ninja” by Quentin JEROME
- “Open source is a virus” by Philippe Ombredanne
We had to move some sessions, so if you were planning on seeing them, check their new dates or locations:
- “Payload Obfuscation for Red Teams” by Duncan Ogilvie (Oct. 21, 2025, 4:30 p.m. → Oct. 21, 2025, 2:15 p.m.)
- “THAT PICTURE IS A LIE: SMUGGLING BINARIES WITH STYLE” by Harpreet Singh (Oct. 22, 2025, 2:15 p.m. → Oct. 24, 2025, 4:30 p.m.)
- “Automate Your Hacking: Writing New Tools & Extending Existing Ones” by Rahul Binjve (Oct. 21, 2025, 4:30 p.m. → Oct. 23, 2025, 2:15 p.m.)
- “Web forensic with Lookyloo” by Raphaël Vinot (Oct. 23, 2025, 10:15 a.m., Vianden & Wiltz → Oct. 21, 2025, 10:15 a.m., Hollenfels)
- “Back to basics - Exploring OpenSSH: hands-on workshop for beginners” by William Robinet (Oct. 21, 2025, 2:15 p.m. → Oct. 22, 2025, 10:15 a.m.)
- “Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain” by Maxime Escourbiac (Oct. 22, 2025, 3:15 p.m. → Oct. 24, 2025, 8:30 a.m.)
- “Hands-On Hardware Hacking: Extracting Keys and Owning Encrypted Laptops” by Edouard D'hoedt, Hayk Gevorgyan (Hollenfels → Vianden & Wiltz)
Version 0.3 Aug. 5, 2025
We released a new schedule version!
We have new sessions!
- “RomCom exploits Firefox and Windows zero days in the wild” by Damien Schaeffer
- “Slipping Through the Cracks: How Malicious Emails Evade Detection” by Elyssa Boulila
- “Field guide to physical attacks against full-disk encryption” by Edouard D'hoedt, Hayk Gevorgyan
- “Exploring Threats Leveraging Blockchains” by Rascagneres Paul
- “From YAML to Root: CI/CD Pipeline Attacks and Countermeasures” by Hugo
- “Kaitai Struct: a tool for dealing with binary formats” by Petr Pucil
- “From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities” by Marina Bochenkova
- “Practical Maldoc Analysis Workshop” by Didier Stevens
- “Security Monitoring and Response in Large Linux Environments” by Hilko Bengen, Hendrik Schmidt
- “OverLAPS: Overriding LAPS Logic” by Antoine Goichot
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Tech Duel: The Escape Battle” by Stijn Tomme, Dominiek Madou
- “Hacking Kubernetes” by Benjamin Koltermann
- “Reversing a Pay Phone for Fun but No Profit” by Inbar Raz
- “Nightmare on NTLM street: Legacy’s Revenge” by Marina Bochenkova
- “Threat detection engineering with Suricata” by Eric Leblond, Peter Manev
- “No way to enable SSH access to your new router? The vendor might have something to hide” by Stanislav Dashevskyi
- “DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape” by Julien Bedel
- “Malware Development for Ethical Hackers (Windows, Linux, Android)” by cocomelonc
- “What Malware Leaves Behind: Analysing Forensic Traces of Ransomware” by Ankshita Maunthrooa
- “What's New in Suricata 8: Enhanced Detection and Performance” by Peter Manev, Eric Leblond
- “Wyse Management Subversion : Taking over Dell's Wyse Management Suite” by Alain Mowat
- “Automate Your Hacking: Writing New Tools & Extending Existing Ones” by Rahul Binjve
- “Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations” by cocomelonc
- “Payload Obfuscation for Red Teams” by Duncan Ogilvie
- “Payload Obfuscation for Red Teams” by Duncan Ogilvie
- “Crafting an Infoleak exploit - A Hands On tutorial” by Saumil Shah
- “Breaking Android IPC: A Deep Dive into AIDL Fuzzing” by Rajanish Pathak
- “My other ClassLoader is your ClassLoader: Creating evil twin instances of a class” by Dimitrios Valsamaras
- “Detection Engineering with Sigma” by Thomas Patzke
- “Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain” by Maxime Escourbiac
- “Audit and retrospective of an automotive application: Carplay” by Etienne CHARRON, Khadim
- “CLI ambush” by William Robinet
- “Compromising Threat Actor Communications” by Ben (@polygonben)
- “When Netflow meets Pcap - A network forensic approach.” by Peter
- “yoga for geeks” by Georges Kesseler
- “yoga for geeks” by Georges Kesseler
- “A pragmatic approach to build a threat landscape” by Thomas Patzke
- “In bed with Qubes OS - tips & tricks exchange party” by William Robinet
- “Revisiting Widevine L3: DRM as a playground for Hackers” by Felipe Custodio Romero
- “Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks” by Martin Salfer
- “API Underworld: Red Team Hacking Secrets” by Parth Shukla
- “Fake Jobs, Real Malware. Uncovering How Cybercriminals are Exploiting the Employment Market” by Ionuț Baltariu
- “Hands-On Hardware Hacking: Extracting Keys and Owning Encrypted Laptops” by Edouard D'hoedt, Hayk Gevorgyan
- “The Human Factor: Psychological Safety in Cybersecurity Frontlines” by Cris Brafman Kittner
- “Reverse Engineering Ransomware: Hands-On Malware Analysis & IOCs Extraction” by Ankshita Maunthrooa
- “Krash Kourse: Intro to KQL for Defenders” by Dom Lutz
- “THAT PICTURE IS A LIE: SMUGGLING BINARIES WITH STYLE” by Harpreet Singh
- “French stealer ecosystem: the resurgence skid gangs in cybercrime space” by 0xSeeker
- “Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign” by Jiří Vinopal
- “The cloud journey 2013-2025 of the European Commission” by Claus
- “LOLBlue : Living Off the Land with Blue Team tools” by Maxence Fossat, Antoine C
- “From RMM to RATs: Malware Delivery Through ScreenConnect Abuse” by Rohit Chaturvedi
- “iOS analysis using the Sysdiagnose analysis framework workshop - advanced session” by Christophe Vandeplas
- “Livewire : remote command execution through unmarshalling” by Rémi Matasse (@_remsio_), Pierre Martin (@_Worty), Pierre MARTIN
- “Integrating Zeek With Third-Party Applications” by Christian Kreibich
- “Attacking The Developer Environment Through Drive-by Localhost Attacks” by Joseph Beeton
- “Phishing detection using various parts of DNS ecosystem” by Piotr Białczak
- “Practical intro to deeplearning: chihuahuas vs muffins” by Pauline Bourmeau (Cookie), William Robinet
- “Web forensic with Lookyloo” by Raphaël Vinot
- “Confessions of a Linux Drama Queen: Incident Response When Hackers Try to Steal Your Spotlight” by Melina Phillips
- “iOS analysis using the Sysdiagnose analysis framework workshop - beginners guide” by Christophe Vandeplas
- “Anti-Forensics - You are doing it wrong (Believe me, I'm an IR consultant)” by Stephan Berger
- “So you're interested in social engineering? The very first steps” by Kirils Solovjovs
- “Russian-speaking underground - changes in the risks, attack surface and modus operandi” by Vladimir Kropotov
- “intelmq.ai - adding ML model support to intelmq” by Aaron Kaplan, Sebastian Wagner
- “From Achilles to NIS2: Slovakian Lessons on Proactive Cybersecurity and Vulnerability Disclosure” by Michal Rampášek, Alexander Valach
- “The “S” in IoT: Tales from inside the IoT industry” by Will Moffat
- “Breaking the Signal: Red Teaming Mobile Networks in 2025” by Ali Abdollahi
- “One day at the Internet Storm Center” by Xavier Mertens
- “Smack my LLM up!” by Jindrich Karasek
- “Hack your brain” by Pauline Bourmeau (Cookie)
- “The Parking Chronicles - A DIY Guide to Agents Detection” by David Sopas
- “Integrating secure coding to DevSecOps cycle” by Gopika Subramanian
- “Hacking - 30+ years ago” by Walter Belgers
- “Beyond post-quantum stereotypes” by Antoine Gicquel, Benjamin SEPE
- “Oops, I Hacked It Again: Tales and disclosures” by Ignacio Navarro
- “Back to basics - Exploring OpenSSH: hands-on workshop for beginners” by William Robinet
- “New advanced network detection with Suricata 8” by Peter Manev, Eric Leblond
- “Containing the Threat: Analyzing cryptomining campaigns” by Bogdan Trufanda, Mihai Vasilescu
- “Lethal Language Models: From Bit Flip to RCE in Ollama” by Paul Gerste
Version 0.2 Dec. 3, 2024
We released a new schedule version!
Version 0.1 Dec. 3, 2024
We released our first schedule!