<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BJ8LES@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BJ8LES</pentabarf:event-slug>
            <pentabarf:title>GCVE Backstage: BCPs, Tooling, and Hackathon Opportunities</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T090000</dtstart>
            <dtend>20260414T091500</dtend>
            <duration>001500</duration>
            <summary>GCVE Backstage: BCPs, Tooling, and Hackathon Opportunities</summary>
            <description>GCVE is a decentralized and open approach to vulnerability identification, publication, and reuse. Behind the initiative is a growing set of public Best Current Practices (BCPs): from signature verification and disclosure workflows to decentralized publication, ID allocation, structured vulnerability records, GNA transparency criteria, and KEV assertions. The interesting part for a hackathon is that GCVE is designed as a living, hackable ecosystem: open formats, open BCPs, open validators, and reference implementations already exist.

This session gives a backstage view of the current GCVE tooling and shows where people can contribute right now. Possible hackathon projects range from editors, validators, and sync clients to GNA dashboards, KEV tooling, and quality-of-data improvements. As one concrete example, I’ll be working on a CPE editor to improve structured product metadata in the broader GCVE ecosystem.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/BJ8LES/</url>
            <location>Salle Europe</location>
            
            <attendee>Alexandre Dulaunoy</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>ZRBFZ7@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-ZRBFZ7</pentabarf:event-slug>
            <pentabarf:title>Hidden in Plain Text: Identifying Dark Jargon with NLP</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T091500</dtstart>
            <dtend>20260414T093000</dtend>
            <duration>001500</duration>
            <summary>Hidden in Plain Text: Identifying Dark Jargon with NLP</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/ZRBFZ7/</url>
            <location>Salle Europe</location>
            
            <attendee>Laura Bernardy</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SJGAZT@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SJGAZT</pentabarf:event-slug>
            <pentabarf:title>Pivotick: A generic network graph library</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T093000</dtstart>
            <dtend>20260414T094500</dtend>
            <duration>001500</duration>
            <summary>Pivotick: A generic network graph library</summary>
            <description>Pivotick is a new network graph library designed to be both hackable and plug-and-play for the web. In this short talk, we’ll explore its current capabilities, highlight ongoing development, and preview planned features. The goal is to gather feedback and insights to help shape what comes next.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/SJGAZT/</url>
            <location>Salle Europe</location>
            
            <attendee>Sami Mokaddem</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>XHGLKA@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-XHGLKA</pentabarf:event-slug>
            <pentabarf:title>RADAR meets DECIPHER: from anomaly detection in Wazuh to automated response and cases in Flowintel</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T094500</dtstart>
            <dtend>20260414T100000</dtend>
            <duration>001500</duration>
            <summary>RADAR meets DECIPHER: from anomaly detection in Wazuh to automated response and cases in Flowintel</summary>
            <description>We will briefly present the key subsystems that enable this workflow:

- **RADAR**: a risk-aware automated response engine integrated into Wazuh that enables anomaly-based and signature-based detection, computing a risk score on threat alerts informed by live Cyber Threat Intelligence (CTI) to run automated response actions.
- **DECIPHER**: a REST microservice for automated, IOC-based severity-confidence scoring of security alerts, backed by [MISP](https://www.misp-project.org/) threat intelligence and integrated with [Flowintel](https://github.com/flowintel) for prioritized incident case creation.
- **[PyFlowintel](https://github.com/AbstractionsLab/PyFlowintel)**: a Python library providing programmatic access to the [Flowintel](https://github.com/flowintel) API for case management automation.
- **SONAR**: a multivariate anomaly detection engine for [Wazuh](https://wazuh.com/), powered by a deep learning algorithm.

**RADAR** detects a threat; **DECIPHER** analyzes the alert IOCs with CTI from MISP and computes a severity-confidence score; **RADAR** computes a risk score combining anomaly detection signal, signature-based risk, and DECIPHER CTI score; **RADAR** uses the risk score for triage and automated response; **RADAR** uses **DECIPHER** to create prioritized incident cases in Flowintel according to the triage.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/XHGLKA/</url>
            <location>Salle Europe</location>
            
            <attendee>Arash Atashpendar</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>HSAY8Y@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-HSAY8Y</pentabarf:event-slug>
            <pentabarf:title>Collaborative Detection Engineering with Rulezet</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T100000</dtstart>
            <dtend>20260414T101500</dtend>
            <duration>001500</duration>
            <summary>Collaborative Detection Engineering with Rulezet</summary>
            <description>https://rulezet.org/ for more informations</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/HSAY8Y/</url>
            <location>Salle Europe</location>
            
            <attendee>Théo Geffé</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>WE9P3S@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-WE9P3S</pentabarf:event-slug>
            <pentabarf:title>Phone Check app - collecting iOS Sysdiagnose archives at scale</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T101500</dtstart>
            <dtend>20260414T103000</dtend>
            <duration>001500</duration>
            <summary>Phone Check app - collecting iOS Sysdiagnose archives at scale</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/WE9P3S/</url>
            <location>Salle Europe</location>
            
            <attendee>Will Moffat</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FQ3MAQ@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FQ3MAQ</pentabarf:event-slug>
            <pentabarf:title>AIL Project</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T103000</dtstart>
            <dtend>20260414T104500</dtend>
            <duration>001500</duration>
            <summary>AIL Project</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/FQ3MAQ/</url>
            <location>Salle Europe</location>
            
            <attendee>Aurelien Thirion</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>EBNJLH@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-EBNJLH</pentabarf:event-slug>
            <pentabarf:title>Lookyloo &amp; Lacus internals</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T104500</dtstart>
            <dtend>20260414T110000</dtend>
            <duration>001500</duration>
            <summary>Lookyloo &amp; Lacus internals</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/EBNJLH/</url>
            <location>Salle Europe</location>
            
            <attendee>Raphaël Vinot</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>GP7EVV@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-GP7EVV</pentabarf:event-slug>
            <pentabarf:title>Dealing with AI PRs</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T110000</dtstart>
            <dtend>20260414T111500</dtend>
            <duration>001500</duration>
            <summary>Dealing with AI PRs</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/GP7EVV/</url>
            <location>Salle Europe</location>
            
            <attendee>Raphaël Vinot</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>A9ZLMU@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-A9ZLMU</pentabarf:event-slug>
            <pentabarf:title>Flowintel - Something has changed... No ?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T111500</dtstart>
            <dtend>20260414T113000</dtend>
            <duration>001500</duration>
            <summary>Flowintel - Something has changed... No ?</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/A9ZLMU/</url>
            <location>Salle Europe</location>
            
            <attendee>Cruciani David</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>TZD7PP@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-TZD7PP</pentabarf:event-slug>
            <pentabarf:title>HOPLITE-MISP-Modules (AI)</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T113000</dtstart>
            <dtend>20260414T114500</dtend>
            <duration>001500</duration>
            <summary>HOPLITE-MISP-Modules (AI)</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/TZD7PP/</url>
            <location>Salle Europe</location>
            
            <attendee>Alex Cronin</attendee>
            
            <attendee>David Curran</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BKSEWH@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BKSEWH</pentabarf:event-slug>
            <pentabarf:title>Integrating Ghidra Behavioral Similarity with the MISP Ecosystem</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T114500</dtstart>
            <dtend>20260414T120000</dtend>
            <duration>001500</duration>
            <summary>Integrating Ghidra Behavioral Similarity with the MISP Ecosystem</summary>
            <description>[Misp-ghidra](https://github.com/MISP/misp-ghidra) is a python library and scripts to extend Ghidra for exporting ghidra decompilation indicators (functions names, FID hashes, BSIM vectors) to MISP Objects.

[BSimVis](https://github.com/MISP/BSimVis) is a tool to analyze similarities across a collection of binaries, based on Ghidra analyzers and the BSim (Behavioral Similarity) plugin. It provides an API and Web interface to upload large quantities of decompiled binaries and BSim feature vectors to a Kvrocks database for similarity analysis, function diffing, and family clustering.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/BKSEWH/</url>
            <location>Salle Europe</location>
            
            <attendee>Thomas Caillet</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3VAFP9@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3VAFP9</pentabarf:event-slug>
            <pentabarf:title>Dusting Off SSLDump</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T130000</dtstart>
            <dtend>20260414T131500</dtend>
            <duration>001500</duration>
            <summary>Dusting Off SSLDump</summary>
            <description>The SSLDump project lived two lifes since its inception early 2000s by Eric Rescorla (aka EKR) who maintained it till 2008. Adulau took over in 2015, he created a new repository on GitHub and merged publicly available patches that were produced by the community but never ended up in the project itself.
This talk is about what followed; modernization of the code base, bug fixing and implementation of various new features.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/3VAFP9/</url>
            <location>Salle Europe</location>
            
            <attendee>William Robinet</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RAWNS8@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RAWNS8</pentabarf:event-slug>
            <pentabarf:title>Vibe coding - scoping to reduce risks</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260414T131500</dtstart>
            <dtend>20260414T133000</dtend>
            <duration>001500</duration>
            <summary>Vibe coding - scoping to reduce risks</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/hackathon-2026/talk/RAWNS8/</url>
            <location>Salle Europe</location>
            
            <attendee>Andras Iklody</attendee>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
