|
About the 2025 talks / workshops category
|
|
0
|
11
|
August 25, 2025
|
|
Hack your brain β Pauline Bourmeau (Cookie)
|
|
1
|
19
|
October 31, 2025
|
|
How to better identify (weaponized) file formats with ftguess β Philippe Lagadec
|
|
2
|
78
|
October 28, 2025
|
|
CLI ambush β William Robinet
|
|
1
|
29
|
October 28, 2025
|
|
DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape β Julien Bedel
|
|
1
|
26
|
October 24, 2025
|
|
Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks β Martin Salfer
|
|
1
|
22
|
October 24, 2025
|
|
Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations β cocomelonc
|
|
1
|
19
|
October 24, 2025
|
|
Lethal Language Models: From Bit Flip to RCE in Ollama β Paul Gerste
|
|
1
|
17
|
October 24, 2025
|
|
Russian-speaking underground - changes in the risks, attack surface and modus operandi β Vladimir Kropotov
|
|
1
|
7
|
October 24, 2025
|
|
From YAML to Root: CI/CD Pipeline Attacks and Countermeasures β Hugo
|
|
1
|
17
|
October 24, 2025
|
|
Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain β Maxime Escourbiac
|
|
1
|
22
|
October 24, 2025
|
|
Breaking Android IPC: A Deep Dive into AIDL Fuzzing β Rajanish Pathak
|
|
1
|
9
|
October 24, 2025
|
|
Practical intro to deeplearning: chihuahuas vs muffins β Pauline Bourmeau (Cookie), William Robinet
|
|
1
|
16
|
October 24, 2025
|
|
Livewire : remote command execution through unmarshalling β RΓ©mi Matasse (@_remsio_), Pierre Martin (@_Worty), Pierre MARTIN
|
|
1
|
13
|
October 24, 2025
|
|
2038 is gonna be epoch! β Pedro Umbelino, Trey Darley
|
|
1
|
20
|
October 24, 2025
|
|
Wyse Management Subversion : Taking over Dell's Wyse Management Suite β Alain Mowat
|
|
1
|
6
|
October 24, 2025
|
|
What's New in Suricata 8: Enhanced Detection and Performance β Eric Leblond, Peter Manev
|
|
1
|
6
|
October 24, 2025
|
|
Hacking for hoodies: MISP edition β Jeroen Pinoy
|
|
1
|
15
|
October 24, 2025
|
|
Building a pipeline to analyse iOS devices at scale β David Durvaux, Christophe Vandeplas
|
|
1
|
11
|
October 23, 2025
|
|
My other ClassLoader is your ClassLoader: Creating evil twin instances of a class β Dimitrios Valsamaras
|
|
1
|
5
|
October 23, 2025
|
|
Field guide to physical attacks against full-disk encryption β Edouard D'hoedt, Hayk Gevorgyan
|
|
1
|
68
|
October 23, 2025
|
|
One day at the Internet Storm Center β Xavier Mertens
|
|
1
|
14
|
October 23, 2025
|
|
Attacking The Developer Environment Through Drive-by Localhost Attacks β Joseph Beeton
|
|
1
|
11
|
October 23, 2025
|
|
Instrumenting software builds to detect stealth backdoors and other curiosities β Hilko Bengen
|
|
1
|
7
|
October 23, 2025
|
|
Compromising Threat Actor Communications β Ben (@polygonben)
|
|
1
|
30
|
October 23, 2025
|
|
Nightmare on NTLM street: Legacyβs Revenge β Marina Bochenkova
|
|
1
|
32
|
October 23, 2025
|
|
In bed with Qubes OS - tips & tricks exchange party β William Robinet
|
|
2
|
38
|
October 23, 2025
|
|
Integrating Zeek With Third-Party Applications β Christian Kreibich
|
|
1
|
6
|
October 22, 2025
|
|
What Malware Leaves Behind: Analysing Forensic Traces of Ransomware β Ankshita Maunthrooa
|
|
1
|
9
|
October 22, 2025
|
|
Security Monitoring and Response in Large Linux Environments β Hendrik Schmidt, Hilko Bengen
|
|
1
|
14
|
October 22, 2025
|