Alexandre Bartel

“DOS Software Security: Is there Anyone Left to Patch a 25-year old Vulnerability?”


Alyssa Herrera

“Piercing the Veil: Server Side Request Forgery attacks on Internal Networks.”


Andreia Gaita

“Exploiting bug report systems in the game industry”


Ange Albertini

“Hash collisions exploitations” | “Kill MD5 - demystifying hash collisions”


Antonin Beaujeant

“AppSec 101: Understanding and exploiting buffer overflows”


Ari Eitan

“The Red Square - Mapping the connections inside Russia's APT Ecosystem”


Axelle Apvrille

“Smartphone apps: let's talk about privacy” | “Junior CTF Install Party”


Benoit Sevens

“Repacking the unpacker: Applying Time Travel Debugging to malware analysis”


Celine Massompierre

“IOCs are dead, long live the IOCs!”


Chris Kubecka

“The Road to Hell is Paved with Bad Passwords”


Damien Cauquil

“Hacking Bluetooth Low Energy devices with Btlejack” | “Defeating Bluetooth Low Energy 5 PRNG for fun and jamming”


Daniil Yugoslavskiy

“oscd.community”


David Szili

“Introduction to Osquery”


Desiree Sacher

“Fingerpointing False Positives: How to better integrate Continuous Improvement into Security Monitoring”


Didier Stevens

“Malicious RTF Document Analysis”


Elmar Nabigaev

“Effectiveness in simplicity: The Taskmasters APT”


Emilien

“Who contains the containers”


Eva Szilagyi

“Java Web Application Secure Coding Workshop”


Eve Matringe

“The regulation (EU) 2019/796 of 17 May 2019 concerning restrictive measures against cyber-attacks threatening the Union or its Member States”


Eyal Itkin

“Say Cheese - How I Ransomwared your DSLR Camera”


Geethna T K

“Intro to Dark Arts: Getting Started with CTFs”


Gerhard Klostermeier

“New Tales of Wireless Input Devices”


Hack.lu

“Jobfair” | “CTF Prizes” | “Call for Failure (CfF 0x0)” | “Power Point Karaoke” | “Cinema” | “Cinema”


harlo

“Tiplines Today”


アドリアン ヘンドリック - Hendrik Adrian - @MalwareMustDie

“Fileless Malware Infection and Linux Process Injection in Linux OS”


Ioana Andrada

“Who contains the containers”


Itay Cohen

“The Red Square - Mapping the connections inside Russia's APT Ecosystem”


Kostiantyn Korsun

“Hacktivism as a defense technique in a cyberwar. #FRD Lessons for Ukraine”


Marcus Bakker

“DeTT&CT: Mapping your Blue Team to MITRE ATT&CK”


Marion

“The Glitch In The Matrix”


Mathieu

“Leveraging KVM as a debugging platform”


Matthias Deeg

“New Tales of Wireless Input Devices”


Miriam Wiesner

“What the log?! So many events, so little time…”


Patrice Auffret

“Learn to use ONYPHE to have a view on your Internet exposed devices”


Patrick Ventuzelo

“Reversing WebAssembly Module 101”


Pauline

“Snarf it! Firmware extraction and analysis with open source tools.”


Quentin JEROME

“Introduction to WHIDS an Open Source Endpoint Detection System for Windows”


Rascagneres Paul

“DNS On Fire”


Ruben Bouman

“DeTT&CT: Mapping your Blue Team to MITRE ATT&CK”


Saad Kadhi

“Disturbance: on the Sorry State of Cybersecurity and Potential Cures” | “Practical Incident Response, With Automation and Collaboration Inside”


Sebastien Tricaud

“Faup workshop, parse and investigate URLs!”


Shruti Dixit

“Intro to Dark Arts: Getting Started with CTFs”


Solal jacob

“Memory forensics analysis of Cisco IOS XR 32 bits routers with 'Amnesic-Sherpa'”


Sowmya

“Intro to Dark Arts: Getting Started with CTFs”


Stijn Tomme

“Open the safe and get cured.” | “Open the safe and get cured.” | “Open the safe and get cured.” | “Open the safe and get cured.” | “Open the safe and get cured.” | “Open the safe and get cured.” | “Open the safe and get cured.” | “Open the safe and get cured.”


Takahiro Haruyama

“Defeating APT10 Compiler-level Obfuscations”


Thomas Fischer

“Beyond Windows Forensics with Built-in Microsoft Tooling”


Thomas Patzke

“Sigma Workshop”


Trammell Hudson

“spispy: opensource SPI flash emulation”


Warren Mercer

“DNS On Fire”


Zoz

“Sensor & Logic Attack Surface of Driverless Vehicles”