Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Twitter
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my Twitter
.
►
BSides Prague 2024
Closing
- Martin Hron
►
BSides Prague 2024
Unmask The Bastards: Malice And Fraud In Mobile Ads
- Abdullah Joseph
►
BSides Prague 2024
SIEM Slam: Tricking Modern SIEMs With Fake Logs And Confusing Blue Teams
- Özgün Kültekin
►
BSides Prague 2024
Hack To The Future: Using LLMs As Attacking Agents In Real Networks
- Maria Rigaki & Sebastian Garcia
►
BSides Prague 2024
File Infectors Are (Not) Dead: What's Spreading And How To Detect It Using YARA
- Ladislav Zezula
►
BSides Prague 2024
Using, And Mis-using Kubernetes Dynamic Admission Control
- Richard Finlay Tweed
►
BSides Prague 2024
Digital Scorched Earth: Understanding APT-Driven Cyber Destruction
- Or Chechik
►
BSides Prague 2024
GPT-like Pre-Training On Unlabeled System Logs For Malware Detection
- Dmitrijs Trizna
►
BSides Prague 2024
Industrial Robots And Machines Under Attack
- Marco Balduzzi
►
BSides Prague 2024
A Two-part Saga: Continuing The Journey Of Hacking Malware C2S
- Vangelis Stykas
►
BSides Prague 2024
Securing Our Post-Quantum Future
- Jaya Baloo
►
BSides Prague 2024
Welcome
- Martin Hron
►
BSides Lancashire 2024
Closing
- Rosie Anderson
►
BSides Lancashire 2024
Closing Panel
- Panel
►
BSides Lancashire 2024
Introduction To The Hacking Games
- Sam Humphries & Fergus Hay
►
BSides Lancashire 2024
Those Who Can't Do
- James Starnes
►
BSides Lancashire 2024
Anything Online Can Be Faked: Here’s How
- Wayne May
►
BSides Lancashire 2024
The Origin Story of DracoEye
- Ste Wright
►
BSides Lancashire 2024
What Your Browser Can Teach You About Secure Design
- Mark Goodwin
►
BSides Lancashire 2024
I Was Threatened With A Lawsuit
- James Bore
►
BSides Lancashire 2024
Building My Ultimate Home Detection Lab
- Oliver Creed
►
BSides Lancashire 2024
Uneathing Digital Fossils
- Alsa Tibbett
►
BSides Lancashire 2024
Keynote
- Holly Grace-Williams
►
BSides Lancashire 2024
Intel-Driven Red Teaming
- Carlos Gonçalves
►
BSides Lancashire 2024
Securing Critical Infrastructure, Navigating Tech. Risks
- Paul Smith
►
BSides Lancashire 2024
Adversarial AI Attacks In Cyber Security
- Thomas Win
►
BSides Lancashire 2024
Cyber Relevance – The Titanic Effect
- Rosie Anderson
►
BSides Lancashire 2024
Write Your Damn Report
- Paul Johnson
►
BSides Lancashire 2024
AI AIEEEEEE! The Trilogy
- Leum Dunn
►
BSides Lancashire 2024
Operational Technology Cyber Security In Railways
- Dan Basher
►
BSides Lancashire 2024
Save The Chicken, Save The World
- Andy Barratt
►
BSides Lancashire 2024
Sales And Business Development (EEEK!) For All Technical Consultants
- Tim Ogle
►
BSides Lancashire 2024
The Seven Sins Of Attackers
- Sarah Armstrong-Smith
►
BSides Lancashire 2024
Opening Remarks
- BSides Lancashire
►
OWASP Manchester 2024-01-15
Basic Assembly And Memory
- Tom Blue
►
OWASP Manchester 2024-01-15
Appsec In The Enterprise: In-Flight Testing And Shifting Left
- Stuart Crawford
►
OWASP BeNeLux Day 2023
OWASP Juice Shop - An Open Source Software (And Security) Fairytale
- Björn Kimminich
►
OWASP BeNeLux Day 2023
Down The Rabbit Hole: Exploring GraphQL Exploitation
- Himanshu Mehta
►
OWASP BeNeLux Day 2023
How To Implement With DevSecOps In Large Complex Organizations
- Stefan Simenon
►
OWASP BeNeLux Day 2023
Secure Defaults: A Scalable Security Approach For Modern Development
- Pieter De Cremer
►
OWASP BeNeLux Day 2023
Using WebAssembly To Run, Extend, And Secure Your Application
- Niels Tanis
►
OWASP BeNeLux Day 2023
A Quest To Tame DevOps Unicorns
- Jeroen Prinse
►
OWASP BeNeLux Day 2023
Far From Green Fields - Introducing Threat Modelling To Established Teams
- Sarah-Jane Madden
►
OWASP BeNeLux Day 2023
Everything-as-Code: Pushing The Boundaries Of SAST
- Frans Van Buul
►
OWASP BeNeLux Day 2023
The State Of The Art In AI Security
- Rob Van Der Veer
►
Elbsides 2023
Closing Remarks
- Florian Junge
►
Elbsides 2023
Broadcom Router SDK Vulnerabilities: The Uncomfortable Reality Of The IoT Linux Kernel Space
- Attila Szasz
►
Elbsides 2023
Reverse Engineering Of Intel's Branch Prediction
- Nick Mahling
►
GreHack 2023
Closing Remarks
- Adam Larabi
►
GreHack 2023
Backstage
- Bastien Becarie
►
GreHack 2023
InfoSec Streaming 101
- Laluka
►
GreHack 2023
FUN
- Pascal Lafourcade
►
GreHack 2023
LOGOS And BOOKS
- Pascal Lafourcade
►
GreHack 2023
Codix Ramp Prompt Engineering
- Baptiste Roussel
►
Elbsides 2023
You Are (Not) Prepared: A Ransomware Story
- Christian Kollee
►
GreHack 2023
Ubuntu Shiftfs: Unbalanced Unlock Exploitation Attempt (CVE-2023-2612)
- Jean-Baptiste Cayrou
►
Elbsides 2023
A Beginner's Guide To SSO (Mis)Configuration
- Adina Bogert-O’Brien
►
GreHack 2023
Won't You Please, Please --Help Me?
- Thomas Chauchefoin
►
GreHack 2023
System Introspection Applied To Micro-Services Pentests In K8S Clusters
- Laluka And Christophe Biguereau
►
Elbsides 2023
My CI/CD Pipeline Contains All Security Tools Available! Now What…?
- Jasmin Mair
►
Elbsides 2023
40 Years Census Decision: The Census And Understanding Privacy Protection In The Transition Of Time
- Simone Fischer-Hübner
►
Elbsides 2023
Conference Opening
- Morton Swimmer
►
GreHack 2023
Unlocking The Drive: Exploiting Tesla Model 3
- David Berard & Vincent Dehors
►
GreHack 2023
Vulnerability In The QR Code Of The Izly Phone Application
- Clément Gindrier
►
GreHack 2023
Virtualization From An Attacker Point-Of-View
- Corentin Bayet & Thomas Bouzerar
►
GreHack 2023
Google Apps Script: This Talk Requires Access To Your E-mails
- Nicolas Kovacs & Sébastien Rolland
►
Hardwear.io 2023
Closing Ceremony & Prize
- Antriksh Shah
►
Black Alps 2023
Infiltrating Kubernetes: A Comprehensive Study Of Attack Scenarios And Security Measures
- Magno Logan
►
Hardwear.io 2023
Breaking Secure Boot On The Silicon Labs Gecko Platform
- Benoît Forgette & Sami Babigeon
►
Black Alps 2023
Defeating VPN Always-On
- Maxime Clementz
►
Hardwear.io 2023
Protect Your Screen From Eavesdropping: Don’t Forget Its Power Supply
- Emmanuel Cottais
►
Hardwear.io 2023
Hacking A Smart Doorbell: An IoT Hacking Guide
- Daniel Schwendner
►
Hardwear.io 2023
Understanding Physics To Break AES Encryption With Custom Side-channel Hardware
- Stephan Mathieu & Roman Korkikian
►
Black Alps 2023
Command-line Obfuscation Detection Using Large Language Models
- Michael Adam Polak and Vojtech Outrata
►
Hardwear.io 2023
TEEzz: Fuzzing Trusted Applications On COTS Android Devices
- Marcel Busch
►
Black Alps 2023
A Security Research Journey: How The Mobile Industry Met Hackers In The Middle
- David Rogers MBE
►
Hardwear.io 2023
Attacking Vehicle Fleet Management Systems
- Yashin Mehaboobe & Ramiro Pareja Veredas
►
Black Alps 2023
Unraveling The Challenges Of Reverse Engineering Flutter Applications
- Axelle Apvrille
►
Hardwear.io 2023
Basebanheimer: Now I Am Become Death, The Destroyer Of Chains
- Daniel Komaromy
►
Black Alps 2023
Unleash The Engineer Within: Culture Eats Policy For Breakfast
- Fred Blaise
►
Hardwear.io 2023
Automated Fault Injection Attacks On Embedded Devices
- Enrico Pozzobon & Nils Weiss
►
Black Alps 2023
Sideloading Serenade: A Symphony Of .NET Payload Techniques
- Nick Powers and Steven Flores
►
Hardwear.io 2023
A New Future For IoT Security: Better Solutions And What Did Not Work So Far
- Panel
►
Black Alps 2023
Quantum Computing Doomsday Planning: Is Your Organisation Ready?
- JP Aumasson and Farida Aclimandos
►
Hardwear.io 2023
Dissecting The Modern Android Data Encryption Scheme
- Maxime Rossi Bellom & Damiano Melotti
►
Black Alps 2023
Ghidriff: Ghidra Binary Diffing Engine
- John Mac
►
Hardwear.io 2023
How Deep Is The Rabbit Hole? A Deep Dive Into Exploitation Of A Popular Smart Speaker
- Sergei Volokitin
►
Hardwear.io 2023
CSI:Rowhammer - Cryptographic Security And Integrity Against Rowhammer
- Jonas Juffinger
►
Black Alps 2023
XORtigate: Zero-Effort, Zero-Expense, 0-Day On Fortinet SSL VPN
- Charles Fol
►
Hardwear.io 2023
Triple Exploit Chain With Laser Fault Injection On A Secure Element
- Olivier Heriveaux