- GCVE: Rebooting Vulnerability Tracking for an Open Security Ecosystem
Bas is the technical lead for post-quantum at Cloudflare. He works to drive the adoption of post-quantum cryptography at Cloudflare and the Internet at large. His works range from cryptography engineering, standardisation, to large-scale experimentation, and subsequent deployment. In a previous life, Bas studied the mathematical foundations of quantum theory.
- Let's stay encrypted—rethinking WebPKI for post-quantum age with Merkle Tree Certificates
Passionate about how systems work since my childhood and with an initial education in computer science, I gradually moved to the security of these systems and the electronic part of these equipments.Today, I work as a Cybersecurity Engineer in software and hardware reverse engineering at Quarkslab, where my daily work consists in disassembling equipments sent by our clients, then inspecting all their attack surfaces (hardware, radio, software, cloud). Then, we help our clients to find the best way to protect their systems and their equipments.
In this work, the part that seems to me the most interesting is the automation/instrumentation/hijacking part. It is fascinating to see how much it is possible to hijack a piece of equipment from its original purpose. This is even more impressive when we talk about physical equipment which has an impact on its environment.
- Workshop to explore SightHouse! Learn how to use it to accelerate your reverse engineering process using its function identification features.
- Introducing Sighthouse for Seamless Function Detection
Information security auditor with a passion for building security tools
- Bypassing BitLocker in under 5 min using boot manager downgrade attacks
Cédric is a seasoned DevSecOps and infrastructure engineer with 10yrs of experience spanning defense, blockchain, and cloud-native environments. He began his career working on safety-critical software in the defense industry, then moved into the blockchain space as a DevSecOps & SRE for the Tezos Foundation. He now runs his own digital agency, delivering security, and key management services to key accounts across banking and SaaS. His expertise sits at the intersection of cybersec, supply chain security, and applied cryptography, with a particular interest in privacy-preserving technologies. Company: Katvio.com
- Fractum: an open-source CLI for Threshold-Based Cold Storage of Critical Secrets
PhD in Cybersecurity. Open-source enjoyer.
- Zero Dependencies sounds great... until you try to share your code for the security good.
- Rust, PAM and Typestate: Cooking up spotless authentication with nonstick
Eric Leblond is a cybersecurity professional and open-source developer focused on network threat detection. He is the co-founder and Chief Technology Officer (CTO) of Stamus Networks, a company that provides Network Detection and Response (NDR) solutions.
In the open-source security space, Leblond is a core developer of Suricata, an intrusion detection and prevention system (IDS/IPS). His work on the project centers around network visibility and alert context. He also serves on the board of directors for the Open Information Security Foundation (OISF), the non-profit organization behind Suricata.
Additionally, Eric Leblond is an emeritus member of the Netfilter Core Team, where his work involves kernel and user-space interactions.
- Threat Detection Engineering with Suricata
- Suricata and IOCs, latest news on a love story
Fabrice started as a cryptography researcher working on post-quantum and classical construction for privacy-preserving constructions. He joined the CryptPad team in 2023 to work on a cryptography-first open-source product and make cryptography accessible to most people.
- CryptPad experimented on Post-Quantum Cryptography
Gaetan is a security researcher with a decade of experience uncovering software vulnerabilities. After establishing himself in offensive security in 2015, he transitioned to security research in 2022, bringing his hands-on expertise in application security. His track record includes uncovering significant vulnerabilities in enterprise-grade systems like Cisco Nexus and Apache HTTPD. Gaetan loves sharing his knowledge through blog posts, speaking at conferences, or hands-on security training sessions at universities and private organizations.
- Private Key Leaks in the Wild: from PTS to RWC, and back to PTS
Gal Zaban is a Research Team Lead at Zafran. Gal has over 10 years of experience as a Security Researcher, with vast experience in reverse engineering. She has a particular interest in low-level research and vulnerability research. Gal also contributed a C++ reverse engineering class to Open Security Training2 and presented in various security and development conferences.
- ChainLeak: From AI Framework to Cloud Secrets
Guillaume is a Cybersecurity Researcher at GitGuardian. He holds a PhD in networking. He likes looking at data and crafting packets. He co-maintains Scapy. And he still remembers what AT+MS=V34 means!
- Private Key Leaks in the Wild: from PTS to RWC, and back to PTS
Ido is a Security Researcher at Zafran, specializing in vulnerability research of open-source Python packages. With a background in security product research, he is currently focused on detecting logical vulnerabilities within AI infrastructure projects.
- ChainLeak: From AI Framework to Cloud Secrets
Igor Korkin, Ph.D., is a security researcher, developer, and innovator with over 15 years of experience in system security—holding a Huawei security patent, authoring over 50 research papers and a monograph Kernel Protection of Operating Systems Under Countermeasures.
Specializing in advanced security research and development, he focuses on Windows and Linux kernel security, Rootkit Detection, Memory Forensics, Bare-metal Hypervisors, Data Storage Protection, Ransomware Defense, and Evasion Techniques.
He is open to new challenges and international collaboration, seeking opportunities to work with global partners on innovative security projects.
- DesktopRanger Blocks Keystroke Spying: Hardening Windows Desktop Isolation
Karolina Gorna is a PhD candidate at Télécom Paris, conducting her research with the Ledger Donjon on vulnerability detection and formal methods. She holds an ANSSI ESSI certification and previously led KRYPTOSPHERE, a tech student association of over 500 members across France. When she is not chasing silent integer overflows, she organizes and competes in hackathons including NASA Space Apps Challenge and ETH Global. She has also delivered technical training for AFORP and MIT Professional Education, and enjoys bridging academic research with hands-on security practice.
- Automated Vulnerability Detection in Go: Concolic Execution for Multi-Threaded Binaries
- Fuzzwizard
Marius-Florin Cristian is a computer scientist and the author of KeibiDrop, an open-source post-quantum encrypted file transfer tool. He holds a CISSP certification and a Master's degree in Computer Science from the University of Copenhagen (DIKU), where his thesis addressed the minimum spanning tree problem in the context of linear-time complexity. He served as CISO at two B2B SaaS startups in Copenhagen---Krizo.io and Omnio.net---where he built cybersecurity programs from scratch (ISO 27001 ISMS, NIST RMF/800-53, risk management) while simultaneously contributing to product development (Haskell at Krizo, Rust at Omnio), managing DevOps and Kubernetes infrastructure, and shipping features in sprints---both acquired within two years of his joining. After Omnio's acquisition by IBM, he worked briefly as a Senior Cybersecurity Specialist at IBM before moving to Romania to build KeibiSoft full-time. He works across the full stack---from cryptographic protocol design and threat modeling to systems programming and infrastructure---doing whatever it takes to ship.
- KeibiDrop: Post-Quantum Encrypted Peer-to-Peer File Transfer Without the Cloud
Marius Genheimer is a DFIR Specialist and Threat Researcher with the SECUINFRA Falcon Team. He specializes in malware analysis and defensive security training.
- A phishing trip with Fancy Bear - Let's analyze APT malware together!
I gained IT and infosec experience while running many of the university servers. I turned my teaching skills, gained as a PhD student, into writing technical blogs and talking at conferences.
• Engineer working now as an open source evangelist and technical product manager
• Lead the development of syslog-ng open source edition, and contribute to sudo development
• Experienced in open source community outreach, work with distributions to maintain the syslog-ng package, follow bug trackers, help users
• Accomplished blog writer and conference presenter with a proven track record of creating engaging content and delivering impactful presentations (All Things Open, FOSDEM, Pass the SALT, EuroBSDCon, and others).
In my free time I am interested in non-x86 architectures, and work on one of my PPC or ARM machines. I am an IBM Champion for POWER.
- Simplifying log management, not just for security logs
Cybersecurity Researcher at Depi focused on software supply chain security.
- CVE-2025-54068 : Deep dive into Livewire, from weak typing to pre-authenticated remote command execution
Quentin Kaiser is a former penetration tester turned binary analysis nerd. He is currently the Lead Security Researcher at ONEKEY, where he focuses on binary exploitation of embedded devices and large-scale bug-finding automation across firmware corpora.
As part of his work, he maintains the firmware extraction tool unblob among other open-source tools such as jefferson, ubi-reader, or sasquatch.
He has published extensive research on offensive security for eCOS and maintains https://ecos.wtf
, a resource hub dedicated to eCOS exploitation. He also (infrequently) updates his blog at https://quentinkaiser.be.
- __Salty Firmware - Adventures in Firmware Encryption Reversing
- Hands-on Firmware Extraction, Exploration, and Emulation
Formerly member of CIRCL, I moved to France but didn't go that far in spirit as I'm still part of the developers and maintainers for a whole bunch of tools there. Some say it is too many, we disagree.
- Web forensics with Lookyloo and Lacus
I am Rémi Matasse (pseudo Remsio), a pentester that worked at Synacktiv for the past four years, passionated by offensive web security, especially on anything related to PHP.
I passed some years working on concrete PHP filters chain exploitation, documenting it in blogpost and presenting it in several conferences such as Nullcon or hack.lu.
I then decided to focus on the Laravel since we often come across this framework during audits before jumped in with both feet on exploitation based on APP_KEY leaks.
- CVE-2025-54068 : Deep dive into Livewire, from weak typing to pre-authenticated remote command execution
Security researcher at Quarkslab, focus on embedded targets and reverse engineering.
- Workshop to explore SightHouse! Learn how to use it to accelerate your reverse engineering process using its function identification features.
- Introducing Sighthouse for Seamless Function Detection
I fell into computers when I was a kid and never really climbed back out. I’ve always loved taking things apart — though putting them back together wasn’t always guaranteed. That curiosity naturally pulled me toward hardware, first through basic electronics, then computer‑controlled circuits, and eventually the world of microcontrollers. Today, I’m still fully immersed in it, juggling more projects than I probably should, but enjoying every minute of it. In open hardware I trust.
- Design Your First PCB: From Concept to Board
- Your credentials were leaked, so what?
- Oblivious HTTP - when the server does not want to see your IP
Vincent is a Security Researcher at Synacktiv, where he performs vulnerability research and penetration testing across diverse environments. With over a decade of experience, he has conducted a wide range of security assessments, placing a primary focus on web application security. Vincent is dedicated to sharing his expertise and has led multiple training sessions, helping security professionals enhance their skills in this critical area.
X: @us3r777
LinkedIn: https://www.linkedin.com/in/vincent-herbulot/
- Finding the Needle in the Haystack with Dicozorus - A New Companion for Advanced Web Fuzzing
William manages the technical team behind AS197692 at Conostix S.A. in Luxembourg. He’s been working in cybersecurity using free and opensource software on a daily basis for more than 25 years.
He particularly enjoys tinkering with open (and not so open) hardware. Currently he likes playing around with new tools in the current ML scene, building, hopefully, useful systems for fun and, maybe, profit. When not behind an intelligent wannabe machine, he's doing analog music with his band of humans.
- In bed with Qubes OS, hands-on workshop
- Your credentials were leaked, so what?
- Quantum Apocalypse Update.ical