📍 Visit us at Stand H063 (Hall 4 – Forensic Zone).
ℹ️ www.milipol.com/fr-FR
Meet our dream team:
▪️ #REVEL·IO, our mobile device #forensic solution
▪️ @synacktiv.com, leaders in offensive #cybersecurity
Find us at stand H063 (Hall 4 - Forensic Zone) 📍
📍 Visit us at Stand H063 (Hall 4 – Forensic Zone).
ℹ️ www.milipol.com/fr-FR
As the latter often constitute a blind spot for AD enumeration tools, the article also describes a pull request aiming to integrate them into the BloodHound project:
As the latter often constitute a blind spot for AD enumeration tools, the article also describes a pull request aiming to integrate them into the BloodHound project:
📅 November 18-21, 2025
📍 Paris Nord Villepinte - Hall 4, Stand H063 (Forensic Zone)
Meet our experts on site and discover how #REVEL·IO improves the efficiency and reliability of digital investigations
🔗 www.milipol.com/en
📅 November 18-21, 2025
📍 Paris Nord Villepinte - Hall 4, Stand H063 (Forensic Zone)
Meet our experts on site and discover how #REVEL·IO improves the efficiency and reliability of digital investigations
🔗 www.milipol.com/en
They proudly secured third place overall 👏
Next stop: Tokyo for the upcoming edition 🇯🇵 👀
More details on the targets and participants here ℹ️
www.zerodayinitiative.com/blog/2025/20...
They proudly secured third place overall 👏
Next stop: Tokyo for the upcoming edition 🇯🇵 👀
More details on the targets and participants here ℹ️
www.zerodayinitiative.com/blog/2025/20...
Developed by @synacktiv.com, REVEL·IO is the first French digital forensics solution designed to help investigators.
📍 Hall 4 - Forensic zone - Stand H063
💡 Learn more about Milipol: www.milipol.com/en
💡 Discover REVEL·IO: revelio.eu
Developed by @synacktiv.com, REVEL·IO is the first French digital forensics solution designed to help investigators.
📍 Hall 4 - Forensic zone - Stand H063
💡 Learn more about Milipol: www.milipol.com/en
💡 Discover REVEL·IO: revelio.eu
Links and more details below 👇️
Links and more details below 👇️
www.synacktiv.com/en/publicati...
www.synacktiv.com/en/publicati...
@pol-y.bsky.social of #Synacktiv successfully breached the @Ubiquiti AI Pro surveillance system 🦈🎶
What a way to wrap up the challenge - congrats, @pol-y.bsky.social 💪
@pol-y.bsky.social of #Synacktiv successfully breached the @Ubiquiti AI Pro surveillance system 🦈🎶
What a way to wrap up the challenge - congrats, @pol-y.bsky.social 💪
@mtalbi.bsky.social and Matthieu just pulled off an exploit on the Philips Hue Bridge without laying a finger on the device!
Great demonstration of Synacktiv’s offensive expertise 👏
Come on 🔥
@mtalbi.bsky.social and Matthieu just pulled off an exploit on the Philips Hue Bridge without laying a finger on the device!
Great demonstration of Synacktiv’s offensive expertise 👏
Come on 🔥
Let’s keep pushing 💪
#P2OIreland #Synacktiv
Let’s keep pushing 💪
#P2OIreland #Synacktiv
This new article by @bluesheeet.bsky.social unpacks the hybridization of key exchanges, covering theory and implementations.
Read all about why it matters, how to approach it safely, and some misconceptions here 👇
www.synacktiv.com/en/publicati...
This new article by @bluesheeet.bsky.social unpacks the hybridization of key exchanges, covering theory and implementations.
Read all about why it matters, how to approach it safely, and some misconceptions here 👇
www.synacktiv.com/en/publicati...
Our #CSIRT team discovered and named LinkPro, a new Linux rootkit, during an incident response. It exploits eBPF for evasion and persistence.
Here are the four key technical points in the image below. 💡
🔗 www.synacktiv.com/en/publicati...
Our #CSIRT team discovered and named LinkPro, a new Linux rootkit, during an incident response. It exploits eBPF for evasion and persistence.
Here are the four key technical points in the image below. 💡
🔗 www.synacktiv.com/en/publicati...
We hope that you've enjoyed the event at least as much as we did 🤩
Please take a moment to fill out our satisfaction survey and help us make Hexacon 2026 even better 🔥
Thank you for trusting us year after year 🙏
We hope that you've enjoyed the event at least as much as we did 🤩
Please take a moment to fill out our satisfaction survey and help us make Hexacon 2026 even better 🔥
Thank you for trusting us year after year 🙏
5 intense days diving into advanced AD intrusion techniques.
Don’t miss our upcoming offensive #cybersecurity courses!
🔗 www.synacktiv.com/en/offers/tr...
5 intense days diving into advanced AD intrusion techniques.
Don’t miss our upcoming offensive #cybersecurity courses!
🔗 www.synacktiv.com/en/offers/tr...
Inject a trigger-activated Trojan in a LLM. First step, build a probe to read a transformer's pre-down MLP activations to detect your chosen trojan trigger.
🔗 Full article www.synacktiv.com/en/publicati...
Inject a trigger-activated Trojan in a LLM. First step, build a probe to read a transformer's pre-down MLP activations to detect your chosen trojan trigger.
🔗 Full article www.synacktiv.com/en/publicati...
Come and meet us at 𝘀𝘁𝗮𝗻𝗱 𝗙𝟮𝟴 to discuss your challenges and find out how we can strengthen your #cyber posture.
Adrien, Augustin and Neder will be on hand to answer all your questions and share their insights.
Seeing you there 🤝
Come and meet us at 𝘀𝘁𝗮𝗻𝗱 𝗙𝟮𝟴 to discuss your challenges and find out how we can strengthen your #cyber posture.
Adrien, Augustin and Neder will be on hand to answer all your questions and share their insights.
Seeing you there 🤝
We are proud of our experts Quentin and Etienne, who are leading the ‘iOS for Security Engineers’ training course.
At the same time, Matthieu and Paul are hard at work on the ‘Azure intrusion for red teamers’ training course 🚀
We are proud of our experts Quentin and Etienne, who are leading the ‘iOS for Security Engineers’ training course.
At the same time, Matthieu and Paul are hard at work on the ‘Azure intrusion for red teamers’ training course 🚀
The @synacktiv.com team can't wait to see you at this crucial event for the #cyber ecosystem.
Our experts will be on hand to discuss the latest innovations in pentesting and reverse engineering with you !
ℹ️ www.hexacon.fr
@synacktiv.com strives to help firms evaluate and improve their IT security, everybody there is working to make it the 🇫🇷 standard in offensive security.
There will a be a lot of ninjas lurking around, feel free to reach them out!
The @synacktiv.com team can't wait to see you at this crucial event for the #cyber ecosystem.
Our experts will be on hand to discuss the latest innovations in pentesting and reverse engineering with you !
ℹ️ www.hexacon.fr
www.synacktiv.com/en/publicati...
www.synacktiv.com/en/publicati...
Learn offensive techniques for compromising Azure environments. Realistic scenarios, stealthy approaches and cutting-edge expertise.
Information & registration 👇
www.synacktiv.com/en/offers/tr...
Learn offensive techniques for compromising Azure environments. Realistic scenarios, stealthy approaches and cutting-edge expertise.
Information & registration 👇
www.synacktiv.com/en/offers/tr...
@synacktiv.com strives to help firms evaluate and improve their IT security, everybody there is working to make it the 🇫🇷 standard in offensive security.
There will a be a lot of ninjas lurking around, feel free to reach them out!
@synacktiv.com strives to help firms evaluate and improve their IT security, everybody there is working to make it the 🇫🇷 standard in offensive security.
There will a be a lot of ninjas lurking around, feel free to reach them out!