Synacktiv
banner
synacktiv.com
Synacktiv
@synacktiv.com
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
All presentation materials can be found on our website: www.synacktiv.com/ressources

Some presentations also have one or multiple corresponding blogposts, which you can find here: www.synacktiv.com/publications
October 30, 2025 at 4:30 PM
All the the talks recordings are available on YouTube:

- NTLM reflection: youtu.be/IiT3iHc2_b8
- LOLBlue: youtu.be/XDFWsWIATxA
- Livewire unmarshalling: youtu.be/yh7RK_5W6M4
- Post-quantum cryptography: youtu.be/WqFrNRgBpEM
October 30, 2025 at 4:30 PM
To wrap up our presentations at #HackLu, @bluesheeet.bsky.social and @butanol.bsky.social tackled a scary subject: Post-quantum cryptography. 🤯
They demonstrated that it is not as complicated at it seems and why it is crucial to begin integrating it in your products.
hack.lu 2025
Hack.lu (and CTI summit) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. It’s the ...
Hack.lu
October 30, 2025 at 4:30 PM
Still at #HackLu, @remsio.bsky.social and @w0rty.bsky.social shared their research on Livewire's unmarshalling mechanism at #nullcon Berlin. They demonstrated how to achieve RCE with the APP_KEY and extended their laravel-crypto-killer tool to automate the process. 💪
hack.lu 2025
Hack.lu (and CTI summit) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. It’s the ...
Hack.lu
October 30, 2025 at 4:29 PM
Later this month, at #HackLu in Luxembourg, @aeinot.bsky.social and @cybiosity.bsky.social demonstrated how Blue team tooling can be used by attackers for reconnaissance and post exploitation. They also gave insights on detection opportunities. 🧑‍🎓
October 30, 2025 at 4:27 PM
At @nohatcon.bsky.social, in the beautiful city of Bergamo, @wilfri3d.bsky.social and @yaumn.bsky.social presented their research on Windows authentication reflection that led to the infamous CVE-2025-33073, which allowed to get RCE on almost any Windows machine with just a user account. 💥
October 30, 2025 at 4:27 PM