The speaker’s profile picture
Adrianus Warmenhoven
  • I spy with my little WiFi
The speaker’s profile picture
Anco Scholte ter Horst
  • Freedom Update
The speaker’s profile picture
Anne Jan Brouwer
  • CI all the things
The speaker’s profile picture
BS

.

  • RFC 1925 Festival Editie
  • Network Hacking 301
The speaker’s profile picture
Bart
  • IKEA & Pallet hacks!
The speaker’s profile picture
Boekenwurm
  • PubQuiz
The speaker’s profile picture
Brenno de Winter
  • Kittenbased Security
The speaker’s profile picture
Cedric van Bockhaven

Cedric loves solving offensive computer security puzzles, researching new attack vectors, and finding vulnerabilities in obscure technologies. At Outflank, he performs Red Teaming projects and works on the Outflank Security Tooling (OST).

  • The Registry Rundown for Red Teams
The speaker’s profile picture
Chris van 't Hof

Director DIVD

  • How (not) to Professionalise Hacker Creativity. Help us design DIVD 3.0
The speaker’s profile picture
Dejana
  • Ready or not?
The speaker’s profile picture
Dennis van Zuijlekom
  • Shoot ALL the hackers
  • Shoot ALL the hackers
The speaker’s profile picture
Dimitri
  • Closing talk Hackerhotel 2023
The speaker’s profile picture
Dimitri Modderman
  • Opening Hackerhotel 2023
The speaker’s profile picture
Edwin van Andel

Edwin van Andel started hacking at the age of 13. Although he is now CTO of hacker company Zerocopter, his relationship with the hacker community is still the main driving force in his life. His dream to bring the brilliant minds of all hackers he knows together in one room and to hack everything that is brought in is something that he is getting closer to. In addition, together with the “Guild of Grumpy Old Hackers”, he is actively guiding and leading young hackers in the right direction in order to create his ultimate goal - a safe society through a safer internet.

  • PoPoPizza - How to break the Dutch police body cams for fun and pizza
The speaker’s profile picture
Eelco Maljaars
  • Hackerhotel Mastodon Server
The speaker’s profile picture
Elger/Stitch/Zoéén
  • Naming and shaming security, Basisbeveiliging updates, State of the Map 2023
  • The MCH2022 Aftermath Talk
The speaker’s profile picture
Frank@hackerhotel.nl
  • Firebreathing
The speaker’s profile picture
GCSC
  • Goede cyber, slechte cyber - the musical (DUTCH!)
The speaker’s profile picture
H.O. Klompenmaker
  • Yarn, Needles, "Reverse Engineering" & Osint
The speaker’s profile picture
IJskimo

.

  • Nothing but the truth
The speaker’s profile picture
Isabel Barberá
  • Plot4ai: AI Privacy Threat Modelling
The speaker’s profile picture
Jan Willem Markus

.Jan-Willem Markus (@jwrm22) is an security analyst and trainer focused on defeating chips security with fault injection and sharing the knowledge. In his spare time he is the secretary of the The Open Organisation of Lockpickers (Toool.nl) where he organizes bi-weekly lockpicking meetups in Amsterdam. When time allows, he spends time on researching, collecting, and defeating mechanical security systems (i.e. locks, safes, and more).

  • Impressioning workshop 1
  • Impressioning workshop 3
  • Impressioning workshop 2
  • Experiment driven lockpicking
The speaker’s profile picture
Janneke
  • PubQuiz
The speaker’s profile picture
Joeri Blokhuis
  • Deadbolt Ransomware
The speaker’s profile picture
Jos Weyers

Jos Weyers is a world-record holder in the field of lock impressioning and a mainstay participant at LockSport events around the world. President of TOOOL in the Netherlands and a key figure at the Hack42 hackerspace in Arnhem. Jos is the mastermind behind the beehive42.org initiative. Some people know him as the Dutch Kilt guy. Featured in the New York Times. Voted #2 in the category "Hackers and Security" of the Nerd101-list of VrijNederland June 2015.

  • Impressioning workshop 1
  • Impressioning workshop 3
  • Impressioning workshop 2
The speaker’s profile picture
Lennaert Oudshoorn
  • Doomsday scenarios the Dutch institute for Vulnerability disclosure hopes it prevents.
The speaker’s profile picture
Maarten Boone
  • HijackDotNet – We Don’t Know What Is Yet* ¯\_(ツ)_/¯
The speaker’s profile picture
Maja Reissner
  • Trust me, it's secure
The speaker’s profile picture
Martijn Korse
  • Plot4ai: AI Privacy Threat Modelling
The speaker’s profile picture
Max Grim

Max knows a thing or two about software engineering, cloud environments and DevOps practices. He has a background in security testing and Red Teaming and has a keen interest in designing and hacking (embedded) hardware devices. He applies that knowledge building the Outflank Security Tooling (OST).

  • The Registry Rundown for Red Teams
The speaker’s profile picture
Melinda
  • The Tales from the Night Owls aka 10 candle HackerHotel edition
The speaker’s profile picture
Mischa Rick van Geelen
  • Project Fenix - (NL)
The speaker’s profile picture
Moem

.

  • Making resin jewellery
  • Happy with Bleach & finish the resin jewellery
The speaker’s profile picture
NFIR
  • CTF (Capture the Flag)
  • NFIR CTF (Capture the Flag)
The speaker’s profile picture
Nancy Beers
  • Perfect Timing in teams
The speaker’s profile picture
Nico Dekens/Dutch OSINT guy

Nico “Dutch_Osintguy” Dekens is an All Source Analyst specializing in Open Source Intelligence (OSINT), online Human Intelligence (HUMINT) and Online investigations.

Nico Eats, Sleeps, and lives everything which has to do with OSINT, online investigations, Intelligence gathering and Analysis.
Nico is an international lecturer at Fortune 500 companies and governments. He has over 20 years experience as an (all source) Intelligence Analyst at Dutch Law Enforcement. He analyzed murder cases, international narcotics cases, stolen art cases, gang violence cases, political disturbance cases, online jihadist groups & conducted several online, covert, virtual HUMINT investigations.
Nico has worked as Senior Project Manager at Bellingcat, an international independent investigative research collective.

Online Nico is known as Dutch_OsintGuy and very active within the OSINT community. He is a Co-founder of the OSINTcurious project. Also he is a Sans Institute instructor for the SEC497: Practical Open-Source Intelligence (OSINT) course. Nico is the lead-author & instructor of the SANS SEC587 Advanced Open-Source Intelligence Gathering & Analysis course

Currently Nico is working as Director of Intelligence & Collection Innovation at ShadowDragon.

  • OSINT: The past, present & future
  • OSINT: scaling up video analysis with AI &ML
The speaker’s profile picture
Nikolett
  • Badgetalk
The speaker’s profile picture
Pim
  • Badgetalk
The speaker’s profile picture
Ralph Horn
  • Doomsday scenarios the Dutch institute for Vulnerability disclosure hopes it prevents.
The speaker’s profile picture
RedTeam Cyber Security B.V.

bio

  • Whisky Tasting
The speaker’s profile picture
Remco
  • Deadbolt Ransomware
The speaker’s profile picture
Renze
  • Badge Brainstorm
The speaker’s profile picture
Rudi Jager - Stijn Rommens
  • Vectra AI automated threat hunting
  • Vectra AI BlueTeam CTF Hands-on lab
The speaker’s profile picture
Sake
  • Badgetalk
The speaker’s profile picture
Tom Tervoort (Secura)

Tom Tervoort is a Principal Security Specialist for Secura, a security company based in the Netherlands. Tom regularly performs network pentests, web/mobile application assessments, as well as code, configuration and design reviews for large Dutch companies and institutions. Tom’s primary areas of interest include cryptographic protocols and cryptography engineering, advanced web attacks and Windows AD pentesting. Besides doing security assessments, Tom also develops and gives cryptography and secure programming courses to software developers. In December 2020, Tom won a Pwnie award for Best Cryptographic Attack, due to work on the Zerologon vulnerability. Tom also spoke about Zerologon at Black Hat USA 2021 and about Kerberos at Black Hat Europe 2022.

  • Breaking IBM WebSphere authentication: exploiting crypto bugs to impersonate anyone