Adrianus Warmenhoven
  • I spy with my little WiFi
Anco Scholte ter Horst
  • Freedom Update
Anne Jan Brouwer
  • CI all the things
Bart
  • IKEA & Pallet hacks!
Boekenwurm
  • PubQuiz
Brenno de Winter
  • Kittenbased Security
BS

.

  • RFC 1925 Festival Editie
  • Network Hacking 301
Cedric van Bockhaven

Cedric loves solving offensive computer security puzzles, researching new attack vectors, and finding vulnerabilities in obscure technologies. At Outflank, he performs Red Teaming projects and works on the Outflank Security Tooling (OST).

  • The Registry Rundown for Red Teams
Chris van 't Hof

Director DIVD

  • How (not) to Professionalise Hacker Creativity. Help us design DIVD 3.0
Dejana
  • Ready or not?
Dennis van Zuijlekom
  • Shoot ALL the hackers
  • Shoot ALL the hackers
Dimitri
  • Closing talk Hackerhotel 2023
Dimitri Modderman
  • Opening Hackerhotel 2023
Edwin van Andel

Edwin van Andel started hacking at the age of 13. Although he is now CTO of hacker company Zerocopter, his relationship with the hacker community is still the main driving force in his life. His dream to bring the brilliant minds of all hackers he knows together in one room and to hack everything that is brought in is something that he is getting closer to. In addition, together with the “Guild of Grumpy Old Hackers”, he is actively guiding and leading young hackers in the right direction in order to create his ultimate goal - a safe society through a safer internet.

  • PoPoPizza - How to break the Dutch police body cams for fun and pizza
Eelco Maljaars
  • Hackerhotel Mastodon Server
Elger/Stitch/Zoéén
  • Naming and shaming security, Basisbeveiliging updates, State of the Map 2023
  • The MCH2022 Aftermath Talk
Frank@hackerhotel.nl
  • Firebreathing
GCSC
  • Goede cyber, slechte cyber - the musical (DUTCH!)
H.O. Klompenmaker
  • Yarn, Needles, "Reverse Engineering" & Osint
IJskimo

.

  • Nothing but the truth
Isabel Barberá
  • Plot4ai: AI Privacy Threat Modelling
Jan Willem Markus

.Jan-Willem Markus (@jwrm22) is an security analyst and trainer focused on defeating chips security with fault injection and sharing the knowledge. In his spare time he is the secretary of the The Open Organisation of Lockpickers (Toool.nl) where he organizes bi-weekly lockpicking meetups in Amsterdam. When time allows, he spends time on researching, collecting, and defeating mechanical security systems (i.e. locks, safes, and more).

  • Impressioning workshop 1
  • Impressioning workshop 2
  • Experiment driven lockpicking
  • Impressioning workshop 3
Janneke
  • PubQuiz
Joeri Blokhuis
  • Deadbolt Ransomware
Jos Weyers

Jos Weyers is a world-record holder in the field of lock impressioning and a mainstay participant at LockSport events around the world. President of TOOOL in the Netherlands and a key figure at the Hack42 hackerspace in Arnhem. Jos is the mastermind behind the beehive42.org initiative. Some people know him as the Dutch Kilt guy. Featured in the New York Times. Voted #2 in the category "Hackers and Security" of the Nerd101-list of VrijNederland June 2015.

  • Impressioning workshop 1
  • Impressioning workshop 2
  • Impressioning workshop 3
Lennaert Oudshoorn
  • Doomsday scenarios the Dutch institute for Vulnerability disclosure hopes it prevents.
Maarten Boone
  • HijackDotNet – We Don’t Know What Is Yet* ¯\_(ツ)_/¯
Maja Reissner
  • Trust me, it's secure
Martijn Korse
  • Plot4ai: AI Privacy Threat Modelling
Max Grim

Max knows a thing or two about software engineering, cloud environments and DevOps practices. He has a background in security testing and Red Teaming and has a keen interest in designing and hacking (embedded) hardware devices. He applies that knowledge building the Outflank Security Tooling (OST).

  • The Registry Rundown for Red Teams
Melinda
  • The Tales from the Night Owls aka 10 candle HackerHotel edition
Mischa Rick van Geelen
  • Project Fenix - (NL)
Moem

.

  • Making resin jewellery
  • Happy with Bleach & finish the resin jewellery
Nancy Beers
  • Perfect Timing in teams
NFIR
  • CTF (Capture the Flag)
  • NFIR CTF (Capture the Flag)
Nico Dekens/Dutch OSINT guy

Nico “Dutch_Osintguy” Dekens is an All Source Analyst specializing in Open Source Intelligence (OSINT), online Human Intelligence (HUMINT) and Online investigations.

Nico Eats, Sleeps, and lives everything which has to do with OSINT, online investigations, Intelligence gathering and Analysis.
Nico is an international lecturer at Fortune 500 companies and governments. He has over 20 years experience as an (all source) Intelligence Analyst at Dutch Law Enforcement. He analyzed murder cases, international narcotics cases, stolen art cases, gang violence cases, political disturbance cases, online jihadist groups & conducted several online, covert, virtual HUMINT investigations.
Nico has worked as Senior Project Manager at Bellingcat, an international independent investigative research collective.

Online Nico is known as Dutch_OsintGuy and very active within the OSINT community. He is a Co-founder of the OSINTcurious project. Also he is a Sans Institute instructor for the SEC497: Practical Open-Source Intelligence (OSINT) course. Nico is the lead-author & instructor of the SANS SEC587 Advanced Open-Source Intelligence Gathering & Analysis course

Currently Nico is working as Director of Intelligence & Collection Innovation at ShadowDragon.

  • OSINT: The past, present & future
  • OSINT: scaling up video analysis with AI &ML
Nikolett
  • Badgetalk
Pim
  • Badgetalk
Ralph Horn
  • Doomsday scenarios the Dutch institute for Vulnerability disclosure hopes it prevents.
RedTeam Cyber Security B.V.

bio

  • Whisky Tasting
Remco
  • Deadbolt Ransomware
Renze
  • Badge Brainstorm
Rudi Jager - Stijn Rommens
  • Vectra AI automated threat hunting
  • Vectra AI BlueTeam CTF Hands-on lab
Sake
  • Badgetalk
Tom Tervoort (Secura)

Tom Tervoort is a Principal Security Specialist for Secura, a security company based in the Netherlands. Tom regularly performs network pentests, web/mobile application assessments, as well as code, configuration and design reviews for large Dutch companies and institutions. Tom’s primary areas of interest include cryptographic protocols and cryptography engineering, advanced web attacks and Windows AD pentesting. Besides doing security assessments, Tom also develops and gives cryptography and secure programming courses to software developers. In December 2020, Tom won a Pwnie award for Best Cryptographic Attack, due to work on the Zerologon vulnerability. Tom also spoke about Zerologon at Black Hat USA 2021 and about Kerberos at Black Hat Europe 2022.

  • Breaking IBM WebSphere authentication: exploiting crypto bugs to impersonate anyone