System
Light
Dark
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for WHY2025
webm
SD quality
mp3
mp4
SD quality
opus
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for WHY2025
webm
SD quality
mp3
mp4
SD quality
opus
browse
conferences
camp-NL
why2025
Hacking
What Hackers Yearn 2025
Hacking
Full playlist:
Video
/
Audio
https://why2025.org/
name
duration
date
view count
25 min
📧 Your own Mailserver - 2025 Edition
Hacking
Andromeda
25 min
2025-08-10
1.0k
simonmicro
54 min
WHY2025 Infrastructure Review
Hacking
Brachium
54 min
2025-08-11
878
Arjan Koopen
52 min
Stealth Web Scraping Techniques for OSINT
Hacking
Cassiopeia
52 min
2025-08-09
841
Soukaina Cherrabi
and
François GRANIER
51 min
0click Enterprise compromise – thank you, AI!
Hacking
Delphinus
51 min
2025-08-09
773
Inbar Raz
29 min
Synology Disk Station Manager (DSM) - the good, the bad and the ugly
Hacking
Cassiopeia
29 min
2025-08-10
671
Mischa Rick van Geelen
43 min
Kubernetes from Scratch, The Hard Way
Hacking
Delphinus
43 min
2025-08-10
532
Alain van Hoof
67 min
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations
Hacking
Andromeda
67 min
2025-08-11
521
Kirils Solovjovs
and
Iceman
25 min
Horus Scenario 2.0
Hacking
Andromeda
25 min
2025-08-09
514
Willem Westerhof
38 min
Can we trust the Zero in Zero trust?
Hacking
Delphinus
38 min
2025-08-12
509
Thomas Fricke
40 min
Escaping a misleading "sandbox": breaking the WebAssembly-JavaScript barrier
Hacking
Cassiopeia
40 min
2025-08-11
503
Thomas Rinsma
50 min
How (not) to configure your domainname [internet.nl]
Hacking
Cassiopeia
50 min
2025-08-11
501
Benjamin W. Broersma
47 min
Hack the Grid. Disclosing vulnerabilities to help prevent blackouts
Hacking
Andromeda
47 min
2025-08-10
460
Chris van 't Hof
,
Frank Breedijk
and
Wietse Boonstra
41 min
Flipping Bits: Your Credentials Are Certainly Mine
Hacking
Andromeda
41 min
2025-08-11
398
STÖK
and
joohoi
44 min
Low Energy to High Energy: Hacking nearby EV-chargers over Bluetooth
Hacking
Andromeda
44 min
2025-08-10
384
Daan Keuper
and
Thijs Alkemade
48 min
The Well Is Poisoned — Now What Shall We Drink?
Hacking
Andromeda
48 min
2025-08-12
376
Martin Hamilton
34 min
Pentesting Passkeys
Hacking
Brachium
34 min
2025-08-10
362
Matthijs Melissen
33 min
Die Hardcoded: Unlocking Yealink's (weakest) secrets
Hacking
Cassiopeia
33 min
2025-08-11
302
Jeroen Hermans
and
Stefan Gloor
48 min
The WHY, the How, the What. An assessment of TETRA End-to-end
Hacking
Andromeda
48 min
2025-08-11
294
Wouter Bokslag
and
Carlo Meijer
52 min
Quantum cryptography and its certification against attacks
Hacking
Brachium
52 min
2025-08-10
285
Vadim Makarov
47 min
From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface
Hacking
Andromeda
47 min
2025-08-09
279
Daan Keuper
and
Thijs Alkemade
51 min
USB: the most successful interface that also brings power
Hacking
Brachium
51 min
2025-08-11
231
Ondřej Caletka
48 min
From barking to Meow: mature pentesting
Hacking
Delphinus
48 min
2025-08-11
213
Mischa Rick van Geelen
and
Brenno de Winter
49 min
EntrySign: create your own x86 microcode for fun and profit
Hacking
Andromeda
49 min
2025-08-10
197
Nspace
and
spq
48 min
A journey into reverse engineering arcade PCBs for video game preservation via FPGA…
Hacking
Cassiopeia
48 min
2025-08-11
191
Solal Jacob
26 min
A step towards infinite storage?
Hacking
Brachium
26 min
2025-08-09
189
Jesus Zen Droïd
18 min
Race conditions, transactions and free parking
Hacking
Cassiopeia
18 min
2025-08-10
188
Benjamin W. Broersma
49 min
Automate yourself out of supply chain hell
Hacking
Brachium
49 min
2025-08-11
176
cy
49 min
Getting Started: Reading Bosch Sensor Data on the Badge with MicroPython
Hacking
Andromeda
49 min
2025-08-11
170
Harald Koenig
43 min
Building Bitchat: Offline first protocols and E2E Encrypted Social Apps with Nostr,…
Hacking
Delphinus
43 min
2025-08-11
169
rabble
52 min
Packets Over Any Wire: Alternative Networking Mediums for Hackers
Hacking
Delphinus
52 min
2025-08-10
155
Robert Sheehy
26 min
Embrace Chaos! How Game Randomizers Work
Hacking
Cassiopeia
26 min
2025-08-10
150
Nikki
43 min
Rush hour rodeo and traffic cam selfies
Hacking
Andromeda
43 min
2025-08-12
141
Willem Westerhof
26 min
Knock knock who's there 2.0, the subtle art of (physical) port knocking
Hacking
Delphinus
26 min
2025-08-10
140
Jeroen Hermans
22 min
A Journey Through Boring Telco Data Leaks
Hacking
Andromeda
22 min
2025-08-11
127
kantorkel
44 min
Crypto(graphy) 101
Hacking
Cassiopeia
44 min
2025-08-11
125
Dirk Maij
39 min
Hacking the Aeotec Smart Hub: The little hub that could
Hacking
Delphinus
39 min
2025-08-11
122
Daan Keuper
and
Thijs Alkemade
22 min
Time Lord's adventures: abusing time on Linux systems
Hacking
Cassiopeia
22 min
2025-08-12
122
Daniels Heincis
43 min
About Time
Hacking
Cassiopeia
43 min
2025-08-12
115
pcwizz
29 min
I donated a kidney (and maybe you can too)
Hacking
Cassiopeia
29 min
2025-08-10
114
Peetz0r
47 min
The shadow of Operational technologies: A journey into the OT security
Hacking
Delphinus
47 min
2025-08-09
112
Davide "Skullb0y" Pala
48 min
How election software can fail
Hacking
Brachium
48 min
2025-08-12
106
Benjamin W. Broersma
39 min
Hacked in translation: Giving an Abandoned IoT Device a New Life
Hacking
Cassiopeia
39 min
2025-08-12
98
Artem Makarov
45 min
Towards digital sovereignty with cloud federation: how to break the dominance of the…
Hacking
Brachium
45 min
2025-08-12
92
Wido
41 min
AiTM panels and sellers
Hacking
Andromeda
41 min
2025-08-11
52
rik van duijn
and
Wesley Neelen
27 min
Scaling up victim notification, because crededential theft is scaling up too...
Hacking
Andromeda
27 min
2025-08-12
45
Frank Breedijk