Hack'n Speak
Episodes
0x32 | Retour sur le CTF Active Directory Windows Barbhack (2/4)
28 Dec 2025
Contributed by Lukas
Github https://github.com/Pennyw0rth/NetExec-Lab/tree/main/BARBHACK-2024Writeup from Acceis https://www.acceis.fr/write-up-barbhack-challenge...
0x31 | Retour sur le workshop LeHack-2024
25 Nov 2025
Contributed by Lukas
Github https://github.com/Pennyw0rth/NetExec-Lab/tree/main/LeHack-2024Writeup from rayanlecat https://www.rayanle.cat/lehack-2024-netexec-workshop-wri...
0x30 Un jeu, une quête, un ctf: l'aventure commence à barbhack
17 Oct 2025
Contributed by Lukas
barbhack https://barbhack.fr/2025/fr/Twitter https://twitter.com/mpgn_x64
0x2F Doomer | Du bugbounty, de l'IA, un parcours atypique
30 Jul 2025
Contributed by Lukas
Twitter: https://x.com/DoomerOutrunTwitter: https://x.com/mpgn_x64HackerOne https://hackerone.com/doomerhunter
0x2E Cravaterouge | Retour sur bloodyAD, une philosophie, badsuccessor
26 Jun 2025
Contributed by Lukas
Twitter: https://x.com/mpgn_x64Twitter: https://x.com/rouge_cravateGithub bloodyad https://github.com/CravateRouge/bloodyADBlogpost:...
0x2D @shadow_gatt | Démystification du redteam, des anecdotes
27 May 2025
Contributed by Lukas
Twitter: https://x.com/shadow_gattTwitter: https://x.com/mpgn_x64Talk lehack https://www.youtube.com/watch?v=7itLKu4f1XQ
0x2C @croco_byte | Relai kerberos partie 2, SCCM, redteam !
28 Feb 2025
Contributed by Lukas
Twitter: https://x.com/croco_byteTwitter: https://x.com/mpgn_x64Blog post - https://www.synacktiv.com/publications/relaying-kerberos-over-...
0x2B Hugow | Du relai Kerberos, du redteam, de l'intrusion physique
31 Jan 2025
Contributed by Lukas
Twitter: https://x.com/hugow_vincent Twitter: https://x.com/mpgn_x64 Blog post https://www.synacktiv.com/publications/relaying-kerberos-over-smb-usin...
0x2A jmbesnard | Retour sur la création d'AD_Miner, du graph, des perfs !
18 Dec 2024
Contributed by Lukas
Twitter: https://x.com/jmbesnard_maz Twitter: https://x.com/mpgn_x64 Adminer: https://github.com/Mazars-Tech/AD_Miner Bluesky: mpgn
0x29 Worty | Retour d'expérience sur l'European CyberSecurity Challenge et le FCSC
03 Oct 2024
Contributed by Lukas
Twitter: https://x.com/_worty Twitter: https://x.com/mpgn_x64 ECSC: https://ecsc.eu/ FCSC: https://cyber.gouv.fr/france-cybersecurity-challenge-2024 H...
0x28 poly & Vdehors | Hacking de Tesla, la pwn2own, des anecdotes
29 Aug 2024
Contributed by Lukas
Twitter : https://x.com/_p0ly_ Twitter: https://x.com/vdehors Twitter: https://x.com/mpgn_x64
0x27 Nabot & JahMyst | Retour sur la création de Secator, des études longues ou pas
01 Jul 2024
Contributed by Lukas
Secator: https://github.com/freelabz/secator Twitter: https://x.com/freelabz Twitter: https://x.com/mpgn_x64
0x26 mrxch | Retour sur la création de Ghunt, une anecdote croustillante !
27 Feb 2024
Contributed by Lukas
Twitter: https://twitter.com/mxrchreborn Twitter: https://twitter.com/mpgn_x64 Ghunt : https://github.com/mxrch/GHunt
0x25 s4r | Du reverse, des anecdotes, la création de crackmes.one
11 Jan 2024
Contributed by Lukas
Twitter https://twitter.com/sar5430 blog: https://sar5430.github.io/ Twitter https://twitter.com/mpgn_x64 Site de crackme: http...
0x24 Arnaud Pilon | De la réponse à incident, retour d'expérience ...
04 Dec 2023
Contributed by Lukas
Twitter https://twitter.com/nono_nonop Twitter https://twitter.com/mpgn_x64
0x23 @fr0gger_ | Du threat Intel, de la réponse sur incident, le projet unprotect.io, un livre
24 Oct 2023
Contributed by Lukas
Twitter fr0gger https://twitter.com/fr0gger_ Twitter https://twitter.com/mpgn_x64 Livre https://store.securitybreak.io/threatintel Unprotect.io...
0x22 - Renaud Feil | De la passion, de l'entreprenariat, une société: Synacktiv
29 Sep 2023
Contributed by Lukas
Synacktiv: https://www.synacktiv.com/ mpgn: https://twitter.com/mpgn_x64
0x21 - @ringtail_sec | De l'hardware fait par un pentester pour les pentesters
29 Aug 2023
Contributed by Lukas
ringtail twitter: https://twitter.com/ringtail_sec ringtail site web: https://ringtail.ch/ basilisk: https://ringtail.ch/products/basilisk-zero-au...
0x20 - @BitK_ & @sakiirsecurity | Objectif top10 CtfTime, faire un bon ctf, les voyages, une anecdote croustillante
31 Jul 2023
Contributed by Lukas
Twitter: BitK: https://twitter.com/BitK_ Twitter Sakiir: https://twitter.com/sakiirsecurity Team CTFtime: https://ctftime.org/team/87434 m...
0x1F - @Zblurx | Retour sur dploot, certsync et le déchiffrement de Windows LAPS
13 Jun 2023
Contributed by Lukas
Twitter: https://twitter.com/_zblurx Github: https://github.com/zblurx mpgn: https://twitter.com/mpgn_x64
0x1E - @Agarri_FR | Un peu d'histoire, la formation Mastering Burp Suite Pro, le bug bounty (XXE, XSLT, SSRF)
15 May 2023
Contributed by Lukas
Twitter Agarri: https://twitter.com/Agarri_FR Formation Burp Suite: https://hackademy.agarri.fr/ Twitter MasteringBurp : https://twitter.com/M...
0x1D - @palenath | De l'OSINT, un workshop à Interpol, de l'open source
10 Apr 2023
Contributed by Lukas
palenath : https://twitter.com/palenath Github: https://github.com/megadose/ Site OSINT FR: https://osintfr.com/ Discord OSINT F...
0x1C - @Blaklis_ | Bug Bounty full time, un reward à 75k, la création du club Paris HackerOne
27 Feb 2023
Contributed by Lukas
Blaklis_ : https://twitter.com/Blaklis_ Lien Club Paris Discord: https://discord.gg/MT6D8wP2Hd Profil HackerOne: https://hackerone.com/blak...
0x1B - @M4yFly | Retour sur la création du lab GOAD et une RCE 9.8 sur GLPI CVE-2022-35914
31 Jan 2023
Contributed by Lukas
M4Fly: https://twitter.com/M4yFly GOAD: https://github.com/Orange-Cyberdefense/GOAD RCE GLPI: https://mayfly277.github.io/posts/GLPI-htmlawed...
0x1A - @g0h4n | Retour sur la création de RustHound, l'outil crossplateforme plus rapide que Sharphound !
23 Dec 2022
Contributed by Lukas
g0h4n: https://twitter.com/g0h4n_0 RustHound: https://github.com/OPENCYBER-FR/RustHound SharpHound: https://github.com/BloodHoundAD/SharpHo...
0x19 - @rkvl | Retour sur la création de Sliver & le redteam aux US (gilet pare balles non obligatoire)
29 Nov 2022
Contributed by Lukas
lesnuages / rkervell : https://twitter.com/rkervell Moloch : https://twitter.com/LittleJoeTables blogpost sliver : https://domini...
0x18 - @Swissky | Retour sur la création de PayloadsAllTheThings & SSRFmap !
02 Nov 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 @pentest_swissky : https://twitter.com/pentest_...
0x17 - @_ZakSec | Retour sur la création de Masky et on parle purple team !
29 Sep 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 @_ZakSec : https://twitter.com/_ZakSec tool...
0x16 - @snyff | Retour sur la création et la philosophie de PentesterLab
25 Aug 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 @snyff: https://twitter.com/snyff Pentester...
0x15 - @Th3_l5D | Retour sur la création et la philosophie de NewbieContest
28 Jul 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 @Th3_l5D: https://twitter.com/Th3_l5D ...
0x14 - @T00uF | Retour sur DonPAPI !
30 Jun 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 @T00uF : https://twitter.com/T00uF github...
Hors-serie : Debrief du Workshop CrackMapExec (difficulté facile) à leHack 2022
27 Jun 2022
Contributed by Lukas
Solution du lab présenté lors du Workshop CrackMapExec à leHack 2022 par @mpgn_x64
0x13 - @swapgs | One vulnerability to rule them all, nomination aux pwnie awards, première participation à la pwn2own
03 Jun 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 @swapgs: https://twitter.com/swapgs blog: ht...
0x12 - the-useless-one & @lowercase_drm | Retour sur la librairie Pywerview
05 May 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 the-useless-one (Yannick): https://github.com/t...
0x11 - 0xLupin | Un parcours atypique, gagner la coupe du monde de Bug Bounty organisée par @Hackerone
02 Mar 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 0xLupin: https://twitter.com/0xLupin Clas...
0x10 - Qazeer & th3m4ks | Retour sur l'outil EDRSandBlast, fonctionnement et contournement d'un EDR
31 Jan 2022
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 Qazeer: https://twitter.com/_Qazeer th3m4ks...
0x0F - Laluka | RCE sur root-me.org, recherche de 0-day et dev d'outils custom
22 Dec 2021
Contributed by Lukas
mpgn: https://twitter.com/mpgn_x64 laluka: https://twitter.com/TheLaluka Github...
0x0E - Podalirius | Retour sur LDAPMonitor, pydsinternals et le rebuild d'un AS400
06 Dec 2021
Contributed by Lukas
Liens: mpgn: https://twitter.com/mpgn_x64 podalirius: https://twitter.com/podaliri...
0x0D - Amat Cama | Gagner la Pwn2Own avec @fluoroacetate, la sth4ck, "w3challs c'est mieux que root-me !"
29 Oct 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 Amat Cama: https://twitter.com/amatcam...
0x0C - Shutdown | Retour sur Exegol / thehacker.recipes (partie 2)
20 Sep 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 Shutdown: https://twitter.com/_nwodtuh...
0x0B - Shutdown | Retour sur les outils pywhisker / targetedKerberoast (partie 1)
20 Sep 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 Shutdown: https://twitter.com/_nwodtuh...
0x0A - cfreal_ | Retour sur PHPGGC, du code, encore du code
20 Aug 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 cfreal_: https://twitter.com/cfreal_ ...
0x09 - topotam | Une belle histoire, du TII et PetitPotam
28 Jul 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 topotam : https://twitter.com/topotam77 G...
0x08 - gentilkiwi | Retour sur kekeo, du RDP, de la smartcard et le choix de l'open source (partie 2)
23 Jun 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 gentilkiwi: https://twitter.com/gentilkiwi Github proje...
0x07 - gentilkiwi | Retour sur Mimikatz, la BlueHat et les EDR ԅ(≖‿≖ԅ) (partie 1)
23 Jun 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 gentilkiwi: https://twitter.com/gentilkiwi Github project...
0x06 - vletoux | Retour sur PingCastle, le choix de l'open source et Mimikatz (dcsync)
12 May 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 vletoux: https://twitter.com/mysmartlogon Github project: Pin...
0x05 - lgandx | Retour sur Responder, du sponsoring via Patreon et PCredz
12 Apr 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 lgandx: https://twitter.com/PythonResponder Github projects: Respon...
0x04 - hisxo | Bug Bounty, motivex, moraline et un outil nommé gitGraber (partie 2)
26 Mar 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 hisxo : https://twitter.com/adrien_jeanneau Github projects: gitGraber: ht...
0x03 - hisxo | Bug Bounty, motivex, moraline et un outil nommé gitGraber (partie 1)
26 Mar 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 hisxo : https://twitter.com/adrien_jeanneau Github projects: gitGraber: https://gi...
0x02 - itm4n | Recherche de 0days Windows, trois outils, un blog (partie 2)
15 Feb 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 itm4n: https://twitter.com/itm4n Blog: https://itm4n.github.io/ Github ...
0x01 - itm4n | Recherche de 0days Windows, trois outils, un blog (partie 1)
15 Feb 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 itm4n: https://twitter.com/itm4n Blog: https://itm4n.github.io/ Github projects: PrivescC...
0x00 - Pixis | Retour sur lsassy et hackndo.com
12 Jan 2021
Contributed by Lukas
Twitter: mpgn: https://twitter.com/mpgn_x64 Pixis: https://twitter.com/HackAndDo Github projects: lsassy: https://github.com/Hackndo/lsassy...