Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Category
Technical talks at BSides
4541 talks tagged
Technical
from 125 chapters of BSides events worldwide.
Related topics
Talk
Red
Blue
Technical Deep-dives
Vulnerability Research
Threat Intel
44:52
Hacking Satellites with Software Defined Radio
Gerard de Jong
BSides Cape Town
· 2019
Technical
Hardware Hacking
Reverse Engineering
Satellite Technology
Open →
2019-12
56:25
How to Hide in Plain Sight: Next-Level Digital Privacy
Ivan Banov
BSides SLC
· 2025
Technical
Talk
Open →
2025-10
39:40
The Dark Side of Wireless Networks: Intro to Wi-Fi Hacking
Megi Bashi
Ryan Dinnan
BSides Prishtina
Technical
Wireless Security
Intro
Red
Technical Deep-dives
Demo
Talk
Open →
2023-05
43:55
Metody pozostania w ukryciu w sieci i w terenie
Dariusz Damian Jakubowski
BSides Warsaw
Technical
Intermediary
Red
Talk
Open →
2017-10
28:37
Elliptic Curve Cryptography for those who are afraid of maths
Martijn Grooten
BSides London
Technical
Cryptography
Intro
Technical Deep-dives
Talk
Open →
2015-07
39:16
Next Gen AV vs My Shitty Code
James Williams
BSides Manchester
· 2018
Technical
Malware
Post-Exploitation
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2018-08
45:24
It's the Little Things
Ben Sadeghipour
BSides PDX
· 2018
Technical
Web AppSec
Intermediary
Red
Technical Deep-dives
Talk
Open →
2019-02
31:02
The Security Vulnerability Assessment Process, Best Practices & Challenges
Kellep Charles
BSides Delaware
· 2012
Technical
Intermediary
Talk
Open →
2012-11
57:24
Cyfrowa Twierdza – Poradnik Rebelianta (Digital Fortress – A Rebel's Guide)
Jakub Mrugalski
BSides Warsaw
· 2016
Technical
Intro
Talk
Open →
2016-10
36:09
New Attacks On The MIFARE DESFire EV1 Smartcard Used In Public Transportation
Rory Flynn
BSides Belfast
· 2020
Technical
Cryptography
Advanced
Red
Technical Deep-dives
Talk
Open →
2020-01
35:36
(Perfect) Cell Games: You Thought It Was Just Surveillance...
Mike Curnow
Bsides CT 2025
Research
Technical
Cellular Security
Wireless Security
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
1:03:19
Bug Bounty on Steroids
Hussein Daher
BSides Ahmedabad
· 2023
Technical
Vulnerability Research
Web AppSec
Intermediary
Red
Talk
Open →
2023-02
28:38
Bluetooth Warwalking: Hacking Devices Around You with Just Your Phone
Matt Miller
BSides SLC
· 2026
Technical
OSINT
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Empirical Research
Demo
+1
Open →
2026-04
42:21
Hacking Wireless Home Security Systems
Eric Escobar
BSides Manchester
· 2017
Technical
Hardware Hacking
Reverse Engineering
Wireless Security
Talk
Open →
2017-08
42:16
Catching the Catchers: Open Source Stingray Detection in the Wild
Michael Raymond
Bsides CT 2025
Technical
Cellular Security
OSINT
Intermediary
Blue
Talk
Open →
2025-12
25:00
Bug Bounty Recon The Right Way
Khalil A. Lemtaffah
BSides Budabest
· 2022
Technical
OSINT
Web AppSec
Intermediary
Red
Talk
Open →
2023-06
33:48
Deep Dive on the Dark Web
John Shier
BSides London
· 2018
Technical
Intro
Blue
Talk
Open →
2018-06
22:47
Passive-ish Recon Techniques
Tom Hudson
BSides Leeds
· 2018
Technical
Web AppSec
Intermediary
Red
Talk
Open →
2018-02
32:06
UPnP - Universal Pwn n Play
Martin Zeiser
BSides Munich
· 2018
Technical
Talk
Open →
2018-04
33:53
The Power of Recon
Orwa Atyat
BSides Ahmedabad
Technical
OSINT
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-05
49:41
Open Source Malware Lab
Robert Simmons
BSides London
· 2016
Technical
DFIR
Detection Engineering
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2016-07
28:04
Exposing Malicious USB Cables: Hardware Detection of Embedded Implants
Jaynie Shorb
BSides PDX
· 2022
Technical
Intermediary
Blue
Technical Deep-dives
Demo
Talk
Open →
2022-10
35:42
Hands-on Writing Malware in Go
Stuart McMurray
Carson Seese
BSides DC
· 2019
Technical
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2019-10
28:25
Post-Exploit Threat Modeling with ATT&CK
Andy Applebaum
BSides Delaware
· 2016
Technical
Talk
Open →
2016-11
34:45
Bug Hunting with Static Code Analysis
Nick Jones
BSides London
· 2016
Technical
Talk
Open →
2016-07
43:48
How I fully compromised the "most advanced code execution system in the world"
Daniel Cooper
BSides Canberra
Technical
Advanced
Talk
Open →
2024-11
47:59
Prototyping and Reverse Engineering with Frida
Jahmel Harris
BSides Leeds
· 2018
Technical
Mobile Security
Reverse Engineering
Red
Demo
Talk
Open →
2018-02
28:29
The IoT Hacker's Toolkit
David Tomaschik
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
29:24
No More XSS: Deploying CSP with nonces and strict-dynamic
Devin Lundberg
BSidesSF
· 2018
Technical
Web AppSec
Talk
Open →
2018-04
37:31
Art of VirusTotal Hacking
Orwa
BSides Ahmedabad
· 2025
Technical
Web AppSec
Talk
Open →
2025-04
51:35
Attacking Kerberos: Kicking the Guard Dog of Hades
Tim Medin
BSides Orlando
· 2015
Technical
Active Directory
Kerberos
Intermediary
Red
Talk
Open →
2015-11
27:38
Hopping on the CAN Bus
Eric Evenchick
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
31:06
From Email Address to Phone Number: A New OSINT Approach
Martin Vigo
BSides Las Vegas
· 2019
Technical
OSINT
Social Engineering
Red
Technical Deep-dives
Talk
Open →
2019-10
47:57
Exploit Development Is Dead, Long Live Exploit Development!
Connor McGarr
BSides KC
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-11
10:48
Running Circles On Social Media - Intelligent OSINT
BSides London
· 2017
Technical
Talk
Open →
2017-06
32:11
The Art of Authentication Bypass
Abdallah AL Mohameed
BSides Ahmedabad
· 2025
Technical
Web AppSec
Red
Talk
Open →
2025-04
1:09:05
Demystifying Bug Bounties: Insights from a Decade of Experience
Yassine Aboukir
BSides Prishtina
· 2023
Technical
Supply Chain Security
Vulnerability Research
Red
Talk
Open →
2023-05
20:51
One OSINT Tool to Rule Them All
Emilie St-Pierre
BSides Las Vegas
· 2017
Technical
OSINT
Red
Talk
Open →
2017-08
50:57
Kevin Breen - DarkComet From Defense To Offense - Identify your Attacker
Kevin Breen
BSides London
· 2015
Technical
Case Studies and Incidents Analysis
Talk
Open →
2015-07
1:47:36
Syslog-ng: Getting Started, Parsing Messages, Storing In Elasticsearch
Peter Czanik
BSides Luxembourg
· 2019
Technical
Intro
Workshop
Open →
2019-11
37:06
CyberRange: An Open-source Offensive Security Lab In AWS
Thomas Cappetta
BSides London
· 2019
Technical
Tooling
Talk
Open →
2019-06
30:17
Lyft Cartography: Automating Security Visibility and Democratization
Sacha Faust
BSidesSF
· 2019
Technical
Talk
Open →
2019-03
37:53
Cruising Ocean Threat With TheHive, Cortex & MISP Without Sinking
Saâd Kadhi
BSides Lisbon
· 2018
Technical
Talk
Open →
2018-12
30:26
Web security is fun (or how I stole your Google Drive files)
Lyra Rebane
BSides Tallinn
· 2024
Technical
Vulnerability Research
Web AppSec
Talk
Open →
2024-10
29:58
MITRE ATT&CK Framework For Threat Hunting - Seth Brunt and Abby Warnes
Seth Brunt
Abby Warnes
BSides Bristol
· 2019
Technical
Talk
Open →
2019-07
42:05
Turning The Tables: Using Cyber Deception To Hunt Phishers At Scale - Ross Bevington
Ross Bevington
BSides Exeter
Technical
Talk
Open →
2024-10
1:00:30
Bypassing CRP on Microcontrollers by Andrew Tierney
Andrew Tierney
BSides Leeds
· 2018
Technical
Cryptography
Advanced
Red
Demo
Talk
Open →
2018-01
27:44
Hacking AAA Unreal Engine Games with Python
Ross Simpson
BSides Cape Town
· 2023
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2023-12
31:04
Microsoft EMET Overview and Demonstration
Kevin Ginousso
BSides Peru 2015
Technical
Tooling
Blue
Demo
Talk
Open →
2015-06
1:14:14
Inżynieria odwrotna z Radare2: Jak zacząć
Jarosław Górny
BSides Warsaw
· 2017
Technical
Talk
Open →
2017-10
38:53
Bypassing malware analysis sandboxes is easy, let's discuss how they are doing it and why it works
Michael Gough
BSidesSF
· 2017
Technical
Talk
Open →
2017-03
47:55
BSides DC 2014 - Building and Using A GPU Password Cracker
Jonathan Fallone
BSides DC 2014
Technical
Cryptography
Talk
Open →
2014-10
32:39
Navigating Passwordless Authentication with FIDO2 & WebAuthn
Jerrod Chong
BSidesSF
· 2019
Technical
Demo
Talk
Open →
2019-03
53:55
Peek Inside the Pelicans - What Gear Do Covert Entry Teams Take on the Road?
Deviant Ollam
BSides Seattle
· 2020
Technical
Red
Demo
Talk
Open →
2020-12
27:37
PowerShell-Fu — Hunting on the Endpoint
Chris Gerritz
BSides Las Vegas
· 2016
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Technical Deep-dives
Talk
Open →
2016-08
1:11:35
Dr Gareth Owen: TOR - Attacks and Countermeasures
Gareth Owen
BSides London
· 2014
Technical
Talk
Open →
2014-05
32:41
Offensive Javascript Techniques for Red Teamers
Dylan Ayrey
Christian Frichot
BSidesSF
· 2019
Technical
Web AppSec
Red
Talk
Open →
2019-03
49:29
AutoRepeater: Automated HTTP Request Repeating With Burp Suite
Justin Moore
BSidesROC
· 2018
Technical
Tooling
Web AppSec
Demo
Talk
Open →
2018-04
36:13
WiFi-based IMSI Catcher - Piers O'Hanlon
Piers O'Hanlon
BSides London
· 2017
Research
Technical
Cellular Security
Wireless Security
Advanced
Talk
Open →
2017-06
28:41
Measuring Cybersecurity Maturity with the NIST CSF
Josh Sokol
BSides Vancouver
· 2021
Technical
GRC
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2021-06
18:23
Forensicating Windows Artifacts: Investigation Without Event Logs!
Renzon Cruz
BSides London
· 2019
Technical
Blue
Talk
Open →
2019-06
57:48
Performing JavaScript Static Analysis by Lewis Ardern
Lewis Ardern
BSides Leeds
· 2018
Technical
Web AppSec
Talk
Open →
2018-01
41:15
OSTrICa – Open Source Threat Intelligence Collector
Roberto Sponchioni
BSides London
· 2016
Technical
DFIR
Threat Intel
Tooling
Demo
Talk
Open →
2016-07
46:55
The Smart Fuzzer Revolution
Dan Guido
BSides Lisbon
· 2016
Technical
Keynote
Open →
2017-02
41:35
How to Write Your First Nuclei Template
Dhiyaneshwaran
BSides Ahmedabad
Technical
Vulnerability Research
Web AppSec
Talk
Open →
2023-02
49:50
LTE Security: Facts & Fictions
Joshua Franklin
BSides Charlotte
· 2014
Technical
Cellular Security
Talk
Open →
2014-06
23:15
APT Attack Techniques in Azure Cloud
Lina Lau
BSides Canberra
· 2023
Technical
Cloud IAM
Talk
Open →
2024-01
19:32
Blackhat Python
Dan Frisch
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
13:22
Watching The Watchers: The Stalkerware Surveillance Ecosystem
Cian Heasley
BSides London
· 2019
Research
Technical
Malware Analysis
Privacy
Reverse Engineering
Talk
Open →
2019-06
20:40
Detection-as-code: Why it works and where to start
Kyle Bailey
BSidesSF
· 2022
Technical
DevSecOps
Talk
Open →
2022-07
43:49
Shellcoding basics
Max Harley
BSides Charleston
· 2016
Technical
CTF
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2016-11
36:46
Breaking into Embedded Devices and IoT Security
Andrew Costis
BSides London
· 2018
Technical
Talk
Open →
2018-06
33:07
Unlocking the Power of the Flipper Zero
Jordan Bush
Cosette Mazet
BSides KC
Technical
Wireless Security
Intro
Red
Demo
Open →
2023-10
56:44
Finding Tony Abbott's Passport Number and Entering the Do Not Get Arrested Challenge 2020
BSides Canberra
· 2021
Technical
Red
Talk
Open →
2021-04
47:26
Smokeloader: The Pandora's box of tricks, payloads and anti-analysis
Pim Trouerbach
BSides PDX
· 2022
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
46:38
How to 10X Your Company's Security (Without a Series D)
Clint Gibler
BSidesSF
· 2020
Technical
Cloud IAM
DevSecOps
Threat Modeling
Blue
Talk
Open →
2020-03
41:25
Command-Line Obfuscation: You Can Run, _and_ You Can Hide
Wietze Beukema
BSides Dublin
· 2024
Technical
DFIR
Detection Engineering
Talk
Open →
2024-06
10:53
If You're Not Using SSH Certificates You're Doing SSH Wrong
Mike Malone
BSidesSF
· 2020
Technical
Network Security
Intermediary
Talk
Open →
2020-03
56:17
What's in a Jailbreak? Hacking the iPhone: 2014 - 2019
Mark Dowd
BSides Canberra
· 2019
Technical
Advanced
Keynote
Open →
2019-05
31:58
Automating Web Application Bug Hunting
Jerry Gamblin
Jonathan Cran
BSidesSF
· 2019
Technical
OSINT
Vulnerability Research
Web AppSec
Talk
Open →
2019-03
39:37
Committing CSS Crimes for fun and profit
Lyra Rebane
BSides Tallinn
· 2025
Technical
Web AppSec
Talk
Open →
2025-10
40:07
The Exploit Development Life Cycle: From Concept to Compromise
Valentina Palmiotti
BSides Canberra
Technical
Red
Keynote
Open →
2025-04
2:08:11
Windows Forensics Workshop
Ali Hadi
BSides Amman
· 2021
Technical
DFIR
Intermediary
Workshop
Open →
2021-07
56:06
Easy LPEs and Common Software Vulnerabilities
Christopher Vella
BSides Canberra
· 2021
Technical
Reverse Engineering
Vulnerability Research
Talk
Open →
2021-04
58:45
Pentesting Hardware And IoT by Mark Carney
Mark Carney
BSides Leeds
· 2018
Technical
Demo
Open →
2018-02
38:07
LoRa the Explorer - Attacking and Defending LoRa Systems
Robert Miller
BSides London
· 2016
Technical
Wireless Security
Talk
Open →
2016-07
47:48
DevOps/SysOps Security
Borys Łącki
BSides Warsaw
· 2016
Technical
Open →
2016-10
50:25
Bridging the Gap: Lessons in Adversarial Tradecraft
Will Schroeder
Matt Nelson
BSides DC
· 2015
Technical
Red
Talk
Open →
2015-11
48:32
DOM Based Angular Sandbox Escapes
Gareth Heyes
BSides Manchester
· 2017
Technical
Vulnerability Research
Web AppSec
Advanced
Red
Technical Deep-dives
Talk
Open →
2017-08
44:22
SWF Seeking Lazy Admin for Cross-Domain Action
Seth Art
BSides DC
· 2014
Technical
OWASP
Web AppSec
Talk
Open →
2014-10
44:53
BSidesSF 2025 - AI's Bitter Lesson for SOCs: Let Machines Be Machines (Jackie Bow, Peter Sanford)
Jackie Bow
Peter Sanford
BSidesSF
· 2025
Technical
Talk
Open →
2025-06
45:31
Source Code Security Audit Speed Run
Eldar Marcussen
BSides Canberra
· 2019
Technical
Vulnerability Research
Web AppSec
Talk
Open →
2019-05
41:25
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK
Jackie Lasky
Sarah Yoder
BSides DC
· 2019
Technical
Purple
Methodology
Technical Deep-dives
Talk
Open →
2019-11
53:37
Smart Contract Security 101
BSides Ahmedabad
Technical
Intro
Talk
Open →
2023-02
51:37
Security Onion: Peeling Back the Layers of Your Network in Minutes
Doug Burks
BSides Augusta
· 2013
Technical
Tooling
DFIR
Detection Engineering
Network Security
Blue
Demo
Talk
Open →
2013-09
25:25
Web Apps: APIs’ Nightmare
BSides Ahmedabad
Technical
OWASP
Web AppSec
Intro
Talk
Open →
2024-05
45:46
You can be an iOS hacker: Stack Pivots and JOP/ROPs
Lina Lau
BSides Canberra
· 2024
Technical
Advanced
Red
Talk
Open →
2024-10
32:11
Hijacking .NET to Defend PowerShell
Amanda Rousseau
BSidesSF
· 2017
Technical
Blue
Talk
Open →
2017-03
48:21
PowerShell Security: Defending the Enterprise from the Latest Attack Platform
Sean Metcalf
BSides DC
· 2016
Technical
Active Directory
Blue
Talk
Open →
2016-10
41:28
Googling Like A Boss: Expanding the Powers of OSINT
Ethan Dodge
BSides SLC
· 2016
Technical
Demo
Open →
2016-05
View all 4,541 talks tagged Technical →