Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Difficulty
Advanced talks at BSides
342 talks tagged
Advanced
from 80 chapters of BSides events worldwide.
Related topics
Red
Reverse Engineering
Technical Deep-dives
Technical
Vulnerability Research
Talk
39:16
Next Gen AV vs My Shitty Code
James Williams
BSides Manchester
· 2018
Technical
Malware
Post-Exploitation
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2018-08
36:09
New Attacks On The MIFARE DESFire EV1 Smartcard Used In Public Transportation
Rory Flynn
BSides Belfast
· 2020
Technical
Cryptography
Advanced
Red
Technical Deep-dives
Talk
Open →
2020-01
35:36
(Perfect) Cell Games: You Thought It Was Just Surveillance...
Mike Curnow
Bsides CT 2025
Research
Technical
Cellular Security
Wireless Security
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
43:48
How I fully compromised the "most advanced code execution system in the world"
Daniel Cooper
BSides Canberra
Technical
Advanced
Talk
Open →
2024-11
47:57
Exploit Development Is Dead, Long Live Exploit Development!
Connor McGarr
BSides KC
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-11
1:00:30
Bypassing CRP on Microcontrollers by Andrew Tierney
Andrew Tierney
BSides Leeds
· 2018
Technical
Cryptography
Advanced
Red
Demo
Talk
Open →
2018-01
36:13
WiFi-based IMSI Catcher - Piers O'Hanlon
Piers O'Hanlon
BSides London
· 2017
Research
Technical
Cellular Security
Wireless Security
Advanced
Talk
Open →
2017-06
47:26
Smokeloader: The Pandora's box of tricks, payloads and anti-analysis
Pim Trouerbach
BSides PDX
· 2022
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
56:17
What's in a Jailbreak? Hacking the iPhone: 2014 - 2019
Mark Dowd
BSides Canberra
· 2019
Technical
Advanced
Keynote
Open →
2019-05
48:32
DOM Based Angular Sandbox Escapes
Gareth Heyes
BSides Manchester
· 2017
Technical
Vulnerability Research
Web AppSec
Advanced
Red
Technical Deep-dives
Talk
Open →
2017-08
45:46
You can be an iOS hacker: Stack Pivots and JOP/ROPs
Lina Lau
BSides Canberra
· 2024
Technical
Advanced
Red
Talk
Open →
2024-10
36:58
Cracking The Perimeter: How Red Teams Penetrate
Dominic Chell
BSides Manchester
· 2018
Technical
Active Directory
Malware Analysis
Advanced
Red
Talk
Open →
2018-08
39:04
Hacking the Hackers: Analysis of a Cobalt Strike Remote Command Execution Vulnerability - Rio Sherri
Rio Sherri
BSides Prishtina
· 2023
Technical
Advanced
Talk
Open →
2023-05
53:54
Reverse Engineering Sherlock Holmes Style: Obfuscated APIs & The Art of Deduction
Katie Deakin-Sharpe
BSides Canberra
Technical
Malware Analysis
Reverse Engineering
Advanced
Blue
Talk
Open →
2025-11
14:23
Exploring Emotet, An Elaborate Everyday Enigma - Luca Nagy
Luca Nagy
BSides London
· 2019
Technical
Advanced
Talk
Open →
2019-06
50:28
PowerShell Is DEAD — Epic Learnings!
Ben Turner
Doug McLeod
Rob Maslen
BSides London
· 2019
Technical
Advanced
Blue
Red
Talk
Open →
2019-06
36:51
[BSL2022] Windows kernel rootkits for red teams - André Lima
André Lima
BSides Lisbon
· 2022
Technical
Advanced
Red
Demo
Talk
Open →
2022-12
52:23
Securing Bare Metal Hardware at Scale
Matt King
Paul McMillan
BSides PDX
· 2018
Technical
Supply Chain Security
Advanced
Talk
Open →
2019-02
37:13
Phishing With Phineas (Again) Hack Recreation On Steroids
George Karantzas
Constantinos Patsakis
BSides Athens
· 2022
Technical
Advanced
Purple
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-06
49:03
ABC to XYZ of Writing System Management Mode (SMM) Drivers
Brian Delgado
Tejaswini Vibhute
BSides PDX
· 2019
Technical
Advanced
Talk
Open →
2019-11
27:16
BSidesSF 2017 - AtomBombing: Injecting Code Using Windows’ Atoms (Tal Liberman)
Tal Liberman
BSidesSF
· 2017
Technical
Advanced
Talk
Open →
2017-03
43:44
Truly Anonymous Credentials Using Modern Cryptography - Matthew Di Ferrante
Matthew Di Ferrante
BSides London
· 2017
Technical
Cryptography
Privacy
Advanced
Demo
Talk
Open →
2017-06
41:33
Stop Writing Malware! The Blue Team Has Done It for You
Alberto Rodriguez
Erik Hunstad
BSides Augusta
· 2022
Technical
Advanced
Red
Talk
Open →
2022-10
23:15
Circumventing egress filtering by exploiting HTTP "transfer-encoding: chunked" for faster web shells
Lorenzo Grespan
BSides London
· 2018
Technical
Advanced
Red
Talk
Open →
2018-06
50:11
No Code Execution? No Problem! — Living The Age of Virtualization-Based Security
Connor McGarr
BSides KC
· 2022
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-10
23:07
Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol
Riley Kidd
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2025-12
50:11
StreamHash4
Michał Trojnara
BSides Warsaw
· 2017
Cryptography
Advanced
Talk
Open →
2017-10
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
24:54
Taking DMA attacks to the next level
Anna Trikalinou
Dan Lake
BSides PDX
· 2018
Research
Technical
Advanced
Talk
Open →
2018-03
47:43
Lightning fast CTF solving - Automatic Exploit Generation & Side Channel Analysis
Christopher Roberts
BSides DC 2018
Technical
CTF
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2018-11
26:43
Pwning Android Apps at Scale
Sparsh
Shashank
BSides Ahmedabad
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2023-02
44:49
Callback objects — Everything you didn't know you wanted to hook in the kernel
Yarden Shafir
BSides Delhi
· 2020
Technical
Advanced
Talk
Open →
2020-11
1:12:47
Metlstorm's Empiricism Emporium: Unpleasant Truths Our Speciality
Adam Boileau
BSides Wellington
· 2017
Technical
War Stories
Active Directory
Kerberos
Supply Chain Security
Threat Intel
Advanced
Red
+1
Open →
2018-02
59:16
0-day Research Disassembled
Chris Lyne
David Wells
Jimi Sebree
BSides DC
· 2019
Research
Advanced
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2019-11
48:57
Walkthrough of an N-day Android GPU driver vulnerability
Angus
BSides Canberra
· 2025
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Talk
Open →
2026-03
54:48
Malware Analysis — Red Team Edition
Uriel Kosayev
BSides Las Vegas
· 2022
Technical
Malware Analysis
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2022-09
32:40
Hunting kernel rootkits with eBPF by Asaf Eitani & Itamar Maouda Kochavi
Asaf Eitani
Itamar Maouda Kochavi
BSides TLV
· 2022
Technical
Advanced
Talk
Open →
2022-07
4:37:44
Day Two: Malware Reverse Engineering
Umair
Irshad
BSides Islamabad
· 2021
Technical
Advanced
Workshop
Open →
2021-02
29:31
Master Of Puppets: How To Tamper The EDR?
Daniel Feichter
BSides Munich
· 2022
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-05
23:03
Return-Oriented Exploitation on ARM
Tamás Tokics
BSides Budabest
· 2019
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2019-06
44:09
Rafal Wojtczuk: LoL (Layers on Layers) - Bypassing Security for Fun and Profit V2
Rafal Wojtczuk
BSides London
· 2014
Technical
Advanced
Red
Talk
Open →
2014-05
27:24
Cold Case — Catch a Killer in 16 Bytes
Iggy
BSides Canberra
· 2021
Technical
War Stories
DFIR
Hardware Hacking
Reverse Engineering
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2021-04
48:43
Inside Google's Discovery & Remediation of a Critical CPU Vulnerability
Yousif Hussin
BSides Lisbon
· 2024
Research
Technical
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-12
1:10:45
Reverse Engineering PlugX APT Malware
U Myo Myint Htike
BSides Myanmar
· 2020
Technical
Advanced
Talk
Open →
2021-01
48:31
Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
Nick Stephens
BSides DC
· 2018
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2018-11
47:03
Pasten: Capture the Flag
Danny Grander
Yuval Ofir
BSides TLV
· 2019
Technical
CTF
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2019-11
44:30
Writing a Mask ROM Tool
Travis Goodspeed
BSides Knoxville
· 2023
Technical
Hardware Hacking
Reverse Engineering
Advanced
Technical Deep-dives
Talk
Open →
2023-05
42:30
Crash all the Flying Things! — Exploiting and Defending Aircraft Collision Avoidance
Joe Greenwood
BSides London
· 2015
Technical
Hardware Hacking
Threat Modeling
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2015-07
49:52
Abusing Windows with PowerShell and Microsoft debuggers
Pierre-Alexandre Braeken
BSides DC
· 2016
Technical
Active Directory
Advanced
Red
Talk
Open →
2016-10
40:10
Semi-Offline Attack on Android Full-Disk Encryption
Oliver Kunz
BSides Lisbon
· 2016
Technical
Cryptography
Mobile Security
Advanced
Red
Talk
Open →
2016-11
29:56
Breaking into Android IPC Mechanisms Through Advanced AIDL Fuzzing
Rajanish Pathak
Hardik Mehta
BSides Ahmedabad
· 2025
Technical
Advanced
Red
Demo
Talk
Open →
2025-05
42:15
Adventures in Asymmetric Warfare: Fighting the AV Vendors
Will Schroeder
BSides DC
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2014-10
43:15
Spectre and Meltdown: Speculative Execution Considered Harmful
Yuval Yarom
BSides Canberra
· 2018
Research
Advanced
Talk
Open →
2018-05
28:18
WarBerry: Tactical Network Reconnaissance from a Raspberry Pi
Yiannis Ioannides
BSides Athens
· 2016
Technical
Advanced
Red
Demo
Talk
Open →
2016-07
55:07
Exposing the Neutrino EK: All the Naughty Bits
Ryan Chapman
BSides Las Vegas
· 2016
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2016-08
36:48
Elevate & Conquer: A Journey Into Kernel Exploitation
Tijme Gommers
BSides London
Technical
Advanced
Red
Talk
Open →
2024-02
54:50
Well well well, if it isn't the consequences of my own actions
Justin Steven
BSides Canberra
· 2025
Technical
Cryptography
Supply Chain Security
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
50:28
Estonian Electronic Identity Card and its Security Challenges
Arnis Paršovs
BSides Tallinn
· 2021
Research
Cryptography
DFIR
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-10
43:48
Scudo Allocator exploitation
Zac Ecob
BSides Canberra
· 2023
Technical
Advanced
Red
Technical Deep-dives
Talk
Open →
2024-01
51:17
BSidesSF 2023 - Advanced Attack Vectors in Azure Environments (Zur Ulianitzky, Bill Ben Haim)
Zur Ulianitzky
Bill Ben Haim
BSidesSF
· 2023
Technical
Active Directory
Cloud IAM
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-05
58:44
New Era in Telecom Hacking
Ali Abdollahi
BSides Toronto
· 2020
Technical
Cellular Security
Advanced
Red
Talk
Open →
2021-11
19:23
Ding Dong The EDR is DEAD
Ayman Sagy
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
48:29
DUALITY – Advanced Red Team Persistence through Self-Reinfecting DLL Backdoors... - Faisal Tameesh
Faisal Tameesh
BSides KC
· 2023
Technical
Advanced
Red
Talk
Open →
2023-10
40:14
When Malware Becomes Creative: A Survey of Advanced Android Detection Evasion Tactics
Dimitrios Valsamaras
José Leitão
BSides Lisbon
· 2024
Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
47:14
Breaking COMposure: Journey to Hunting Windows COM Vulnerabilities
ByungHyun Kang
BSides Canberra
· 2025
Technical
Vulnerability Research
Advanced
Red
Talk
Open →
2025-12
40:53
Hardware Hacking: DVRs and Dildos
Ken Munro
BSides Scotland 2017
Technical
Hardware Hacking
IoT
Reverse Engineering
Vulnerability Research
Advanced
Red
Keynote
Open →
2017-11
34:16
Decrypting IPTV
Radoslav Gerganov
BSides Sofia
· 2022
Technical
Cryptography
Hardware Hacking
Reverse Engineering
Advanced
Red
Talk
Open →
2022-04
33:14
Deconstruction Of A Linux Adversarial Toolkit
Christian Giuffre
BSides Canberra
· 2019
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2019-05
44:00
The Nation State Actor Ate My Homework!
Liam Smit
BSides Cape Town
· 2019
Research
Hardware Security
Malware Analysis
Reverse Engineering
Threat Intel
Advanced
Case Studies and Incidents Analysis
Empirical Research
+2
Open →
2019-12
20:37
From MS08-067 to EternalBlue
Denis Isakov
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-08
55:50
Practical Serialization Attacks
Nicky Bloor
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Web AppSec
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2017-08
41:29
The Art of Compromising C2 Servers
Vangelis Stykas
BSides Berlin
· 2023
Technical
Malware Analysis
Reverse Engineering
Web AppSec
Advanced
Red
Talk
Open →
2024-01
43:53
Pwning Electric Motorcycles
Mitchell Marasch
Persephone Karnstein
BSides Seattle
· 2026
Research
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2026-03
32:59
EDR Evasion Primer
Jorge Gimenez
BSides Berlin
· 2022
Technical
Active Directory
Malware Analysis
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-02
36:58
Find Me If You Can! How to Locate a DLL's Unexported Functions
Oryan De Paz
BSides TLV
· 2022
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Talk
Open →
2022-07
53:01
Hidden Networks Pivoting: Redefining DNS Rebinding Attack
Tomer Zait
Nimrod Levy
BSides Las Vegas
· 2019
Technical
Network Security
Vulnerability Research
Web AppSec
Advanced
Red
Talk
Open →
2019-10
1:06:18
Rick & Morty Walk Across Mordor: A History of The World in 10 1/2 Chapters
Trey Darley
BSides Lisbon
· 2025
Advanced
Keynote
Open →
2025-11
40:54
Travis Goodspeed - An Amateur's Guide to Microchip Decapsulation Chemistry
Travis Goodspeed
BSides Knoxville
Technical
Hardware Hacking
Hardware Security
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-05
47:19
Attacking Patient Health: The Anatomy of Hospital Exploitation
Jacob Holcomb
BSides DC
· 2016
Research
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2016-10
32:33
L0ss sans C St0 - PAMdemonium! Privileged Access Management
BSides Perth
· 2023
Technical
Active Directory
Cryptography
Vulnerability Research
Advanced
Red
Talk
Open →
2023-08
45:17
Open Sesame – All Your Doors Are Belong To Us
Kev Breen
Ben McCarthy
BSides London
· 2025
Technical
Cryptography
Hardware Hacking
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2026-03
38:06
Como Hackear um Banco sem Sair do seu Quarto?
Arthur Aires
Matheus Wreck
Gustavo Oliveira
BSides São Paulo
· 2025
Technical
War Stories
Reverse Engineering
Vulnerability Research
Web AppSec
Advanced
Red
Talk
Open →
2025-06
51:56
Unbreaking the iPhone: Bootchain Reversal, SEP Sabotage, and the iOS Kernel Frontier
Jack Sessions
BSides Canberra
· 2025
Technical
DFIR
Mobile Security
Reverse Engineering
Advanced
Red
Technical Deep-dives
Demo
Open →
2025-11
36:19
Binary Exploitation: Android Edition
John D
BSides Cheltenham
· 2022
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2022-07
41:09
Blowing up Gas Stations for fun and profit
Pedro Umbelino
BSides Lisbon
Research
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
36:47
Rootkiting the Linux Kernel: Persistence and Stealth Techniques
Petar Anastasov
Yordan Stoychev
BSides Sofia
· 2024
Technical
Advanced
Red
Talk
Open →
2024-04
42:28
How We Reverse-Engineered Multiple Industrial Radio Remote-Control Systems
Stephen Hilt
BSides Knoxville
· 2020
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Wireless Security
Advanced
Red
Talk
Open →
2020-05
40:17
Jakub Kaluzny - Proprietary network protocols - risky business on the wire.
Jakub Kaluzny
BSides London
· 2015
Technical
Advanced
Red
Talk
Open →
2015-07
46:50
"Don’t Lookaside or you’ll miss it: Turning a Hyper-V cache miss into 200k cash" Leo Adrian, Cbr23
Leo Adrien
BSides Canberra
· 2023
Technical
Advanced
Red
Talk
Open →
2023-10
59:11
Vehicle Cyber Security and Innovative Assessment Techniques
Andy Davis
David Claire
BSides Manchester
· 2016
Technical
War Stories
Hardware Hacking
Reverse Engineering
Vulnerability Research
Wireless Security
Advanced
Red
+3
Open →
2016-10
23:02
Rage Against the Regime: Attacking National Infrastructure in Iran by Sam Handelman and Israel Gubi
Sam Handelman
Israel Gubi
BSides TLV
· 2022
Technical
Advanced
Red
Talk
Open →
2022-07
48:22
An Attack & a Defense in the Context of Security of Digital ICs
Mahesh Tripunitara
BSides Toronto
· 2015
Research
Technical
Hardware Hacking
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-11
42:54
Perfect Data Exfiltration Techniques: Bypassing DLP and Detection
Éric Filiol
BSides Lisbon
· 2022
Technical
Cryptography
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-12
29:53
Google Pay, Drug Bots, & SIM Swaps: How Old Leaks Power New Attacks
Sarit Yerushalmi
Ron Masas
BSides London
· 2025
Research
Technical
OSINT
Social Engineering
Vulnerability Research
Web AppSec
Advanced
Case Studies and Incidents Analysis
+2
Open →
2026-03
35:45
Breaking The Impossible: Bypassing Android's Secure Hardware Backed Attestation by Joseph Foote
Joseph Foote
BSides Basingstoke
· 2022
Research
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2022-07
1:05:44
Memory Corruption is for Wussies!
Pedro Vilaça
BSides Lisbon
· 2016
Technical
Advanced
Red
Talk
Open →
2016-11
32:45
Living Forever In The Internet Of E-Waste by Darren Martyn
Darren Martyn
BSides Basingstoke
· 2023
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2023-09
36:38
Forensics Impossible: Self-Destructing Thumb Drives
Brandon Wilson
BSides Knoxville
· 2016
Technical
DFIR
Hardware Hacking
Reverse Engineering
Advanced
Red
Talk
Open →
2016-06
12:24
PE03 - Dumping LSASS when Debug Privilege is Disabled - Bleon Proko
Bleon Proko
BSides Athens
Technical
Active Directory
Advanced
Red
Talk
Open →
2024-06
35:03
Minerva_lib
Mateusz Kocielski
BSides Warsaw
· 2018
Technical
Reverse Engineering
Vulnerability Research
Advanced
Talk
Open →
2018-10
View all 342 talks tagged Advanced →