Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Style
Demo talks at BSides
431 talks tagged
Demo
from 80 chapters of BSides events worldwide.
Related topics
Technical
Red
Tooling
Reverse Engineering
Wireless Security
Blue
39:40
The Dark Side of Wireless Networks: Intro to Wi-Fi Hacking
Megi Bashi
Ryan Dinnan
BSides Prishtina
Technical
Wireless Security
Intro
Red
Technical Deep-dives
Demo
Talk
Open →
2023-05
39:16
Next Gen AV vs My Shitty Code
James Williams
BSides Manchester
· 2018
Technical
Malware
Post-Exploitation
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2018-08
28:38
Bluetooth Warwalking: Hacking Devices Around You with Just Your Phone
Matt Miller
BSides SLC
· 2026
Technical
OSINT
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Empirical Research
Demo
+1
Open →
2026-04
28:04
Exposing Malicious USB Cables: Hardware Detection of Embedded Implants
Jaynie Shorb
BSides PDX
· 2022
Technical
Intermediary
Blue
Technical Deep-dives
Demo
Talk
Open →
2022-10
35:42
Hands-on Writing Malware in Go
Stuart McMurray
Carson Seese
BSides DC
· 2019
Technical
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2019-10
47:59
Prototyping and Reverse Engineering with Frida
Jahmel Harris
BSides Leeds
· 2018
Technical
Mobile Security
Reverse Engineering
Red
Demo
Talk
Open →
2018-02
1:00:30
Bypassing CRP on Microcontrollers by Andrew Tierney
Andrew Tierney
BSides Leeds
· 2018
Technical
Cryptography
Advanced
Red
Demo
Talk
Open →
2018-01
27:44
Hacking AAA Unreal Engine Games with Python
Ross Simpson
BSides Cape Town
· 2023
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2023-12
31:04
Microsoft EMET Overview and Demonstration
Kevin Ginousso
BSides Peru 2015
Technical
Tooling
Blue
Demo
Talk
Open →
2015-06
32:39
Navigating Passwordless Authentication with FIDO2 & WebAuthn
Jerrod Chong
BSidesSF
· 2019
Technical
Demo
Talk
Open →
2019-03
53:55
Peek Inside the Pelicans - What Gear Do Covert Entry Teams Take on the Road?
Deviant Ollam
BSides Seattle
· 2020
Technical
Red
Demo
Talk
Open →
2020-12
49:29
AutoRepeater: Automated HTTP Request Repeating With Burp Suite
Justin Moore
BSidesROC
· 2018
Technical
Tooling
Web AppSec
Demo
Talk
Open →
2018-04
41:15
OSTrICa – Open Source Threat Intelligence Collector
Roberto Sponchioni
BSides London
· 2016
Technical
DFIR
Threat Intel
Tooling
Demo
Talk
Open →
2016-07
33:07
Unlocking the Power of the Flipper Zero
Jordan Bush
Cosette Mazet
BSides KC
Technical
Wireless Security
Intro
Red
Demo
Open →
2023-10
58:45
Pentesting Hardware And IoT by Mark Carney
Mark Carney
BSides Leeds
· 2018
Technical
Demo
Open →
2018-02
51:37
Security Onion: Peeling Back the Layers of Your Network in Minutes
Doug Burks
BSides Augusta
· 2013
Technical
Tooling
DFIR
Detection Engineering
Network Security
Blue
Demo
Talk
Open →
2013-09
41:28
Googling Like A Boss: Expanding the Powers of OSINT
Ethan Dodge
BSides SLC
· 2016
Technical
Demo
Open →
2016-05
36:51
ThreatPursuit VM
Dan Kennedy
BSides Canberra
· 2020
Tooling
Malware Analysis
Threat Intel
Blue
Demo
Talk
Open →
2020-05
29:33
Hacking And Exploit Development For Bluetooth Low Energy (BLE)
Sarah Mader
BSides Munich
· 2022
Technical
Wireless Security
Demo
Talk
Open →
2022-05
1:04:53
Smashing the Stack to Building ROP Chains with Gadgets
Doug Rodgers
BSides Charlotte
· 2016
Technical
Reverse Engineering
Vulnerability Research
Intro
Red
Demo
Open →
2016-05
51:46
Understanding and Attacking Delegations in Active Directory
Venkatraman K
BSides SATX
· 2021
Technical
Active Directory
Kerberos
Red
Demo
Talk
Open →
2021-06
26:12
Skiptracer: OSINT for broke ass hackers
illwill
Bsides CT
· 2018
Technical
OSINT
Red
Demo
Open →
2018-11
47:47
IDS Configuration for Beginners
Nick Leghorn
BSides SATX
· 2018
Technical
Intro
Blue
Demo
Talk
Open →
2018-07
47:16
Climbing the Production Mountain: Practical CI/CD Attacks Using CI/CD Goat
Omer Gil
Asaf Greenholts
BSides Las Vegas
· 2022
Technical
DevSecOps
Supply Chain Security
Red
Demo
Open →
2022-09
36:51
[BSL2022] Windows kernel rootkits for red teams - André Lima
André Lima
BSides Lisbon
· 2022
Technical
Advanced
Red
Demo
Talk
Open →
2022-12
34:39
A Drop of Jupyter: A Modular Approach to Penetration Testing
Omar Bheda
Nate Kirk
Cody Ruscigno
BSides Dallas/Fort Worth
Technical
Tooling
Red
Demo
Open →
2020-11
35:44
Sweet Security: Deploying a Defensive Raspberry Pi
Travis Smith
BSidesSF
· 2016
Technical
Demo
Open →
2016-04
39:42
BSMaaS 2020 - Hacking a Smart Coffee Machine
Axelle Apvrille
BSides Munich
· 2020
Technical
Demo
Talk
Open →
2020-09
50:12
Active Directory Password Blacklisting
Leeren Chang
BSides Las Vegas
· 2018
Technical
Active Directory
Blue
Demo
Talk
Open →
2018-09
39:34
What the DLL? Finding and Exploiting DLL Preloading Vulnerabilities
Chris Le Roy
BSides Cape Town
· 2016
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2016-12
29:25
Hacking the Drones - Aatif Khan
Aatif Khan
BSides London
Technical
Wireless Security
Demo
Talk
Open →
2018-06
24:06
Joe Grand - Hacking a Tooth Tunes Toothbrush for a Positive Dental Outlook
Joe Grand
BSides PDX
Technical
Demo
Talk
Open →
2018-03
43:44
Truly Anonymous Credentials Using Modern Cryptography - Matthew Di Ferrante
Matthew Di Ferrante
BSides London
· 2017
Technical
Cryptography
Privacy
Advanced
Demo
Talk
Open →
2017-06
23:07
Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol
Riley Kidd
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2025-12
8:30
PHP Execute After Redirect to SQL Injection
Kuldeep Pandya
BSides Ahmedabad
· 2022
Technical
Vulnerability Research
Web AppSec
Red
Demo
Open →
2023-02
25:39
Journey to Command Injection: Hacking the Lenovo ix4-300d
Rick Ramgattie
BSidesSF
· 2019
Technical
Hardware Hacking
Vulnerability Research
Web AppSec
Intermediary
Red
Demo
Open →
2019-03
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
50:58
It, Do it Live (PowerShell Digital Forensics)
Jared Atkinson
BSides DC
· 2015
Technical
Blue
Demo
Talk
Open →
2015-11
51:37
Naughty Toys for Wicked Girls and Boys
Steve Lord
BSides London
· 2016
Technical
Demo
Talk
Open →
2016-07
47:29
Easy Ways to Bypass Antivirus Systems
Craig Young
BSides London
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2014-05
12:00
Turning Your Weapons Against You. - Andrew Blane
Andrew Blane
BSides London
· 2019
Technical
Demo
Talk
Open →
2019-07
30:55
ByteSweep: A Free Software IoT Security Analysis Platform
Matt Brown
BSides Las Vegas
· 2019
Technical
Tooling
IoT
Reverse Engineering
Vulnerability Research
Demo
Talk
Open →
2019-10
10:54
Using Network Miner To Reconstruct Network Traffic
Matthew Short
BSides London
· 2019
Technical
Intro
Blue
Demo
Talk
Open →
2019-06
54:48
Malware Analysis — Red Team Edition
Uriel Kosayev
BSides Las Vegas
· 2022
Technical
Malware Analysis
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2022-09
40:25
Attack on Proximity Card- HID Seos with Flipper Zero - Jackson Ip
Jackson Ip
BSides Hong Kong
· 2025
Technical
Wireless Security
Demo
Talk
Open →
2025-06
24:45
Honeydocs and Offensive Countermeasures
Roy Firestein
BSides Toronto
· 2014
Technical
DFIR
Threat Intel
Blue
Demo
Talk
Open →
2014-12
27:36
Requiem For An Admin: Orchestrating BloodHound and Empire for Automated AD Post-Exploitation
Walter Legowski
BSides Amsterdam
· 2017
Technical
Active Directory
Red
Demo
Open →
2017-09
48:41
Offensive Ansible For Red Teams
Leo McCavana
BSides Belfast
· 2020
Technical
Active Directory
Tooling
Red
Demo
Talk
Open →
2020-01
49:06
Introduction to Software Defined Radio for Offensive and Defensive Operations
Grey Fox
BSides Peru
· 2024
Technical
IoT
OSINT
Wireless Security
Intermediary
Demo
Talk
Open →
2024-08
25:11
Weapons of a Pentester
Nick Aleks
BSides Toronto
· 2015
Technical
Network Security
Physical Security
Social Engineering
Wireless Security
Red
Demo
Open →
2015-11
26:03
Automated Security Scanning of GraphQL APIs with Burp
Jared Meit
BSides Toronto
· 2022
Technical
Vulnerability Research
Web AppSec
Demo
Talk
Open →
2022-10
50:05
Rapid RFID: Live PACS Hacking Demo — Clone Badges & Break Access Control
Evan Cook
BSides SLC
· 2026
Technical
Hardware Hacking
Physical Security
Intermediary
Red
Demo
Open →
2026-04
23:03
Return-Oriented Exploitation on ARM
Tamás Tokics
BSides Budabest
· 2019
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2019-06
26:51
Voltron - Extending LLDB and GDB for Hackers
Richo Healey
BSides Toronto
· 2014
Technical
Demo
Talk
Open →
2014-12
51:14
Continuous Security Testing in a DevOps World
Stephen de Vries
BSides London
· 2014
Technical
DevSecOps
Web AppSec
Demo
Talk
Open →
2014-05
18:50
CTF Walkthrough
Tiago Sintra
BSides Lisbon
· 2015
Technical
Demo
Open →
2015-07
48:34
A Poor Man's Pentest: Automating the Manual
John Hammond
BSides Delaware
· 2019
Technical
Red
Demo
Talk
Open →
2019-11
35:14
Introducing Pi-Key: Hacking just like the Movies
Jon Aubrey
Trevor Shingles
BSides London
· 2017
Technical
Red
Demo
Talk
Open →
2017-06
48:31
Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
Nick Stephens
BSides DC
· 2018
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2018-11
47:16
Karl Fosaaen - Attacking Azure Environments with PowerShell - BSides Portland 2018
Karl Fosaaen
BSides PDX
· 2018
Technical
Cloud IAM
Red
Demo
Talk
Open →
2019-02
44:54
A Quick, Efficient Yet Not Entirely Sane Introduction to Deception
John Strand
BSides Frankfurt
Technical
Active Directory
Detection Engineering
Intermediary
Blue
Demo
Talk
Open →
2025-03
29:56
Breaking into Android IPC Mechanisms Through Advanced AIDL Fuzzing
Rajanish Pathak
Hardik Mehta
BSides Ahmedabad
· 2025
Technical
Advanced
Red
Demo
Talk
Open →
2025-05
33:04
CSRFT, A Toolkit for CSRF Vulnerabilities
Paul Amar
BSides London
· 2014
Technical
Tooling
Web AppSec
Demo
Talk
Open →
2014-05
10:18
How to: Actually attack computers at cafes - Felix Ryan
Felix Ryan
BSides London
· 2018
Technical
Network Security
Wireless Security
Intermediary
Red
Demo
Talk
Open →
2018-06
29:42
Maltego In The Enterprise
David Bressler
BSides Boston
· 2013
Technical
OSINT
Threat Intel
Blue
Demo
Talk
Open →
2013-06
52:17
reNgine: An Automated Reconnaissance Framework
Yogesh Ojha
BSides Cyprus
· 2021
Technical
Web AppSec
Red
Demo
Open →
2022-06
32:19
Cybersecurity meets Generative AI: Automating Your Compliance Operations
Rafae Bhatti
BSidesSF
· 2024
Technical
Demo
Talk
Open →
2024-07
46:08
Security Metrics: Why, where and how?
Tiago Henriques
Tiago Martins
BSides Lisbon
· 2015
Technical
Demo
Talk
Open →
2015-07
26:24
Game Hacking for Security Professionals
Max Harley
Nick Powers
BSides Charleston
· 2024
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2024-11
18:02
Making Malware Analysis Less Scary
Jack Resetti
BSides London
· 2025
Technical
Malware Analysis
Reverse Engineering
Intro
Blue
Demo
Talk
Open →
2026-03
28:18
WarBerry: Tactical Network Reconnaissance from a Raspberry Pi
Yiannis Ioannides
BSides Athens
· 2016
Technical
Advanced
Red
Demo
Talk
Open →
2016-07
55:07
Exposing the Neutrino EK: All the Naughty Bits
Ryan Chapman
BSides Las Vegas
· 2016
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2016-08
43:20
Eyeing the Onion
Brad Shoop
Chris Rimondi
BSides Augusta
· 2013
Technical
Detection Engineering
Network Security
Blue
Demo
Talk
Open →
2013-09
43:27
Threat Hunting AWS CloudTrail Logs with Microsoft Sentinel: Real-Time Attack Demo
Arijit Paul
BSides Sydney
· 2025
Technical
Cloud IAM
Detection Engineering
Threat Intel
Intermediary
Demo
Open →
2025-02
59:52
Testy bezpieczeństwa infrastruktury w przerwie na herbatę. Czy to możliwe?
Krystian Działowy
BSides Warsaw
· 2024
Technical
Network Security
Vulnerability Research
Demo
Talk
Open →
2024-07
46:57
Adversarial Post-Exploitation: Lessons From The Pros
Justin Warner
Chris Ross
BSides DC
· 2016
Technical
Red
Demo
Talk
Open →
2016-10
46:53
Enemies of the West - Neil Lines
Neil Lines
BSides London
· 2014
Technical
War Stories
Case Studies and Incidents Analysis
Demo
Talk
Open →
2017-06
36:24
ICS Intrusion KillChain explained with real simulation
Juan Escobar
BSides Athens
· 2021
Technical
ICS Security
Intermediary
Red
Demo
Workshop
Open →
2021-06
42:05
Hacking The Airwaves
Robin Roodt
BSides Joburg
Technical
Wireless Security
Red
Demo
Talk
Open →
2025-07
33:14
Deconstruction Of A Linux Adversarial Toolkit
Christian Giuffre
BSides Canberra
· 2019
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2019-05
17:09
I've seen you get hacked! (AI Real-Time Attack Simulation)
BSides Joburg
Technical
Intermediary
Blue
Technical Deep-dives
Demo
Open →
2024-12
39:16
Exfiltrate All The Things!
David Sopas
Pedro Umbelino
BSides Lisbon
· 2018
Technical
IoT
Wireless Security
Red
Demo
Talk
Open →
2018-12
53:20
AI in OSINT — Zero Snake Oil
Roelof Temmingh
BSides Cape Town
· 2025
Technical
AI Security
OSINT
Technical Deep-dives
Demo
Talk
Open →
2025-02
25:01
Shut the Front Door
Mark Bassegio
BSides Toronto
· 2014
Technical
Wireless Security
Red
Demo
Talk
Open →
2014-12
29:44
Password Cracking: The First 500 Million
Jamie Riden
BSides London
· 2019
Technical
Cryptography
Demo
Talk
Open →
2019-06
48:34
Using DeTT&CT and the MITRE ATT&CK Framework to Assess Your Security Posture
David Branscome
BSides Knoxville
· 2022
Technical
Detection Engineering
Threat Modeling
Intermediary
Blue
Demo
Talk
Open →
2022-05
14:04
0Keyboard: a simple keyboard with the evil inside
Kastriot Fetahaj
BSides Prishtina
· 2022
Technical
Red
Demo
Talk
Open →
2022-05
30:15
Incident Response Evidence Collection & Triage
John Meyers
BSides Peru
· 2017
Technical
DFIR
Malware Analysis
Blue
Demo
Talk
Open →
2017-06
38:28
Ryan Hays - Weaponizing Splunk: Using Blue Team Tools for Evil
Ryan Hays
BSides Knoxville
· 2017
Technical
Red
Demo
Talk
Open →
2017-06
26:54
Introduction to OWASP Juice Shop
Tim Corless-Carter
BSides Manchester
· 2019
Technical
OWASP
Vulnerability Research
Web AppSec
Intro
Red
Demo
Open →
2019-09
30:34
Ethical Hacking: DIY Mobile Security Workstation (For Cheap)
Dale Meredith
BSidesSF
· 2019
Tooling
Blue
Red
Demo
Open →
2019-03
44:08
The attacker's guide to exploiting credentials & secrets
Mackenzie Jackson
BSides Tallinn
· 2023
Technical
Red
Demo
Talk
Open →
2023-10
17:33
SniffAir – An Open-Source Framework for Wireless Security Assessments
Steven Darracott
Matthew Eidelberg
BSides Las Vegas
· 2017
Technical
Tooling
Vulnerability Research
Wireless Security
Demo
Talk
Open →
2017-08
45:23
How to Break the Modbus Protocol and Cause a PLC DoS
Omar Morando
BSides Budabest
· 2023
Technical
OT/ICS Security
Intermediary
Red
Demo
Open →
2023-08
51:56
Unbreaking the iPhone: Bootchain Reversal, SEP Sabotage, and the iOS Kernel Frontier
Jack Sessions
BSides Canberra
· 2025
Technical
DFIR
Mobile Security
Reverse Engineering
Advanced
Red
Technical Deep-dives
Demo
Open →
2025-11
32:51
Non-Human Identity Attack Surface: A Live Hacking Demo and Defense Strategies
Michael Silva
BSides Toronto
· 2024
Technical
Cloud IAM
Supply Chain Security
Blue
Red
Demo
Open →
2024-10
49:48
AV Evasion - How Adversaries Aim to Bypass Antivirus Tools
Marvin Ngoma
BSides Joburg
· 2024
Technical
Detection Engineering
Malware Analysis
Demo
Talk
Open →
2024-08
45:13
Analyzing volatile memory on a Google Kubernetes Engine node
Marcus Hallberg
BSides NYC
· 2023
Technical
Cloud IAM
Container Security
DFIR
Demo
Talk
Open →
2023-06
40:27
Practical Out-of-Band Data Exfiltration in 802.11
João Pena Gil
Luís Gomes
BSides Lisbon
· 2017
Technical
Wireless Security
Purple
Red
Demo
Open →
2017-11
39:45
Demystifying the First Few Minutes After Compromising a Container
Stuart McMurray
BSides Dublin
Technical
Container Security
Red
Demo
Talk
Open →
2025-10
View all 431 talks tagged Demo →