Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Team
Red talks at BSides
1040 talks tagged
Red
from 105 chapters of BSides events worldwide.
Related topics
Technical
Talk
Advanced
Vulnerability Research
Reverse Engineering
Demo
39:40
The Dark Side of Wireless Networks: Intro to Wi-Fi Hacking
Megi Bashi
Ryan Dinnan
BSides Prishtina
Technical
Wireless Security
Intro
Red
Technical Deep-dives
Demo
Talk
Open →
2023-05
43:55
Metody pozostania w ukryciu w sieci i w terenie
Dariusz Damian Jakubowski
BSides Warsaw
Technical
Intermediary
Red
Talk
Open →
2017-10
1:06:07
Top-Tier Bug Bounty Hunter Mindset
Yassine Aboukir
BSides Ahmedabad
· 2022
Career
Career & Soft Skills
Vulnerability Research
Intermediary
Red
Keynote
Open →
2023-02
39:16
Next Gen AV vs My Shitty Code
James Williams
BSides Manchester
· 2018
Technical
Malware
Post-Exploitation
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2018-08
32:24
Preparing for Offensive Security Penetration Testing with Kali (PWK) and OSCP
Tony Punturiero
BSides DC
· 2019
Career
Career & Soft Skills
Intro
Red
Talk
Open →
2019-10
45:24
It's the Little Things
Ben Sadeghipour
BSides PDX
· 2018
Technical
Web AppSec
Intermediary
Red
Technical Deep-dives
Talk
Open →
2019-02
36:09
New Attacks On The MIFARE DESFire EV1 Smartcard Used In Public Transportation
Rory Flynn
BSides Belfast
· 2020
Technical
Cryptography
Advanced
Red
Technical Deep-dives
Talk
Open →
2020-01
35:36
(Perfect) Cell Games: You Thought It Was Just Surveillance...
Mike Curnow
Bsides CT 2025
Research
Technical
Cellular Security
Wireless Security
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
36:12
Recursion is a Harsh Mistress
Joel Moore
BSides Charleston
· 2024
Tooling
Intermediary
Red
Technical Deep-dives
Talk
Open →
2024-11
1:03:19
Bug Bounty on Steroids
Hussein Daher
BSides Ahmedabad
· 2023
Technical
Vulnerability Research
Web AppSec
Intermediary
Red
Talk
Open →
2023-02
28:38
Bluetooth Warwalking: Hacking Devices Around You with Just Your Phone
Matt Miller
BSides SLC
· 2026
Technical
OSINT
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Empirical Research
Demo
+1
Open →
2026-04
1:01:16
Red teaming w Polsce
Borys Łącki
BSides Warsaw
Red
Talk
Open →
2017-10
25:00
Bug Bounty Recon The Right Way
Khalil A. Lemtaffah
BSides Budabest
· 2022
Technical
OSINT
Web AppSec
Intermediary
Red
Talk
Open →
2023-06
22:47
Passive-ish Recon Techniques
Tom Hudson
BSides Leeds
· 2018
Technical
Web AppSec
Intermediary
Red
Talk
Open →
2018-02
33:53
The Power of Recon
Orwa Atyat
BSides Ahmedabad
Technical
OSINT
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-05
35:42
Hands-on Writing Malware in Go
Stuart McMurray
Carson Seese
BSides DC
· 2019
Technical
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2019-10
47:59
Prototyping and Reverse Engineering with Frida
Jahmel Harris
BSides Leeds
· 2018
Technical
Mobile Security
Reverse Engineering
Red
Demo
Talk
Open →
2018-02
51:35
Attacking Kerberos: Kicking the Guard Dog of Hades
Tim Medin
BSides Orlando
· 2015
Technical
Active Directory
Kerberos
Intermediary
Red
Talk
Open →
2015-11
31:06
From Email Address to Phone Number: A New OSINT Approach
Martin Vigo
BSides Las Vegas
· 2019
Technical
OSINT
Social Engineering
Red
Technical Deep-dives
Talk
Open →
2019-10
47:57
Exploit Development Is Dead, Long Live Exploit Development!
Connor McGarr
BSides KC
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-11
32:11
The Art of Authentication Bypass
Abdallah AL Mohameed
BSides Ahmedabad
· 2025
Technical
Web AppSec
Red
Talk
Open →
2025-04
1:09:05
Demystifying Bug Bounties: Insights from a Decade of Experience
Yassine Aboukir
BSides Prishtina
· 2023
Technical
Supply Chain Security
Vulnerability Research
Red
Talk
Open →
2023-05
20:51
One OSINT Tool to Rule Them All
Emilie St-Pierre
BSides Las Vegas
· 2017
Technical
OSINT
Red
Talk
Open →
2017-08
37:13
Introducing wifiphisher, a tool for automated WiFi phishing attacks
George Chatzisofroniou
BSides London
· 2015
Tooling
Wireless Security
Red
Talk
Open →
2015-07
1:00:30
Bypassing CRP on Microcontrollers by Andrew Tierney
Andrew Tierney
BSides Leeds
· 2018
Technical
Cryptography
Advanced
Red
Demo
Talk
Open →
2018-01
27:44
Hacking AAA Unreal Engine Games with Python
Ross Simpson
BSides Cape Town
· 2023
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2023-12
53:55
Peek Inside the Pelicans - What Gear Do Covert Entry Teams Take on the Road?
Deviant Ollam
BSides Seattle
· 2020
Technical
Red
Demo
Talk
Open →
2020-12
32:41
Offensive Javascript Techniques for Red Teamers
Dylan Ayrey
Christian Frichot
BSidesSF
· 2019
Technical
Web AppSec
Red
Talk
Open →
2019-03
43:49
Shellcoding basics
Max Harley
BSides Charleston
· 2016
Technical
CTF
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2016-11
33:07
Unlocking the Power of the Flipper Zero
Jordan Bush
Cosette Mazet
BSides KC
Technical
Wireless Security
Intro
Red
Demo
Open →
2023-10
56:44
Finding Tony Abbott's Passport Number and Entering the Do Not Get Arrested Challenge 2020
BSides Canberra
· 2021
Technical
Red
Talk
Open →
2021-04
47:26
Smokeloader: The Pandora's box of tricks, payloads and anti-analysis
Pim Trouerbach
BSides PDX
· 2022
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
40:07
The Exploit Development Life Cycle: From Concept to Compromise
Valentina Palmiotti
BSides Canberra
Technical
Red
Keynote
Open →
2025-04
50:25
Bridging the Gap: Lessons in Adversarial Tradecraft
Will Schroeder
Matt Nelson
BSides DC
· 2015
Technical
Red
Talk
Open →
2015-11
48:32
DOM Based Angular Sandbox Escapes
Gareth Heyes
BSides Manchester
· 2017
Technical
Vulnerability Research
Web AppSec
Advanced
Red
Technical Deep-dives
Talk
Open →
2017-08
45:46
You can be an iOS hacker: Stack Pivots and JOP/ROPs
Lina Lau
BSides Canberra
· 2024
Technical
Advanced
Red
Talk
Open →
2024-10
28:58
Introduction to Return Oriented Exploitation on ARM64
Billy Ellis
BSides Manchester
· 2018
Technical
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2018-08
42:25
Client-Side to Critical
Satyam Gothi
Kuldeep Pandya
BSides Ahmedabad
· 2025
Technical
Vulnerability Research
Web AppSec
Red
Talk
Open →
2025-05
1:00:45
BREAKING in BAD (I'm the one who doesn't knock)
Jayson E Street
BSides SLC
· 2015
War Stories
Red
Talk
Open →
2015-04
27:49
Needles Without The Thread: Threadless Process Injection
Ceri Coburn
BSides Cymru Wales
· 2023
Technical
Red
Talk
Open →
2023-04
1:04:53
Smashing the Stack to Building ROP Chains with Gadgets
Doug Rodgers
BSides Charlotte
· 2016
Technical
Reverse Engineering
Vulnerability Research
Intro
Red
Demo
Open →
2016-05
36:58
Cracking The Perimeter: How Red Teams Penetrate
Dominic Chell
BSides Manchester
· 2018
Technical
Active Directory
Malware Analysis
Advanced
Red
Talk
Open →
2018-08
30:07
Local Admin in less than 60 seconds
Nikos Vourdas
BSides Budabest
· 2024
Technical
Active Directory
Kerberos
Vulnerability Research
Red
Technical Deep-dives
Talk
Open →
2025-01
51:46
Understanding and Attacking Delegations in Active Directory
Venkatraman K
BSides SATX
· 2021
Technical
Active Directory
Kerberos
Red
Demo
Talk
Open →
2021-06
26:12
Skiptracer: OSINT for broke ass hackers
illwill
Bsides CT
· 2018
Technical
OSINT
Red
Demo
Open →
2018-11
15:37
Tale of Chaining Bugs for Account Takeover
Harsh Bothra
BSides Ahmedabad
· 2022
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2023-02
5:44
Yassine Aboukir: Bug Bounty, Authentication Vulnerabilities, and Hacker Collaboration
Yassine Aboukir
BSides Ahmedabad
· 2023
Career
Vulnerability Research
Web AppSec
Red
Talk
Open →
2023-02
47:16
Climbing the Production Mountain: Practical CI/CD Attacks Using CI/CD Goat
Omer Gil
Asaf Greenholts
BSides Las Vegas
· 2022
Technical
DevSecOps
Supply Chain Security
Red
Demo
Open →
2022-09
50:28
PowerShell Is DEAD — Epic Learnings!
Ben Turner
Doug McLeod
Rob Maslen
BSides London
· 2019
Technical
Advanced
Blue
Red
Talk
Open →
2019-06
1:42:10
Exploiting esoteric Android vulnerability
Sharan
Sanjay
BSides Ahmedabad
· 2021
Technical
Web AppSec
Intermediary
Red
Workshop
Open →
2022-04
36:51
[BSL2022] Windows kernel rootkits for red teams - André Lima
André Lima
BSides Lisbon
· 2022
Technical
Advanced
Red
Demo
Talk
Open →
2022-12
34:39
A Drop of Jupyter: A Modular Approach to Penetration Testing
Omar Bheda
Nate Kirk
Cody Ruscigno
BSides Dallas/Fort Worth
Technical
Tooling
Red
Demo
Open →
2020-11
28:50
Amazon Cognito (Mis)Configurations
BSides Ahmedabad
· 2021
Technical
Cloud IAM
Intermediary
Red
Talk
Open →
2022-03
39:30
Pwning Cloud Contexts: From GitHub Token to Compromising an Entire GCP Organization
Ayoub Fathi
BSides Ahmedabad
· 2024
Technical
Cloud IAM
Supply Chain Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
22:25
Introduction to the use after free vulnerability and why it matters
Johnathan Fragale
BSides Delaware
· 2012
Technical
Intro
Red
Talk
Open →
2013-04
28:57
Abusing WCF Endpoint for RCE and Privilege Escalation
Christopher Anastasio
BSidesSF
· 2019
Technical
Red
Talk
Open →
2019-03
44:16
An Introduction To Fault-Injection For Exploiting Bug-Free Code In Embedded Systems
BSides London
· 2025
Technical
Cryptography
Intermediary
Red
Technical Deep-dives
Talk
Open →
2025-02
14:53
Help Yourself! Exploiting Self-Service Kiosks
Jacob Steedman
BSides Belfast
· 2025
Technical
Hardware Hacking
Network Security
Physical Security
Red
Talk
Open →
2025-12
31:02
Phineas Fisher: A Timeline of Hacktivism
BSides Leeds
· 2020
War Stories
OSINT
Reverse Engineering
Threat Intel
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2020-07
51:32
Keynote: Tim Medin
Tim Medin
BSides Augusta
· 2022
Kerberos
Red
Keynote
Open →
2022-10
39:34
What the DLL? Finding and Exploiting DLL Preloading Vulnerabilities
Chris Le Roy
BSides Cape Town
· 2016
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2016-12
34:26
Hacking ASUS Routers
BSides DC
· 2017
Technical
Wireless Security
Red
Talk
Open →
2017-10
7:47:16
BsidesLV 2025 - Ground Floor - Monday
BSides Las Vegas
· 2025
Technical
Cloud IAM
OSINT
Vulnerability Research
Red
Talk
Open →
2025-08
56:31
Using JA3: Asking for a Friend?
Justin Warner
Ed Miles
BSides DC
· 2019
Technical
Cryptography
DFIR
Detection Engineering
Network Security
Blue
Red
Talk
Open →
2019-11
41:33
Stop Writing Malware! The Blue Team Has Done It for You
Alberto Rodriguez
Erik Hunstad
BSides Augusta
· 2022
Technical
Advanced
Red
Talk
Open →
2022-10
23:15
Circumventing egress filtering by exploiting HTTP "transfer-encoding: chunked" for faster web shells
Lorenzo Grespan
BSides London
· 2018
Technical
Advanced
Red
Talk
Open →
2018-06
50:11
No Code Execution? No Problem! — Living The Age of Virtualization-Based Security
Connor McGarr
BSides KC
· 2022
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-10
23:07
Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol
Riley Kidd
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2025-12
8:30
PHP Execute After Redirect to SQL Injection
Kuldeep Pandya
BSides Ahmedabad
· 2022
Technical
Vulnerability Research
Web AppSec
Red
Demo
Open →
2023-02
44:04
Noooooooooo touch!
Michael Rodger
BSides Cape Town
· 2023
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-12
25:39
Journey to Command Injection: Hacking the Lenovo ix4-300d
Rick Ramgattie
BSidesSF
· 2019
Technical
Hardware Hacking
Vulnerability Research
Web AppSec
Intermediary
Red
Demo
Open →
2019-03
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
6:51
Playing with Fake Emails for Fun and Profit
Sayaan Alam
BSides Ahmedabad
· 2022
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2023-02
50:55
Fuzz Smarter, Not Harder: An afl-fuzz Primer
Craig Young
BSidesSF
· 2016
Technical
Red
Talk
Open →
2016-04
47:43
Lightning fast CTF solving - Automatic Exploit Generation & Side Channel Analysis
Christopher Roberts
BSides DC 2018
Technical
CTF
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2018-11
55:18
Windows Credential Attacks and Mitigations
Chad Tilbury
BSides SLC
· 2017
Technical
Active Directory
Purple
Red
Talk
Open →
2017-07
33:32
The Subtle Art of Not Giving a F*ck: Advanced OSINT Tracking Techniques
Sagar Tiwari
Shubham Sharma
BSides Mumbai
Technical
Red
Talk
Open →
2025-03
26:43
Pwning Android Apps at Scale
Sparsh
Shashank
BSides Ahmedabad
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2023-02
56:59
PCI for Pen Testers
Joseph Pierini
BSides DC
· 2017
Technical
Red
Talk
Open →
2017-10
52:48
Navigating Bug Bounties: From NAs to P1s
Animesh Acharya
BSides Canberra
· 2025
Career
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-11
1:12:47
Metlstorm's Empiricism Emporium: Unpleasant Truths Our Speciality
Adam Boileau
BSides Wellington
· 2017
Technical
War Stories
Active Directory
Kerberos
Supply Chain Security
Threat Intel
Advanced
Red
+1
Open →
2018-02
47:39
Mastering Android Security Research: A Guide for the Modern Security Researcher
Hahna Latonick
Jacob Swinsinski
BSides Tampa
· 2024
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2024-05
47:29
Easy Ways to Bypass Antivirus Systems
Craig Young
BSides London
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2014-05
29:06
Social Engineering Tales of the Pirate Queen
Sharka
BSides Manchester
· 2018
Technical
Physical Security
Social Engineering
Red
Talk
Open →
2018-08
23:35
AI Red Teaming for Artificial Dummies
Bryson Loughmiller
BSides SLC
· 2025
Technical
AI Security
Web AppSec
Red
Talk
Open →
2025-06
48:57
Walkthrough of an N-day Android GPU driver vulnerability
Angus
BSides Canberra
· 2025
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Talk
Open →
2026-03
42:09
BSidesSF 2021 - Offensive Javascript Techniques for Red Teamers (Dylan Ayrey • Christian Frichot)
Dylan Ayrey
Christian Frichot
BSidesSF
· 2021
Technical
Web AppSec
Red
Talk
Open →
2021-03
54:48
Malware Analysis — Red Team Edition
Uriel Kosayev
BSides Las Vegas
· 2022
Technical
Malware Analysis
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2022-09
12:19
Introduction To Red Team Tooling And OpSec
Marwan El-Gendi
BSides London
· 2022
Technical
Intro
Red
Talk
Open →
2022-01
51:35
Red Team Handcuffs
Caleb McGary
BSides Seattle
· 2020
Technical
Supply Chain Security
Red
Case Studies and Incidents Analysis
Talk
Open →
2020-11
27:36
Requiem For An Admin: Orchestrating BloodHound and Empire for Automated AD Post-Exploitation
Walter Legowski
BSides Amsterdam
· 2017
Technical
Active Directory
Red
Demo
Open →
2017-09
30:22
Hacking with Physics
Rishikesh Somchatwar
BSides Ahmedabad
· 2021
Technical
Hardware Security
IoT
Wireless Security
Red
Talk
Open →
2022-03
48:41
Offensive Ansible For Red Teams
Leo McCavana
BSides Belfast
· 2020
Technical
Active Directory
Tooling
Red
Demo
Talk
Open →
2020-01
28:01
Tomer Fichman - (In)secure Boot finding and exploiting vulnerabilities
Tomer Fichman
BSides TLV
· 2023
Technical
Red
Talk
Open →
2023-07
44:06
Cyberhydraulik w akcji - czyli skąd i jak cieknie!
Adam Lange
BSides Warsaw
· 2019
Blue
Red
Talk
Open →
2019-10
36:48
Hacking Embedded Devices - From Black Box to UID 0
Zezadas
David Silva
BSides Lisbon
Technical
Red
Talk
Open →
2024-02
43:56
Red Teaming macOS Environments with Hermes the Swift Messenger
Justin Bui
BSidesSF
· 2022
Technical
Red
Talk
Open →
2022-07
25:11
Weapons of a Pentester
Nick Aleks
BSides Toronto
· 2015
Technical
Network Security
Physical Security
Social Engineering
Wireless Security
Red
Demo
Open →
2015-11
44:05
Fade from Whitehat… to Black
Beau Bullock
BSides Orlando
· 2016
War Stories
Red
Keynote
Open →
2016-03
50:05
Rapid RFID: Live PACS Hacking Demo — Clone Badges & Break Access Control
Evan Cook
BSides SLC
· 2026
Technical
Hardware Hacking
Physical Security
Intermediary
Red
Demo
Open →
2026-04
View all 1,040 talks tagged Red →