Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring IDA Pro
155
talks mention this tool across
60
BSides chapters.
Talks featuring IDA Pro
28:29
The IoT Hacker's Toolkit
David Tomaschik
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
47:57
Exploit Development Is Dead, Long Live Exploit Development!
Connor McGarr
BSides KC
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-11
56:13
Jak zdobyć flagę?
Mateusz Szymaniec
Jarosław Jedynak
BSides Warsaw
· 2016
Open →
2016-10
1:00:30
Bypassing CRP on Microcontrollers by Andrew Tierney
Andrew Tierney
BSides Leeds
· 2018
Technical
Cryptography
Advanced
Red
Demo
Talk
Open →
2018-01
38:53
Bypassing malware analysis sandboxes is easy, let's discuss how they are doing it and why it works
Michael Gough
BSidesSF
· 2017
Technical
Talk
Open →
2017-03
25:28
If You Can Open The Terminal, You Can Capture The Flag: CTF For Everyone
BSides Detroit
Open →
2013-06
1:11:35
Dr Gareth Owen: TOR - Attacks and Countermeasures
Gareth Owen
BSides London
· 2014
Technical
Talk
Open →
2014-05
40:53
We Need More Mediocre Security Engineers
Jackie Bow
BSidesSF
· 2022
Career
Keynote
Open →
2022-07
32:11
Hijacking .NET to Defend PowerShell
Amanda Rousseau
BSidesSF
· 2017
Technical
Blue
Talk
Open →
2017-03
24:17
PG - Pwn All The Mobile Porn Apps - Ben Actis
BSides Las Vegas
Open →
2017-08
53:54
Reverse Engineering Sherlock Holmes Style: Obfuscated APIs & The Art of Deduction
Katie Deakin-Sharpe
BSides Canberra
Technical
Malware Analysis
Reverse Engineering
Advanced
Blue
Talk
Open →
2025-11
46:06
Podobieństwa i różnice, czyli analiza malware’u dla leniwych
Maciej Kotowicz
BSides Warsaw
· 2017
Technical
Talk
Open →
2017-10
3:19:17
Malware Reverse Engineering
Muhammad Irshad
Muhammad Umair
BSides Islamabad
· 2021
Technical
Malware Analysis
Reverse Engineering
Workshop
Open →
2021-02
27:16
BSidesSF 2017 - AtomBombing: Injecting Code Using Windows’ Atoms (Tal Liberman)
Tal Liberman
BSidesSF
· 2017
Technical
Advanced
Talk
Open →
2017-03
32:02
Batch Firmware Analysis
Jeremy Richards
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
43:57
TL;DR: Applying AI to Security
Clint Gibler
BSidesSF
· 2024
Technical
AI Security
Detection Engineering
Threat Intel
Intro
Talk
Open →
2024-07
23:07
Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol
Riley Kidd
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2025-12
54:12
10 rzeczy których mogłeś nie wiedzieć o Radare2
Paweł Łukasik
BSides Warsaw
· 2017
Technical
Talk
Open →
2017-10
30:55
ByteSweep: A Free Software IoT Security Analysis Platform
Matt Brown
BSides Las Vegas
· 2019
Technical
Tooling
IoT
Reverse Engineering
Vulnerability Research
Demo
Talk
Open →
2019-10
54:48
Malware Analysis — Red Team Edition
Uriel Kosayev
BSides Las Vegas
· 2022
Technical
Malware Analysis
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2022-09
4:37:44
Day Two: Malware Reverse Engineering
Umair
Irshad
BSides Islamabad
· 2021
Technical
Advanced
Workshop
Open →
2021-02
45:50
Alissa Torres Security BSides Boston 2013 - Sick Anti-Analysis Mechanisms From The Wild
BSides Boston
Open →
2013-06
55:25
Confidently Measuring Attack Technique Coverage by Asking Better Questions
Matt Graeber
BSides Augusta
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Blue
Talk
Open →
2021-10
36:48
Hacking Embedded Devices - From Black Box to UID 0
Zezadas
David Silva
BSides Lisbon
Technical
Red
Talk
Open →
2024-02
59:07
Malware Analysis 101: N00b to Ninja in 60 Minutes
BSides Las Vegas
· 2014
Technical
Malware Analysis
Intro
Talk
Open →
2016-12
20:17
Aluma Lavi Shaari - Golang Malware: Using the attackers force against them
Aluma Lavi Shaari
BSides TLV
· 2021
Technical
Talk
Open →
2021-08
37:02
Holy smokes, how to vape yourself to root
Ross Bevington
BSides London
· 2017
Technical
Talk
Open →
2017-06
58:42
A Tourist's Guide to the ARM Cortex M3
Travis Goodspeed
Ryan Speers
BSides Knoxville
· 2020
Technical
Hardware Security
Reverse Engineering
Intermediary
Talk
Open →
2020-05
48:31
Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
Nick Stephens
BSides DC
· 2018
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2018-11
44:30
Writing a Mask ROM Tool
Travis Goodspeed
BSides Knoxville
· 2023
Technical
Hardware Hacking
Reverse Engineering
Advanced
Technical Deep-dives
Talk
Open →
2023-05
47:56
Enter The Ninja
Maciej Kotowicz
BSides Warsaw
· 2018
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2018-10
44:49
Mo' Monero Mo' Problems: An Analysis of Cryptomining Malware
Joshua Reynolds
BSides Edmonton
· 2018
Technical
Talk
Open →
2018-09
54:28
Bugs, tools, pitfalls, methodology – this is how we do it
Marcin Noga
BSides Warsaw
· 2016
Open →
2016-10
47:40
Uncovering Azure's Silent Threats: A Journey into Cloud Vulnerabilities
Nitesh Surana
BSides Ahmedabad
Technical
Talk
Open →
2024-05
57:55
Seriously? You Want Me To Believe Cyber-Spies Want My Data
BSides Detroit
Open →
2012-06
49:11
Intro to Automotive Security - Ariel Zentner
BSides Knoxville
Open →
2016-06
18:02
Making Malware Analysis Less Scary
Jack Resetti
BSides London
· 2025
Technical
Malware Analysis
Reverse Engineering
Intro
Blue
Demo
Talk
Open →
2026-03
24:11
PG - Introduction to Reversing and Pwning - David Weinman
BSides Las Vegas
Open →
2017-08
55:07
Exposing the Neutrino EK: All the Naughty Bits
Ryan Chapman
BSides Las Vegas
· 2016
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2016-08
1:00:25
Hardware Hacking, We Need To Go Deeper
Meadow Ellis
BSides Leeds
· 2019
Technical
Hardware Hacking
Reverse Engineering
Red
Talk
Open →
2019-01
43:40
Diaphora: a new FOSS program diffing tool
Joxean Koret
BSides Lisbon
· 2015
Technical
Reverse Engineering
Vulnerability Research
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2015-07
20:46
BinDbg: Easy Windows Debugging for Binary Ninja
Dave Kukfa
BSidesROC
· 2018
Technical
Reverse Engineering
Tooling
Talk
Open →
2018-04
45:24
BSides Rochester 2016: Nitin Jami: Exploring SecAccessControl Obj in iOS 9 Keychain
Nitin Jami
BSidesROC
· 2016
Technical
Mobile Security
Reverse Engineering
Technical Deep-dives
Talk
Open →
2016-05
43:19
GO Forth And Reverse
Tim Strazzere
BSides Las Vegas
· 2017
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2017-08
27:38
BSidesPDX 101: Conference Organization, Capture the Flag, Contests & Events
BSides PDX
· 2019
Community
CTF
Panel
Open →
2019-11
33:14
Deconstruction Of A Linux Adversarial Toolkit
Christian Giuffre
BSides Canberra
· 2019
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2019-05
26:34
Nice One, Dad: Dissecting A Rare Malware Used By Leviathan - Brian Bartholomew
Brian Bartholomew
BSides Belfast
· 2020
Technical
Talk
Open →
2020-01
20:37
From MS08-067 to EternalBlue
Denis Isakov
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-08
33:49
Software Vulnerability Discovery and Exploitation During Red Team Assessments
Ryan Wincey
BSides Charleston
· 2015
Technical
Red
Talk
Open →
2015-12
36:58
Find Me If You Can! How to Locate a DLL's Unexported Functions
Oryan De Paz
BSides TLV
· 2022
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Talk
Open →
2022-07
34:40
Reversing Patches for Exploit Creation, Pen-Testing or Just Fun
BSides Detroit
Open →
2012-06
40:54
Travis Goodspeed - An Amateur's Guide to Microchip Decapsulation Chemistry
Travis Goodspeed
BSides Knoxville
Technical
Hardware Hacking
Hardware Security
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-05
40:17
Jakub Kaluzny - Proprietary network protocols - risky business on the wire.
Jakub Kaluzny
BSides London
· 2015
Technical
Advanced
Red
Talk
Open →
2015-07
46:50
"Don’t Lookaside or you’ll miss it: Turning a Hyper-V cache miss into 200k cash" Leo Adrian, Cbr23
Leo Adrien
BSides Canberra
· 2023
Technical
Advanced
Red
Talk
Open →
2023-10
36:38
Forensics Impossible: Self-Destructing Thumb Drives
Brandon Wilson
BSides Knoxville
· 2016
Technical
DFIR
Hardware Hacking
Reverse Engineering
Advanced
Red
Talk
Open →
2016-06
4:14:50
Hardware Hacking Workshop
Jilles Vandermeulen
BSides Pakistan
· 2020
Technical
Hardware Hacking
IoT
Reverse Engineering
Intro
Workshop
Open →
2020-11
42:18
What Botnet Is This?
Tiago Pereira
BSides Lisbon
· 2015
Technical
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-07
27:34
Goldilocks and the Three ATM Attacks
David M. N. Bryan
BSidesSF
· 2019
Technical
Physical Security
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Talk
Open →
2019-03
47:43
Leveling Up Ghidra: Learn Ghidra Plugins with a Game Boy Game
Jacob Latonis
BSides Boulder
· 2024
Technical
Demo
Talk
Open →
2024-09
49:57
MTV Reboot — my Super Sweet 16-bit malware (MS-DOS Edition, TSR Remix)
Nika Korchok Wakulich
BSidesSF
· 2023
Technical
Advanced
Talk
Open →
2023-05
54:32
Christopher Doege - Intro to Reverse Engineering with Ghidra Taming The Dragon
BSides SATX
Open →
2019-09
25:29
Unlocking macOS Internals: A Beginner's Guide to Apple's Open Source Code
Olivia Gallucci
BSides 312
· 2025
Technical
Intro
Technical Deep-dives
Talk
Open →
2025-10
51:43
All Software is Open Source: An Introduction to Reverse Engineering
Dmitriy Beryoza
BSides Las Vegas
· 2021
Technical
Reverse Engineering
Vulnerability Research
Intro
Red
Talk
Open →
2021-08
49:49
BG - SiliVaccine: North Korea's Weapon of Mass Detection - Mark Lechtik & Michael Kajiloti
BSides Las Vegas
Open →
2018-09
46:30
Script All the Things, Reverse All the Malware: Jython-Enhanced Reverse Engineering with Ghidra
Byron Roosa
BSidesSF
· 2020
Technical
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2020-03
21:24
Vincent Moscatello - Destover: Inside the Malware at Sony Entertainment
BSides Orlando
Open →
2015-11
45:56
Saving My Car By Hacking It: A Tale of Joy and Woe
Brandon Wilson
BSides Knoxville
· 2017
Technical
Hardware Hacking
Reverse Engineering
Advanced
Talk
Open →
2017-06
35:28
Hacking Mobile Apps with Frida
David Coursey
BSides Charleston
· 2018
Technical
Talk
Open →
2018-11
28:10
Pwn2Own Stories - Ben McBride
Ben McBride
BSides Albuquerque
War Stories
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Talk
Open →
2024-08
40:27
A Practical Approach In Exploit Development For Embedded Devices
BSides Munich
Open →
2017-04
25:40
An Effective Approach to Software Obfuscation
Yu-Jye Tung
BSidesSF
· 2020
Technical
Talk
Open →
2020-03
23:14
Improving UEFI Binary Analysis within Ghidra
Brent Holtsclaw
BSides PDX
· 2023
Technical
Technical Deep-dives
Talk
Open →
2023-11
24:02
Having fun while analyzing mobile applications
Álvaro Felipe Melchor
BSides Lisbon
· 2017
Technical
Mobile Security
Reverse Engineering
Talk
Open →
2017-11
50:07
Unlocking MacOS Internals - A Beginner's Guide to Apple's Open Source Code
Olivia Gallucci
BSides Buffalo
· 2025
Technical
Reverse Engineering
Intro
Red
Talk
Open →
2025-06
47:02
Intro to Reverse Engineering with Ghidra: Taming the Dragon
Christopher Doege
BSides SATX
· 2021
Technical
Intro
Open →
2021-06
52:06
No Disassembly Required
Brian Satira
BSides Peru
· 2018
Technical
DFIR
Malware Analysis
Reverse Engineering
Blue
Talk
Open →
2018-06
41:01
Travis Goodspeed, Reverse Engineering Small Radios for Compatibility
BSides Knoxville
Open →
2019-06
32:40
The Fresh Smell of Ransom Coffee
Martin Hron
BSides Canberra
· 2019
Technical
Hardware Hacking
IoT
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2019-05
23:55
IoT on Easy Mode: Reversing Embedded Devices
Elvis Collado
BSidesSF
· 2016
Technical
Hardware Hacking
IoT
Reverse Engineering
Vulnerability Research
Intro
Red
Talk
Open →
2016-04
34:46
Hyundai head unit hacking
Radoslav Gerganov
BSides Sofia
· 2023
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-03
32:21
Reversing and Bypassing DRM/HSM Dongles
Jeremy Mill
Bsides CT
· 2019
Technical
Cryptography
Advanced
Talk
Open →
2019-11
29:37
Reverse Engineering And Control Flow Analysis With Intel Processor Trace - Hagen Paul Pfeifer
Hagen Paul Pfeifer
BSides Munich
· 2025
Technical
Talk
Open →
2024-11
27:53
Total Flaw: Hacking Flow Computers for Fun and Free Gas
Vera Mens
BSides TLV
· 2022
Technical
IoT
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-07
46:11
Jake Williams - DIY Vulnerability Discovery with DLL Side Loading
BSides Augusta
Open →
2015-09
24:48
Penetration Testing Using Windows Features - Niall Caffrey
Niall Caffrey
BSides Belfast
Technical
Talk
Open →
2024-03
54:40
BSidesCharm - 2017 - Stephen Sims - Microsoft Patch Analysis for Exploitation
BSides Charm
Open →
2021-05
26:52
BSidesSF 2018 - Supply Chain Attack Through CCleaner (Itai Tevet)
Itai Tevet
BSidesSF
· 2018
Research
Supply Chain Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
38:59
Fully Automated Luxury Malware Detection
Camilla Montonen
BSides Oslo
· 2019
Technical
Talk
Open →
2019-06
54:28
The Power and Perils of Binary Emulation for Malware Analysis
Anuj Soni
BSides Philly
· 2023
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2024-01
29:13
Karta - Fast Source Code Assisted Binary Matching - Eyal Itkin
Eyal Itkin
BSides TLV
· 2019
Technical
Talk
Open →
2019-11
37:23
Firmware Reverse Engineering - a pragmatic approach
Munawwar Hussain Shelia
BSides Delhi
· 2020
Technical
IoT
Malware Analysis
Reverse Engineering
Talk
Open →
2020-11
45:15
Reverse Engineering for Vintage Systems
David Riley
BSides DC
· 2018
Technical
Talk
Open →
2018-11
24:39
Start - Recon - Exploit: A Framework for Desktop App Pentesting
Santiago Gimenez Ocano
Ryan Syed
BSides SLC
· 2025
Technical
Red
Talk
Open →
2025-06
43:52
JARVIS for Code? Meaningful AI Research for Software Reverse Engineering
BSides DC
· 2019
Research
Intermediary
Technical Deep-dives
Talk
Open →
2019-10
53:08
The History and Analysis of Stuxnet
Lilly Chalupowski
BSides Fredericton
· 2018
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-12
43:31
CTF de BSides Colombia 2025
BSides Colombia
· 2025
Community
Open →
2025-05
49:58
Writing Windows N-days
Bo Pearce
BSides Boulder
· 2020
Technical
Advanced
Red
Talk
Open →
2020-11
46:48
InfoSec, Just Doing It
Rob Jorgensen
BSides SLC
· 2015
Career
Career & Soft Skills
Intro
Talk
Open →
2015-04
53:40
Subverting the Windows Kernel with Exploits and Rootkits
Juan Sacco
BSides Frankfurt
· 2025
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Demo
+1
Open →
2025-12
21:59
Hunting unsigned DLLs to find APT
Daniela Shalev
BSides Sofia
· 2023
Technical
Talk
Open →
2023-03
54:13
"Program analysis for reverse engineers: from ⊤ to ⊥" - Adrian Herrera
Adrian Herrera
BSides Canberra
· 2018
Technical
Reverse Engineering
Vulnerability Research
Advanced
Technical Deep-dives
Talk
Open →
2018-07
29:37
Ghidra Vs The Cold War
BSides Bristol
· 2019
Talk
Open →
2019-10
21:17
Automated, Generic System Call Hooking, And Interpretation
Markus Partheymüller
BSides Luxembourg
· 2018
Technical
Talk
Open →
2018-10
21:23
PG - I’m a hunter! Cyber Intelligence in the New(ish) Frontier - Yasmine Johnston-Ison
BSides Las Vegas
Open →
2019-10
31:26
Manalyze: A Static Analyzer for PE Executables
Ivan Kwiatkowski
BSides Belfast
· 2017
Technical
Talk
Open →
2017-10
38:21
Bug Hunting in Firmware and Hardware at Scale: Tools, Tips & Real Vulnerabilities
Jeff Spielberg
BSides Boston
· 2020
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2020-11
31:46
I Boot when U-Boot
Bernardo Maia Rodrigues
Vincent Ruijter
BSides Amsterdam
· 2017
Technical
Advanced
Red
Technical Deep-dives
Talk
Open →
2017-09
48:01
NEVER BEFORE HAD STIERLITZ BEEN SO CLOSE TO FAILURE
Sergei Shevchenko
BSides Sydney
· 2019
Technical
Malware Analysis
Mobile Security
Reverse Engineering
Advanced
Blue
Talk
Open →
2019-09
31:14
Using Math to Speed Up Security Assessments of Windows Executables
Cole Thompson
BSidesSF
· 2018
Technical
Demo
Talk
Open →
2018-04
24:42
When Usability Met 2FA - Hyunsu Kim, Junoh Lee, Kihong Heo, Sang Kil Cha and Myeong Geun Shin
Hyunsu Kim
Junoh Lee
Kihong Heo
Sang Kil Cha
Myeong Geun Shin
BSides Munich
· 2022
Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-05
24:28
Buffer Overflows Demystified – Exploits & Patching
Chaitanya Rahalkar
BSides SLC
· 2025
Technical
Blue
Red
Demo
Talk
Open →
2025-06
32:33
Basic Malware Analysis for Incident Responders by Jared Graff
Jared Graff
BSides Tampa
Technical
Intro
Talk
Open →
2024-05
54:39
Yara For Hunting Malwares
Lakshya Dubey
Bsides CT
· 2020
Technical
Talk
Open →
2020-11
24:52
Intro to CTF
Trion
BSides Canberra
· 2025
Technical
CTF
Intro
Talk
Open →
2025-12
49:57
Tim Crothers - Infiltrating C2 Infrastructure
BSides Augusta
Open →
2015-09
39:10
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides Dallas/Fort Worth
· 2024
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
29:55
Radare2: Can It Destroy the Market's Monopoly?
BSides Ukraine
· 2018
Technical
Reverse Engineering
Tooling
Vulnerability Research
Intermediary
Talk
Open →
2018-05
31:48
Let's Play with WinDBG & .NET
Paul Rascagneres
BSides Belfast
· 2017
Technical
Malware Analysis
Reverse Engineering
Tooling
Talk
Open →
2017-10
41:50
Fuzzing: What? Why? How? Genetics? - Roger Seagle
BSides Asheville
Open →
2018-06
42:47
Reverse Engineering Ransomware Protocols
Kyle Nehman
BSides Peru
· 2021
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Talk
Open →
2021-10
30:13
Dissecting Carbanak
Hristo Asenov
BSides Delaware
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2019-11
48:23
Hacking $100K Gas Chromatograph Without Hardware Vera Mens (Vulnerability Researcher@Claroty/Team82)
BSides São Paulo
Open →
2025-06
54:03
Malware Analysis and Automation using Binary Ninja
Erika Noerenberg
BSides Charm
· 2018
Technical
Malware Analysis
Reverse Engineering
Tooling
Talk
Open →
2021-05
29:36
Finding A Vulnerability In Half Life by Ryan Saridar
Ryan Saridar
BSides Basingstoke
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2024-03
49:05
How To Investigate IOS Devices - Paul Rascagneres
Paul Rascagneres
BSides Belfast
· 2020
Technical
DFIR
Malware Analysis
Mobile Security
Talk
Open →
2020-01
38:07
Making Sense Of Your Car: Reverse Engineering AUTOSAR Classic Firmware - Martin Petráň
Martin Petráň
BSides Prague
· 2025
Technical
Talk
Open →
2025-10
26:00
The Allure of Go's Cross-Platform Capability: A Gateway for Threats
Anmol Maurya
BSides NYC
· 2025
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
22:54
PG - CTF All the Things: Leveraging Gamification to Up Your Security Game - Matt Pardo
BSides Las Vegas
Open →
2017-08
38:55
BSidesSLC 2015 - Malware Fun - Kenny Long
BSides SLC
Open →
2015-04
38:28
Wes Widner - Lessons Learned from Analyzing Terabytes of Malware
Wes Widner
BSides Augusta
· 2015
Talk
Open →
2015-09
39:37
Selling Formbook
Borja Rodriguez
Victor Acin
BSides Barcelona
Technical
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-01
21:54
Breaking Down Walls With Windows
Alexander Klepal
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
28:49
Boston BSides Bringing Down the Great Cryptowall - Weston Hecker
BSides Boston
Open →
2016-08
27:16
Unmasking The Unseen: Effortless Linux Malware Reversing With LLMs
Remco Sprooten
BSides Munich
· 2025
Research
Technical
AI Security
Malware Analysis
Reverse Engineering
Demo
Talk
Open →
2026-02
37:20
Operation WordDrone: Cyber Threats in the Drone Industry
Ilia Dafchev
BSides Sofia
· 2025
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-04
41:25
GT - Seek out new protocols, and boldly go where no one has gone before
BSides Las Vegas
Open →
2024-09
53:48
Insecure, Obsolete and Trivial: The Real IoT
Price McDonald
Justin Berry
BSidesROC
· 2017
Technical
Hardware Hacking
IoT
Physical Security
Reverse Engineering
Red
Demo
Talk
Open →
2018-01
55:18
Mobile Hacking
Aaron Guzman
BSides Augusta
· 2016
Technical
Mobile Security
Reverse Engineering
Web AppSec
Red
Talk
Open →
2016-09
36:24
BSidesAugusta 2014 Will Schroeder - Adventures in Asymmetric Warfare
BSides Augusta
Open →
2014-09
50:15
Alcohol, Blood, Sweat, and Creativity: Reversing an Obfuscated Car Mod Tool
atlas 0fd00m
BSides Philly
· 2025
Technical
Hardware Hacking
Reverse Engineering
Advanced
Red
Talk
Open →
2025-02
55:23
How We Reverse Engineered OSX/Pirrit, Got Legal Threats and Survived
Amit Serper
BSides Charm
· 2018
Technical
War Stories
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
42:41
Hacking K-12 School Software in a Time of Remote Learning
Sam Quinn
BSides Knoxville
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
31:28
One XOR to Rule Them All: The Cryptographic Evolution of Brazilian Malware
Italo Lima
BSides São Paulo
· 2025
Technical
Cryptography
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-06
39:47
Deciphering Infostealers From Static Analysis to Automated IOC Extraction
Sadia Bashir
BSides Islamabad
· 2021
Technical
Talk
Open →
2022-05
37:41
Threat hunting .NET malware with YARA
Martin Pontiroli
BSides NYC
· 2018
Technical
Malware Analysis
Reverse Engineering
Threat Intel
Blue
Talk
Open →
2023-04
26:44
How to Review a Mobile (Android) App
James Kinninger
BSides Greenville
· 2020
Technical
Talk
Open →
2020-06
33:24
Malware: Then, Now and How
Cody J. Winkler
BSides Springfield
· 2017
Technical
IoT
Malware Analysis
Reverse Engineering
Talk
Open →
2018-02
43:21
JARVIS for Code? Meaningful AI Research
evm
BSides DC
· 2019
Research
Intermediary
Technical Deep-dives
Talk
Open →
2019-10
1:00:30
Stolen Laptops: Modern Physical Access Attacks with DMA and Firmware Exploitation
Pierre Nicolas Allard Coutu
BSides Vancouver Island
· 2025
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Advanced
Blue
Red
Technical Deep-dives
+1
Open →
2026-03
21:47
Hunter Hardman - Adventures in RAT dev
Hunter Hardman
BSides Augusta
· 2016
Technical
Talk
Open →
2016-09
54:53
Augmenting osquery Visibility on Windows Through Reverse Engineering
Guillaume Ross
Marcos Oviedo
BSides Austin
Technical
Talk
Open →
2024-02
29:19
GT - Comparing Function Embeddings - Rob Brandon
BSides Las Vegas
Open →
2019-10
55:30
Comparing Malicious Files
Robert Simmons
BSides Charm
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2021-05
33:58
Industrial Scale Hardware Hacking - Anthony Clark
Anthony Clark
BSides Albuquerque
· 2024
Technical
Hardware Hacking
IoT
Reverse Engineering
Red
Methodology
Talk
Open →
2024-08
50:37
A Code Pirate's Cutlass: Recovering Software Architecture from Embedded Binaries
evm
BSides Charm
· 2019
Technical
Reverse Engineering
Talk
Open →
2021-05