Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Metasploit
333
talks mention this tool across
80
BSides chapters.
Talks featuring Metasploit
39:16
Next Gen AV vs My Shitty Code
James Williams
BSides Manchester
· 2018
Technical
Malware
Post-Exploitation
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2018-08
32:24
Preparing for Offensive Security Penetration Testing with Kali (PWK) and OSCP
Tony Punturiero
BSides DC
· 2019
Career
Career & Soft Skills
Intro
Red
Talk
Open →
2019-10
47:57
Exploit Development Is Dead, Long Live Exploit Development!
Connor McGarr
BSides KC
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-11
37:06
CyberRange: An Open-source Offensive Security Lab In AWS
Thomas Cappetta
BSides London
· 2019
Technical
Tooling
Talk
Open →
2019-06
31:04
Microsoft EMET Overview and Demonstration
Kevin Ginousso
BSides Peru 2015
Technical
Tooling
Blue
Demo
Talk
Open →
2015-06
45:08
Scripting Myself Out of a Job - Automating the Penetration Test with APT2 - Adam Compton
BSides Knoxville
Open →
2016-06
25:28
If You Can Open The Terminal, You Can Capture The Flag: CTF For Everyone
BSides Detroit
Open →
2013-06
28:27
Hack Yourself: Building a Test Lab - David Boyd
BSides Knoxville
Open →
2016-06
18:23
Forensicating Windows Artifacts: Investigation Without Event Logs!
Renzon Cruz
BSides London
· 2019
Technical
Blue
Talk
Open →
2019-06
43:49
Shellcoding basics
Max Harley
BSides Charleston
· 2016
Technical
CTF
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2016-11
58:45
Pentesting Hardware And IoT by Mark Carney
Mark Carney
BSides Leeds
· 2018
Technical
Demo
Open →
2018-02
50:25
Bridging the Gap: Lessons in Adversarial Tradecraft
Will Schroeder
Matt Nelson
BSides DC
· 2015
Technical
Red
Talk
Open →
2015-11
48:21
PowerShell Security: Defending the Enterprise from the Latest Attack Platform
Sean Metcalf
BSides DC
· 2016
Technical
Active Directory
Blue
Talk
Open →
2016-10
36:58
Cracking The Perimeter: How Red Teams Penetrate
Dominic Chell
BSides Manchester
· 2018
Technical
Active Directory
Malware Analysis
Advanced
Red
Talk
Open →
2018-08
26:12
Skiptracer: OSINT for broke ass hackers
illwill
Bsides CT
· 2018
Technical
OSINT
Red
Demo
Open →
2018-11
39:04
Hacking the Hackers: Analysis of a Cobalt Strike Remote Command Execution Vulnerability - Rio Sherri
Rio Sherri
BSides Prishtina
· 2023
Technical
Advanced
Talk
Open →
2023-05
50:28
PowerShell Is DEAD — Epic Learnings!
Ben Turner
Doug McLeod
Rob Maslen
BSides London
· 2019
Technical
Advanced
Blue
Red
Talk
Open →
2019-06
39:30
Pwning Cloud Contexts: From GitHub Token to Compromising an Entire GCP Organization
Ayoub Fathi
BSides Ahmedabad
· 2024
Technical
Cloud IAM
Supply Chain Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
51:02
Powershell for CyberWarriors - Russel Van Tuyl
BSides Knoxville
Open →
2016-06
37:13
Phishing With Phineas (Again) Hack Recreation On Steroids
George Karantzas
Constantinos Patsakis
BSides Athens
· 2022
Technical
Advanced
Purple
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-06
32:30
The journey begins: Preparing for Offensive Security
Tony Punturiero
BSides DC
· 2019
Career
Intro
Talk
Open →
2019-10
39:34
What the DLL? Finding and Exploiting DLL Preloading Vulnerabilities
Chris Le Roy
BSides Cape Town
· 2016
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2016-12
56:31
Using JA3: Asking for a Friend?
Justin Warner
Ed Miles
BSides DC
· 2019
Technical
Cryptography
DFIR
Detection Engineering
Network Security
Blue
Red
Talk
Open →
2019-11
23:07
Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol
Riley Kidd
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2025-12
25:39
Journey to Command Injection: Hacking the Lenovo ix4-300d
Rick Ramgattie
BSidesSF
· 2019
Technical
Hardware Hacking
Vulnerability Research
Web AppSec
Intermediary
Red
Demo
Open →
2019-03
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
1:04:23
QUESTIONING 42: Where is the "engineering" in the Social Engineering of Namespace Compromises?
BSides Las Vegas
Open →
2016-08
14:50
IPv6 for Pentesters
Owen Shearing
BSides London
· 2017
Technical
Talk
Open →
2017-06
9:14:20
BSides Perth 2021 Day 2
BSides Perth
· 2021
Technical
Open →
2021-09
41:04
Hunt Or Be Hunted
Alex Davies
BSides London
· 2017
Technical
Blue
Talk
Open →
2017-06
47:29
Easy Ways to Bypass Antivirus Systems
Craig Young
BSides London
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2014-05
25:38
Race Against the Machine: Rapid Exploit Development via LLMs
Matthew Deluca
BSides Augusta
· 2023
Research
Technical
AI Security
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2023-10
48:41
Offensive Ansible For Red Teams
Leo McCavana
BSides Belfast
· 2020
Technical
Active Directory
Tooling
Red
Demo
Talk
Open →
2020-01
49:53
2017 - A Year In The Red by Dominic Chell and Vincent Yiu
BSides Manchester
Open →
2017-08
19:14
Zero2Hero: Red Team Tradecraft
Jordan Jay
BSides Basingstoke
Technical
Red
Talk
Open →
2022-07
26:01
How To Bypass Email Gateways Using Common Payloads
Neil Lines
BSides Manchester
· 2017
Technical
Malware Analysis
Social Engineering
Red
Talk
Open →
2017-08
19:06
Hacking a Hackathon for Fun and Profit
Alexei Kojenov
Alex Ivkin
BSides PDX
· 2018
Technical
Supply Chain Security
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2018-03
54:04
Finding ICS/OT (Industrial Control Systems/Operational Technology) Assets with Shodan
BSides Greenville
· 2023
Technical
IoT
OSINT
Red
Talk
Open →
2023-06
33:10
BSides Iowa 2018: " Investigating the FBI’s use of Network Investigative Techniques (NIT)"
BSides Iowa
Open →
2018-04
25:14
From Firmware to Exploit
Michael Messner
BSides Las Vegas
· 2023
Technical
Tooling
Firmware Security
IoT
Reverse Engineering
Vulnerability Research
Intermediary
Technical Deep-dives
+1
Open →
2023-10
44:49
Mo' Monero Mo' Problems: An Analysis of Cryptomining Malware
Joshua Reynolds
BSides Edmonton
· 2018
Technical
Talk
Open →
2018-09
52:19
RedOps: Automating your Red Team Infrastructure
Alex Rodriguez
BSides Charleston
· 2018
Technical
DevSecOps
Tooling
Red
Talk
Open →
2018-11
43:46
Meticulously Modern Mobile Manipulations
Leon Jacobs
BSides Cape Town
· 2019
Technical
Malware Analysis
Mobile Security
Reverse Engineering
Red
Talk
Open →
2019-12
50:24
BSidesAugusta 2018 - Paul Melson - Hunting APTs and Script Kiddies with Beer Money
BSides Augusta
Open →
2018-11
20:12
Automating red team infrastructure using Overlord
Evangelos Nikolaou
Vasilis Sikkis
BSides Athens
· 2021
Technical
Tooling
Red
Open →
2021-06
39:07
Hunting high-value targets in corporate networks - Patrick Fussell, Josh Stone
BSides Las Vegas
Open →
2016-08
29:42
Maltego In The Enterprise
David Bressler
BSides Boston
· 2013
Technical
OSINT
Threat Intel
Blue
Demo
Talk
Open →
2013-06
50:19
Building an EmPyre with Python - Steve Borosh Alexander Rymdeko-Harvey, Will Schroeder
BSides Las Vegas
Open →
2016-08
57:55
Seriously? You Want Me To Believe Cyber-Spies Want My Data
BSides Detroit
Open →
2012-06
24:36
The Security of Emojis
Adrian Justice
BSides Canberra
· 2021
Technical
Technical Deep-dives
Talk
Open →
2021-04
43:04
How to fuzz?
Kamil Frankowicz
BSides Warsaw
· 2016
Technical
Vulnerability Research
Technical Deep-dives
Talk
Open →
2016-10
42:15
Adventures in Asymmetric Warfare: Fighting the AV Vendors
Will Schroeder
BSides DC
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2014-10
22:40
Pensieve: Finding Malicious Artifacts in Container Environments
Yathi Naik
BSidesSF
· 2018
Technical
Container Security
DFIR
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2018-04
22:47
"Introduction to Malware Development in C#" by Jayden Caelli, BSides Canberra 2023
Jayden Caelli
BSides Canberra
· 2023
Technical
Intro
Talk
Open →
2023-10
46:57
Adversarial Post-Exploitation: Lessons From The Pros
Justin Warner
Chris Ross
BSides DC
· 2016
Technical
Red
Demo
Talk
Open →
2016-10
46:53
Enemies of the West - Neil Lines
Neil Lines
BSides London
· 2014
Technical
War Stories
Case Studies and Incidents Analysis
Demo
Talk
Open →
2017-06
14:38
Visualising TLS Fingerprints With TMAP To Hunt Malicious Domains
Amanda Thomson
BSides London
· 2025
Technical
Cryptography
Talk
Open →
2025-02
22:50
BADPDF: Stealing Windows Credentials via PDF Files
Ido Solomon
Adi Ikan
BSidesSF
· 2019
Technical
Network Security
Vulnerability Research
Web AppSec
Red
Technical Deep-dives
Talk
Open →
2019-03
36:24
ICS Intrusion KillChain explained with real simulation
Juan Escobar
BSides Athens
· 2021
Technical
ICS Security
Intermediary
Red
Demo
Workshop
Open →
2021-06
20:25
Leveraging Osquery for DFIR at Scale
Sohini Mukherjee
BSidesSF
· 2020
Technical
DFIR
Detection Engineering
Intermediary
Talk
Open →
2020-03
53:00
Keynote: David Kennedy
David Kennedy
BSides Augusta
· 2018
Keynote
Open →
2018-10
19:40
BSides Rochester 2018 - IoT Botnet Detection System using Machine Learning
BSidesROC
Open →
2018-04
53:26
2015 - Ben Turner & Dave Hardy - PowerShell Fu with Metasploit “Interactive PowerShell Sessions...
BSides Manchester
Open →
2015-09
34:05
"SSH, so hot right now. Profiling it with HASSH" - Ben Reardon & Adel Karimi
Ben Reardon
Adel Karimi
BSides Canberra
· 2019
Technical
Detection Engineering
Network Security
Threat Intel
Talk
Open →
2019-05
23:22
AI And Pentesting by Dan Canon
Dan Canon
BSides Cheltenham
· 2023
Talk
Open →
2023-06
23:35
Breaking Into Infosec or, How I hacked my way out of poverty - BSides Portland 2022
BSides PDX
Open →
2022-10
20:37
From MS08-067 to EternalBlue
Denis Isakov
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-08
51:24
Red Blue Purple AI
Jason Haddix
BSides Boulder
· 2024
Technical
AI Security
OSINT
Blue
Purple
Red
Keynote
Open →
2024-09
46:54
Hack To The Future: Using LLMs As Attacking Agent In Real Networks - Maria Rigaki & Sebastian Garcia
Maria Rigaki
Sebastian Garcia
BSides Prague
Technical
Talk
Open →
2024-04
33:49
Software Vulnerability Discovery and Exploitation During Red Team Assessments
Ryan Wincey
BSides Charleston
· 2015
Technical
Red
Talk
Open →
2015-12
42:01
Jak i dlaczego przygotować firmę do wprowadzenia narzędzia SIEM – realne problemy i wyzwania
Krzysztof Hudek
BSides Warsaw
· 2016
Technical
Talk
Open →
2016-10
43:54
Hackinabox: Self-Contained Pen Testing Lab
Marv White
BSides SLC
· 2016
Technical
Hardware Hacking
Intro
Talk
Open →
2016-05
28:29
You Don't See Me: Abusing Whitelists to Hide and Run Malware
Michael Spaling
BSides Las Vegas
· 2016
Technical
Malware Analysis
Vulnerability Research
Red
Talk
Open →
2016-08
45:39
LightBasin: A Roaming Threat To Telecommunications Companies by Stuart Davis
Stuart Davis
BSides Dublin
· 2023
Research
Cellular Security
Talk
Open →
2023-07
38:28
Ryan Hays - Weaponizing Splunk: Using Blue Team Tools for Evil
Ryan Hays
BSides Knoxville
· 2017
Technical
Red
Demo
Talk
Open →
2017-06
30:34
Ethical Hacking: DIY Mobile Security Workstation (For Cheap)
Dale Meredith
BSidesSF
· 2019
Tooling
Blue
Red
Demo
Open →
2019-03
17:33
SniffAir – An Open-Source Framework for Wireless Security Assessments
Steven Darracott
Matthew Eidelberg
BSides Las Vegas
· 2017
Technical
Tooling
Vulnerability Research
Wireless Security
Demo
Talk
Open →
2017-08
44:35
Open Source Adversary Simulation Toolset Review
Ryan Voloch
BSides Peru
· 2019
Technical
Purple
Talk
Open →
2019-07
45:23
How to Break the Modbus Protocol and Cause a PLC DoS
Omar Morando
BSides Budabest
· 2023
Technical
OT/ICS Security
Intermediary
Red
Demo
Open →
2023-08
40:56
BSMaaS 2020 - The Art of bypassing endpoint protections for red teaming engagements
BSides Munich
Open →
2020-09
20:10
Weaponizing Splunk: Using Blue Team Tools For Evil - Ryan Hays
BSides Boston
Open →
2017-05
40:27
Practical Out-of-Band Data Exfiltration in 802.11
João Pena Gil
Luís Gomes
BSides Lisbon
· 2017
Technical
Wireless Security
Purple
Red
Demo
Open →
2017-11
36:35
Hunting Threat Actors using OSINT Forensics
Abi Waddell
BSides NYC
· 2023
Technical
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-06
47:51
BSidesCHS 2016: "Hunting High-Value Targets in Corporate Networks" - Patrick Fussell & Josh Stone
Patrick Fussell
Josh Stone
BSides Charleston
· 2016
Technical
Talk
Open →
2016-11
44:11
Training Citizen Cyber Warriors on the Michigan Cyber Range
BSides Detroit
Open →
2013-06
51:17
BSidesSF 2022 - Biohacker: The Invisible Threat (Len Noe)
Len Noe
BSidesSF
· 2022
Talk
Open →
2022-07
53:36
Rolling out the C2: Red Team Infrastructure in 2024
BSides Las Vegas
· 2024
Technical
Cloud IAM
DevSecOps
Red
Demo
Talk
Open →
2024-09
47:47
The Hunt For The Red DA by Neil Lines
BSides Scotland
Open →
2017-04
45:50
Cobalt Strike – A Defender's Perspective
Roshan Maskey
BSides Islamabad
· 2020
Technical
Blue
Talk
Open →
2020-11
43:38
Summoning Angels in the Modern Age: Digitizing the Methods of Steganographia
Connor Gannon
BSides Knoxville
· 2023
Technical
Cryptography
Talk
Open →
2023-05
38:25
Matriux Leandros: An Open Source Penetration Testing and Forensic Distribution
Prajwal Panchmahalkar
BSides Las Vegas
· 2013
Technical
DFIR
Tooling
Talk
Open →
2017-01
33:10
Fuzzing Ruby and C Extensions
Claudio Contin
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
45:12
CG - Pentesting with Docker - Tom Steele
BSides Las Vegas
Open →
2016-12
9:17:44
2016 BSides - Breaking Ground - Day Two
BSides Las Vegas
Technical
Active Directory
Vulnerability Research
Red
Talk
Open →
2025-07
52:07
Purple View
Haydn Johnson
Laura Rafferty
BSides Toronto
· 2015
Technical
Active Directory
Purple
Talk
Open →
2015-11
24:50
The Top 5 Ways I Own Your Internal Network
Heath Adams
BSides RDU
· 2019
Technical
Active Directory
Kerberos
Intermediary
Blue
Red
Demo
Talk
Open →
2019-10
29:50
Large NLP Machine Learning Models and Their Upcoming Impact on Cybersecurity
Geoff McDonald
BSides Vancouver
· 2022
Technical
AI Security
Malware Analysis
Threat Intel
Intro
Talk
Open →
2022-07
53:29
The Pentester Blueprint: A Guide to Becoming a Pentester
Phillip Wylie
BSides SATX
· 2020
Career
Intro
Talk
Open →
2020-08
44:56
FileLess Malware Infections: Malware Tricks for Pentesters
Ramon Pinuaga
BSides Lisbon
· 2017
Technical
Malware Analysis
Reverse Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-11
48:16
Ross Simpson - Docker for Hackers
BSides Cape Town
Open →
2017-12
40:27
A Practical Approach In Exploit Development For Embedded Devices
BSides Munich
Open →
2017-04
44:48
Offensive Azure Security by Sergey Chubarov
Sergey Chubarov
BSides Dublin
· 2021
Technical
Talk
Open →
2021-05
33:51
BYOTB: Bring Your Own Trusted Binary - David Kennedy
David Kennedy
BSides London
· 2025
Technical
Blue
Red
Talk
Open →
2025-02
30:58
There's no place like 169.254.169.254 - (Ab)using cloud metadata URLs
Brennon Thomas
BSides SATX
· 2019
Technical
Cloud IAM
Red
Talk
Open →
2019-09
56:01
21st Century War Stories
Ben Turner
BSides Manchester
· 2016
War Stories
OSINT
Social Engineering
Threat Intel
Red
Case Studies and Incidents Analysis
Talk
Open →
2016-09
53:11
CG - LibreSSL - Moving the Ecosystem Forward - Brent Cook
BSides Las Vegas
Open →
2018-09
44:16
Eric Goldstrom - Interactive Threat Defense: Incident Response, Threat Intel, and Red Team (oh my!)
Eric Goldstrom
BSides PDX
Technical
Talk
Open →
2019-11
25:13
[In]secure Deserialization, and how [not] to do it
Alexei Kojenov
BSides PDX
· 2019
Technical
OWASP
Vulnerability Research
Web AppSec
Intermediary
Demo
Talk
Open →
2019-11
34:32
Introduction To Ethical Hacking
Brandon S. Keath
BSides Delaware
· 2018
Talk
Open →
2018-11
44:18
BG - Introducing the Smartphone Penetration Testing Framework - Georgia Weidman
BSides Las Vegas
Open →
2017-03
16:35
Breaking out of Restricted RDP
Wicked Clown
BSides London
· 2014
Technical
Red
Demo
Open →
2014-07
51:14
Living Off the Land: Windows Post-Exploitation with Built-in Tools
Christopher Campbell
Matthew Graeber
BSides Augusta
· 2013
Technical
Malware Analysis
Post-Exploitation
Red
Talk
Open →
2013-09
56:08
SCADAsploit: a Command & Control for OT. How to break an ICS system
Omar Morando
BSides Sofia
· 2024
Technical
Advanced
Red
Demo
Open →
2024-04
27:01
Pwninstaller 1.0 Will Shroeder Security BSides Boston 2014
BSides Boston
Open →
2014-05
1:00:28
Creating A Resilient Red Team Infrastructure Using Terraform
Andrei Grigoras
BSides Tirana
Technical
Red
Talk
Open →
2023-11
24:42
PG - Bypassing Antivirus Engines using Open Sourced Malleable C2 Software, MSFVenom, Powershell and
BSides Las Vegas
Open →
2018-09
53:19
XXE and the Cloud: the Sky IS Falling
Clint Kehr
Mark Schmidt
BSides NoVa
· 2021
Technical
Cloud IAM
Web AppSec
Red
Demo
Talk
Open →
2021-06
20:17
BSides Toronto 2019 Anton Ovrutsky
BSides Toronto
Open →
2019-10
16:34
BSides Iowa 2018: "Finding & Exploiting Zerodays (Yes, you can do this!)"
BSides Iowa
Open →
2018-04
18:48
Think You're Stealthy? How to Detect Attacks in AD
Rachit Arora
Sai Sathvik Ruppa
Aakash Raman
BSides Charm
· 2025
Technical
Active Directory
DFIR
Detection Engineering
Intermediary
Blue
Talk
Open →
2025-05
21:06
Learning Security by ATT&CK'ing Yourself
Travis Smith
BSides PDX
· 2018
Career
Community
Talk
Open →
2019-02
22:42
Learn To Be a Hacker
Tzouriel Saadoun
BSides Berlin
· 2022
Career
Community
CTF
Career & Soft Skills
Intro
Talk
Open →
2023-02
37:13
Take Down Cyberthreat Dwell Time With Optimum Security
Eric Payne
BSides Vancouver
· 2021
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2021-06
21:17
Recog: Open Source Asset and Service Identification
Greg Wiseman
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
18:38
Pentest Deep Dive: Anatomy Of A Weaponized Remote Code Execution Flaw
Robert Kugler
BSides Lisbon
· 2019
Technical
Red
Talk
Open →
2019-12
47:28
From SEH Overwrite with Egg Hunter to Get a Shell - Rodolpho Concurde
BSides Vancouver
Open →
2022-07
47:19
Bypassing Anti-Virus Using BadUSB by Cristian Cornea
Cristian Cornea
BSides Cheltenham
· 2023
Technical
Talk
Open →
2023-06
47:15
Chris Myers and Barrett Adams Building a Cloud Pentest Lab (and how we blew some up)
Chris Myers
Barrett Adams
BSides Delaware
· 2018
Technical
Talk
Open →
2018-11
52:15
Exercícios de Red Team: Não simule a ameaça, seja a ameaça
Oliveira Lima
BSides São Paulo
· 2025
Technical
Advanced
Red
Talk
Open →
2025-06
34:56
Let's Talk About the AI Apocalypse
Dylan Ayrey
BSidesSF
· 2025
Technical
Talk
Open →
2025-06
43:57
MS SQL Super Quality Logs
Tristan
BSides Perth
· 2023
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Methodology
Technical Deep-dives
Talk
Open →
2023-08
54:40
BSidesCharm - 2017 - Stephen Sims - Microsoft Patch Analysis for Exploitation
BSides Charm
Open →
2021-05
18:50
The Top 5 Ways I Own Your Internal Network
Heath Adams
BSides Charleston
· 2019
Technical
Active Directory
Kerberos
Network Security
Red
Talk
Open →
2019-11
31:36
Darryn Cull and Thomas Underhay - SensePost XRDP Tool
BSides Cape Town
Open →
2016-12
52:58
Dave Kennedy Keynote
Dave Kennedy
BSides Boston
· 2017
Technical
Keynote
Open →
2017-05
16:26
Red Teaming On Critical Infrastructure
Granit Beka
BSides London
· 2025
Technical
Critical Infrastructure
Threat Modeling
Red
Talk
Open →
2024-02
57:51
Will Schroeder & Max Harley - Meet Your Nemesis: Fighting Data With Data
Will Schroeder
Max Harley
BSides Augusta
· 2023
Technical
DFIR
Threat Intel
Advanced
Red
Talk
Open →
2023-10
22:10
Code C.A.I.N – Keeping Your Source Code Under Control
Rotem Reiss
BSides TLV
· 2022
Technical
Detection Engineering
OSINT
Supply Chain Security
Talk
Open →
2022-07
43:45
Attackers Perspective: A Technical Demonstration of an Email Phishing Attack
Zac Davis
BSides Philly
· 2016
Technical
Red
Demo
Open →
2016-12
1:02:12
Pentesting: Tips, Tricks and Stories
Patrick Laverty
Aaron Herndon
Bsides CT
· 2018
Technical
Active Directory
OSINT
Social Engineering
Threat Intel
Red
Talk
Open →
2018-11
55:34
Adding PowerShell to your Arsenal with PSAttack
Jared Haight
BSides Charleston
· 2016
Technical
Talk
Open →
2016-11
42:43
It's not stalking, it's investigating
Robert Bui Moore
BSides Belfast
· 2017
Talk
Open →
2017-10
30:12
Mystical Vulnerabilities: Exploring Oddities in Cybersecurity
Massimo Morello
BSides Munich
· 2025
Research
Threat Intel
Vulnerability Research
Talk
Open →
2024-11
25:59
BSidesSF 2019 - Containers: Your Ally in Improving Security (Connor Gilbert • Connor Gorman)
Connor Gilbert
Connor Gorman
BSidesSF
· 2019
Technical
DevSecOps
Talk
Open →
2019-03
42:25
Boston BSides - Pentesting for Fun and Profit by William Reyor
BSides Boston
Open →
2016-07
54:45
BG - The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirec
BSides Las Vegas
Open →
2017-08
44:04
Pwned Cloud Society
Bryce Kunz
BSides SLC
· 2017
Technical
Cloud IAM
Red
Talk
Open →
2017-06
24:38
A Practical Approach to Hacking an Enterprise with YASUO
BSides Toronto
· 2014
Technical
Active Directory
Red
Talk
Open →
2014-12
30:42
Malware, Cats and Cryptography
Zhassulan Zhussupov
BSides Sofia
· 2024
Research
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Red
Empirical Research
+2
Open →
2024-04
45:09
Reverse-Shell Fallacy: An introduction into defence evasion techniques
Gerhard Botha
BSides Joburg
· 2024
Technical
Red
Talk
Open →
2024-08
44:59
Tony Lambert - Spotting Lateral Movement with Endpoint Data
Tony Lambert
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
24:58
What's Inside The Open Directory From 96 Different Threat Actors?
Alana Witten
BSides London
· 2025
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
24:06
I Love my BFF (Brute Force Framework) - Kirk Hayes
BSides Las Vegas
Open →
2016-09
46:48
InfoSec, Just Doing It
Rob Jorgensen
BSides SLC
· 2015
Career
Career & Soft Skills
Intro
Talk
Open →
2015-04
53:27
Unparalleled Remote Desktop Monitoring: Revealing Attackers' Tradecraft
Olivier Bilodeau
Adrian Beron
BSides Augusta
· 2023
Research
DFIR
Malware Analysis
Network Security
Threat Intel
Blue
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2023-10
31:20
Getting Better with Data - Steph Locke
Steph Locke
BSides London
· 2016
Technical
Talk
Open →
2016-07
20:58
BSidesSLC 2015 - Hey Guys, I'm a Pentester! - Metacortex
BSides SLC
· 2015
Career
Intro
Talk
Open →
2015-04
21:49
Ducky-in-the-Middle: Injecting Keystrokes into Plaintext Protocols
BSidesROC
· 2018
Technical
Network Security
Reverse Engineering
Red
Talk
Open →
2018-04
1:02:51
Secure distroless OCI images via YAML
Victor Bonev
BSides Sofia
· 2023
Technical
Container Security
Vulnerability Research
Talk
Open →
2023-03
36:34
Bypassing Anti-Virus Using BadUSB
Cristian Cornea
BSides Dublin
· 2023
Technical
Hardware Hacking
Malware Analysis
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2023-07
28:37
SMBeagle: SMB Share Hunter
Daniel Oates-Lee
BSides Cheltenham
· 2022
Talk
Open →
2022-07
39:48
Is that a penguin in my Windows? - Spencer McIntyre
BSides Las Vegas
Open →
2016-08
22:44
Egg Hunting… but it's not Easter season!
Mohamed Salah
BSides Bournemouth
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-09
53:09
BG - WhyMI So Sexy? WMI attacks, Realtime Defense & Advanced Forensic Analysis - William Ballenthin,
BSides Las Vegas
Open →
2016-12
43:16
Biohacker: The Invisible Threat
Len Noe
BSides Barcelona
· 2021
Technical
Demo
Talk
Open →
2022-01
27:02
FFM - A Free, Open-Source Hacking Harness
Ivan Kwiatkowski
BSides Belfast
· 2018
Technical
Tooling
Talk
Open →
2018-10
21:23
PG - I’m a hunter! Cyber Intelligence in the New(ish) Frontier - Yasmine Johnston-Ison
BSides Las Vegas
Open →
2019-10
51:52
Exploiting Classic Stack Overflow, By Owais Mehtab
BSides Islamabad
Open →
2020-11
53:14
BSidesSLC 2017 -- Haydn Johnson -- Planning a Purple Team Exercise; The What, Why, and How
BSides SLC
Open →
2017-07
46:03
Why You Need To Be Red Team'ed
Nate McConnell
BSides SLC
· 2015
Technical
Red
Talk
Open →
2015-04
26:31
The hackers guide to environmental catastrophe
Mark Baggett
BSides Augusta
· 2022
Technical
Red
Talk
Open →
2022-10
40:40
FAIL-in-Depth
Marcus J. Carey
BSides Charleston
· 2015
Talk
Open →
2015-12
25:35
Low Hanging Blue Fruit: Defending With Open-Source Tools
Yaron King
BSides TLV
· 2019
Technical
Blue
Talk
Open →
2019-11
19:22
Hacking Your Favorite Kiosk
Aristotelis Koureleas
George Tyritidis
BSides Athens
Technical
Hardware Security
Mobile Security
Physical Security
Red
Talk
Open →
2024-03
51:05
Inside the Mind of a Threat Actor: Beyond Pentesting
Phillip Wylie
BSides Knoxville
· 2021
Technical
Red
Talk
Open →
2021-05
30:58
Introduction to CTF - For All!
Matthew Haynes
Daniel Card
BSides Leeds
· 2020
Technical
CTF
Intro
Blue
Red
Demo
Talk
Open →
2020-07
41:35
Why It's All Snake Oil - And That May Be Ok - Pablo Breuer
BSides Las Vegas
Open →
2020-12
53:49
Using JA3. Asking for a friend?
Justin Warner
BSides DC
· 2019
Technical
Cryptography
Blue
Talk
Open →
2019-10
31:08
Charting the SSH Multiverse
HD Moore
BSidesSF
· 2025
Technical
Network Security
Vulnerability Research
Talk
Open →
2025-10
22:47
Cameras, CACs & Clocks: A Story of Millions of Interrogated and Hacked xIoT Devices
John Vecchi
BSidesSF
· 2023
Technical
Red
Demo
Talk
Open →
2023-05
44:57
Your Friendly Penguin: Using Linux And WSL To Stay Under The Radar
Idan Ron
Max De Lacey
BSides London
Technical
Purple
Red
Talk
Open →
2024-02
49:33
Building Penetration Testing Dropboxes
Chris Carlis
BSides Prishtina
· 2026
Technical
Hardware Hacking
Intermediary
Red
Technical Deep-dives
Talk
Open →
2026-02
56:51
Hacking the OWASP Top 10: An Intro to Web Application Security
Greg Sternberg
BSides Denver
· 2020
Technical
OWASP
Web AppSec
Intro
Talk
Open →
2020-10
39:01
Atomic Honeypot – A MySQL Honeypot That Fights Back
Alexander Rubin
BSides SLC
· 2025
Technical
Vulnerability Research
Web AppSec
Advanced
Red
Talk
Open →
2025-06
54:58
From SEH Overwrite with Egg Hunter to Get a Shell!
Rodolpho Concurde
BSides Athens
· 2022
Technical
Advanced
Red
Workshop
Open →
2022-06
30:03
Scott Taylor: Exploring Common Hacking Techniques
Scott Taylor
BSides Calgary
Open →
2020-12
13:45
Invoke-NoShell - Gal Bitensky
Gal Bitensky
BSides TLV
· 2018
Talk
Open →
2018-07
10:09
Threat Analysis In Minutes And Other AI Super Powers
Bailey Williams
BSides London
· 2025
Technical
DevSecOps
Talk
Open →
2025-02
36:38
In Your Mems — Windows AV Evasion Using in Memory Techniques
iDigitalFlame
BSides Delaware
· 2016
Technical
Talk
Open →
2016-11
22:11
Keynote
Holly Grace Williams
BSides Lancashire
· 2023
Keynote
Open →
2023-04
40:47
Cloaked in Pixels: Concealing Payloads with Steganography
Ben Folland
BSides Exeter
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2024-09
24:28
Buffer Overflows Demystified – Exploits & Patching
Chaitanya Rahalkar
BSides SLC
· 2025
Technical
Blue
Red
Demo
Talk
Open →
2025-06
54:29
Car Hacking
BSides Colombia
· 2024
Technical
Talk
Open →
2025-03
26:47
Bypassing Antivirus with badUSB: Evading Windows Defender via Keyboard Emulation
Cristian Cornea
BSides Sofia
· 2023
Technical
Hardware Hacking
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2023-03
49:02
Printers: The Neglected High Value Asset in ICS and OT Pentests
Gabriel Agboruche
BSides Vancouver
· 2022
Technical
Network Security
Vulnerability Research
Red
Talk
Open →
2022-07
52:42
Biohacking: The Invisible Threat
Len Noe
BSides Calgary
Talk
Open →
2021-12
52:05
Ransomware: The Real Pandemic
Jeremy Rasmussen
BSides Tampa
· 2021
Technical
Case Studies and Incidents Analysis
Talk
Open →
2021-04
30:25
Your security black hole
Huxley Barbee
BSides SLC
· 2023
Talk
Open →
2023-06
37:13
Wild Wild Web App to Domain Admin: A Case Study
Nacho Sorribas
BSides Lisbon
· 2017
Technical
Active Directory
Web AppSec
Case Studies and Incidents Analysis
Talk
Open →
2017-11
39:58
A Hillbilly's First C2
Adam Compton
BSides Knoxville
· 2024
Technical
Tooling
Red
Talk
Open →
2024-11
14:50
TryHackingMy Way From Cyber Sales to Cyber SOC
R4ck4tt4ck
Michael Rack
BSides London 2025
Career
Career & Soft Skills
Detection Engineering
Intro
Blue
Talk
Open →
2026-03
49:51
Movement After Initial Compromise
Matthew Batten
Collyn Hartley
BSides Augusta
· 2018
Technical
Active Directory
Threat Intel
Red
Talk
Open →
2018-11
31:46
Beyond Base-64: When Your Data Gets Emojional
Errant Packet
Bsides CT
· 2025
Technical
Talk
Open →
2025-12
49:23
Not my server C2: Using trusted sources for C2
Brandon Helms
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
30:12
How to pen-test off the grid…and in the middle of the Pacific
Dave Keene
BSides Charleston
· 2015
Technical
Talk
Open →
2015-12
29:21
Bypassing Anti-Virus Using BadUSB
Cristian Cornea
BSides Cymru Wales
· 2023
Technical
Talk
Open →
2023-04
29:14
BumpKey: A Hardware Swiss Knife for Red Teamers
Mauro Eldritch
Luis Angel Ramírez Mendoza
BSides Islamabad
· 2020
Technical
Red
Demo
Talk
Open →
2020-12
31:56
Patching Monthly IMPOSSIBLE, Maintaining Compliance Is Possible
Adam Steed
BSides SLC
· 2016
Policy
Talk
Open →
2016-05
27:26
Don't Turn Your Back on Ransomware
BSides Newcastle
· 2022
Technical
Active Directory
DFIR
Malware Analysis
Demo
Talk
Open →
2022-09
47:19
Emulating the Adversary While Training the Defenders: Purple Teaming with MITRE ATT&CK
David Evenden
BSides KC
· 2021
Technical
Purple
Talk
Open →
2021-11
24:10
So You Wanna Be a Red Teamer
Shelby Spencer
BSides Boise
· 2020
Career
Career & Soft Skills
Intro
Red
Talk
Open →
2020-10
31:44
2019 - Hidden Agenda The darker side of cryptocurrency botnet mining - Greg Foss
BSides Denver
Open →
2019-09
30:14
BSidesWLG 2017 - Josh Brodie - Ethics in penetration testing
BSides Wellington
Open →
2018-02
22:44
Fuzzing for Security Vulnerabilities
Andy Nelson
BSides KC
· 2019
Technical
Vulnerability Research
Talk
Open →
2019-06
51:13
From Patch to Shell: Exploiting a Hardened SonicWall GMS Platform
Ron Bowes
BSides PDX
· 2023
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2023-11
39:10
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides Dallas/Fort Worth
· 2024
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
27:25
GF - Invoke-NoShell - Gal Bitensky
BSides Las Vegas
Open →
2018-09
47:38
BG - Force Multipliers for Red Team Operations - Raphael Mudge
BSides Las Vegas
Open →
2017-03
39:44
The Pentester Blueprint: A Guide to Becoming a Pentester
Phillip Wylie
BSides Delhi
· 2020
Career
Career & Soft Skills
Intro
Talk
Open →
2020-11
37:31
PG - Lotus Notes Password Hash Redux - Willaim Ghote
BSides Las Vegas
Open →
2017-03
54:02
Using Microsoft's Incident Response Language
Chris Campbell
BSides Augusta
· 2014
Technical
Talk
Open →
2014-09
51:07
BSides Iowa 2018: "Threat Modeling in practice"
BSides Iowa
Open →
2018-04
48:27
A Novel Runtime Technique For Identifying Malicious Applications
Chris Le Roy
BSides Lisbon
· 2018
Research
Malware Analysis
Mobile Security
Reverse Engineering
Advanced
Technical Deep-dives
Talk
Open →
2018-12
47:22
How can bad boys or even u rule the world BSidesCO + Eleven Paths Webinar
BSides Colombia
· 2016
Open →
2016-09
34:50
AMSI: O cão de guarda que late mas não morde?
Mario Lobo Romero
BSides São Paulo
· 2025
Technical
Detection Engineering
Malware Analysis
Technical Deep-dives
Talk
Open →
2025-06
37:55
BSidesROC 2024 - Exploit and Malicious - Olivia Gallucci
BSidesROC
Open →
2025-03
31:37
Windows EventLog Persistence: Abusing Event Logs for Undetectable Red Team Access
Fabricio Gimenes
BSides Las Vegas
· 2024
Technical
Malware Analysis
Advanced
Red
Talk
Open →
2024-09
30:13
Dissecting Carbanak
Hristo Asenov
BSides Delaware
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2019-11
32:23
The Emotional Rollercoaster That Is Penetration Testing
Kurt Pomeroy
BSides Vancouver
· 2022
Career
War Stories
Active Directory
Malware Analysis
Red
Talk
Open →
2022-07
56:40
BG - Defense Evasion Modeling - Frank Artes
BSides Las Vegas
Open →
2017-01
52:25
Mapping the Penetration Tester's Mind: 0 to Root in 60 min
Kizz MyAnthia
BSidesSF
· 2012
Career
Talk
Open →
2017-11
35:38
I Know What You Did Last Summer… I'm Still Hacking Your Small Business
Vincent Matteo
BSides SATX
· 2022
Technical
War Stories
Red
Talk
Open →
2023-03
29:10
The Way From App To Brain: Attack Surfaces Of Smart Medical Infrastructure - Denis Makrushin
Denis Makrushin
BSides Munich
· 2019
Technical
Talk
Open →
2019-03
21:52
BSidesCLT 2021: PowerShell’s Return to Power - Dahvid Schloss
Dahvid Schloss
BSides Charlotte
· 2021
Technical
Red
Talk
Open →
2021-09
49:12
Offensive Rust Tales
András Tevesz
BSides Budabest
· 2022
Technical
Advanced
Red
Talk
Open →
2023-06
36:57
How I Managed to Break Into the InfoSec World With Only a Tweet and an Email
Michael Fornal
BSides Las Vegas
· 2012
Career
Career & Soft Skills
Intro
Talk
Open →
2017-03
35:21
Container Crisis 3: More Containers More Problems
Caprico
BSides Dallas/Fort Worth
· 2022
Technical
War Stories
Container Security
Malware Analysis
OSINT
Threat Intel
Blue
Red
+3
Open →
2022-11
49:20
Finding Your Own Vulnerabilities (Before Attackers & Auditors Do)
Michael Holcomb
BSides Charleston
· 2018
Technical
Talk
Open →
2018-11
13:59
Fun things to do with CTFR
Edward Sabijon
BSides Charleston
· 2018
Technical
Talk
Open →
2018-11
33:54
EDR Evasion 101 in a Professional Hacker Red Team
André Lima
BSides Kristiansand 2026
Technical
Detection Engineering
Reverse Engineering
Advanced
Red
Talk
Open →
2026-02
57:06
Overt Operations: When the Red Team Gets in Your Face
Matthew Toussain
BSides SATX
· 2020
Technical
Advanced
Red
Talk
Open →
2020-08
23:29
Windows Defender Exploit Guard vs. Unpatched Software and Zero-Day Exploits
Chad Duffey
BSides Toronto
· 2020
Technical
Reverse Engineering
Vulnerability Research
Blue
Talk
Open →
2021-11
29:55
Cloaked in Pixels: Concealing Payloads with Steganography
Ben Folland
BSides Newcastle
· 2025
Technical
Malware Analysis
Reverse Engineering
Blue
Red
Demo
Talk
Open →
2025-01
43:05
2024 Security BSides // Scott Thomas
Scott Thomas
BSides Cayman Islands
· 2024
Open →
2025-01
41:32
Dispelling the Myth of "Maturity" in Threat Hunting
Kelsey Seymour
BSides Buffalo
· 2023
Technical
Blue
Talk
Open →
2023-06
58:02
Andrew Kozma - Building Offensive Security Skills
Andrew Kozma
BSides Fredericton
Technical
Demo
Talk
Open →
2018-12
45:45
Pen Testing Your Incident Response - Ryan Linn
BSides Asheville
Open →
2018-06
58:03
Biohacker: The Invisible Threat
Len Noe
BSides Cayman Islands
· 2022
Talk
Open →
2022-07
55:43
Creating an Effective Security Posture
Dominique Pizzie
BSides SATX
· 2019
Career
Talk
Open →
2019-09
39:51
Morning Keynote
Craig Smith
Fred Wilmot
BSides KC
· 2018
Keynote
Open →
2018-06
35:45
2024: A Cyborg Odyssey - Len Noe
BSides Philly
Open →
2025-02
34:24
PowerShell's Return to Power
Dahvid Schloss
BSides Greenville
· 2021
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2021-10
23:16
Inside Ransomware - Martin Lutz
Martin Lutz
BSides Tirana
· 2025
Technical
Talk
Open →
2024-10
27:50
Cats, Cats & Moar Katz: Windows Post Exploitation
Alex Reuben
BSides Delaware
· 2017
Technical
Talk
Open →
2017-11
10:39
LT - Cross Platform Metasploit Payloads - B Perry
BSides Las Vegas
Open →
2017-03
23:26
Vulnerability Intelligence for All: Say Goodbye to Data Gatekeeping
Jerry Gamblin
BSides Las Vegas
· 2023
Technical
Threat Intel
Vulnerability Research
Talk
Open →
2023-10
52:03
I Broke In, Now What? Linux Manual Privilege Escalation 101
Melina
BSides Dallas/Fort Worth
· 2020
Technical
Reverse Engineering
Blue
Talk
Open →
2020-11
19:18
Don't be a Hammer. Learning more tools with VMs and Vulnhub
Weston George
BSides Springfield
· 2017
Technical
Demo
Open →
2018-02
51:44
BSidesIA 2017 Track1: Defense Wins Championships – Ben Schmitt
BSides Iowa
Open →
2017-04
41:54
Weaponizing Systems Administration: Leveraging IT Skills In Penetration Testing by Jayme Hancock
Jayme Hancock
BSides Dublin
· 2021
Technical
Talk
Open →
2021-05
46:20
How Zero Trusty is Your Network Access?
Derron Carstensen
BSides PDX 2025
Technical
Network Security
Threat Modeling
Intermediary
Empirical Research
Methodology
Talk
Open →
2025-12
21:54
Breaking Down Walls With Windows
Alexander Klepal
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
33:25
Chris Dorman - Open Source and Leaked Malware
Chris Dorman
BSides Belfast
· 2017
Talk
Open →
2017-10
30:58
Setting up a lab
William Price
Bill Price
BSides Charlotte
· 2019
Open →
2019-11
35:15
PowerShell's Return to Power
Dahvid Schloss
BSides Dallas/Fort Worth
· 2021
Technical
Red
Talk
Open →
2021-11
36:24
BSidesAugusta 2014 Will Schroeder - Adventures in Asymmetric Warfare
BSides Augusta
Open →
2014-09
38:24
Penetration Testing Experience and How to Get It
Phillip Wylie
BSides Las Vegas
Career
Career & Soft Skills
Intro
Talk
Open →
2024-09
49:50
Phillip Wylie - The Pentester Blueprint: A Guide to Becoming a Pentester
Phillip Wylie
BSides Boston
Career
Career & Soft Skills
Intro
Talk
Open →
2020-11
27:00
Open Source Vulnerability Intelligence: A Key To Proactive Defense - Jerry Gamblin
BSides Newcastle
Open →
2024-01
1:07:44
Hacking 101: An introductory course in hacking!
BSides Calgary
· 2021
Technical
Active Directory
Network Security
OSINT
Intro
Red
Workshop
Open →
2021-12
26:16
Breaking Free From Remote Browsers
Nishaanth Guna
BSides Tirana
Research
Technical
Vulnerability Research
Web AppSec
Talk
Open →
2024-10
56:23
Blue teaming Incident Response for the Win
Roy Wattanasin
Bsides CT
· 2019
Technical
Blue
Talk
Open →
2019-11
25:21
When SSL Fails: Tracing the SSL Vulnerability to the Most Shocking Real World Impacts
Michelle Simpson
BSides Dublin
Technical
Cryptography
Talk
Open →
2025-10
50:39
ATGP - Wi-Door - Blind/Reverse Shells for Your Wi-Fi - Vivek Ramachandran
BSides Las Vegas
Open →
2016-12
28:57
Framework for Embedded Device Analysis
Madison Oliver
Kyle O'Meara
BSides Peru
· 2017
Research
Technical
Methodology
Technical Deep-dives
Talk
Open →
2017-10
31:11
PG - Attacking Drupal - Greg Foss
BSides Las Vegas
Open →
2016-12
49:51
Movement After Initial Compromise
Matt Batten
Collyn Hartley
BSides RDU
· 2018
Technical
Active Directory
Intermediary
Red
Demo
Talk
Open →
2018-10
24:41
How To Pentest Industrial Systems (OT/ICS) And Still Live To Tell The Tale!
Mikael Vingaard
BSides Tirana
· 2023
Technical
Talk
Open →
2023-11
54:16
PurpleTeam 101 by Chris Peacock
Chris Peacock
BSides Tampa
· 2023
Purple
Talk
Open →
2023-09
22:22
PG - Catching Linux Post-Exploitation with Auditd - Eric Gershman
BSides Las Vegas
Open →
2016-12
33:24
Malware: Then, Now and How
Cody J. Winkler
BSides Springfield
· 2017
Technical
IoT
Malware Analysis
Reverse Engineering
Talk
Open →
2018-02
33:43
From Hardware to Zero-Day by Pietro Oliva at BSides Toronto 2020
BSides Toronto
Open →
2021-11
28:09
Injection Attacks: Defending an Application Takedown
Andy Nelson
BSides KC
· 2018
Technical
OWASP
Web AppSec
Intro
Talk
Open →
2018-06
22:15
Gateway To IoT - Rob McLellan
Rob McLellan
BSides Lancashire
· 2026
Talk
Open →
2025-07
56:35
5 Things that Matter
Dave Kennedy
BSides Charlotte
· 2019
Keynote
Open →
2019-11
38:29
Using SIP Traffic to Influence the Communications and Geopolitical Landscape of Germany
Luke Gleba
BSides Huntsville
· 2021
Technical
Talk
Open →
2021-02
54:06
BG - How I Learned to Stop Worrying and Love the Smart Meter - Spencer McIntyre
BSides Las Vegas
Open →
2017-03
41:58
Fuzzing: Finding Your Own Bugs and 0days
Rodolpho Concorde
BSides Calgary
Technical
Reverse Engineering
Vulnerability Research
Red
Talk
Open →
2021-12
22:22
Weaponizing Splunk: Using Blue Teams for Evil
Ryan Hays
BSides Charm
· 2017
Technical
Red
Talk
Open →
2021-05
50:26
Alexander Rymdeko-Harvey - RAT Reusing Adversary Tradecraft
Alexander Rymdeko-Harvey
BSides Augusta
· 2016
Technical
Talk
Open →
2016-09
26:26
Using Bashfuscator to Generate Complex Layered Bash Obfuscation
Andrew LeFevre
BSides Charm
· 2019
Technical
Red
Demo
Talk
Open →
2021-05
48:12
Jonathan Creekmore and Michael Edie - Hide and Seek with EMET
Jonathan Creekmore
Michael Edie
BSides Augusta
· 2016
Talk
Open →
2016-09
39:26
Biohacker: The Invisible Threat
Len Noe
BSides Newcastle
· 2021
Technical
Hardware Hacking
Physical Security
Social Engineering
Red
Demo
Talk
Open →
2021-10
25:52
Navigating The Volatile Vulnerability Landscape: Strategies For Resilience
Jerry Gamblin
BSides Munich 2025
Technical
Threat Intel
Vulnerability Research
Blue
Talk
Open →
2026-02
30:08
Charge!: Why you shouldn't trust that power bank
Mauro Castles
Luis Angel Mendoza
BSides Newcastle
· 2020
Technical
Hardware Hacking
Hardware Security
Social Engineering
Red
Demo
Talk
Open →
2020-12
54:34
Introducing DropEngine: A Malleable Payload Creation Framework
Gabriel Ryan
BSides Newcastle
· 2020
Tooling
Advanced
Red
Demo
Talk
Open →
2020-11
44:09
Vulnerability & Exploit Trends: A Deep Look Inside The Data
Ed Bellis
Michael Roytman
BSides Las Vegas
· 2013
Threat Intel
Vulnerability Research
Talk
Open →
2017-01
44:06
Taste the Rainbow
BSides NYC
· 2018
Open →
2023-04
20:17
Turbo Tactical Exploitation: 22 Tips for Tricky Targets
HD Moore
BSides Las Vegas 2025
Technical
Network Security
OSINT
Vulnerability Research
Red
Talk
Open →
2025-12
55:30
2020 - Red Teaming is Fun! - Donovan Farrow
BSides Denver
Open →
2020-10
28:52
Cyber Zoology: Protecting Your Network from New Breeds of Attacks with a Raspberry Pi
Patrick Kelly
BSides Toronto
· 2018
Technical
Talk
Open →
2018-11
25:04
Using Ravello to Create a Security Lab in the Cloud
Anthony Maughan
BSides Springfield
· 2017
Technical
Talk
Open →
2018-02
36:46
Cleveland bSides 2012 - Dave Kennedy - Keynote
BSides Cleveland
Open →
2016-10
21:47
Hunter Hardman - Adventures in RAT dev
Hunter Hardman
BSides Augusta
· 2016
Technical
Talk
Open →
2016-09
55:47
Using policy delay to gain RCE and to execute Ransomware
Filipi Pires
BSides Barcelona
· 2021
Technical
Advanced
Red
Talk
Open →
2022-01
25:01
Wrangle Your Defense Using Offensive Tactics
Matt Dunn
Bsides CT
· 2019
Technical
Blue
Talk
Open →
2019-11
28:46
PG - Maximizing Bro Detection - John B. Althouse
BSides Las Vegas
Open →
2016-12
41:35
How to Find a Companys BreakPoint
BSides Philly
Open →
2017-08
55:58
Hacking Into A Hospital During A Pandemic
Matt Miller
BSides Charlotte
· 2020
Technical
Active Directory
Red
Talk
Open →
2020-10
26:46
Shellcode: What It Is and Why It's Loved by Cybercriminals
Trym Skilleås
BSides Kristiansand
· 2026
Technical
Malware Analysis
Reverse Engineering
Red
Talk
Open →
2026-02
41:43
Red and Blue Teaming and the Powers Gained! Adversarial Emulation: Jason Maynard
Jason Maynard
BSides Edmonton 2023
Technical
Blue
Red
Demo
Talk
Open →
2023-10
31:20
Evading C2 Detection with Asymmetry
Andrew Johnston
Anthony Morrow
BSides Philly
· 2018
Technical
Detection Engineering
Threat Intel
Advanced
Red
Talk
Open →
2018-11
10:02
Exploit Prediction Scoring System (EPSS)
Jerry Gamblin
BSides Newcastle
Technical
Threat Intel
Vulnerability Research
Intro
Talk
Open →
2023-12
38:33
From the Eyes of Overwatch: Intrusion Threat Landscape
Jason Rivera
BSides Greenville
· 2020
Technical
Talk
Open →
2020-06
33:58
Industrial Scale Hardware Hacking - Anthony Clark
Anthony Clark
BSides Albuquerque
· 2024
Technical
Hardware Hacking
IoT
Reverse Engineering
Red
Methodology
Talk
Open →
2024-08
53:10
BSidesYXE 2024 - Jason Maynard - Red and Blue Teaming and the Powers Gained! Adversarial Emulation.
BSides Saskatoon
Open →
2024-09
15:36
Log4Shell Unleashed - Vulnerability, attacks, and mitigations
BSides Boulder
· 2022
Technical
Talk
Open →
2022-12
44:47
Tomb Raiders pilfering of critical data from the graves of our decommissioned IoT tech - Deral H.
BSides Peru
Open →
2022-09
48:06
Shot With Your Own Gun: How Appliances Are Used Against You
Christopher Campbell
Skip Duckwides
BSides Las Vegas
· 2012
Technical
Network Security
Vulnerability Research
Red
Talk
Open →
2017-03
26:01
PG - How I Learnt Hacking in High School - Lokesh Pidawekar
BSides Las Vegas
Open →
2016-12
53:01
BG - Amubush - Catching Intruders At Any Point - Matt Weeks
BSides Las Vegas
Open →
2017-03
24:37
Hackinabox: Building a Portable Penetration Testing Lab with Raspberry Pi
Marv White
BSides Boise
Technical
Tooling
Talk
Open →
2020-02
35:31
BSidesCharm -2017 -Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy
BSides Charm
Open →
2021-05
1:12:21
A Wolf In Sheep's Clothing - Bsides Vancouver 2017
BSides Vancouver
Open →
2018-01
40:05
Shedding Light on Web Isolation Technologies and Their Bypass Techniques: C2 Communication via Outlook Using SMTP and IMAP
Terada Yu
BSides Las Vegas
· 2025
Technical
Malware Analysis
Web AppSec
Talk
Open →
2025-12
31:26
There's No Place Like (Dual)Homed
David E. Young Jr.
BSides Columbus
· 2020
Technical
Active Directory
Network Security
Intermediary
Red
Talk
Open →
2020-08
21:10
The Art of Concealment: CVE's Challenge with Transparency
Jerry Gamblin
BSides Las Vegas
· 2025
Research
Technical
Threat Intel
Vulnerability Research
Talk
Open →
2025-12
50:53
BSidesROC 2024 - Styrofoam in a Landfill - Jack Hatwick
Jack Hatwick
BSidesROC
· 2024
Technical
Talk
Open →
2025-03
29:52
Out With the Old, In With the GNU: Command-Line Habits and Tool Discovery
Lesley Adams
BSides Philly
· 2018
Tooling
Red
Talk
Open →
2018-11
41:57
Cascading Failure, Unified Defense: Defending Water, Power, Healthcare, & EMS
Alexander Vanino
Ruslan Karimov
BSides Las Vegas 2025
Technical
Critical Infrastructure
DFIR
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-12
17:59
PG - Out of Denial: A 12-Step Program for Recovering Admins - Paul Lee
BSides Las Vegas
Open →
2016-12
41:40
Ivan Marchany: How to Build a Cyber Home Lab
Ivan Marchany
BSides St. Pete
· 2025
Career
Detection Engineering
Threat Intel
Vulnerability Research
Intro
Talk
Open →
2026-03
50:25
Cleveland BSides 2011 Talk 5 Steve O
BSides Cleveland
Open →
2016-10