Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring nc
60
talks mention this tool across
31
BSides chapters.
Talks featuring nc
19:32
Blackhat Python
Dan Frisch
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
51:26
BG - Pacu: Attack and Post-Exploitation in AWS - Spencer Gietzen
BSides Las Vegas
Open →
2018-09
43:24
2016 - Ken Munro & Dave Lodge - Hacking the Mitsubishi Outlander & IOT
BSides Manchester
Open →
2016-09
59:07
Malware Analysis 101: N00b to Ninja in 60 Minutes
BSides Las Vegas
· 2014
Technical
Malware Analysis
Intro
Talk
Open →
2016-12
37:02
Holy smokes, how to vape yourself to root
Ross Bevington
BSides London
· 2017
Technical
Talk
Open →
2017-06
48:34
A Poor Man's Pentest: Automating the Manual
John Hammond
BSides Delaware
· 2019
Technical
Red
Demo
Talk
Open →
2019-11
37:43
Finding Obvious Automotive Security Bugs Using Common Tools & Attacks
Jay Turla
BSides Ahmedabad
· 2025
Technical
Automotive Security
Hardware Hacking
Reverse Engineering
Wireless Security
Intermediary
Red
Technical Deep-dives
+1
Open →
2025-04
33:14
Deconstruction Of A Linux Adversarial Toolkit
Christian Giuffre
BSides Canberra
· 2019
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2019-05
43:11
Offensive Pcap - Stuart McMurray
Stuart McMurray
BSides London
· 2019
Technical
Red
Talk
Open →
2019-06
21:19
10 Steps to Build & Lead a Competitive Cybersecurity/CTF Team
John Hammond
Bsides CT
· 2018
Career
Community
CTF
Career & Soft Skills
Intro
Talk
Open →
2018-11
4:42:27
Charlas dìa 2 Bsides Colombia 2025. Mañana
BSides Colombia
· 2025
Open →
2025-06
21:44
Joseph Cohen Security BSides Boston 2013 - Bluecat Netcat For Bluetooth
BSides Boston
Open →
2013-06
40:27
A Practical Approach In Exploit Development For Embedded Devices
BSides Munich
Open →
2017-04
44:48
Offensive Azure Security by Sergey Chubarov
Sergey Chubarov
BSides Dublin
· 2021
Technical
Talk
Open →
2021-05
33:51
BYOTB: Bring Your Own Trusted Binary - David Kennedy
David Kennedy
BSides London
· 2025
Technical
Blue
Red
Talk
Open →
2025-02
25:11
CTF Writeup: Log 'em All
Ron Bowes
BSidesSF
· 2021
Technical
CTF
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
Open →
2021-03
42:06
Mark Baggett - Free tools for your threat hunting toolbox
Mark Baggett
BSides Augusta
· 2021
Tooling
Talk
Open →
2021-10
42:56
PG - Mainframed - The Forgotten Fortress - Phil Young
BSides Las Vegas
Open →
2017-03
45:19
Plunder, Pillage and Print
Deral Heiland
BSides Boston
· 2013
Technical
Hardware Hacking
Network Security
OSINT
Intermediary
Red
Case Studies and Incidents Analysis
Methodology
+1
Open →
2013-06
34:31
What You Can't See CAN Hurt You: SonarQube Privilege Escalation via Hidden API Calls
Jon Williams
Bsides CT
· 2020
Technical
Talk
Open →
2020-11
35:21
Stack Smashing Protection Bypass via Pthreads - Aleksandar Nikolic
BSides Knoxville
Open →
2019-02
23:23
WHOIS Calling the 80s to Get Their Finger Back
Joakim Kennedy
BSidesSF
· 2019
Technical
Talk
Open →
2019-03
38:33
BSidesBUD2022: Github Actions Security Landscape
Alex Ilgayev
Ilia Shkolyar
BSides Budabest
· 2022
Technical
DevSecOps
Supply Chain Security
Empirical Research
Technical Deep-dives
Talk
Open →
2023-06
21:49
Ducky-in-the-Middle: Injecting Keystrokes into Plaintext Protocols
BSidesROC
· 2018
Technical
Network Security
Reverse Engineering
Red
Talk
Open →
2018-04
29:21
Leaking Kakao: How I Found A 1-Click Exploit In Korea's Biggest Chat App
Dawin Schmidt
BSides Munich
· 2025
Technical
Mobile Security
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-11
30:57
Network Attached Shell: N.A.S.ty systems that store network accessible shells
Jacob Holcomb
BSides DC
· 2014
Technical
Red
Demo
Open →
2014-10
27:02
FFM - A Free, Open-Source Hacking Harness
Ivan Kwiatkowski
BSides Belfast
· 2018
Technical
Tooling
Talk
Open →
2018-10
20:02
LOLS: Low-Level Shells — Weaponizing Ethernet for Command Control
Elysee Franchuk
Mohnish Dhage
BSides Las Vegas
Technical
Network Security
Reverse Engineering
Advanced
Red
Talk
Open →
2024-09
58:04
Continuous Security: Monitoring & Active Defense in the Cloud
Eric Johnson
BSides Iowa
· 2018
Technical
Cloud IAM
Detection Engineering
Threat Intel
Blue
Purple
Case Studies and Incidents Analysis
Talk
Open →
2018-04
5:04
CTF Introduction
Ron Bowes
BSidesSF
· 2021
Community
Talk
Open →
2021-03
31:59
Privilege Escalation in Azure Machine Learning
Christian Bortone
BSides Zagreb
Technical
Cloud IAM
Vulnerability Research
Red
Technical Deep-dives
Talk
Open →
2025-03
30:03
Scott Taylor: Exploring Common Hacking Techniques
Scott Taylor
BSides Calgary
Open →
2020-12
49:50
Intro to HTTP and De-Sync Attacks
Cary Hooper
BSides SATX
· 2021
Technical
Web AppSec
Intro
Talk
Open →
2021-06
42:13
GF - Who Watches the Watchers?: Understanding the Internet's Background Noise - Curt Barnard
BSides Las Vegas
Open →
2018-09
42:37
Feeding the Shark
Jeremy Pierson
BSides SLC
· 2015
Technical
Talk
Open →
2015-04
48:23
Hacking $100K Gas Chromatograph Without Hardware Vera Mens (Vulnerability Researcher@Claroty/Team82)
BSides São Paulo
Open →
2025-06
37:41
Overlooked Artifacts: Enhancing Windows Forensics Analysis
Fernando Tomlinson
BSides Charlotte
· 2021
Technical
DFIR
Blue
Talk
Open →
2021-09
23:29
Windows Defender Exploit Guard vs. Unpatched Software and Zero-Day Exploits
Chad Duffey
BSides Toronto
· 2020
Technical
Reverse Engineering
Vulnerability Research
Blue
Talk
Open →
2021-11
27:50
Cats, Cats & Moar Katz: Windows Post Exploitation
Alex Reuben
BSides Delaware
· 2017
Technical
Talk
Open →
2017-11
25:53
PowerShell's Return to Power
Dahvid Schloss
BSides RDU
· 2021
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2021-10
24:23
A Quick Story of Security Pitfalls with Exec Commands in Software Integrations
Lenin Alevski
BSides Las Vegas
· 2024
Technical
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-09
40:17
Cryptojacking Servers: The Intersection of poor patch management and ICO's - Chuck McAuley
Chuck McAuley
BSides SATX
· 2018
Technical
Talk
Open →
2018-07
3:22:04
Rooting out security risks lurking in your kubernetes ecosystem
Vasant Chinnipilli
BSides Barcelona
· 2021
Technical
DevSecOps
Workshop
Open →
2022-01
36:51
I Find Your Lack of Serverless Disturbing! Leveraging the Cloud to Automate the Mun
Michael Butler
Bryce Kunz
BSides SLC
· 2019
Talk
Open →
2019-02
31:11
PG - Attacking Drupal - Greg Foss
BSides Las Vegas
Open →
2016-12
24:11
A New Host Touches the Beacon
Devon Clary
Marlo W Clary
BSides Las Vegas
· 2024
Technical
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2024-09
23:29
For Everything Else, There's WireGuard!
Kevin Lustic
BSides SLC
· 2021
Technical
Talk
Open →
2021-12
41:30
DoH Deception: Evading ML-Based Tunnel Detection with Black-Box Attack Techniques
Emanuel Valente
BSides Las Vegas
· 2024
Research
Technical
Adversarial Machine Learning
Network Security
Vulnerability Research
Advanced
Red
Technical Deep-dives
+1
Open →
2024-09
54:27
A Tale of Two Powershells
Fernando Tomlinson
BSides Greenville
· 2020
Technical
Active Directory
Detection Engineering
Malware Analysis
Purple
Talk
Open →
2020-06
41:58
Fuzzing: Finding Your Own Bugs and 0days
Rodolpho Concorde
BSides Calgary
Technical
Reverse Engineering
Vulnerability Research
Red
Talk
Open →
2021-12
38:40
Remote Access, the APT
Ian Latter
BSides Las Vegas
· 2015
Technical
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2016-12
47:34
I came in like a wrecking ball
Vincent
BSides SLC
· 2023
Technical
Intermediary
Red
Talk
Open →
2023-06
45:40
Offensive Azure Security
Sergey Chubarov
BSides Barcelona
· 2021
Technical
Active Directory
Cloud IAM
Red
Demo
Open →
2022-01
48:30
Breaking NBAD and UEBA Detection
Charles Herring
BSides NoVa
· 2021
Technical
Detection Engineering
Threat Intel
Advanced
Red
Technical Deep-dives
Talk
Open →
2021-07
20:00
Hell-0_World: Making Weather Cry
Amelia Weeding
Dave Bailey
BSides Las Vegas
· 2024
Technical
Hardware Hacking
IoT
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2024-09
38:21
Popping the Penguin: An Introduction to the Principles of Linux Persistence
Mark Kita
BSides Las Vegas
· 2013
Technical
Red
Demo
Talk
Open →
2017-01
55:47
Using policy delay to gain RCE and to execute Ransomware
Filipi Pires
BSides Barcelona
· 2021
Technical
Advanced
Red
Talk
Open →
2022-01
52:11
BG - Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT) - Paul Asadoorian & Nick Cu
BSides Las Vegas
Open →
2016-12
46:37
Malware Persistence in Windows
Peter Morin
BSides Calgary
· 2022
Technical
Malware Analysis
Talk
Open →
2022-12
35:48
Vulnerability Detected: Busted! Analyzing the Impact of a Screw-Up
Alexandre Argeris
BSides St. John's
· 2025
War Stories
Vulnerability Research
Web AppSec
Case Studies and Incidents Analysis
Talk
Open →
2025-05