Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Nmap
249
talks mention this tool across
74
BSides chapters.
Talks featuring Nmap
45:24
It's the Little Things
Ben Sadeghipour
BSides PDX
· 2018
Technical
Web AppSec
Intermediary
Red
Technical Deep-dives
Talk
Open →
2019-02
33:53
The Power of Recon
Orwa Atyat
BSides Ahmedabad
Technical
OSINT
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-05
45:08
Scripting Myself Out of a Job - Automating the Penetration Test with APT2 - Adam Compton
BSides Knoxville
Open →
2016-06
28:27
Hack Yourself: Building a Test Lab - David Boyd
BSides Knoxville
Open →
2016-06
36:46
Breaking into Embedded Devices and IoT Security
Andrew Costis
BSides London
· 2018
Technical
Talk
Open →
2018-06
29:33
Hacking And Exploit Development For Bluetooth Low Energy (BLE)
Sarah Mader
BSides Munich
· 2022
Technical
Wireless Security
Demo
Talk
Open →
2022-05
35:44
Sweet Security: Deploying a Defensive Raspberry Pi
Travis Smith
BSidesSF
· 2016
Technical
Demo
Open →
2016-04
49:05
Power of Community
Sandeep Singh
BSides Ahmedabad
· 2021
Community
Keynote
Open →
2022-02
42:33
Web Application Vulnerability Scanners: An Introduction & Discussion on Their Limitations
Robert Feeney
BSides Cape Town
· 2019
Technical
Vulnerability Research
Web AppSec
Talk
Open →
2019-12
32:37
The Automation Of Firmware-Analysis For IoT-Devices - Alexander Poth
BSides Munich
Open →
2019-03
29:25
Hacking the Drones - Aatif Khan
Aatif Khan
BSides London
Technical
Wireless Security
Demo
Talk
Open →
2018-06
23:15
Circumventing egress filtering by exploiting HTTP "transfer-encoding: chunked" for faster web shells
Lorenzo Grespan
BSides London
· 2018
Technical
Advanced
Red
Talk
Open →
2018-06
14:50
IPv6 for Pentesters
Owen Shearing
BSides London
· 2017
Technical
Talk
Open →
2017-06
25:06
Adventures & Findings in ISP Hacking
Ian Foster
BSidesSF
· 2025
Technical
Talk
Open →
2025-06
56:59
PCI for Pen Testers
Joseph Pierini
BSides DC
· 2017
Technical
Red
Talk
Open →
2017-10
38:51
Spear Phishing: From LinkedIn To Loggedin
Alex Archondakis
BSides London
· 2019
War Stories
Talk
Open →
2019-06
49:41
The Way of the Bounty
David Sopas
BSides Lisbon
· 2016
Career
Talk
Open →
2016-11
41:52
Sanders Diaz | Introduction to Custom Protocol Fuzzing
BSides Orlando
Open →
2016-06
59:07
Malware Analysis 101: N00b to Ninja in 60 Minutes
BSides Las Vegas
· 2014
Technical
Malware Analysis
Intro
Talk
Open →
2016-12
45:56
Flash Memory, NAND, ECC, Oh My! Practical Techniques for Acquiring and Processing Raw NAND Images
Jake Valletta
BSides Charleston
· 2022
Technical
DFIR
Hardware Hacking
IoT
Reverse Engineering
Technical Deep-dives
Talk
Open →
2023-01
42:09
Tokens & Takeovers: Cloud-Powered Supply Chain Attacks
Nitesh Surana
BSides Ahmedabad
· 2025
Technical
Supply Chain Security
Talk
Open →
2025-03
54:04
Finding ICS/OT (Industrial Control Systems/Operational Technology) Assets with Shodan
BSides Greenville
· 2023
Technical
IoT
OSINT
Red
Talk
Open →
2023-06
10:49
Introducing Opabinia (SSLAuditor4)
Aman Hardikar
BSides London
· 2014
Tooling
Talk
Open →
2014-05
25:14
From Firmware to Exploit
Michael Messner
BSides Las Vegas
· 2023
Technical
Tooling
Firmware Security
IoT
Reverse Engineering
Vulnerability Research
Intermediary
Technical Deep-dives
+1
Open →
2023-10
6:18:25
Security BSides Athens 2022 — Live Stream Part 2
BSides Athens
· 2022
Technical
Talk
Open →
2022-06
47:40
Uncovering Azure's Silent Threats: A Journey into Cloud Vulnerabilities
Nitesh Surana
BSides Ahmedabad
Technical
Talk
Open →
2024-05
1:14:13
BSidesIOWA 2015 Track2: Secure Process Isolation with Docker by Greg Rice
BSides Iowa
Open →
2015-04
57:55
Seriously? You Want Me To Believe Cyber-Spies Want My Data
BSides Detroit
Open →
2012-06
30:04
Tales of Red Teaming (Continuous Intrusion Continuous Deception)
Aladdin Mubaied
Rahul Nair
BSidesSF
· 2018
Technical
Container Security
DevSecOps
Red
Talk
Open →
2018-04
24:36
The Security of Emojis
Adrian Justice
BSides Canberra
· 2021
Technical
Technical Deep-dives
Talk
Open →
2021-04
28:18
WarBerry: Tactical Network Reconnaissance from a Raspberry Pi
Yiannis Ioannides
BSides Athens
· 2016
Technical
Advanced
Red
Demo
Talk
Open →
2016-07
27:56
Honeypot Boo Boo: Better Breach Detection With Deception Inception
Justin Varner
BSides Munich
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2023-10
49:18
Aarti Gadhia: There is no security skills shortage!
Aarti Gadhia
BSides Calgary
Career
Talk
Open →
2020-12
59:52
Testy bezpieczeństwa infrastruktury w przerwie na herbatę. Czy to możliwe?
Krystian Działowy
BSides Warsaw
· 2024
Technical
Network Security
Vulnerability Research
Demo
Talk
Open →
2024-07
35:30
Hacking Companies For Internet Glory While Not Dying In A Sarlacc Pit
Andy Gill
BSides Leeds
· 2019
Technical
OSINT
Vulnerability Research
Web AppSec
Red
Talk
Open →
2019-01
41:39
Keith Perry - Roll Your Own Internet of Things Search Engine
BSides Orlando
Open →
2014-04
9:10:48
5th Annual BSides Asheville Information Security Conference Live Stream
BSides Asheville
Open →
2018-06
36:24
ICS Intrusion KillChain explained with real simulation
Juan Escobar
BSides Athens
· 2021
Technical
ICS Security
Intermediary
Red
Demo
Workshop
Open →
2021-06
21:04
Be a Human nMAP! – Cultivating a 'Renaissance & Reconnaissance Approach' for the Social Engineer
Tigran Terpandjian
BSides Augusta
· 2017
Career
Red
Talk
Open →
2017-09
43:11
Offensive Pcap - Stuart McMurray
Stuart McMurray
BSides London
· 2019
Technical
Red
Talk
Open →
2019-06
25:25
Build To Hack, Hack To Build
Chris Le Roy
BSides London
Technical
Tooling
Talk
Open →
2019-06
34:05
"SSH, so hot right now. Profiling it with HASSH" - Ben Reardon & Adel Karimi
Ben Reardon
Adel Karimi
BSides Canberra
· 2019
Technical
Detection Engineering
Network Security
Threat Intel
Talk
Open →
2019-05
23:22
AI And Pentesting by Dan Canon
Dan Canon
BSides Cheltenham
· 2023
Talk
Open →
2023-06
7:47:30
BSides Las Vegas 2019 D1 - Ground 1234!
Alvaro Muñoz
Alexander Miros
BSides Las Vegas
· 2019
Technical
Talk
Open →
2019-08
52:29
BG - Overlooked Tactics for Attacking Hardened Active Directory Environment - Hao Wang, Yothin Rodan
BSides Las Vegas
Open →
2018-09
46:54
Hack To The Future: Using LLMs As Attacking Agent In Real Networks - Maria Rigaki & Sebastian Garcia
Maria Rigaki
Sebastian Garcia
BSides Prague
Technical
Talk
Open →
2024-04
33:49
Software Vulnerability Discovery and Exploitation During Red Team Assessments
Ryan Wincey
BSides Charleston
· 2015
Technical
Red
Talk
Open →
2015-12
38:28
Ryan Hays - Weaponizing Splunk: Using Blue Team Tools for Evil
Ryan Hays
BSides Knoxville
· 2017
Technical
Red
Demo
Talk
Open →
2017-06
49:11
A Cascade of Pebbles: How Small Incident Response Mistakes Make for Big Compromises
BSides Detroit
Open →
2013-06
36:00
Attacking Authentication in Web Applications - Jake Miller
Jake Miller
BSides SATX
· 2018
Technical
Web AppSec
Red
Talk
Open →
2018-07
45:23
How to Break the Modbus Protocol and Cause a PLC DoS
Omar Morando
BSides Budabest
· 2023
Technical
OT/ICS Security
Intermediary
Red
Demo
Open →
2023-08
34:13
Minecraft Hacking for Beginners
Zoltán Balázs
BSides Budabest
· 2023
Technical
Intro
Talk
Open →
2025-03
43:20
There and Back Again: Detecting OT devices across protocol gateways
Rob Kim
BSides CDMX
· 2025
Technical
Network Security
Threat Intel
Talk
Open →
2025-07
23:55
A Study on Intrusion Detection Systems with a Practical Experiment on Snort - Vigneshwar Sethuraman
Vigneshwar Sethuraman
BSides Vancouver
· 2021
Technical
Detection Engineering
Network Security
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-06
19:29
Raspberry Pi, Kismet, and PCI 11.1
Bob Hewitt
BSides Delaware
· 2015
Technical
Wireless Security
Talk
Open →
2015-11
52:09
Speedrun Cybersecurity with AI – Hack Faster
Mike Spicer
BSides SLC
· 2025
Technical
AI Security
Vulnerability Research
Red
Demo
Talk
Open →
2025-06
47:47
The Hunt For The Red DA by Neil Lines
BSides Scotland
Open →
2017-04
34:29
BSides DC 2017 - Beyond the Domain: Exploiting Hidden Critical Assets on Red Teams
Brandon Arvanaghi
BSides DC
· 2017
Technical
Active Directory
Red
Talk
Open →
2017-10
38:25
Matriux Leandros: An Open Source Penetration Testing and Forensic Distribution
Prajwal Panchmahalkar
BSides Las Vegas
· 2013
Technical
DFIR
Tooling
Talk
Open →
2017-01
32:17
SecOps Automation And Orchestration
Nicolas Mattiocco
BSides Lisbon
· 2018
Technical
DevSecOps
Tooling
Vulnerability Research
Talk
Open →
2018-12
28:57
ATTACKING THE HID ACCESS CONTROL SYSTEM - Alex Dib
BSides Sydney
Open →
2019-09
21:44
Joseph Cohen Security BSides Boston 2013 - Bluecat Netcat For Bluetooth
BSides Boston
Open →
2013-06
29:56
Offensive RFID/NFC
Shain Lakin
BSides Perth
· 2021
Technical
Wireless Security
Talk
Open →
2021-09
55:28
Low Level TLS Hacking
Richard Moore
BSides Manchester
· 2015
Technical
Cryptography
Network Security
Advanced
Talk
Open →
2015-10
46:48
Look Ma, No Exploits! — The Recon-ng Framework
Tim Tomes
BSides Augusta
· 2013
Technical
OSINT
Tooling
Red
Demo
Talk
Open →
2013-09
44:26
Netsec is Dead(?): Modern Network Fingerprinting for Real-World Defense
Vlad Iliushin
BSidesSF
· 2025
Technical
Talk
Open →
2025-06
39:59
Rogue One: A Wifi Story
Ricardo Gonçalves
BSides Lisbon
· 2018
Technical
Wireless Security
Talk
Open →
2018-12
48:16
Ross Simpson - Docker for Hackers
BSides Cape Town
Open →
2017-12
13:17
Automated Dorking for Fun and Pr^wSalary - Filip Reesalu
BSides Las Vegas
Open →
2016-08
27:40
Ferris Bueller's Guide to Abuse Domain Permutations
Rob Ragan
Kelly Albrink
BSidesSF
· 2019
Technical
OSINT
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2019-03
56:01
21st Century War Stories
Ben Turner
BSides Manchester
· 2016
War Stories
OSINT
Social Engineering
Threat Intel
Red
Case Studies and Incidents Analysis
Talk
Open →
2016-09
42:04
RevEng All the IOTs
Gerald Auger
Tyler Flaagan
Cory Nance
BSides Charleston
· 2017
Technical
Talk
Open →
2017-11
38:34
Overview of Python: Flying Made Simple Without the NyQuil Hangover
Keith Dixon
BSides Detroit
· 2012
Technical
Intro
Talk
Open →
2012-06
22:54
Introducing The OWASP Nettacker Project
Sam Stepanyan
BSides Athens
· 2020
Technical
Tooling
OWASP
Demo
Talk
Open →
2020-06
56:56
What's the Big Deal with Assessing ICS/SCADA?
Jim Gilsinn
BSides DC
· 2016
Technical
Red
Talk
Open →
2016-11
37:38
How Evil Kirk Uses Maltego
Robert McMahon
BSides Delaware
· 2015
Technical
Talk
Open →
2015-11
34:32
Introduction To Ethical Hacking
Brandon S. Keath
BSides Delaware
· 2018
Talk
Open →
2018-11
44:18
BG - Introducing the Smartphone Penetration Testing Framework - Georgia Weidman
BSides Las Vegas
Open →
2017-03
16:35
Breaking out of Restricted RDP
Wicked Clown
BSides London
· 2014
Technical
Red
Demo
Open →
2014-07
51:14
Living Off the Land: Windows Post-Exploitation with Built-in Tools
Christopher Campbell
Matthew Graeber
BSides Augusta
· 2013
Technical
Malware Analysis
Post-Exploitation
Red
Talk
Open →
2013-09
50:26
BSidesTO 2015 - Allan Stojanovic & David Auclair - MOAR Logs and Tactical Defence
Allan Stojanovic
David Auclair
BSides Toronto
· 2015
Technical
Talk
Open →
2015-11
53:21
in ur scm, bein a ninja
Hank Leininger
BSides DC
· 2014
Technical
Supply Chain Security
Talk
Open →
2014-10
21:06
Learning Security by ATT&CK'ing Yourself
Travis Smith
BSides PDX
· 2018
Career
Community
Talk
Open →
2019-02
40:28
BG - Collaborative Penetration Testing With Lair - Tom Steele & Dan Kottmann
BSides Las Vegas
Open →
2017-01
49:34
How to Defend Against Penetration Testers And Win - Paul Asadoorian
BSides Boston
Open →
2017-05
21:17
Recog: Open Source Asset and Service Identification
Greg Wiseman
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
38:52
Ballin on a Budget
Andrew Morris
BSides Charleston
· 2014
Technical
Talk
Open →
2014-11
26:31
Physical Security & Cybersecurity Overlap: Radio Waves and RF Attacks
Michael Weiskopff
BSidesROC
· 2024
Technical
Network Security
Physical Security
Wireless Security
Intermediary
Red
Talk
Open →
2025-03
17:30
Portscanning with PowerShell
James Conlan
BSides Bristol
· 2025
Technical
Talk
Open →
2024-01
59:21
BSidesSLC 2017 -- Jason Wood -- Get Started Writing Nmap Scripts
BSides SLC
Open →
2017-06
24:48
Penetration Testing Using Windows Features - Niall Caffrey
Niall Caffrey
BSides Belfast
Technical
Talk
Open →
2024-03
18:38
Pentest Deep Dive: Anatomy Of A Weaponized Remote Code Execution Flaw
Robert Kugler
BSides Lisbon
· 2019
Technical
Red
Talk
Open →
2019-12
52:15
Exercícios de Red Team: Não simule a ameaça, seja a ameaça
Oliveira Lima
BSides São Paulo
· 2025
Technical
Advanced
Red
Talk
Open →
2025-06
22:38
Hacking OSS
Rotem Bar
BSides TLV
· 2021
Technical
Red
Talk
Open →
2021-08
30:53
MQTT: Tiny Protocol, Big Vulnerabilities
Tracie Martin
BSides Seattle
· 2020
Technical
Talk
Open →
2020-12
31:36
Darryn Cull and Thomas Underhay - SensePost XRDP Tool
BSides Cape Town
Open →
2016-12
42:56
PG - Mainframed - The Forgotten Fortress - Phil Young
BSides Las Vegas
Open →
2017-03
48:43
Applying Data Science to Identify Malicious Actors in Enterprise Logs
Balaji Balakrishnan
BSides DC
· 2016
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2016-10
31:35
Controlling Your Neighbour's Lights: ZigBee Security Analysis and Smart Home Vulnerabilities
André Garrido
BSides Lisbon
· 2017
Technical
Hardware Hacking
IoT
Wireless Security
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-11
45:19
Plunder, Pillage and Print
Deral Heiland
BSides Boston
· 2013
Technical
Hardware Hacking
Network Security
OSINT
Intermediary
Red
Case Studies and Incidents Analysis
Methodology
+1
Open →
2013-06
30:52
Conquer the Enterprise from Inside
Simon Roses Femerling
BSidesSF
· 2019
Technical
Hardware Hacking
Network Security
Wireless Security
Red
Demo
Talk
Open →
2019-03
30:45
Bsides Orlando - Joey Belans - Hacking Like It's 1999
BSides Orlando
Open →
2013-04
32:04
Offensive PCAP
Stuart McMurray
BSides DC
· 2019
Technical
Network Security
Reverse Engineering
Red
Talk
Open →
2019-11
27:09
2017 - Security Testing As Part Of The Release Pipeline by David Brownhill and Craig Scott Angell
BSides Manchester
Open →
2017-08
42:25
Boston BSides - Pentesting for Fun and Profit by William Reyor
BSides Boston
Open →
2016-07
25:48
BSidesSF 2025 - Tracking the World's Dumbest Cyber Mercenaries (Cooper Quintin, Eva Galperin)
Cooper Quintin
Eva Galperin
BSidesSF
· 2025
Research
Case Studies and Incidents Analysis
Talk
Open →
2025-06
24:38
A Practical Approach to Hacking an Enterprise with YASUO
BSides Toronto
· 2014
Technical
Active Directory
Red
Talk
Open →
2014-12
35:18
Hunt the Stank
Melissa Bischoping
Nir Yosef
BSides Delaware
· 2021
Technical
Blue
Talk
Open →
2021-11
29:46
From Feeding to Learning: Uncovering Hidden Dangers in Smart Devices for Pets and Kids - Roland Sako
Roland Sako
BSides Prishtina
Technical
Talk
Open →
2024-09
19:25
Paravirtualized Honeypot Deployment for the Analysis of Malicious Activity
Andronikos Kyriakou
BSides Athens
· 2018
Technical
Malware Analysis
Threat Intel
Blue
Talk
Open →
2018-08
24:58
What's Inside The Open Directory From 96 Different Threat Actors?
Alana Witten
BSides London
· 2025
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
28:29
Infosec (Cyber Security): We're Doing It Wrong
Bill Gardner
BSides Charleston
· 2015
Purple
Keynote
Open →
2015-12
53:27
Unparalleled Remote Desktop Monitoring: Revealing Attackers' Tradecraft
Olivier Bilodeau
Adrian Beron
BSides Augusta
· 2023
Research
DFIR
Malware Analysis
Network Security
Threat Intel
Blue
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2023-10
40:25
How I Pwned the ICS Data During My Internship
Shail Patel
BSides Philly
· 2019
Technical
Network Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2020-12
30:57
Network Attached Shell: N.A.S.ty systems that store network accessible shells
Jacob Holcomb
BSides DC
· 2014
Technical
Red
Demo
Open →
2014-10
49:15
Tracie Martin - IoT's Little Protocol with Big Vulnerabilities
Tracie Martin
BSides Knoxville
· 2021
Technical
IoT
Network Security
Vulnerability Research
Intermediary
Red
Talk
Open →
2021-05
1:57:57
DevSecOps for Security Teams
Hassan Mussana
BSides Pakistan
· 2021
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2021-10
35:27
Masande Mtintsilana - Junk Hacking to skill up
BSides Cape Town
Open →
2017-12
46:03
Why You Need To Be Red Team'ed
Nate McConnell
BSides SLC
· 2015
Technical
Red
Talk
Open →
2015-04
39:22
Multidimensional Attack Path Analysis: Eliminating Network Blind Spots
Peter Smith
Bsides CT
· 2018
Technical
Talk
Open →
2018-11
26:44
You Must Search Before You Destroy
Adam Steed
BSides SLC
· 2015
Technical
Talk
Open →
2015-04
25:35
Low Hanging Blue Fruit: Defending With Open-Source Tools
Yaron King
BSides TLV
· 2019
Technical
Blue
Talk
Open →
2019-11
28:23
Our Journey of Building a Security Program at a Small Startup - DeFronzo and Erxleben
BSides Boston
Open →
2017-05
30:58
Introduction to CTF - For All!
Matthew Haynes
Daniel Card
BSides Leeds
· 2020
Technical
CTF
Intro
Blue
Red
Demo
Talk
Open →
2020-07
58:04
Continuous Security: Monitoring & Active Defense in the Cloud
Eric Johnson
BSides Iowa
· 2018
Technical
Cloud IAM
Detection Engineering
Threat Intel
Blue
Purple
Case Studies and Incidents Analysis
Talk
Open →
2018-04
28:54
A Talk On IoT Devices Their Vulnerabilities And Potential Exploits
Beverly McKenzie
BSides Leeds
· 2020
Technical
Talk
Open →
2020-07
31:08
Charting the SSH Multiverse
HD Moore
BSidesSF
· 2025
Technical
Network Security
Vulnerability Research
Talk
Open →
2025-10
41:33
Use What You Have
Corey Bussard
BSides Peru
· 2023
Technical
Active Directory
Detection Engineering
Network Security
Blue
Talk
Open →
2023-08
53:48
CG - Hadoop Safari : Hunting For Vulnerabilities - Mahdi Braik & Thomas Debize
BSides Las Vegas
Open →
2017-08
22:47
Cameras, CACs & Clocks: A Story of Millions of Interrogated and Hacked xIoT Devices
John Vecchi
BSidesSF
· 2023
Technical
Red
Demo
Talk
Open →
2023-05
15:23
Efficiency in Pentesting - Developing Your Own Toolset
Sam Ferguson
Bsides CT
· 2020
Technical
Tooling
Network Security
Talk
Open →
2020-11
46:09
IoT Device Post Exploitation
Nick Starke
BSides Iowa 2018
Technical
IoT
Reverse Engineering
Red
Demo
Talk
Open →
2018-04
57:18
BSides Rochester 2018 - Detect Me If You Can
Ben Ten
BSidesROC
· 2018
Technical
Red
Talk
Open →
2018-04
27:11
De Dados a Decisões: O Papel da CTI na Mitigação de Riscos de Vulnerabilidades
Álvaro Farias Jr
BSides São Paulo
· 2025
Technical
Threat Intel
Vulnerability Research
Blue
Talk
Open →
2025-06
56:51
Hacking the OWASP Top 10: An Intro to Web Application Security
Greg Sternberg
BSides Denver
· 2020
Technical
OWASP
Web AppSec
Intro
Talk
Open →
2020-10
49:02
Printers: The Neglected High Value Asset in ICS and OT Pentests
Gabriel Agboruche
BSides Vancouver
· 2022
Technical
Network Security
Vulnerability Research
Red
Talk
Open →
2022-07
30:25
Your security black hole
Huxley Barbee
BSides SLC
· 2023
Talk
Open →
2023-06
25:57
OWASP Nettacker Project Presentation
Sam Stepanyan
BSides Athens
· 2022
Technical
OWASP
Vulnerability Research
Intro
Red
Demo
Talk
Open →
2022-06
49:51
Movement After Initial Compromise
Matthew Batten
Collyn Hartley
BSides Augusta
· 2018
Technical
Active Directory
Threat Intel
Red
Talk
Open →
2018-11
30:12
How to pen-test off the grid…and in the middle of the Pacific
Dave Keene
BSides Charleston
· 2015
Technical
Talk
Open →
2015-12
30:22
Psst, Come Check Out My Lair!! #notacreeper
Justin Larson
BSides SLC
· 2015
Tooling
Demo
Open →
2015-04
29:14
BumpKey: A Hardware Swiss Knife for Red Teamers
Mauro Eldritch
Luis Angel Ramírez Mendoza
BSides Islamabad
· 2020
Technical
Red
Demo
Talk
Open →
2020-12
42:13
GF - Who Watches the Watchers?: Understanding the Internet's Background Noise - Curt Barnard
BSides Las Vegas
Open →
2018-09
42:37
Feeding the Shark
Jeremy Pierson
BSides SLC
· 2015
Technical
Talk
Open →
2015-04
37:00
Introduction to Shodan
Aaron Blythe
BSides Springfield
· 2017
Technical
Talk
Open →
2017-12
29:14
Containers for Pentesters by Rory McCune
Rory McCune
BSides Dublin
· 2023
Technical
Talk
Open →
2023-07
13:29
Router Fail
John Garrett
BSides Charleston
· 2015
Technical
Hardware Hacking
Network Security
Red
Demo
Talk
Open →
2015-12
47:19
Emulating the Adversary While Training the Defenders: Purple Teaming with MITRE ATT&CK
David Evenden
BSides KC
· 2021
Technical
Purple
Talk
Open →
2021-11
35:11
Rudder Nonsense: Steering Smart Rowers Off Course
Shane Kell
BSides PDX
· 2024
Technical
Red
Demo
Talk
Open →
2024-11
26:50
BSides Cape Town 2017 - Hacker Jeopardy
BSides Cape Town
· 2017
Community
Open →
2017-12
40:57
Investigating IPv6 via UPnP
Aleks Nicolic
BSides Knoxville
· 2019
Research
IoT
Network Security
Talk
Open →
2019-06
47:38
BG - Force Multipliers for Red Team Operations - Raphael Mudge
BSides Las Vegas
Open →
2017-03
26:49
First Contact with Container Security
Ell Marquez
BSides RDU
· 2021
Technical
Supply Chain Security
Talk
Open →
2021-10
39:44
The Pentester Blueprint: A Guide to Becoming a Pentester
Phillip Wylie
BSides Delhi
· 2020
Career
Career & Soft Skills
Intro
Talk
Open →
2020-11
27:04
BSides Toronto 2019 Harish Ramadoss
BSides Toronto
Open →
2019-10
24:16
BsidesWLG 2017 - Glenn 'devalias' Grant - Gophers, whales and.. clouds? Oh my!
BSides Wellington
Open →
2018-02
38:42
Streamlining Report Writing with AutoRpt
Ben Acord
BSides Greenville
· 2021
Tooling
Demo
Open →
2021-10
49:31
Cameras, CACs & Clocks: Enterprise IoT Security Sucks
Brian Contos
BSides Knoxville
Technical
IoT
Threat Intel
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-05
39:47
Building AppSec In
Seth Law
BSides SLC
· 2015
Technical
OWASP
Web AppSec
Talk
Open →
2015-04
30:25
A Penetration Test Had A Job AI AI OH :(
Dan Cannon
BSides Lancashire
· 2023
Technical
AI Security
Tooling
Demo
Open →
2023-04
50:09
Back to Basics: Using Descriptive Statistics to Study the Shape of the Internet
Emily Austin
BSides Las Vegas
· 2022
Research
Threat Intel
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2022-09
25:56
I'm in
Richard Appleby
BSides Canberra
· 2025
Community
Talk
Open →
2025-12
25:29
PG - You can be neurodivergent and succeed in InfoSec
Randall Wyatt
BSides Las Vegas
Career
Career & Soft Skills
Intro
Talk
Open →
2024-09
59:18
BSidesAugusta 2018 - Martin Holste - An Anatomy Of A Cloud Hack
BSides Augusta
Open →
2018-11
33:55
Offensive PCAP
Stuart McMurray
BSides DC
· 2019
Technical
Red
Talk
Open →
2019-10
36:07
From pocket to Pwn: How we hacked a multinational corp for $200
Tim Shipp
BSides NYC
· 2025
Technical
Mobile Security
Physical Security
Wireless Security
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-11
29:10
The Way From App To Brain: Attack Surfaces Of Smart Medical Infrastructure - Denis Makrushin
Denis Makrushin
BSides Munich
· 2019
Technical
Talk
Open →
2019-03
18:12
PNA A Short Life, a Long Shadow - Gev Manekshaw
Gev Manekshaw
BSides Philly
· 2025
Technical
Privacy
Web AppSec
Blue
Talk
Open →
2026-02
51:50
A Tiny Datacenter On My Head
Nate Lager
BSides Delaware
· 2015
Talk
Open →
2016-07
39:52
LLMs for Beginners - Jr Hernandez
JR Hernandez
BSides SATX
· 2024
Technical
Intro
Talk
Open →
2024-06
27:50
IoT Devices and why they desperately need help
Christian Halbert
Issa Hafiri
BSidesROC
· 2018
Technical
Talk
Open →
2018-04
41:45
Unleashing AI and Large Language Models in Offensive Security
Martin Ingesen
BSides Oslo
· 2023
Technical
Red
Talk
Open →
2025-07
46:59
BSidesNCL (Newcastle) 2021 - Fuzzing: Finding Your Own Bugs and 0days! - Rodolpho Concurde (ROd0X)
BSides Newcastle
Open →
2021-10
26:10
Stop the Insanity and Improve Humanity: UX for the Win - Robin Burkett
BSides Las Vegas
Open →
2016-08
27:41
Dealing with Undocumented Network Services: Discovering Vulnerabilities in Mikrotik Routers
Ali Abed Al Hadi
BSides Budabest
· 2025
Technical
Network Security
Reverse Engineering
Vulnerability Research
Intermediary
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2026-02
42:24
No CVE, No Problem: Uncovering Hidden Attack Paths in Active Directory
Gerardo Mejía
BSides CDMX
· 2025
Technical
Active Directory
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-07
53:09
Hacking GitHub Actions: Abusing GitHub and Azure for fun and profit
Magno Logan
BSides Buffalo
· 2023
Technical
Cloud IAM
DevSecOps
Supply Chain Security
Advanced
Red
Talk
Open →
2023-06
39:00
Thermostats Gone Wild: Gaining Domain Admin from an Unsecured HVAC System
David Ramírez
BSides CDMX
· 2025
Technical
Active Directory
Vulnerability Research
Web AppSec
Red
Talk
Open →
2025-07
44:56
Differences Between European and Canadian Approaches to Cybersecurity
Tony Dong
BSides Edmonton
· 2024
Talk
Open →
2025-05
43:39
A Log4Shell Practice Exploitation Range in the Cloud
Karl Sickendick
BSides SATX
· 2022
Technical
Vulnerability Research
Red
Demo
Open →
2023-03
25:42
Introduction to Shodan
Aaron Blythe
BSides KC
· 2017
Technical
Talk
Open →
2017-07
21:24
Insider Threat Kill Chain: Human Indicators of Compromise
Ken Westin
BSides Las Vegas
· 2014
Technical
Detection Engineering
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2016-12
28:28
Pwning into Power System Center
Omkar Joshi
BSides Budabest
· 2023
Technical
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-03
50:40
Pen Testing for NOT Dummies
Alex Holden
BSides NYC
· 2023
Technical
Red
Talk
Open →
2023-06
53:49
ICS/SCADA Defense
Chris Sistrunk
BSides Augusta
· 2014
Technical
Blue
Talk
Open →
2014-09
44:48
GF - Hillbilly Storytime - Pentest Fails - Adam Compton
BSides Las Vegas
Open →
2018-09
19:18
Don't be a Hammer. Learning more tools with VMs and Vulnhub
Weston George
BSides Springfield
· 2017
Technical
Demo
Open →
2018-02
40:14
Ghosts at the Gateway: 0-Days That Blind Routers and Invite APTs
Luke Schmidt
BSides Perth
· 2025
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-10
51:42
GT - PhishDefend: A Reinforcement Learning Framework
Bobby Filar
BSides Las Vegas
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2024-09
39:38
I Know What You Did Last Summer… I'm Still Hacking Your Small Business
Vincent Matteo
BSides KC
· 2022
Technical
Red
Case Studies and Incidents Analysis
Talk
Open →
2022-10
51:44
BSidesIA 2017 Track1: Defense Wins Championships – Ben Schmitt
BSides Iowa
Open →
2017-04
41:54
Weaponizing Systems Administration: Leveraging IT Skills In Penetration Testing by Jayme Hancock
Jayme Hancock
BSides Dublin
· 2021
Technical
Talk
Open →
2021-05
48:59
Doug Leece: Detection Engineering
Doug Leece
BSides Calgary
· 2021
Technical
Detection Engineering
Purple
Talk
Open →
2021-12
21:54
Breaking Down Walls With Windows
Alexander Klepal
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
30:58
Setting up a lab
William Price
Bill Price
BSides Charlotte
· 2019
Open →
2019-11
29:06
Hacking Industrial Environments and Securing Them Safely
Tijl Deneut
BSides Limburg
· 2026
Technical
Network Security
OT Security
Vulnerability Research
Intermediary
Blue
Red
Case Studies and Incidents Analysis
+2
Open →
2026-04
27:59
NMAP 101
Chris Hopkins
BSides SLC
· 2017
Technical
Intro
Talk
Open →
2017-06
49:50
Phillip Wylie - The Pentester Blueprint: A Guide to Becoming a Pentester
Phillip Wylie
BSides Boston
Career
Career & Soft Skills
Intro
Talk
Open →
2020-11
36:51
I Find Your Lack of Serverless Disturbing! Leveraging the Cloud to Automate the Mun
Michael Butler
Bryce Kunz
BSides SLC
· 2019
Talk
Open →
2019-02
28:55
Beyond Manual: Enhancing And Scaling Security With Automation
Christian Bauer
BSides Munich
· 2024
Technical
Detection Engineering
DevSecOps
Vulnerability Research
Blue
Talk
Open →
2024-11
42:41
Hacking K-12 School Software in a Time of Remote Learning
Sam Quinn
BSides Knoxville
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
1:07:44
Hacking 101: An introductory course in hacking!
BSides Calgary
· 2021
Technical
Active Directory
Network Security
OSINT
Intro
Red
Workshop
Open →
2021-12
25:21
When SSL Fails: Tracing the SSL Vulnerability to the Most Shocking Real World Impacts
Michelle Simpson
BSides Dublin
Technical
Cryptography
Talk
Open →
2025-10
28:48
Docker To The Security by Sean Wright
Sean Wright
BSides Leeds
· 2023
Talk
Open →
2023-07
31:11
PG - Attacking Drupal - Greg Foss
BSides Las Vegas
Open →
2016-12
49:51
Movement After Initial Compromise
Matt Batten
Collyn Hartley
BSides RDU
· 2018
Technical
Active Directory
Intermediary
Red
Demo
Talk
Open →
2018-10
24:41
How To Pentest Industrial Systems (OT/ICS) And Still Live To Tell The Tale!
Mikael Vingaard
BSides Tirana
· 2023
Technical
Talk
Open →
2023-11
44:52
Credential Compromise: Well, What Now?
Nate Kirk
BSides Dallas/Fort Worth
· 2021
Technical
Active Directory
Cloud IAM
Network Security
Purple
Talk
Open →
2021-11
52:16
From Vulnerability to CTF
Ron Bowes
BSides Las Vegas
· 2022
Technical
CTF
Cryptography
Reverse Engineering
Vulnerability Research
Case Studies and Incidents Analysis
Talk
Open →
2022-09
52:23
Asynchronous Intelligence Gathering with Python
Jeff Bowie
BSides Denver
· 2020
Technical
OSINT
Tooling
Web AppSec
Red
Talk
Open →
2020-10
41:58
Fuzzing: Finding Your Own Bugs and 0days
Rodolpho Concorde
BSides Calgary
Technical
Reverse Engineering
Vulnerability Research
Red
Talk
Open →
2021-12
47:54
Security BSides Delaware 2021 - SBOM’s and CBOM’s – why bills of materials matter to hackers?
Joshua Marpet
BSides Delaware
· 2021
Technical
Supply Chain Security
Blue
Red
Talk
Open →
2021-11
28:09
Shining a Light into the Security Blackhole of IoT and OT
Huxley Barbee
BSides Las Vegas
· 2023
Technical
IoT
Network Security
Vulnerability Research
Blue
Technical Deep-dives
Talk
Open →
2023-10
48:30
Breaking NBAD and UEBA Detection
Charles Herring
BSides NoVa
· 2021
Technical
Detection Engineering
Threat Intel
Advanced
Red
Technical Deep-dives
Talk
Open →
2021-07
52:25
Securing your company's assets with packets
Mike Motta
BSides Springfield
· 2017
Technical
Talk
Open →
2018-02
22:49
Top 5 Ways I Own You Internal Network
Heath Adams
BSides Charlotte
· 2019
Technical
Talk
Open →
2019-11
19:17
Phish-Back: How to Turn the Problem into a Solution
Gautier Bugeon
BSides Las Vegas
· 2025
Technical
Detection Engineering
Threat Intel
Web AppSec
Advanced
Blue
Talk
Open →
2025-12
20:17
Turbo Tactical Exploitation: 22 Tips for Tricky Targets
HD Moore
BSides Las Vegas 2025
Technical
Network Security
OSINT
Vulnerability Research
Red
Talk
Open →
2025-12
22:58
Tom Webb - Incident Response Awakens
Tom Webb
BSides Augusta
· 2016
Talk
Open →
2016-09
51:27
First Contact with Container Security
Ell Marquez
BSides Dallas/Fort Worth
· 2021
Technical
Cloud IAM
Container Security
DevSecOps
Malware Analysis
Talk
Open →
2021-11
50:04
Presentation -- Scaling Security Training at the Speed of Devops
BSides Asheville
Open →
2018-05
30:51
Hacking ICS & OT Networks - Joseph Foote
Joseph Foote
BSides Basingstoke
· 2025
Technical
Talk
Open →
2025-09
20:00
Hell-0_World: Making Weather Cry
Amelia Weeding
Dave Bailey
BSides Las Vegas
· 2024
Technical
Hardware Hacking
IoT
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2024-09
55:30
2020 - Red Teaming is Fun! - Donovan Farrow
BSides Denver
Open →
2020-10
25:04
Using Ravello to Create a Security Lab in the Cloud
Anthony Maughan
BSides Springfield
· 2017
Technical
Talk
Open →
2018-02
15:07
BSidesKC 2018 - Jared Bare - From Port Scanning to Password Cracking
Jared Bare
BSides KC
· 2018
Technical
Talk
Open →
2018-06
42:09
BSidesPGH 2024 Track 2 ch3f The Whole is More Dangerous than the Sum of its Parts
BSides Peru
Open →
2024-08
25:01
Wrangle Your Defense Using Offensive Tactics
Matt Dunn
Bsides CT
· 2019
Technical
Blue
Talk
Open →
2019-11
40:04
From Spoofing to Tunnelling: New Red Team Networking Techniques
Shu Hao Tung
BSides Vancouver Island
· 2025
Technical
Network Security
Vulnerability Research
Red
Talk
Open →
2026-03
40:07
Amplifying Your XDR Experience by Leveraging Free API Services for Maximum Impact
Alexander Argeris
BSides St. John's
Technical
Detection Engineering
Threat Intel
Talk
Open →
2025-05
56:27
More Tales From the Crypt...Analyst
Jeffrey Man
BSides Charm
War Stories
Threat Intel
Vulnerability Research
Red
Talk
Open →
2021-05
56:32
Don't Be a HIPAACrite
Qasim Ijaz
BSides Denver
· 2020
Technical
Privacy
Social Engineering
Threat Modeling
Purple
Talk
Open →
2020-10
50:50
Dynamic Web Scanning at Massive Scale
Erik Peterson
BSidesSF
· 2012
Technical
DevSecOps
Web AppSec
Talk
Open →
2017-11
24:07
What the deuce: Strategies for splitting your alerts
John T. Myers
BSides Philly
Technical
Talk
Open →
2017-08
45:36
Agentic AI Malware: Why the Cybersecurity Battle Isn’t Over
Candid Wuest
BSides Las Vegas
· 2025
Technical
AI Security
Malware Analysis
Advanced
Red
Talk
Open →
2025-12
41:35
How to Find a Companys BreakPoint
BSides Philly
Open →
2017-08
24:41
Cleveland bSides 2012 - Jamison Budacki - NetFlow
BSides Cleveland
Open →
2016-10
27:43
Solar Flare: Pulling Apart SolarWinds ORION
Rob Fuller
BSides Philly
· 2017
Technical
Reverse Engineering
Vulnerability Research
Advanced
Talk
Open →
2017-08
41:45
LLM-SRO: Ontology-Driven Security for LLMs
Dr. Thomas Heverin
Caroline Ma
Avery Buyer
BSides Philly
· 2025
Research
Technical
AI Security
LLM Security
Threat Intel
Threat Modeling
Intermediary
Methodology
+2
Open →
2026-02
30:17
BSidesWLG 2017 - Dan Wallis - Shining a light on the Internet of Terrible
BSides Wellington
Open →
2018-02
48:06
Shot With Your Own Gun: How Appliances Are Used Against You
Christopher Campbell
Skip Duckwides
BSides Las Vegas
· 2012
Technical
Network Security
Vulnerability Research
Red
Talk
Open →
2017-03
28:31
Autopwn or Auto Fail? The Truth About AI in Offensive Security
Dumisani Masimini
BSides Exeter
· 2026
Technical
AI Security
Vulnerability Research
Talk
Open →
2026-05
23:43
Confessions of a Penetration Tester
Vincent Matteo
BSides Albuquerque
· 2024
Technical
War Stories
Active Directory
Malware Analysis
OSINT
Social Engineering
Supply Chain Security
Red
+2
Open →
2024-08
48:07
DougWarden
Doug Warden
BSides Calgary
Technical
Talk
Open →
2024-03
20:51
Reasonable Rapid Recognition and Response to Rogues
Craig Bowser
BSides Charm
· 2019
Technical
Detection Engineering
GRC
Network Security
Blue
Technical Deep-dives
Talk
Open →
2021-05
19:49
Casting Light on Shadow Cloud Deployments
Chapin Bryce
Brittney Argirakis
BSides Las Vegas
· 2025
Technical
Cloud IAM
DFIR
Threat Intel
Blue
Talk
Open →
2025-12
41:57
Cascading Failure, Unified Defense: Defending Water, Power, Healthcare, & EMS
Alexander Vanino
Ruslan Karimov
BSides Las Vegas 2025
Technical
Critical Infrastructure
DFIR
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-12
17:59
PG - Out of Denial: A 12-Step Program for Recovering Admins - Paul Lee
BSides Las Vegas
Open →
2016-12
41:40
Ivan Marchany: How to Build a Cyber Home Lab
Ivan Marchany
BSides St. Pete
· 2025
Career
Detection Engineering
Threat Intel
Vulnerability Research
Intro
Talk
Open →
2026-03