Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring PowerShell
343
talks mention this tool across
81
BSides chapters.
Talks featuring PowerShell
54:33
BG - ATT&CKing the Status Quo: Improving Threat Intel and Cyber Defense with MITRE ATT&CK - Katie Ni
BSides Las Vegas
Open →
2018-09
51:35
Attacking Kerberos: Kicking the Guard Dog of Hades
Tim Medin
BSides Orlando
· 2015
Technical
Active Directory
Kerberos
Intermediary
Red
Talk
Open →
2015-11
31:04
Microsoft EMET Overview and Demonstration
Kevin Ginousso
BSides Peru 2015
Technical
Tooling
Blue
Demo
Talk
Open →
2015-06
27:37
PowerShell-Fu — Hunting on the Endpoint
Chris Gerritz
BSides Las Vegas
· 2016
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Technical Deep-dives
Talk
Open →
2016-08
25:28
If You Can Open The Terminal, You Can Capture The Flag: CTF For Everyone
BSides Detroit
Open →
2013-06
23:15
APT Attack Techniques in Azure Cloud
Lina Lau
BSides Canberra
· 2023
Technical
Cloud IAM
Talk
Open →
2024-01
2:08:11
Windows Forensics Workshop
Ali Hadi
BSides Amman
· 2021
Technical
DFIR
Intermediary
Workshop
Open →
2021-07
43:51
Błędy administratorów w kontekście ostatnich ataków
Mariusz Burdach
BSides Warsaw
· 2017
Open →
2017-10
48:21
PowerShell Security: Defending the Enterprise from the Latest Attack Platform
Sean Metcalf
BSides DC
· 2016
Technical
Active Directory
Blue
Talk
Open →
2016-10
1:05:41
Hunting for Credential Dumping Attacks in Modern Windows Environments
Andrew Case
BSides Philly
· 2023
Technical
Active Directory
DFIR
Malware Analysis
Blue
Talk
Open →
2024-01
24:56
BSidesMCR 2019: Offensive Development: How To DevOps Your Red Team - Dominic Chell
BSides Manchester
Open →
2019-09
36:58
Cracking The Perimeter: How Red Teams Penetrate
Dominic Chell
BSides Manchester
· 2018
Technical
Active Directory
Malware Analysis
Advanced
Red
Talk
Open →
2018-08
27:13
BSides Iowa 2018: "Threat Hunting Windows Event Logs w/ Powershell"
BSides Iowa
Open →
2018-04
50:28
PowerShell Is DEAD — Epic Learnings!
Ben Turner
Doug McLeod
Rob Maslen
BSides London
· 2019
Technical
Advanced
Blue
Red
Talk
Open →
2019-06
47:22
BSidesCharm 2023 - Detecting and Triaging Modern Windows Rootkits - Andrew Case
BSides Charm
Open →
2023-05
51:02
Powershell for CyberWarriors - Russel Van Tuyl
BSides Knoxville
Open →
2016-06
37:13
Phishing With Phineas (Again) Hack Recreation On Steroids
George Karantzas
Constantinos Patsakis
BSides Athens
· 2022
Technical
Advanced
Purple
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-06
28:57
Abusing WCF Endpoint for RCE and Privilege Escalation
Christopher Anastasio
BSidesSF
· 2019
Technical
Red
Talk
Open →
2019-03
50:12
Active Directory Password Blacklisting
Leeren Chang
BSides Las Vegas
· 2018
Technical
Active Directory
Blue
Demo
Talk
Open →
2018-09
22:24
10 tips for Powershell as a hacking tool - Yossi Sassi
Yossi Sassi
BSides TLV
· 2019
Technical
Talk
Open →
2019-11
1:01:11
Taniec Z Całym Ciałem W Gipsie
Angelika Maria Piątkowska
BSides Warsaw
· 2018
Open →
2018-10
56:31
Using JA3: Asking for a Friend?
Justin Warner
Ed Miles
BSides DC
· 2019
Technical
Cryptography
DFIR
Detection Engineering
Network Security
Blue
Red
Talk
Open →
2019-11
28:23
AWS vs Azure Security
Paul Schwarzenberger
BSides London
· 2019
Technical
Cloud IAM
Talk
Open →
2019-06
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
50:58
It, Do it Live (PowerShell Digital Forensics)
Jared Atkinson
BSides DC
· 2015
Technical
Blue
Demo
Talk
Open →
2015-11
26:36
Latest evasion techniques in fileless malware - fl3uryz & Andrew Hay
BSides Las Vegas
Open →
2016-08
41:04
Hunt Or Be Hunted
Alex Davies
BSides London
· 2017
Technical
Blue
Talk
Open →
2017-06
45:19
Wykorzystanie ATT@CK MITRE Do Wykrywania Technik Stosowanych
Jacek Grymuza
BSides Warsaw
· 2018
Technical
Talk
Open →
2018-10
49:53
2017 - A Year In The Red by Dominic Chell and Vincent Yiu
BSides Manchester
Open →
2017-08
46:36
Incident Management with PowerShell
Matt Johnson
BSides Detroit
· 2013
Technical
DFIR
Blue
Talk
Open →
2013-06
47:48
Get-Help: An intro to PowerShell and how to use it for evil
Jared Haight
BSides Charleston
· 2015
Technical
Intro
Talk
Open →
2015-12
37:02
Holy smokes, how to vape yourself to root
Ross Bevington
BSides London
· 2017
Technical
Talk
Open →
2017-06
37:51
Building an Effective Intrusion Detection Program
Jason Craig
BSidesSF
· 2017
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2017-03
46:16
The Imitation Game: Emulating Attackers with CALDERA
Wietze Beukema
BSides London
· 2019
Technical
Talk
Open →
2019-06
47:16
Karl Fosaaen - Attacking Azure Environments with PowerShell - BSides Portland 2018
Karl Fosaaen
BSides PDX
· 2018
Technical
Cloud IAM
Red
Demo
Talk
Open →
2019-02
49:52
Abusing Windows with PowerShell and Microsoft debuggers
Pierre-Alexandre Braeken
BSides DC
· 2016
Technical
Active Directory
Advanced
Red
Talk
Open →
2016-10
44:49
Mo' Monero Mo' Problems: An Analysis of Cryptomining Malware
Joshua Reynolds
BSides Edmonton
· 2018
Technical
Talk
Open →
2018-09
52:59
Hiding in the clouds: How attackers can use applications for sustained persistence and how to find it
Mark Morowczynski
Michael Epping
Bsides CT
· 2020
Technical
Cloud IAM
Blue
Talk
Open →
2020-11
42:25
Bypassing AppLocker Protection by Manipulating Its Cache
Grzegorz Tworek
BSides Prishtina
· 2023
Technical
Reverse Engineering
Vulnerability Research
Red
Technical Deep-dives
Talk
Open →
2023-05
39:07
Hunting high-value targets in corporate networks - Patrick Fussell, Josh Stone
BSides Las Vegas
Open →
2016-08
57:19
PowerShell post-exploitation, the Empire has fallen
Michael Gough
BSides SATX
· 2018
Technical
Blue
Red
Talk
Open →
2018-07
13:28
Abusing WMI Providers For Persistence - Philip Tsukerman
Philip Tsukerman
BSides TLV
· 2018
Technical
Red
Talk
Open →
2018-07
33:40
Quick And Easy Forensic Timelines Via Sysmon, WEF, And ELK
Aaron Jewitt
BSides Munich
· 2019
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2019-03
45:11
Boston BSides - Ryan Nolette - Protect Against CryptoLocker Ransomware
BSides Boston
Open →
2016-07
51:17
BSidesSF 2023 - Advanced Attack Vectors in Azure Environments (Zur Ulianitzky, Bill Ben Haim)
Zur Ulianitzky
Bill Ben Haim
BSidesSF
· 2023
Technical
Active Directory
Cloud IAM
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-05
26:05
CoinMiner Are Evasive - Omri Segev Moyal & Thomas Roccia
Omri Segev Moyal
Thomas Roccia
BSides TLV
· 2018
Technical
Detection Engineering
Malware Analysis
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-07
48:29
DUALITY – Advanced Red Team Persistence through Self-Reinfecting DLL Backdoors... - Faisal Tameesh
Faisal Tameesh
BSides KC
· 2023
Technical
Advanced
Red
Talk
Open →
2023-10
52:47
Owning MS Outlook with Powershell
Andrew Cole
BSides Philly
· 2017
Technical
Red
Talk
Open →
2017-08
14:04
0Keyboard: a simple keyboard with the evil inside
Kastriot Fetahaj
BSides Prishtina
· 2022
Technical
Red
Demo
Talk
Open →
2022-05
38:28
Ryan Hays - Weaponizing Splunk: Using Blue Team Tools for Evil
Ryan Hays
BSides Knoxville
· 2017
Technical
Red
Demo
Talk
Open →
2017-06
41:24
BSides Perth Day 1 (Part 2)
BSides Perth
· 2021
Technical
DFIR
Detection Engineering
Malware Analysis
Talk
Open →
2021-09
40:56
BSMaaS 2020 - The Art of bypassing endpoint protections for red teaming engagements
BSides Munich
Open →
2020-09
45:41
Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government
Mark Parsons
BSides Charleston
· 2024
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-11
40:32
AMAZON FORENSIC PLATFORM: SCALING YOUR DIGITAL FORENSICS - Pratik Mehta
BSides Sydney
Open →
2019-09
20:10
Weaponizing Splunk: Using Blue Team Tools For Evil - Ryan Hays
BSides Boston
Open →
2017-05
25:06
Beyond Traditional Threats: The Rise of AI-Driven Malware
Shreya Maniktala
BSides Ahmedabad
· 2025
Technical
Talk
Open →
2025-03
30:06
Windows Event Forwarding and OSSEC — You can do this!
Robert Wilson
BSides Augusta
· 2018
Technical
DevSecOps
Blue
Talk
Open →
2018-11
50:01
ASP.NET Cryptography
Sebastian Solnica
BSides Warsaw
· 2017
Technical
Cryptography
Open →
2017-10
33:22
BSidesMCR 2019: Navigating The Red Forest - Derek Price
BSides Manchester
Open →
2019-09
37:47
Don't Google 'PowerShell Hunting'
Josh Rykowski
Sean Eyre
BSides Augusta
· 2017
Technical
DFIR
Detection Engineering
Malware Analysis
Talk
Open →
2017-09
29:06
GF - ATT&CKing Your Adversaries -- Operationalizing cyber intelligence in your own environment for b
BSides Las Vegas
Open →
2019-10
3:40:07
Security BSides Warsaw 2025 ścieżka 1 dzień 2
BSides Warsaw 2025
Technical
Advanced
Red
Panel
Open →
2025-11
48:09
Incident Response Case Study – Living off the Land - Will Hudec & Shawn Newman
BSides Peru
Open →
2023-08
9:17:44
2016 BSides - Breaking Ground - Day Two
BSides Las Vegas
Technical
Active Directory
Vulnerability Research
Red
Talk
Open →
2025-07
59:35
BSidesMCR 2019:Getting Splunky With Lateral Movement Attack,Detect&Evade -Ross Bingham&Tom MacDonald
BSides Manchester
Open →
2019-09
52:07
Purple View
Haydn Johnson
Laura Rafferty
BSides Toronto
· 2015
Technical
Active Directory
Purple
Talk
Open →
2015-11
2:11:51
Building InfoSec Worker Power Through the Labor Movement
Logan Arma
BSides Las Vegas
· 2025
Community
Career & Soft Skills
Talk
Open →
2025-08
50:50
Push comes to shove: exploring SCCM attack paths - Brandon Colley
Brandon Colley
BSides KC
· 2022
Technical
Active Directory
Red
Demo
Talk
Open →
2022-10
35:06
Fiddling with Flash Drive Forensics
Alexander Klepal
BSides SATX
· 2018
Technical
Red
Talk
Open →
2018-07
44:56
FileLess Malware Infections: Malware Tricks for Pentesters
Ramon Pinuaga
BSides Lisbon
· 2017
Technical
Malware Analysis
Reverse Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-11
26:10
LoL-Bins Behaving Badly - Andrew Costis
BSides Liverpool
Open →
2019-07
5:20:38
Bsides 2018 Track 2
BSides Vancouver
Open →
2018-03
29:57
BG - Writing Malware Without Writing Code - Gal Bitensky
BSides Las Vegas
Open →
2017-08
45:02
Introduction to Fileless Malware
Juan Araya
BSides Dublin
· 2021
Technical
Malware Analysis
Talk
Open →
2021-05
44:09
BG - SECSMASH: Using Security Products to own the Enterprise - Kevin Dick & Steven Flores
BSides Las Vegas
Open →
2017-08
44:48
Offensive Azure Security by Sergey Chubarov
Sergey Chubarov
BSides Dublin
· 2021
Technical
Talk
Open →
2021-05
3:33:32
BSides 2019 Day 1 Track 2
BSides Vancouver
Open →
2019-03
33:51
BYOTB: Bring Your Own Trusted Binary - David Kennedy
David Kennedy
BSides London
· 2025
Technical
Blue
Red
Talk
Open →
2025-02
42:06
Attacking Microsoft Exchange: Fusing LightNeuron with Cobalt Strike
Leon Jacobs
BSides Cape Town
· 2023
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Advanced
Purple
Red
Talk
Open →
2023-12
40:55
Quando o Simples Vence: Anatomia Real dos Ataques que Continuam Funcionando
Ricardo Tavares
BSides São Paulo
· 2025
War Stories
Active Directory
Detection Engineering
Malware Analysis
Threat Intel
Blue
Purple
Case Studies and Incidents Analysis
+1
Open →
2025-06
36:45
Testing Security Solutions with Atomic Red Team
Michael Haag
BSides Knoxville
· 2018
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-04
54:37
GAN & Gone: Manipulation of the Masses for Political and Social Gains
Logan Hicks
BSides SATX
· 2019
Technical
Red
Talk
Open →
2019-09
24:38
Automating Event Log Production & Testing for SIEM Detection
Alek Rollyson
BSides Augusta
· 2017
Technical
Detection Engineering
Tooling
Blue
Talk
Open →
2017-09
51:55
Isolated to Constrained Language Mode - Living within the Confines
Christopher Truncer
BSides DC
· 2018
Technical
Blue
Red
Talk
Open →
2018-11
16:55
365Inspect
Raquel Eisman
BSides Charleston
· 2022
Talk
Open →
2023-01
56:01
21st Century War Stories
Ben Turner
BSides Manchester
· 2016
War Stories
OSINT
Social Engineering
Threat Intel
Red
Case Studies and Incidents Analysis
Talk
Open →
2016-09
29:55
Bad USB Weaponized
Dan Anderson
Steve Fink
BSides SLC
· 2015
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Red
Demo
Talk
Open →
2015-04
5:42:35
BSides Prishtina 2025 - Day 2 Live
BSides Prishtina
· 2025
Technical
Talk
Open →
2025-04
1:34:46
Chris Truncer - Offensive WMI Workshop
BSides Augusta
Open →
2021-10
44:16
Eric Goldstrom - Interactive Threat Defense: Incident Response, Threat Intel, and Red Team (oh my!)
Eric Goldstrom
BSides PDX
Technical
Talk
Open →
2019-11
18:06
This is a serious laptop; No games and chatting possible OK?
Yiannis Koukouras
BSides Athens
· 2018
Technical
Red
Talk
Open →
2018-07
42:08
The Adversary Mindset: Practical examples from the field
Yossi Sassi
BSides Budabest
· 2024
Technical
Talk
Open →
2024-09
25:44
DNS Hardening - Proactive Net Sec Using F5 iRules and Open Source Analysis Tools - Jim Nitterauer
BSides Las Vegas
Open →
2016-08
51:14
Living Off the Land: Windows Post-Exploitation with Built-in Tools
Christopher Campbell
Matthew Graeber
BSides Augusta
· 2013
Technical
Malware Analysis
Post-Exploitation
Red
Talk
Open →
2013-09
46:48
The Process of Detection Engineering1
BSides Tampa
Technical
Intermediary
Blue
Talk
Open →
2023-03
32:47
Domain Persistence in Active Directory: Detection, Triage, and Recovery
Nicolas Shyne
BSides Belfast
· 2025
Technical
Active Directory
Kerberos
Blue
Talk
Open →
2025-02
24:42
PG - Bypassing Antivirus Engines using Open Sourced Malleable C2 Software, MSFVenom, Powershell and
BSides Las Vegas
Open →
2018-09
43:21
The Problem With Identity Security & How To Fix It
Sean Metcalf
BSides Dublin
Technical
Talk
Open →
2024-06
52:06
No Disassembly Required
Brian Satira
BSides Peru
· 2018
Technical
DFIR
Malware Analysis
Reverse Engineering
Blue
Talk
Open →
2018-06
21:06
Learning Security by ATT&CK'ing Yourself
Travis Smith
BSides PDX
· 2018
Career
Community
Talk
Open →
2019-02
37:13
Take Down Cyberthreat Dwell Time With Optimum Security
Eric Payne
BSides Vancouver
· 2021
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2021-06
55:44
Fernando Tomlinson - Gaining 20/20 vision during an incident with PowerShell
Fernando Tomlinson
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2019-10
29:06
EDR Bypass: From Zero to Success
Jia Hu
BSides Edmonton
· 2025
Technical
Red
Talk
Open →
2025-10
17:30
Portscanning with PowerShell
James Conlan
BSides Bristol
· 2025
Technical
Talk
Open →
2024-01
47:22
Weaponizing Ansible
Christopher Grimm
BSides Charleston
· 2017
Technical
DevSecOps
Tooling
Blue
Red
Talk
Open →
2017-11
38:36
BSides Toronto 2019 Lee Kagan
BSides Toronto
Open →
2019-10
53:22
Offense for Everyone by Bryson Bort
Bryson Bort
BSides Tampa
· 2025
Technical
Red
Talk
Open →
2025-07
47:19
Bypassing Anti-Virus Using BadUSB by Cristian Cornea
Cristian Cornea
BSides Cheltenham
· 2023
Technical
Talk
Open →
2023-06
23:31
BSidesSF 2022 - Rise of the Vermilion ... (Avigayil Mechtinger • Ryan Robinson)
Avigayil Mechtinger
Ryan Robinson
BSidesSF
· 2022
Research
Advanced
Blue
Case Studies and Incidents Analysis
Talk
Open →
2022-07
32:16
Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate
Tomer Nahum
Jonathan Elkabas
BSides Frankfurt
· 2025
Technical
Active Directory
Cloud IAM
Intermediary
Blue
Red
Technical Deep-dives
Demo
+1
Open →
2025-12
47:15
Chris Myers and Barrett Adams Building a Cloud Pentest Lab (and how we blew some up)
Chris Myers
Barrett Adams
BSides Delaware
· 2018
Technical
Talk
Open →
2018-11
28:17
James Habben - Assessing Weaponized USB Devices
James Habben
BSides PDX
· 2018
Technical
Talk
Open →
2018-03
52:58
Dave Kennedy Keynote
Dave Kennedy
BSides Boston
· 2017
Technical
Keynote
Open →
2017-05
25:40
Red and Blue Ping Pong: Living Off the Land in Windows Attack and Defense
Lee Kagan
Anton Ovrutsky
BSides Toronto
· 2017
Technical
Active Directory
Malware Analysis
Purple
Demo
Talk
Open →
2018-01
20:34
Getting Started With CTF’s by Jeff Moye
Jeff Moye
BSides London
Talk
Open →
2022-01
47:55
@ISC2PGHChapter - Hands on Scripting lab with PowerShell and Python
BSides Peru
Open →
2017-09
24:50
PG - The SOC Counter ATT&CK - Mathieu Saulnier
BSides Las Vegas
Open →
2019-10
44:12
Marc Lopez - Taken: What Happens When A Hacker's Daughter Goes Missing
Marc Lopez
BSides Augusta
· 2022
War Stories
Talk
Open →
2023-10
27:06
Automating security with PowerShell
Jaap Brasser
BSides Amsterdam
· 2017
Technical
Blue
Red
Demo
Talk
Open →
2017-09
55:34
Adding PowerShell to your Arsenal with PSAttack
Jared Haight
BSides Charleston
· 2016
Technical
Talk
Open →
2016-11
50:06
Threat Hunting: Out of the Gate with Windows Logs
Greg Longo
Brian Gardiner
BSides Peru
· 2019
Technical
Detection Engineering
Malware Analysis
Threat Intel
Intro
Blue
Technical Deep-dives
Talk
Open →
2019-07
41:22
Blue About Not Being Red? How to Be More Offensive
Tim Medin
BSides KC
· 2019
Career
Kerberos
Talk
Open →
2019-06
27:15
Abusing Azure Arc: From Service Principal Exposed To Reverse Shell
Christian Bortone
BSides Leeds
· 2024
Technical
Active Directory
Cloud IAM
Advanced
Red
Technical Deep-dives
Talk
Open →
2024-07
45:58
Man In The Cloud Attack
Adam Fisher
BSides SLC
· 2017
Technical
Cloud IAM
Red
Talk
Open →
2017-06
47:46
BSidesSLC 2016 -- Preparing 4 PowerShellmageddon -- Chad Tilbury
BSides SLC
Open →
2016-05
49:49
Closing the Visibility Gap: Threat Hunting with Hawk in the Microsoft Cloud
Jonathan Butler
Lorenzo
Paul Navarro
BSides Charm
· 2025
Technical
Tooling
Cloud IAM
DFIR
Detection Engineering
Blue
Demo
Talk
Open →
2025-05
44:59
Tony Lambert - Spotting Lateral Movement with Endpoint Data
Tony Lambert
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
25:43
How Attackers (or Red Teamers) Navigate Azure Using Key Vault Lateral Movement
Christiano Bianchet
BSides Seattle
Technical
Cloud IAM
Red
Talk
Open →
2025-08
54:51
Spoofing Commands - Can You Trust Process Creation Logs?
BSides Canberra
· 2024
Technical
Intermediary
Talk
Open →
2024-12
35:18
Hunt the Stank
Melissa Bischoping
Nir Yosef
BSides Delaware
· 2021
Technical
Blue
Talk
Open →
2021-11
22:45
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides PDX
· 2024
Research
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
26:34
LAMBDA Malware: The Hidden Threat In Excel Spreadsheets by Yonatan Baum and Daniel Wolfman
Yonatan Baum
Daniel Wolfman
BSides Dublin
· 2023
Technical
Talk
Open →
2023-07
27:34
Hunting Fileless Malware with Treesitter - David Mcdonald
David McDonald
BSides SATX
· 2024
Technical
Advanced
Technical Deep-dives
Talk
Open →
2024-06
30:54
DPAPI Demystified: Abusing The Windows Data Protection API One Secret At A Time
Daniel Küppers
BSides Munich
· 2025
Technical
Cryptography
Red
Talk
Open →
2026-02
46:48
InfoSec, Just Doing It
Rob Jorgensen
BSides SLC
· 2015
Career
Career & Soft Skills
Intro
Talk
Open →
2015-04
49:31
Endpoint to Internet: Security Control Validation Using Threat Behavior Emulation
Ken Jenkins
Stuart McMurray
BSides DC
· 2018
Technical
Detection Engineering
Threat Intel
Blue
Red
Talk
Open →
2018-11
52:07
Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science
Daniel Bohannon
BSides DC
· 2017
Technical
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2017-10
55:57
Y'all Tryna enumerate Azure AD and RBAC or Nah?
Leron Gray
BSides Seattle
· 2020
Technical
Cloud IAM
Red
Demo
Talk
Open →
2020-11
55:07
Brandon George - Hunt Like You Mean It
BSides Columbus
Open →
2020-08
38:00
Adding More Realism To Learning Security Testing By Using SWAG And Swing by Colin McLean
BSides Scotland
Open →
2017-04
26:21
Patrick Colford - Scraping Pastebin for Obfuscated Malware - BSides Portland 2018
Patrick Colford
BSides PDX
· 2018
Technical
Demo
Talk
Open →
2019-02
53:09
BG - WhyMI So Sexy? WMI attacks, Realtime Defense & Advanced Forensic Analysis - William Ballenthin,
BSides Las Vegas
Open →
2016-12
40:48
Angela Hennessy - Detecting DNS Tunneling
Angela Hennessy
BSides Boulder
· 2021
Technical
Blue
Talk
Open →
2021-01
38:58
Windows Management Instrumentation for Good and Evil
Jaime Geiger
BSides Delaware
· 2017
Technical
Talk
Open →
2017-11
17:51
Basic Offensive Application of MOF Files in WMI Scripting
Devon Bordonaro
Connor Gephart
Sam Ruthenberg
BSides Charm
· 2018
Technical
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2021-05
45:51
Digital Forensics – The Importance of Forensic Triage Images by Ryan Irving
Ryan Irving
BSides Tampa
Technical
Talk
Open →
2024-05
53:14
BSidesSLC 2017 -- Haydn Johnson -- Planning a Purple Team Exercise; The What, Why, and How
BSides SLC
Open →
2017-07
34:01
Detect the Undetectable with Sysmon and PowerShell Logs
Dimitrios Margaritis
BSides Athens
· 2017
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2017-10
58:11
New Shell in Town: Adventures in using PowerShell on Linux
Fernando Tomlinson
BSides Augusta
· 2021
Technical
Demo
Talk
Open →
2021-10
46:34
Save the Env (Variable): Hijacking Legit Apps w/ Minimal Footprint
Wietze Beukema
BSides NYC
· 2023
Technical
Malware Analysis
Reverse Engineering
Red
Technical Deep-dives
Talk
Open →
2023-06
48:51
PowerShell pew pew pew: Skillz 4 blue team
Ashley McGlone
BSides Columbus
· 2020
Technical
Detection Engineering
Blue
Talk
Open →
2020-08
42:16
The Fellowship of the Ring0: Driver Risk Scoring for Vulnerability Detection
Dana Behling
BSides Charm
· 2024
Research
Technical
Detection Engineering
Malware Analysis
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2024-06
25:35
Low Hanging Blue Fruit: Defending With Open-Source Tools
Yaron King
BSides TLV
· 2019
Technical
Blue
Talk
Open →
2019-11
51:44
Zero Trust — Attack and Defend
Aaron Jewitt
BSides Frankfurt
· 2024
Technical
Cloud IAM
Detection Engineering
Purple
Talk
Open →
2025-05
42:50
Where's Wally? Hands-On Thread Hunting In Elasticsearch Using EE-Outliers
Daan Raman
BSides Luxembourg
· 2019
Technical
Demo
Talk
Open →
2019-11
26:06
DarkEngine: Conducting Research into a Highly Orchestrated Phishing Campaign
Liam Wilkinson
BSides Canberra
· 2025
Research
DFIR
Malware Analysis
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
37:56
Show, Don't Tell: PoCs That Make Security Unignorable
Lou Vega
BSides Charleston
· 2025
Technical
Reverse Engineering
Web AppSec
Red
Talk
Open →
2025-11
20:21
BSidesMCR 2019: Malicious Behavior Detection Using WMI - Ben Lister
BSides Manchester
Open →
2019-09
17:35
Azured Persistence
Peter Ewane
BSides Belfast
· 2018
Technical
Talk
Open →
2018-10
29:51
Stories from the Trenches: Initial Access to Exfiltration... by Tristan Luikey & Jonny Elrod
Tristan Luikey
Jonny Elrod
BSides Tampa
· 2025
Technical
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-06
18:42
Yossi Sassi, Dor Amit - The Art of C2: Myths vs. Reality
Yossi Sassi
Dor Amit
BSides TLV
· 2020
Technical
Talk
Open →
2020-07
39:13
Hiding In The Clouds
Mark Morowczynski
Corissa Koopmans
BSides Charlotte
· 2020
Technical
Cloud IAM
Talk
Open →
2020-10
53:48
Having your pick of the litter: Storing Malware Stagers in Enterprise Services
Fernando Tomlinson
BSides Charleston
· 2019
Technical
Talk
Open →
2019-11
47:02
BSidesSLC 2017 -- Dave Kennedy -- A Continually Changing Industry: INFOSEC
BSides SLC
Open →
2017-06
31:55
A walkthrough of the CERT Australia BSides 2017 Incident Response challenge
Andrew Clark
BSides Canberra
· 2018
Technical
Talk
Open →
2019-02
24:17
Social Engineering The Kill Chain by Tom Harrison
Tom Harrison
BSides Leeds
· 2023
Technical
Talk
Open →
2023-07
24:33
Testing Defensive Controls w/ atomic-operator - Josh Rickard
Josh Rickard
BSides KC
· 2022
Technical
DevSecOps
Blue
Talk
Open →
2022-10
49:35
BSidesROC 2025 - Investigating a Malicious Script in Microsoft Intune - Dennis Labossiere
BSidesROC
Open →
2025-03
26:37
Barcode scanners are disguised windows to your Windows
Paz Hameiri
BSides TLV
· 2023
Technical
Talk
Open →
2023-07
32:02
From Hooks to Shields: The Evolution of Phishing and the Art of Defense
John Dilgen
BSides Tampa
· 2025
Technical
Intro
Talk
Open →
2025-07
30:03
Scott Taylor: Exploring Common Hacking Techniques
Scott Taylor
BSides Calgary
Open →
2020-12
13:45
Invoke-NoShell - Gal Bitensky
Gal Bitensky
BSides TLV
· 2018
Talk
Open →
2018-07
45:47
Bye Bye NTLM
Evgenij Smirnov
BSides Berlin
· 2023
Technical
Active Directory
Kerberos
Blue
Talk
Open →
2024-01
43:03
BSides Iowa 2018: "Windows COM from the bottom up"
BSides Iowa
Open →
2018-04
25:46
Live Interrogation With Osquery
Josh Brower
BSides Augusta
· 2018
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Demo
Talk
Open →
2018-10
30:47
Mitigating Lateral Movement: Quick Wins
Robert Wilson
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
26:47
Bypassing Antivirus with badUSB: Evading Windows Defender via Keyboard Emulation
Cristian Cornea
BSides Sofia
· 2023
Technical
Hardware Hacking
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2023-03
52:05
Ransomware: The Real Pandemic
Jeremy Rasmussen
BSides Tampa
· 2021
Technical
Case Studies and Incidents Analysis
Talk
Open →
2021-04
33:05
Mike Erman & Alex Gonzalez - Stealing the Network via Cisco Anyconnect VPNs
Mike Erman
Alex Gonzalez
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
31:34
A Journey Through MITRE Evaluation - Alex Davies
Alex Davies
BSides Cymru Wales
· 2019
Talk
Open →
2019-10
14:50
TryHackingMy Way From Cyber Sales to Cyber SOC
R4ck4tt4ck
Michael Rack
BSides London 2025
Career
Career & Soft Skills
Detection Engineering
Intro
Blue
Talk
Open →
2026-03
49:49
Cloud Breach Incident Response & Forensics
Michael T. Raggo
Bsides CT
· 2020
Technical
Cloud IAM
Case Studies and Incidents Analysis
Talk
Open →
2020-11
29:55
Getting Started in DFIR
Josh Stemp
BSides Boise
· 2020
Career
Career & Soft Skills
DFIR
Intro
Talk
Open →
2020-10
25:53
Fileless malware -Jim Van De Ryt
BSides Peru
Open →
2018-06
1:00:02
Calling from Inside the House: How Nation States Use Your Domain to Compromise Your Cloud Infrastructure
Alex Parsons
BSides Vancouver
· 2021
Technical
Cloud IAM
DFIR
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-06
46:46
What the Function: A Deep Dive into Azure Function App Security
Karl Fosaaen
BSides PDX
· 2024
Technical
Cloud IAM
Talk
Open →
2024-11
29:14
BumpKey: A Hardware Swiss Knife for Red Teamers
Mauro Eldritch
Luis Angel Ramírez Mendoza
BSides Islamabad
· 2020
Technical
Red
Demo
Talk
Open →
2020-12
31:04
Host-Hunting on a Budget
Leo Bastidas
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-10
27:26
Don't Turn Your Back on Ransomware
BSides Newcastle
· 2022
Technical
Active Directory
DFIR
Malware Analysis
Demo
Talk
Open →
2022-09
47:33
Owning MS Outlook with PowerShell
Andrew Cole
BSides Augusta
· 2016
Technical
Reverse Engineering
Tooling
Red
Talk
Open →
2016-09
10:30
Sysmon Monitoring Different Way
Marek Mikita
BSides Vancouver
· 2021
Tooling
Demo
Talk
Open →
2021-06
34:49
Tom Maddock - Splunking AD - BSides San Diego 2017
BSides San Diego
Open →
2017-01
27:40
All You Need is Guest
Avishai Efrat
BSides TLV
· 2024
Technical
Cloud IAM
Red
Demo
Talk
Open →
2024-08
55:56
KQL and Azure AD Workbooks
Corissa Koopmans
Tosin Lufadeju
BSides Charm
· 2022
Technical
Cloud IAM
Detection Engineering
Threat Intel
Intro
Blue
Talk
Open →
2022-07
24:10
So You Wanna Be a Red Teamer
Shelby Spencer
BSides Boise
· 2020
Career
Career & Soft Skills
Intro
Red
Talk
Open →
2020-10
31:44
2019 - Hidden Agenda The darker side of cryptocurrency botnet mining - Greg Foss
BSides Denver
Open →
2019-09
1:03:24
AI Cyberoperations: Boosting SOC Efficiency with Artificial Intelligence
Gustavo Gómez
BSides Colombia
Technical
AI Security
Detection Engineering
Blue
Talk
Open →
2025-03
26:59
The Katz Out Of The Bag
Sándor Fehér
BSides Budabest
· 2019
Technical
Active Directory
Kerberos
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2019-06
51:15
Microsoft Quick Assist
Tyler Hudak
BSidesROC
· 2025
Technical
Talk
Open →
2025-03
39:10
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides Dallas/Fort Worth
· 2024
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
27:25
GF - Invoke-NoShell - Gal Bitensky
BSides Las Vegas
Open →
2018-09
48:34
Understanding the Modern Attack: A Review of the Adversary's Operational Lifecycle
Jason Rivera
BSides Vancouver
· 2022
Technical
Detection Engineering
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-07
39:41
Catch Me if You Can
Michael Bryant
BSides Asheville
· 2016
Technical
Active Directory
Detection Engineering
Threat Intel
Red
Talk
Open →
2018-06
49:26
Sysmon or it Didn't Happen
Gerard Johansen
BSides Charm
· 2024
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2024-06
43:38
Passwords: Policies, Securing, Cracking, and More
Derek Melber
BSides Las Vegas
· 2023
Technical
Active Directory
Kerberos
Talk
Open →
2023-10
41:12
Detecting Ghouls & Ghosts in the Wires
Michael Edie
BSides Augusta
Technical
Blue
Demo
Talk
Open →
2023-10
47:41
BSidesIA 2017 Track1: Still Penetrating Your Perimeter – Josh Stroschein & Matt Miller
BSides Iowa
Open →
2017-04
54:02
Using Microsoft's Incident Response Language
Chris Campbell
BSides Augusta
· 2014
Technical
Talk
Open →
2014-09
26:50
Powering Up Linux: Unleashing PowerShell for Penetration Testing and Red Team
TJ Null
BSides Buffalo
· 2024
Technical
Red
Demo
Talk
Open →
2024-06
23:50
"Identifying and Abusing Vulnerable Configurations in MS AD Group Policy" - Mike Loss
Mike Loss
BSides Canberra
· 2018
Technical
Active Directory
Talk
Open →
2018-08
42:59
Go Hack Yourself
Jason Frank
BSides Augusta
· 2015
Technical
Active Directory
Network Security
Vulnerability Research
Talk
Open →
2015-09
34:50
AMSI: O cão de guarda que late mas não morde?
Mario Lobo Romero
BSides São Paulo
· 2025
Technical
Detection Engineering
Malware Analysis
Technical Deep-dives
Talk
Open →
2025-06
45:17
Nathan Dolan: Powershell Threat Hunting Recipes
Nathan Dolan
BSides Calgary
· 2020
Technical
Talk
Open →
2020-12
31:37
Windows EventLog Persistence: Abusing Event Logs for Undetectable Red Team Access
Fabricio Gimenes
BSides Las Vegas
· 2024
Technical
Malware Analysis
Advanced
Red
Talk
Open →
2024-09
22:11
Starting A Dumpster Fire: Data Exfiltration
Josh Smith
BSides RDU
· 2019
Technical
Red
Demo
Talk
Open →
2019-10
34:11
Demystifying DNS Security – Practical Steps for Reducing Exposure and Detecting Compromise
Jim Nitterauer
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
56:11
I Thought I Saw a |-|4X0.-
Thomas Fischer
BSides Lisbon
· 2017
Technical
Talk
Open →
2017-11
14:25
Virtually Networkless - A dive into VSOCKs - Izzy Whistlecroft
Izzy Whistlecroft
BSides Belfast
· 2025
Technical
Talk
Open →
2025-02
24:20
Rogue - Neil Lines
Neil Lines
BSides Leeds
Technical
Red
Talk
Open →
2020-07
33:43
Operation Grand Mars: Defending Against Carbanak
Thanassis Diogos
BSides Athens
· 2017
Technical
Active Directory
DFIR
Malware Analysis
Blue
Case Studies and Incidents Analysis
Talk
Open →
2017-10
23:21
Skills to Build for Your Cloud Security Career
Cassandra Young
BSides Philly
· 2023
Career
Career & Soft Skills
Cloud IAM
Intro
Talk
Open →
2024-01
35:38
I Know What You Did Last Summer… I'm Still Hacking Your Small Business
Vincent Matteo
BSides SATX
· 2022
Technical
War Stories
Red
Talk
Open →
2023-03
33:52
What the Log?! So Many Events, So Little Time...
Miriam Wiesner
BSides Luxembourg
· 2019
Technical
Open →
2019-11
37:55
Purple Teaming 301 – Free Attack Simulation and Control Validation via Atomic Red Team
Jason Wright
BSides Charm
· 2024
Technical
Detection Engineering
Threat Modeling
Purple
Talk
Open →
2024-06
45:00
Intelligence Driven Incident Response
Vito Alfano
Artem Artemov
BSides Zagreb
· 2024
Technical
DFIR
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Talk
Open →
2025-03
25:48
From Noise To Insight: Supercharge Your SOC With Automated Alert Correlation
Anicet Fopa Tchoffo
BSides Leeds
Technical
Talk
Open →
2024-07
16:09
Visualize Windows Events using Python3 & Neo4j
Tasos Chatziefstratiou
BSides Athens
· 2020
Technical
Blue
Demo
Talk
Open →
2020-06
26:08
T1 12 A "Shortcut" to Red Teaming, Theo Papadopoulos
Theo Papadopoulos
BSides Athens
· 2017
Red
Talk
Open →
2017-10
38:29
Fantastic Persistence: Creative backdoors & where you will NOT find them
Yossi Sassi
BSides Budabest 2025
Technical
Active Directory
DFIR
Detection Engineering
Demo
Talk
Open →
2026-03
20:36
Nicholas Gobern - Good Behavior is it's own reward
Nicholas Gobern
BSides Augusta
Technical
Talk
Open →
2023-10
39:40
Offensive Azure Security
Sergey Chubarov
BSides Budabest
· 2021
Technical
Cloud IAM
Red
Demo
Open →
2022-03
21:52
BSidesCLT 2021: PowerShell’s Return to Power - Dahvid Schloss
Dahvid Schloss
BSides Charlotte
· 2021
Technical
Red
Talk
Open →
2021-09
41:50
How Adversaries Are Abusing Network Blind Spots - Edmund Brumaghin and Earl Carter
Edmund Brumaghin
Earl Carter
BSides Belfast
Talk
Open →
2020-01
30:08
Before the Breach: The Security Essentials
Peter Ukanov
BSides Charlotte
· 2025
Technical
DFIR
Detection Engineering
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-05
50:34
I Wrote My Own Ransomware; Did Not See 1 Iota of Bitcoin
Thomas Fischer
BSides Scotland
· 2018
Technical
Malware Analysis
Reverse Engineering
Red
Talk
Open →
2018-05
17:47
Trouble with the Troubleshooter: A Primer on CVE-2022-30190
Grant Shanklin
BSides KC
· 2022
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
28:24
Fantastic Clear-Text Passwords And Where To Collect Them
Stephan Berger
BSides Munich
· 2025
Technical
Active Directory
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2026-02
41:51
Keeping up with the Jones's and other APT threats
Kenneth Inkster
BSides Calgary
Technical
DFIR
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2020-12
55:43
Creating an Effective Security Posture
Dominique Pizzie
BSides SATX
· 2019
Career
Talk
Open →
2019-09
32:51
I Hope This Email Finds You Well: AI Phishing, MFA Theft, Consent Grant Abuse, and Remediation in O365 & Entra ID
Mack Taff
BSides Dallas/Fort Worth
· 2024
Technical
AI Security
Cloud IAM
Social Engineering
Talk
Open →
2025-01
34:24
PowerShell's Return to Power
Dahvid Schloss
BSides Greenville
· 2021
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2021-10
48:05
Stay Classy - Class Object Model
Nigel Weber
BSides Calgary
· 2020
Open →
2020-12
34:07
The Cloud is for Launching Cyber Attacks
Raymond Cazanese
BSides Philly
· 2020
Technical
Cloud IAM
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2020-12
52:34
G1234! - Protecting Windows Credentials: An Excessive Guide for Security Professionals - Mark Burnet
BSides Las Vegas
Open →
2017-08
51:28
BG - Building an Empire with PowerShell Will Schroeder & Justin Warner
BSides Las Vegas
Open →
2016-12
29:41
Frustrating the PenTester with Active Directory - Dale Hollis
Dale Hollis
BSides KC
· 2022
Technical
Active Directory
Blue
Talk
Open →
2022-10
52:31
MITRE ATT&CK – Combining APTs, TTPs, & GRC to build realistic security programs
Alex Martirosyan
BSides Buffalo
· 2022
Technical
Talk
Open →
2022-06
25:53
PowerShell's Return to Power
Dahvid Schloss
BSides RDU
· 2021
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2021-10
46:07
AD and DNS: A Match Made in Heck
Jim Sykora
Jake Hildreth
BSides Charm
· 2023
Technical
Active Directory
Kerberos
Talk
Open →
2023-06
53:54
BSidesAugusta 2018 - Chris Truncer - Isolated to Constrained Language Mode
BSides Augusta
Open →
2018-10
36:56
Practical Defense
Sean Whalen
BSides Cincinnati
· 2017
Talk
Open →
2017-05
28:09
Watching Kittens at Play: Dissecting an Iranian Nation State Interactive Intrusion
Ryan Thompson
BSides SATX
· 2022
Technical
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-03
39:38
I Know What You Did Last Summer… I'm Still Hacking Your Small Business
Vincent Matteo
BSides KC
· 2022
Technical
Red
Case Studies and Incidents Analysis
Talk
Open →
2022-10
41:06
Tim Schulz - Automating Adaptive Adversaries
BSides Knoxville
Open →
2022-05
50:26
Shelly Giesbrecht: The Trouble With Ransomware
Shelly Giesbrecht
BSides Calgary
· 2020
Technical
Talk
Open →
2020-12
21:54
Breaking Down Walls With Windows
Alexander Klepal
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
52:33
Securing Active Directory & PAM for ADDS
Rohit D'Souza
Bsides CT
· 2019
Technical
Active Directory
Kerberos
Blue
Talk
Open →
2019-11
44:24
BSides Iowa 2018: "Drug Dealing in IOC’s: a retrospective on threat intel & threat hunting..."
BSides Iowa
Open →
2018-04
49:26
Please Waste My Time - Qasim Ijaz
Qasim Ijaz
BSides KC
Technical
Blue
Talk
Open →
2024-05
35:15
PowerShell's Return to Power
Dahvid Schloss
BSides Dallas/Fort Worth
· 2021
Technical
Red
Talk
Open →
2021-11
19:36
Offensive Azure Security
Sergey Chubarov
BSides Athens
· 2021
Technical
Active Directory
Cloud IAM
Red
Demo
Open →
2021-07
21:37
Threat Actors Do the Funniest Things - Peter Mackenzie
Peter Mackenzie
BSides Bournemouth
· 2025
War Stories
DFIR
Malware Analysis
Intro
Blue
Talk
Open →
2025-09
26:25
Cookie Monster: Tasty Tasty Bytes
Eric Kuehn
BSides Charleston
· 2018
Talk
Open →
2018-11
1:00:24
I thought I saw a |-|4X0.- by Thomas Fischer
BSides Scotland
Open →
2017-04
58:20
Hackers on the Move: Tools of the Trade
Hank Fordham
BSides Calgary
Technical
Hardware Hacking
Network Security
Social Engineering
Wireless Security
Red
Demo
Talk
Open →
2024-03
23:37
D'oH The Simpsons Look at the Growth of DoH in Malware - Allan Liska
BSides Bournemouth
Open →
2025-09
56:23
Blue teaming Incident Response for the Win
Roy Wattanasin
Bsides CT
· 2019
Technical
Blue
Talk
Open →
2019-11
18:54
I Thought I Saw a HAXOR
Thomas V. Fischer
BSides Amsterdam
· 2017
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2017-09
47:14
Navigating the Virtualization Battlefield: A Deep Dive into Hypervisor Attack Vectors
Austin Gadient
BSides NYC
· 2025
Technical
Malware Analysis
Threat Intel
Vulnerability Research
Intermediary
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2025-11
31:10
Cryptojacking Servers: The Intersection of Poor Patch Management, ICOs and Autopwning
Chuck McAuley
Bsides CT
· 2018
Technical
Red
Talk
Open →
2018-11
29:34
Striding Out To Prevent Misconfigurations
Andrea Jones
BSides Leeds
Talk
Open →
2025-08
48:07
Can You Hear Me Now? Good — Because Volt Typhoon Can, Too
David Branscome
BSides Augusta
· 2025
Technical
Active Directory
Detection Engineering
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2025-10
28:57
Assumed Breach: A Better Model for Pen Testing
Mike Saunders
BSides KC
· 2019
Technical
Active Directory
Kerberos
Threat Intel
Red
Talk
Open →
2019-06
32:28
Server 2016 and the End of Lateral Movement (Or is it?)
Ryan Preston
BSides KC
· 2017
Technical
Talk
Open →
2017-07
54:16
PurpleTeam 101 by Chris Peacock
Chris Peacock
BSides Tampa
· 2023
Purple
Talk
Open →
2023-09
45:05
Detecting the Elusive: Active Directory Threat Hunting
Sean Metcalf
BSides Charm
· 2017
Technical
Active Directory
Detection Engineering
Kerberos
Blue
Technical Deep-dives
Talk
Open →
2021-05
26:03
Is malware getting smarter? Exploring AI-driven threats and solutions
Candid Wuest
BSides Dublin
Technical
Talk
Open →
2025-10
44:52
Credential Compromise: Well, What Now?
Nate Kirk
BSides Dallas/Fort Worth
· 2021
Technical
Active Directory
Cloud IAM
Network Security
Purple
Talk
Open →
2021-11
54:29
Developing a holistic approach to threat hunting: Welcome to the jungle
Richard Rowlandson
BSides Calgary
· 2020
Talk
Open →
2020-12
48:06
John Helt - The Many Faces of Emotet: Annoyance or Threat?
BSides Knoxville
Open →
2019-06
14:26
Actioning ATT&CK
Jake Liefer
BSides Delaware
· 2018
Technical
Detection Engineering
Threat Modeling
Purple
Technical Deep-dives
Talk
Open →
2018-11
20:22
Sandbox gems for CTI rookies - Ertugrul Kara
BSides Bournemouth
Open →
2025-09
37:48
Copy That: Tracking and clustering ClickFix campaigns
Stef Rand
BSides Augusta
· 2025
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-10
33:30
Enriching Your SOC Investigations with Insights from Active Directory
Richard Smith
BSides Buffalo
· 2023
Technical
Active Directory
Blue
Talk
Open →
2023-06
47:06
The Cat and Mouse Game! EDR and XDR
Jason Maynard
BSides Calgary
· 2021
Technical
Talk
Open →
2021-12
31:00
Ryuk Ransomware in Industrial Control System Networks
Camille Jackson Singleton
BSides SLC
· 2021
Technical
Talk
Open →
2021-12
36:13
Top 10 Mistakes Made In Active Directory That Can Lead To Being Compromised
Adam Steed
BSides Philly
· 2017
Technical
Active Directory
Talk
Open →
2017-08
56:35
5 Things that Matter
Dave Kennedy
BSides Charlotte
· 2019
Keynote
Open →
2019-11
51:10
So you want to beat the Red Team
Cameron Moore
BSides Philly
· 2017
Technical
Blue
Talk
Open →
2017-08
38:55
Wolves in Windows Clothing: Weaponizing Trusted Services for Stealthy Malware
Michael Bargury
BSides Las Vegas
· 2023
Technical
Cloud IAM
Malware Analysis
Threat Intel
Advanced
Red
Demo
Talk
Open →
2023-10
54:27
A Tale of Two Powershells
Fernando Tomlinson
BSides Greenville
· 2020
Technical
Active Directory
Detection Engineering
Malware Analysis
Purple
Talk
Open →
2020-06
47:03
Have Your Pick of the Litter
Fernando Tomlinson
BSides Charlotte
· 2019
Open →
2019-11
31:24
2018 BSides Toronto: Haydn Johnson
BSides Toronto
Open →
2018-11
50:26
Alexander Rymdeko-Harvey - RAT Reusing Adversary Tradecraft
Alexander Rymdeko-Harvey
BSides Augusta
· 2016
Technical
Talk
Open →
2016-09
49:47
Offensive Azure Security
Sergey Chubarov
BSides Cyprus
· 2021
Technical
Cloud IAM
Red
Demo
Open →
2022-06
45:40
Offensive Azure Security
Sergey Chubarov
BSides Barcelona
· 2021
Technical
Active Directory
Cloud IAM
Red
Demo
Open →
2022-01
58:13
Incident Response is HARRRRRD… but it doesn't have to be
Michael Gough
BSides SATX
· 2020
Technical
Blue
Talk
Open →
2020-08
23:57
When the Shadow Crosses Over
Ilya Yatsenko
BSides NYC
· 2025
Technical
Active Directory
Reverse Engineering
Red
Technical Deep-dives
Demo
Talk
Open →
2025-11
58:39
Incident Response Fails – What we see with our clients
Michael Gough
BSides SATX
· 2021
Technical
Blue
Talk
Open →
2021-06
26:55
BSides Iowa 2018: "Immutable Architecture and Ruthless Automation"
BSides Iowa
Open →
2018-04
47:35
Sharing Open Datasets with the World to Develop Detections from Home | Roberto Rodriguez
Roberto Rodriguez
BSides Delhi 2020
Community
Technical
DFIR
Detection Engineering
Threat Modeling
Talk
Open →
2020-11
44:06
Taste the Rainbow
BSides NYC
· 2018
Open →
2023-04
46:15
A-hunting We Will Go! Adventures in Endpoint Threat Detection
David Branscome
Bsides CT
· 2020
Technical
Blue
Talk
Open →
2020-11
49:39
Supercharge Your SOC with Sysmon
Chris Lee
Matthew Giannetto
BSides Philly
· 2018
Technical
DFIR
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2018-11
46:50
Threat Hunting: Defining the Process While Circumventing Corporate Obstacles
BSides Philly
· 2018
Technical
Blue
Talk
Open →
2018-11
44:53
Chats, Cheats, & Cracks
Edmund Brumaghin
BSides Charlotte
· 2021
Technical
Malware Analysis
Social Engineering
Case Studies and Incidents Analysis
Talk
Open →
2021-09
46:26
Catch Me If You Can: How Attackers Outsmart EDR
Marvin Ngoma
BSides Amsterdam
· 2025
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Blue
Red
Technical Deep-dives
Talk
Open →
2026-03
36:46
Cleveland bSides 2012 - Dave Kennedy - Keynote
BSides Cleveland
Open →
2016-10
42:06
Destruction as a Service: Security Through Reanimation
Jon Medina
BSides Augusta
· 2015
Technical
Talk
Open →
2015-09
45:35
2024 Security BSides // Doug Hislop
Doug Hislop
BSides Cayman Islands
· 2024
Open →
2025-01
24:07
What the deuce: Strategies for splitting your alerts
John T. Myers
BSides Philly
Technical
Talk
Open →
2017-08
45:36
Agentic AI Malware: Why the Cybersecurity Battle Isn’t Over
Candid Wuest
BSides Las Vegas
· 2025
Technical
AI Security
Malware Analysis
Advanced
Red
Talk
Open →
2025-12
21:45
Copy, Paste, Compromise: The Danger of ClickFix Attacks
Dalton Ireland
BSides SATX
· 2025
Talk
Open →
2025-09
47:33
Network Survival WCS
James Costello
BSides Las Vegas
· 2013
Technical
Active Directory
Network Security
Talk
Open →
2017-01
49:38
Looking Back, Containing Chaos: Lessons from Real-World Intrusions
BSides CDMX
Open →
2025-07
31:20
Evading C2 Detection with Asymmetry
Andrew Johnston
Anthony Morrow
BSides Philly
· 2018
Technical
Detection Engineering
Threat Intel
Advanced
Red
Talk
Open →
2018-11
21:38
Abusing Normality: Data Exfiltration in Plain Sight
Aelon Porat
BSides Philly
· 2018
Technical
Talk
Open →
2018-11
40:34
Detections and Dragons: Creating Logic that Scales -Rachel Schwalk & Mak Foss
Rachel Schwalk
Mak Foss
BSides KC
Technical
Intermediary
Blue
Talk
Open →
2025-06
34:56
Emulate.Go: Adversary Emulation for CTI Analysts
Haydn Johnson
BSides Toronto
· 2020
Technical
Detection Engineering
Threat Intel
Purple
Demo
Open →
2021-11
38:33
From the Eyes of Overwatch: Intrusion Threat Landscape
Jason Rivera
BSides Greenville
· 2020
Technical
Talk
Open →
2020-06
43:34
Pwning Slack with PowerShell
Carrie Roberts
Tony Hamburger
BSides Boise
· 2020
Technical
Red
Demo
Talk
Open →
2020-01
27:05
Comparing apples to Apple
Adam Mathis
BSides Augusta
· 2018
Technical
Blue
Talk
Open →
2018-10
52:58
You Moved to Office 365, Now What?
Sean Metcalf
BSides Charm
· 2019
Technical
Active Directory
Cloud IAM
Blue
Talk
Open →
2021-05
33:25
T1 08 I Thought I Saw a |-|4x0.-, Thomas V. Fischer (@fvt)
Thomas V. Fischer
BSides Athens
· 2017
Open →
2017-10
47:47
Trust Boundary Theater: Lateral Movement in the Age of Hybrid Cloud
Ian Lin
Chance Pearson
BSides Edmonton
· 2025
Technical
Active Directory
Cloud IAM
Red
Talk
Open →
2025-10
23:36
Illuminate the Grid: Building Telemetry Through Purple Teaming
Gabriel Schram
BSides Charlotte
· 2026
Technical
Detection Engineering
Threat Intel
Threat Modeling
Purple
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2026-04
33:29
Rips, Reps and Revelations: Creating Cyber Fire Drills with Atomic Red Team
Paul Michaud
BSidesROC
· 2023
Technical
Detection Engineering
Threat Intel
Purple
Talk
Open →
2024-09
24:26
Technical Deep-Dive: Red Canary
BSides Calgary
Open →
2021-12
36:54
Adding Simulated Users to Your Pentesting Lab with PowerShell
Chris Myers
Barrett Adams
BSides Charm
· 2018
Technical
Tooling
Red
Demo
Open →
2021-05
41:17
J-J-J-JEA Power: PowerShell Just Enough Administration
James Honeycutt
BSides Charm
· 2019
Technical
Blue
Demo
Talk
Open →
2021-05
31:21
Tony Drake Incident Response for the Overwhelmed, Understaffed, and Unprepared
Tony Drake
BSides Boulder
Career
DFIR
Talk
Open →
2021-08
26:58
Under The Radar: Circumventing Application Control Solutions
Jimmy Bayne
BSides Charm
· 2019
Technical
Red
Technical Deep-dives
Talk
Open →
2021-05
29:55
The (Un)Rightful Heir: My dMSA Is Your New Domain Admin
Yuval Gordon
BSides Las Vegas 2025
Technical
Active Directory
Kerberos
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
17:43
Breaking In, Giving Back: My Cyber Security Journey - Tom Coogans
Tom Coogans
BSides Basingstoke
· 2025
Career
Community
Career & Soft Skills
DevSecOps
Intro
Talk
Open →
2025-09
52:11
BSidesCharm - 2019 - David Hunt - Automated Adversary Emulation
BSides Charm
Open →
2021-05
1:12:21
A Wolf In Sheep's Clothing - Bsides Vancouver 2017
BSides Vancouver
Open →
2018-01
36:30
What You Don't Know Will Cost You: Modern AD Attack Paths & Toxic Combinations
Craig Birch
BSides Charlotte
· 2026
Technical
Active Directory
Threat Modeling
Intermediary
Red
Technical Deep-dives
Demo
Open →
2026-04
40:05
Shedding Light on Web Isolation Technologies and Their Bypass Techniques: C2 Communication via Outlook Using SMTP and IMAP
Terada Yu
BSides Las Vegas
· 2025
Technical
Malware Analysis
Web AppSec
Talk
Open →
2025-12
52:22
BSidesCharm - 2018 - Devon Kerr - Quantify your hunt: not your parents’ red teaming
BSides Charm
Open →
2021-05
41:57
Cascading Failure, Unified Defense: Defending Water, Power, Healthcare, & EMS
Alexander Vanino
Ruslan Karimov
BSides Las Vegas 2025
Technical
Critical Infrastructure
DFIR
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-12
45:47
Stephane Asselin - Security Frameworks and Zero Trust
BSides St. John's
Open →
2025-05
15:32
Atomic Red Team: Testing Your Security Posture
Michael Haag
BSides Boise
· 2020
Technical
Detection Engineering
Threat Modeling
Vulnerability Research
Talk
Open →
2020-02
34:25
MITRE Attack Flow: Laying Foundations for Predictive Intelligence
BSides Edmonton
· 2024
Research
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-10