Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Procmon
44
talks mention this tool across
28
BSides chapters.
Talks featuring Procmon
56:06
Easy LPEs and Common Software Vulnerabilities
Christopher Vella
BSides Canberra
· 2021
Technical
Reverse Engineering
Vulnerability Research
Talk
Open →
2021-04
27:16
BSidesSF 2017 - AtomBombing: Injecting Code Using Windows’ Atoms (Tal Liberman)
Tal Liberman
BSidesSF
· 2017
Technical
Advanced
Talk
Open →
2017-03
50:58
It, Do it Live (PowerShell Digital Forensics)
Jared Atkinson
BSides DC
· 2015
Technical
Blue
Demo
Talk
Open →
2015-11
31:20
Finding Privilege Escalation with Procmon
Vetle Økland
BSides Oslo
· 2019
Technical
Talk
Open →
2019-06
26:36
Latest evasion techniques in fileless malware - fl3uryz & Andrew Hay
BSides Las Vegas
Open →
2016-08
55:25
Confidently Measuring Attack Technique Coverage by Asking Better Questions
Matt Graeber
BSides Augusta
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Blue
Talk
Open →
2021-10
49:52
Abusing Windows with PowerShell and Microsoft debuggers
Pierre-Alexandre Braeken
BSides DC
· 2016
Technical
Active Directory
Advanced
Red
Talk
Open →
2016-10
57:55
Seriously? You Want Me To Believe Cyber-Spies Want My Data
BSides Detroit
Open →
2012-06
18:02
Making Malware Analysis Less Scary
Jack Resetti
BSides London
· 2025
Technical
Malware Analysis
Reverse Engineering
Intro
Blue
Demo
Talk
Open →
2026-03
45:11
Boston BSides - Ryan Nolette - Protect Against CryptoLocker Ransomware
BSides Boston
Open →
2016-07
33:49
Software Vulnerability Discovery and Exploitation During Red Team Assessments
Ryan Wincey
BSides Charleston
· 2015
Technical
Red
Talk
Open →
2015-12
28:29
You Don't See Me: Abusing Whitelists to Hide and Run Malware
Michael Spaling
BSides Las Vegas
· 2016
Technical
Malware Analysis
Vulnerability Research
Red
Talk
Open →
2016-08
31:52
A Case Study of MacOS Supply Chain Compromise
Jason Craig
Michael George
BSidesSF
· 2018
Technical
Detection Engineering
Malware Analysis
Supply Chain Security
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
2:26:00
BSIDES Malaga 2025
BSides Malaga
· 2025
Technical
Talk
Open →
2025-03
29:06
GF - ATT&CKing Your Adversaries -- Operationalizing cyber intelligence in your own environment for b
BSides Las Vegas
Open →
2019-10
19:57
COM Hijacking Voodoo
Nikolaos Vourdas
BSides Athens
· 2022
Technical
Red
Open →
2022-06
14:59
Commanding Heights: Unmasking COM-Based UAC Bypass Techniques - Amankumar Badhel
Amankumar Badhel
BSides London
· 2025
Technical
Talk
Open →
2025-02
18:06
This is a serious laptop; No games and chatting possible OK?
Yiannis Koukouras
BSides Athens
· 2018
Technical
Red
Talk
Open →
2018-07
37:20
BSidesCharm 2023 - It’s all Magic(RAT) – A look into recent North Korean nation-state attacks
BSides Charm
Open →
2023-05
21:33
FRIDA, The "Hooker"
Barnabás Sztán-Kovács
BSides Budabest
· 2019
Technical
Malware Analysis
Reverse Engineering
Red
Talk
Open →
2019-06
46:11
Jake Williams - DIY Vulnerability Discovery with DLL Side Loading
BSides Augusta
Open →
2015-09
44:35
Zero-day .NET and Nvidia GFE Vulnerabilities Explained
Matt Batten
BSides Knoxville
· 2021
Technical
Reverse Engineering
Vulnerability Research
Red
Talk
Open →
2021-05
25:40
Red and Blue Ping Pong: Living Off the Land in Windows Attack and Defense
Lee Kagan
Anton Ovrutsky
BSides Toronto
· 2017
Technical
Active Directory
Malware Analysis
Purple
Demo
Talk
Open →
2018-01
24:39
Start - Recon - Exploit: A Framework for Desktop App Pentesting
Santiago Gimenez Ocano
Ryan Syed
BSides SLC
· 2025
Technical
Red
Talk
Open →
2025-06
54:51
Spoofing Commands - Can You Trust Process Creation Logs?
BSides Canberra
· 2024
Technical
Intermediary
Talk
Open →
2024-12
41:55
LPE in Enterprise Software
Reino Mostert
BSides Cape Town
· 2023
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Demo
+1
Open →
2023-12
26:43
EDR Killers: Live Rootkit Demo That Blinds Security Tools
Scott Fuhriman
BSides SLC 2026
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Advanced
Red
Technical Deep-dives
Demo
Open →
2026-04
47:24
CryptoLocker Ransomware Variants Are Lurking "In the Shadows"
Ryan Nolette
BSides Charlotte
· 2016
Technical
Talk
Open →
2016-05
34:01
Detect the Undetectable with Sysmon and PowerShell Logs
Dimitrios Margaritis
BSides Athens
· 2017
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2017-10
37:56
Show, Don't Tell: PoCs That Make Security Unignorable
Lou Vega
BSides Charleston
· 2025
Technical
Reverse Engineering
Web AppSec
Red
Talk
Open →
2025-11
16:01
How Digital Forensics And A Batch Script Helped Me Understand The Infection Chain - Ataur Rahman
Ataur Rahman
BSides London
· 2025
Technical
DFIR
Malware Analysis
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2026-03
50:25
Dear Blue Team: Proactive Steps to Supercharge your IR
Joe Gray
BSides KC
· 2018
Technical
Blue
Talk
Open →
2018-06
28:20
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Juho Jauhiainen
BSides Dublin
Technical
Talk
Open →
2025-10
59:02
My Pen Test Toolbox
Octavio Paguaga
BSides NoVa
· 2021
Technical
Active Directory
Kerberos
Threat Intel
Red
Talk
Open →
2021-07
49:26
Sysmon or it Didn't Happen
Gerard Johansen
BSides Charm
· 2024
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2024-06
47:41
BSidesIA 2017 Track1: Still Penetrating Your Perimeter – Josh Stroschein & Matt Miller
BSides Iowa
Open →
2017-04
37:53
Dynamic Malware Analysis for the Overworked Analyst
Edmund Brunaghin
BSides Belfast
· 2017
Technical
DFIR
Malware Analysis
Threat Intel
Intermediary
Blue
Talk
Open →
2017-10
39:37
Selling Formbook
Borja Rodriguez
Victor Acin
BSides Barcelona
Technical
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-01
37:20
Operation WordDrone: Cyber Threats in the Drone Industry
Ilia Dafchev
BSides Sofia
· 2025
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-04
1:00:30
Stolen Laptops: Modern Physical Access Attacks with DMA and Firmware Exploitation
Pierre Nicolas Allard Coutu
BSides Vancouver Island
· 2025
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Advanced
Blue
Red
Technical Deep-dives
+1
Open →
2026-03
36:08
A Glance at Interpreted Language Bytecode Trickery by Chris Lyne
Chris Lyne
BSides Dublin
· 2021
Technical
Talk
Open →
2021-05
49:39
Supercharge Your SOC with Sysmon
Chris Lee
Matthew Giannetto
BSides Philly
· 2018
Technical
DFIR
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2018-11
27:43
Solar Flare: Pulling Apart SolarWinds ORION
Rob Fuller
BSides Philly
· 2017
Technical
Reverse Engineering
Vulnerability Research
Advanced
Talk
Open →
2017-08
42:24
CG - Techniques for Escaping the AppSec Labyrinth - Andrew Hay
BSides Las Vegas
Open →
2017-01