Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Python
173
talks mention this tool across
59
BSides chapters.
Talks featuring Python
43:48
How I fully compromised the "most advanced code execution system in the world"
Daniel Cooper
BSides Canberra
Technical
Advanced
Talk
Open →
2024-11
47:59
Prototyping and Reverse Engineering with Frida
Jahmel Harris
BSides Leeds
· 2018
Technical
Mobile Security
Reverse Engineering
Red
Demo
Talk
Open →
2018-02
10:48
Running Circles On Social Media - Intelligent OSINT
BSides London
· 2017
Technical
Talk
Open →
2017-06
37:13
Introducing wifiphisher, a tool for automated WiFi phishing attacks
George Chatzisofroniou
BSides London
· 2015
Tooling
Wireless Security
Red
Talk
Open →
2015-07
56:13
Jak zdobyć flagę?
Mateusz Szymaniec
Jarosław Jedynak
BSides Warsaw
· 2016
Open →
2016-10
25:28
If You Can Open The Terminal, You Can Capture The Flag: CTF For Everyone
BSides Detroit
Open →
2013-06
34:54
Hacking Megatouch Bartop Games - Mark Baseggio
BSides Las Vegas
Open →
2016-08
20:40
Detection-as-code: Why it works and where to start
Kyle Bailey
BSidesSF
· 2022
Technical
DevSecOps
Talk
Open →
2022-07
58:45
Pentesting Hardware And IoT by Mark Carney
Mark Carney
BSides Leeds
· 2018
Technical
Demo
Open →
2018-02
44:22
SWF Seeking Lazy Admin for Cross-Domain Action
Seth Art
BSides DC
· 2014
Technical
OWASP
Web AppSec
Talk
Open →
2014-10
1:04:53
Smashing the Stack to Building ROP Chains with Gadgets
Doug Rodgers
BSides Charlotte
· 2016
Technical
Reverse Engineering
Vulnerability Research
Intro
Red
Demo
Open →
2016-05
15:45
Using Machine Learning To Detect Phishing Emails by Anthony Saich
Anthony Saich
BSides Cheltenham
· 2023
Technical
Talk
Open →
2023-06
57:35
Presenting Threat Intelligence Automation Using Jupyter
Robert Simmons
BSides Delaware
· 2017
Talk
Open →
2017-11
53:15
Practical Cyborgism: Getting Started with Machine Learning for Incident Detection
David Bianco
Chris McCubbin
BSides DC
· 2016
Technical
Talk
Open →
2016-11
43:10
DYODE: Do Your Own DiodE for Industrial Control Systems - AryKokos, Arnaud Soullie
BSides Las Vegas
Open →
2016-08
26:51
Voltron - Extending LLDB and GDB for Hackers
Richo Healey
BSides Toronto
· 2014
Technical
Demo
Talk
Open →
2014-12
48:00
Machine Learning Fueled Cyber Threat Hunting
Tim Crothers
BSides Augusta
· 2017
Technical
Talk
Open →
2017-09
42:30
Crash all the Flying Things! — Exploiting and Defending Aircraft Collision Avoidance
Joe Greenwood
BSides London
· 2015
Technical
Hardware Hacking
Threat Modeling
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2015-07
29:22
Analyzing AutoIt Malware: Tools and Techniques
Chris Neal
Jerome Radcliffe
BSides Las Vegas
· 2021
Technical
Malware Analysis
Reverse Engineering
Intermediary
Blue
Talk
Open →
2021-08
25:43
Dispatch: Crisis Management Automation
Marc Vilanova
Forest Monsen
BSidesSF
· 2020
Technical
Talk
Open →
2020-03
33:04
A Dive into the Future of Brain Computer Interfaces
Kai Frost
BSides Perth
· 2023
Research
Technical
Talk
Open →
2023-08
50:24
BSidesAugusta 2018 - Paul Melson - Hunting APTs and Script Kiddies with Beer Money
BSides Augusta
Open →
2018-11
49:23
"IoT and the Future of Pentesting" - Jeremy Goldstein
BSides Canberra
Open →
2019-05
58:26
I for one welcome our new Cyber Overlords! An intro to ML in cybersecurity
BSides Lisbon
· 2016
Research
Technical
Intro
Empirical Research
Technical Deep-dives
Talk
Open →
2016-11
30:02
Building a Predictive Pipeline to Rapidly Detect Phishing Domains
Wes Connell
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
39:07
BSides Glasgow 2018 - Paul Ritchie - Hacking with Git
BSides Scotland
Open →
2018-05
30:21
Labeling the VirusShare Corpus: Lessons Learned - John Seymour
BSides Las Vegas
Open →
2016-08
9:10:48
5th Annual BSides Asheville Information Security Conference Live Stream
BSides Asheville
Open →
2018-06
14:17
My First Program: A Pentesting Tool
Nina Fasel
BSides London
· 2019
Technical
OSINT
Tooling
Intro
Talk
Open →
2019-06
32:45
Cats? In My Certificate Transparency Logs?
Scott Behrens
Ian Haken
BSidesSF
· 2019
Technical
Cryptography
Talk
Open →
2019-03
1:07:54
January Presentation Security Data Analysis for the masses
BSides Peru
Open →
2017-01
23:35
Breaking Into Infosec or, How I hacked my way out of poverty - BSides Portland 2022
BSides PDX
Open →
2022-10
55:50
Practical Serialization Attacks
Nicky Bloor
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Web AppSec
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2017-08
50:48
BSidesSF 2023 - Securing the Pipeline: Protecting Self-Hosted GitHub Runners (Adnan Khan)
Adnan Khan
BSidesSF
· 2023
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2023-05
36:58
Find Me If You Can! How to Locate a DLL's Unexported Functions
Oryan De Paz
BSides TLV
· 2022
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Talk
Open →
2022-07
40:43
Detecting Malicious Certificates Using Machine Learning
Abhishek Sharma
Khaled Al-Hassanieh
Jason Reaves
BSides DC
· 2017
Research
Technical
Cryptography
Malware Analysis
Threat Intel
Talk
Open →
2017-10
45:23
How to Break the Modbus Protocol and Cause a PLC DoS
Omar Morando
BSides Budabest
· 2023
Technical
OT/ICS Security
Intermediary
Red
Demo
Open →
2023-08
38:06
Como Hackear um Banco sem Sair do seu Quarto?
Arthur Aires
Matheus Wreck
Gustavo Oliveira
BSides São Paulo
· 2025
Technical
War Stories
Reverse Engineering
Vulnerability Research
Web AppSec
Advanced
Red
Talk
Open →
2025-06
21:11
Data Exfiltration: Secret Chat Application Using Wi-Fi Covert Channel
Yago Hansen
BSides Munich
· 2017
Technical
Wireless Security
Talk
Open →
2017-04
23:04
Security Automation Simplified
Moses Schwartz
BSidesSF
· 2019
Technical
DevSecOps
Intro
Talk
Open →
2019-03
46:34
MalwareViz: a free Malware Visualizer
Craig Field
BSides DC
· 2014
Tooling
Talk
Open →
2014-10
20:10
Weaponizing Splunk: Using Blue Team Tools For Evil - Ryan Hays
BSides Boston
Open →
2017-05
48:56
Determining Normal: Baselining with Security Log and Event Data - Derek Thomas
BSides Las Vegas
Open →
2016-08
36:38
Forensics Impossible: Self-Destructing Thumb Drives
Brandon Wilson
BSides Knoxville
· 2016
Technical
DFIR
Hardware Hacking
Reverse Engineering
Advanced
Red
Talk
Open →
2016-06
22:54
BSidesSF 2018 - Honeypots 2.0: A New ‘Twist’ on Defending Enterprise Networks (Lane Thames)
Lane Thames
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
43:38
Summoning Angels in the Modern Age: Digitizing the Methods of Steganographia
Connor Gannon
BSides Knoxville
· 2023
Technical
Cryptography
Talk
Open →
2023-05
40:32
AI Agents: Augmenting Vulnerability Analysis and Remediation
Peyton Smith
BSides KC
· 2025
Technical
Talk
Open →
2025-06
41:19
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK
Jackie Lasky
BSides DC
· 2019
Research
Technical
Blue
Methodology
Technical Deep-dives
Demo
Talk
Open →
2019-10
25:31
An analysis of data leaks in Kosovo's Universities - Kastriot Fetahaj
Kastriot Fetahaj
BSides Prishtina
· 2023
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-05
26:37
GF - Low & Slow - Techniques for DNS Data Exfiltration - Dimitri Fousekis
BSides Las Vegas
Open →
2019-10
40:32
All Your RFz Are Belong to Me: Software Defined Radio Exploits
Balint Seeber
BSides Las Vegas
· 2015
Technical
Hardware Hacking
Reverse Engineering
Wireless Security
Red
Technical Deep-dives
Demo
Talk
Open →
2016-12
13:17
Automated Dorking for Fun and Pr^wSalary - Filip Reesalu
BSides Las Vegas
Open →
2016-08
42:06
Attacking Microsoft Exchange: Fusing LightNeuron with Cobalt Strike
Leon Jacobs
BSides Cape Town
· 2023
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Advanced
Purple
Red
Talk
Open →
2023-12
54:37
GAN & Gone: Manipulation of the Masses for Political and Social Gains
Logan Hicks
BSides SATX
· 2019
Technical
Red
Talk
Open →
2019-09
48:25
"Security & privacy of Bluetooth-based contact tracing apps" by Jim Mussared, CSides June 2020
Jim Mussared
BSides Canberra
· 2020
Technical
Talk
Open →
2020-06
33:03
Hook, Line and Sinker — Pillaging API Webhooks
Abhay Bhargav
BSidesSF
· 2022
Technical
Web AppSec
Talk
Open →
2022-07
24:37
Androzoo APK Search: A Search Service Of Meta-Data
Médéric Hurier
BSides Luxembourg
· 2018
Research
Talk
Open →
2018-10
34:32
Introduction To Ethical Hacking
Brandon S. Keath
BSides Delaware
· 2018
Talk
Open →
2018-11
57:23
2016 - Ian Trump - Basic Malware Analysis – dispelling Malware FUD
BSides Manchester
Open →
2016-09
14:30
LLM-Powered Network Intrusion Detection
Taeyang Kim
BSides SLC
· 2025
Technical
AI Security
Detection Engineering
Network Security
Blue
Talk
Open →
2025-06
22:49
Taking D-Bus to Explore the Bluetooth Landscape
Paul Wortman
BSides Las Vegas
· 2024
Research
Technical
Reverse Engineering
Wireless Security
Advanced
Empirical Research
Technical Deep-dives
Talk
Open →
2024-09
25:27
How To Get Away With Hacking by Liam Follin
Liam Follin
BSides Leeds
· 2023
Career
Career & Soft Skills
Web AppSec
Intro
Talk
Open →
2023-07
55:44
Burping for Joy and Financial Gain
Tim Tomes
BSides Augusta
· 2017
Technical
Web AppSec
Talk
Open →
2017-09
23:03
The Little Phone That Could Ch-ch-chroot
Mathew Evans
Jack Whitter-Jones
BSides London
· 2019
Technical
DFIR
Mobile Security
Threat Modeling
Advanced
Red
Talk
Open →
2019-06
20:25
BSidesSF 2018 - KubeScope for the Extraordinary World of Containers (Tongbo Luo • Zhaoyan Xu)
Tongbo Luo
Zhaoyan Xu
BSidesSF
· 2018
Technical
DevSecOps
Demo
Talk
Open →
2018-04
49:55
Jailbreaking an Electric Vehicle in 2023: Hotwire Tesla's x86-Based Seat Heater
Niclas Kühnapfel
Hans Niklas Jacob
Christian Werling
BSides Berlin
· 2023
Research
Technical
Cryptography
Hardware Security
Reverse Engineering
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2024-01
47:55
@ISC2PGHChapter - Hands on Scripting lab with PowerShell and Python
BSides Peru
Open →
2017-09
47:04
MySQL Server Attacks YOU! How We Found CVE-2023-21980 In MySQL
Alexander Rubin
BSides Dublin
Talk
Open →
2024-06
46:58
BSidesWLG 2017 - Matthew Daley - Pandas and Rabbits: Xen Meets American Fuzzy Lop
BSides Wellington
Open →
2018-02
28:34
WUDS You Say SmartAssPhone?
Frank Catucci
BSides Charleston
· 2014
Technical
Wireless Security
Demo
Open →
2014-11
23:28
Microservices and FaaS for Offensive Security
Ryan Baxendale
BSides Las Vegas
· 2017
Technical
Talk
Open →
2017-08
41:12
CyPSA Cyber Physical Situational Awareness - Kate Davis, Edmond Rogers
BSides Las Vegas
Open →
2016-08
50:01
Grapl — A Graph Platform for Detection and Response
Colin O'Brien
BSides Las Vegas
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-10
58:51
How to use XXE to your Advantage
Leo Pate
BSides Augusta
· 2018
Technical
Web AppSec
Blue
Purple
Red
Talk
Open →
2018-11
41:37
Incident Response in Cases of Supply Chain Incidents
Lucas Ferreira
BSides Lisbon
· 2023
Technical
Supply Chain Security
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-02
51:55
AI + Actual Intelligence
Marcus J. Carey
BSides Charleston
· 2024
Career
Keynote
Open →
2024-11
49:59
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots
Allyn Stott
BSides Charm
· 2025
Technical
AI Security
Detection Engineering
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2025-05
41:35
BSides Rochester 2016: Jared Stroud & Bryan Harmat: RedOps: Scaling & Automating Your Pwnage
BSidesROC
Open →
2016-05
33:55
HEAP HEAP HOORAY: Unveiling GLIBC heap overflow vulnerability (CVE-2023–6246)
José López Martínez
BSides Budabest
· 2024
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2024-09
48:18
Brace YoSelf: DDoS is Coming
Dima Bekerman
BSides Lisbon
· 2016
Technical
Network Security
Workshop
Open →
2016-11
39:48
Is that a penguin in my Windows? - Spencer McIntyre
BSides Las Vegas
Open →
2016-08
43:11
Ransomware vs EDR: Inside the Mind of Attackers
Zoziel Pinto Freire
BSides São Paulo
· 2025
Technical
Detection Engineering
Malware Analysis
Advanced
Red
Talk
Open →
2025-06
26:21
Patrick Colford - Scraping Pastebin for Obfuscated Malware - BSides Portland 2018
Patrick Colford
BSides PDX
· 2018
Technical
Demo
Talk
Open →
2019-02
1:12:41
DDoS Attack Mitigation
Kastriot Fetahaj
Vigan Raca
Blerim Rexha
BSides Prishtina
Technical
Network Security
Web AppSec
Demo
Open →
2024-09
24:01
Mining Software Vulnerabilities in SCCM with NIST's NVD: Data Challenges and Machine Learning Solutions
Loren Gordon
BSides Las Vegas
· 2017
Technical
Threat Intel
Vulnerability Research
Talk
Open →
2017-09
18:40
Everyday AI: Leveraging LLMs for Simple, Effective Security Automation
Matthew Sullivan
Dominic Zanardi
BSidesSF
· 2025
Technical
AI Security
Cloud IAM
Detection Engineering
Talk
Open →
2025-10
54:44
G1234! - The Chrome Crusader - Lily Chalupowski
BSides Las Vegas
Open →
2018-09
39:24
Alexander Rubin - MySQL server attacks YOU! (How we found CVE-2023-21980 in MySQL)
BSides Knoxville
Open →
2024-10
26:06
DarkEngine: Conducting Research into a Highly Orchestrated Phishing Campaign
Liam Wilkinson
BSides Canberra
· 2025
Research
DFIR
Malware Analysis
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
40:41
From Sandbox Escapes to MCP Database Hijacks: Unveiling Agentic Vulnerabilities
Sean Park
BSides Canberra
· 2025
Technical
AI Security
Vulnerability Research
Red
Talk
Open →
2025-11
36:46
Breaking the Bridge: Hacking Wrapped Coins and Tokens
Dávid Pethes
BSides Budabest
· 2022
Technical
Talk
Open →
2023-06
37:52
CryptKids Keynote
Brooke Mellendick
BSides DC
· 2018
Community
Intro
Keynote
Open →
2018-11
20:53
Mean Blue Team: Fighting Phishing One Exploit at a Time
Alberto del Rio
BSides Berlin
· 2023
Technical
Social Engineering
Threat Intel
Web AppSec
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-01
1:48:57
0-day Research Disassembled
Chris Lyne
BSides DC
· 2019
Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-10
39:01
Atomic Honeypot – A MySQL Honeypot That Fights Back
Alexander Rubin
BSides SLC
· 2025
Technical
Vulnerability Research
Web AppSec
Advanced
Red
Talk
Open →
2025-06
54:58
From SEH Overwrite with Egg Hunter to Get a Shell!
Rodolpho Concurde
BSides Athens
· 2022
Technical
Advanced
Red
Workshop
Open →
2022-06
30:03
Scott Taylor: Exploring Common Hacking Techniques
Scott Taylor
BSides Calgary
Open →
2020-12
50:08
Integrating Large Language Models into Your Security Stack
Shane Hartman
BSides Tampa
· 2026
Technical
AI Security
Detection Engineering
Threat Intel
Blue
Talk
Open →
2026-02
22:02
CryptKids Keynote
Samantha Mosley
BSides DC
· 2019
Community
Career & Soft Skills
Intro
Keynote
Open →
2019-10
39:58
A Hillbilly's First C2
Adam Compton
BSides Knoxville
· 2024
Technical
Tooling
Red
Talk
Open →
2024-11
14:50
TryHackingMy Way From Cyber Sales to Cyber SOC
R4ck4tt4ck
Michael Rack
BSides London 2025
Career
Career & Soft Skills
Detection Engineering
Intro
Blue
Talk
Open →
2026-03
29:55
Getting Started in DFIR
Josh Stemp
BSides Boise
· 2020
Career
Career & Soft Skills
DFIR
Intro
Talk
Open →
2020-10
42:09
Who Let the Dogs Out? When PUPs Become BlackCat's Best Friend Ryan Rath & Matthew Boyle
Ryan Rath
Matthew Boyle
BSides Tampa
· 2024
Technical
DFIR
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2024-05
45:08
Unmasking Data Leaks: A Guide to Finding, Fixing, and Prevention
Jordan Wright
BSides SATX
· 2019
Technical
Cloud IAM
Demo
Talk
Open →
2019-09
41:46
Vulnerability Regression Testing with Nuclei Framework
Domagoj Vratarić
BSides Zagreb
Technical
Detection Engineering
DevSecOps
Vulnerability Research
Case Studies and Incidents Analysis
Talk
Open →
2025-03
24:10
So You Wanna Be a Red Teamer
Shelby Spencer
BSides Boise
· 2020
Career
Career & Soft Skills
Intro
Red
Talk
Open →
2020-10
16:31
Malware C2 over x509 Certificate Exchange
Jason Reaves
BSides Springfield
· 2017
Technical
Cryptography
Talk
Open →
2018-02
26:31
Alex Walston - Threat Hunting in Your Identity Stack
Alex Walston
BSides Augusta
· 2025
Technical
Cloud IAM
Blue
Talk
Open →
2025-10
28:39
A New XZ Every Day – The Collapse of OSS Supply Chain Security
Paul Novarese
BSides SLC
· 2025
Technical
Supply Chain Security
Case Studies and Incidents Analysis
Talk
Open →
2025-06
42:02
GT - Behavioral Analysis from DNS and Network Traffic - Josh Pyorre
BSides Las Vegas
Open →
2017-08
23:00
Accidental Honeypot: How I Ended Up Receiving Thousands of Emails Meant for No One
Cory Solovewicz
BSides PDX 2025
War Stories
OSINT
Privacy
Intro
Talk
Open →
2025-12
30:13
Dissecting Carbanak
Hristo Asenov
BSides Delaware
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2019-11
49:48
CG - All Your Cloud Are Belong To Us - Hunting Compromise in Azure - Nate Warfield
BSides Las Vegas
Open →
2018-09
38:50
GT - Deep Learning Neural Networks – Our Fun Attempt At Building One - Ladi Adefala
BSides Las Vegas
Open →
2017-08
23:21
Skills to Build for Your Cloud Security Career
Cassandra Young
BSides Philly
· 2023
Career
Career & Soft Skills
Cloud IAM
Intro
Talk
Open →
2024-01
20:02
PwnSpoof by Daniel Oates-Lee
Daniel Oates-Lee
BSides Dublin
· 2022
Open →
2022-05
50:26
DevOps Methods for Patching an Open Source Operating System
Sidney Faber
BSides Peru
· 2021
Technical
Talk
Open →
2021-10
16:09
Visualize Windows Events using Python3 & Neo4j
Tasos Chatziefstratiou
BSides Athens
· 2020
Technical
Blue
Demo
Talk
Open →
2020-06
51:50
A Tiny Datacenter On My Head
Nate Lager
BSides Delaware
· 2015
Talk
Open →
2016-07
47:58
Repurposing Vulnerability Tickets to Predict Severity Levels: An Introduction to Natural Language Processing and Classification Algorithms
Brittany Bahk
BSides Las Vegas
· 2022
Technical
AI Security
Vulnerability Research
Talk
Open →
2022-09
19:07
Broke but Breached: Secret Scanning at Scale on a Student Budget
Raviteja
Ming Chow
BSides Las Vegas
· 2025
Research
Technical
DevSecOps
Supply Chain Security
Vulnerability Research
Intermediary
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2025-12
47:21
Sean Eyre & Phelan Guan - Using mathematics to draw usable operational insights from WiFi data
Sean Eyre
Phelan Guan
BSides Augusta
· 2019
Technical
Wireless Security
Talk
Open →
2019-10
28:26
Chasing Whispers: A Pragmatic Review of Adversary Emulation Processes
Kyle Smith
BSides Charleston
· 2024
Technical
Detection Engineering
Threat Intel
Threat Modeling
Purple
Talk
Open →
2024-11
37:07
Niall McGrath - Digital Forensic Science and How it Fits in to the Field of Forensic Science
BSides Belfast
Open →
2017-10
23:03
CryptKids Keynote
Samantha Mosley
BSides DC
· 2019
Community
Career & Soft Skills
Intro
Keynote
Open →
2019-10
27:44
BSidesTO2017 Victor Hora
BSides Toronto
Open →
2018-01
24:30
PBKDF2: Performance Matters
Joseph Birr-Pixton
BSides Las Vegas
· 2015
Research
Technical
Cryptography
Talk
Open →
2016-12
30:57
Under the Hood of Ransomware.live: Building an Open-Source Ransomware Observatory
Julien Mousqueton
BSides Bournemouth
· 2025
Research
Technical
Malware Analysis
OSINT
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2025-09
51:16
Retro Video Game Reverse Engineering
Theyflower
StumpSpeedruns
BSides Delaware
· 2019
Technical
Talk
Open →
2019-11
27:17
Better Way to Threat Matrix
Cody Martin
BSides Greenville
· 2021
Technical
Blue
Talk
Open →
2021-10
23:57
The First Hour of Incident Response: Every Second Logs
George Chapman
BSides Exeter
· 2026
Technical
DFIR
Detection Engineering
Intermediary
Blue
Talk
Open →
2026-05
23:34
Linux Monitoring with Elastic Security
Mikey McDonald
BSides Augusta
· 2022
Technical
Talk
Open →
2022-10
33:17
BSidesGVL 2021 - Nick Sweet - "Pretty Easy Threat Hunting"
Nick Sweet
BSides Greenville
· 2021
Technical
Talk
Open →
2021-10
26:35
Developers, the weakest link in the supply chain?
David Leadbeater
BSides Canberra
· 2025
Technical
Supply Chain Security
Vulnerability Research
Technical Deep-dives
Talk
Open →
2025-12
47:59
Linux Network Defence Evasion Techniques
Aqeeb Husain
BSides Newcastle
Technical
Malware Analysis
Network Security
Red
Talk
Open →
2023-12
37:52
Pool on the Roof Must Have a Leak – Brazilian Data Breach
Renato Hormazabal
BSides Chile
· 2021
Technical
Talk
Open →
2021-05
16:59
Reversing F5 Service Password Encryption
Dustin Heywood
BSides Las Vegas
· 2025
Technical
Cryptography
Reverse Engineering
Red
Talk
Open →
2025-12
44:14
MySQL server attacks YOU! (How we found CVE-2023-21980 in MySQL)
Alexander Rubin
BSides Buffalo
Technical
Advanced
Red
Talk
Open →
2024-06
25:24
Brian Bell - Detection of malicious capabilities using YARA
BSides Augusta
Open →
2016-09
42:41
Hacking K-12 School Software in a Time of Remote Learning
Sam Quinn
BSides Knoxville
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
31:28
One XOR to Rule Them All: The Cryptographic Evolution of Brazilian Malware
Italo Lima
BSides São Paulo
· 2025
Technical
Cryptography
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-06
20:10
Building the BSides DC Registration System
Jim Gilsinn
BSides DC 2016
Technical
Tooling
Talk
Open →
2016-11
21:39
Show Me The Honey: Creating Elasticsearch Honeypots Powered By LLMs
Claire Dickson
BSides Belfast
· 2025
Research
Technical
AI Security
Detection Engineering
Threat Intel
Talk
Open →
2025-12
26:39
Gitdigger: Creating Useful Wordlists From Public GitHub Repositories
WiK
Mubix
BSides Las Vegas
· 2013
Technical
Tooling
OSINT
Vulnerability Research
Talk
Open →
2017-01
24:07
Pretty Easy Threat Hunting
Nick Sweet
BSides SATX
· 2021
Technical
Blue
Talk
Open →
2021-06
47:03
Have Your Pick of the Litter
Fernando Tomlinson
BSides Charlotte
· 2019
Open →
2019-11
22:23
A new approach to security
Chandrani Mukherjee
BSides SLC
· 2023
Talk
Open →
2023-06
23:43
Federating AWS CLI
Ayman Elsawah
Paul Moreno
BSidesSF
· 2015
Technical
Cloud IAM
Talk
Open →
2023-12
22:31
API Scraping For Swim & Profit
Melissa Augustine Goldsmith
BSides Bristol
· 2025
Technical
Talk
Open →
2024-01
34:27
How one line of Python can bring your network to its knees
Bobby Simpson
BSides Oklahoma
· 2017
Technical
Blue
Demo
Talk
Open →
2017-05
17:06
PG - Can I Code Against an API to Learn a Product? - Adrienne Merrick-Tagore
BSides Las Vegas
Open →
2016-12
33:48
AlexandraTenney
BSides Calgary
Open →
2024-03
36:46
Cryptocoin Miners vs ML - John Callahan
BSides Peru
Open →
2019-07
42:06
Destruction as a Service: Security Through Reanimation
Jon Medina
BSides Augusta
· 2015
Technical
Talk
Open →
2015-09
50:01
BG - Chaos Drive: Briefly known as Loki - Michael Rich
BSides Las Vegas
Open →
2019-10
19:57
Using documentation to build better OT security knowledge graphs
Ian Fox
BSides Oslo
· 2023
Technical
Talk
Open →
2025-07
13:32
Can An Old(ish) Dog Learn New (Cyber) Tricks?
Andrew Carr
BSides Newcastle
· 2025
Career
Career & Soft Skills
Intro
Talk
Open →
2024-01
41:35
How to Find a Companys BreakPoint
BSides Philly
Open →
2017-08
26:33
Writing Our Own DNS Tunneling Protocol, And Other AWS Misadventures, All In A Pen Test
Sunny Chau
BSides Basingstoke
Technical
Talk
Open →
2024-09
45:24
When Attackers Tune In: Weaponizing LLM Tuning for Stealthy C2 and Exfiltration
Noa Dekel
BSides Las Vegas
· 2025
Technical
Talk
Open →
2025-12
43:34
Pwning Slack with PowerShell
Carrie Roberts
Tony Hamburger
BSides Boise
· 2020
Technical
Red
Demo
Talk
Open →
2020-01
32:38
Mithören: Device for Wireless Peripheral Testing
Michael Wolf
BSides Cincinnati
· 2017
Technical
Wireless Security
Talk
Open →
2017-05
27:05
Comparing apples to Apple
Adam Mathis
BSides Augusta
· 2018
Technical
Blue
Talk
Open →
2018-10
41:45
LLM-SRO: Ontology-Driven Security for LLMs
Dr. Thomas Heverin
Caroline Ma
Avery Buyer
BSides Philly
· 2025
Research
Technical
AI Security
LLM Security
Threat Intel
Threat Modeling
Intermediary
Methodology
+2
Open →
2026-02
37:14
Unity Makes Strength
Xavier Mertens
BSides Athens
· 2017
Talk
Open →
2017-10
27:42
I Simulated Hacking a Car. Then I Tried to Defend It. Here's What Broke!
Rakesh Elamaran
BSides Exeter
· 2026
Research
Technical
Hardware Security
Vulnerability Research
Talk
Open →
2026-05
47:41
BG - TAPIOCA (TAPIOCA Automated Processing for IOC Analysis) - Ryan Chapman & Moses Schwartz
BSides Las Vegas
Open →
2016-12
12:51
Life's a Breach: Modern Data Breach Reporting with Sencode Breaches
Gareth Kerr
BSides Newcastle
· 2020
Research
Tooling
Talk
Open →
2020-11
17:43
Breaking In, Giving Back: My Cyber Security Journey - Tom Coogans
Tom Coogans
BSides Basingstoke
· 2025
Career
Community
Career & Soft Skills
DevSecOps
Intro
Talk
Open →
2025-09
25:05
Rob Truesdell - How do you find the needle in the haystack? Burn all the hay!
BSides FloodCity
Open →
2019-05
36:00
Introducing LMDA: Enhancing Lateral Movement and Data Access Identification on Windows Systems
Kostya Ilioukevitch
Phalgun Kulkarni
BSides Edmonton
· 2025
Technical
Talk
Open →
2025-10
40:52
It's Malware Time: A Bar Crawl from Skunked Homebrew to Rotten Apples
Erika Noerenberg
BSides Charm
· 2019
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
15:32
Atomic Red Team: Testing Your Security Posture
Michael Haag
BSides Boise
· 2020
Technical
Detection Engineering
Threat Modeling
Vulnerability Research
Talk
Open →
2020-02