Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Sliver
28
talks mention this tool across
20
BSides chapters.
Talks featuring Sliver
41:33
Stop Writing Malware! The Blue Team Has Done It for You
Alberto Rodriguez
Erik Hunstad
BSides Augusta
· 2022
Technical
Advanced
Red
Talk
Open →
2022-10
19:14
Zero2Hero: Red Team Tradecraft
Jordan Jay
BSides Basingstoke
Technical
Red
Talk
Open →
2022-07
29:03
macOS Endpoint Security Framework: What It Can Do And How To Use It
Connor Morley
BSides Munich
· 2022
Technical
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2022-05
32:59
EDR Evasion Primer
Jorge Gimenez
BSides Berlin
· 2022
Technical
Active Directory
Malware Analysis
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-02
34:33
The Best Defense is a Great Offense: Leveraging Automated OffSec to Build Proactive C2 Detections
Sam Manzer
Mike Parowski
BSidesSF
· 2023
Technical
Blue
Talk
Open →
2023-05
53:36
Rolling out the C2: Red Team Infrastructure in 2024
BSides Las Vegas
· 2024
Technical
Cloud IAM
DevSecOps
Red
Demo
Talk
Open →
2024-09
54:13
So You Wanta Build a C2?
iDigitalFlame
BSides Las Vegas
· 2022
Technical
Malware Analysis
Reverse Engineering
Red
Talk
Open →
2022-09
50:37
Terry D . Smith II - Threat Hunting and Hacking Questions which Get Increasingly Harder
Terry D. Smith II
BSides Augusta
Technical
Blue
Talk
Open →
2023-10
1:00:28
Creating A Resilient Red Team Infrastructure Using Terraform
Andrei Grigoras
BSides Tirana
Technical
Red
Talk
Open →
2023-11
32:33
Effective Adversary Emulation
Jeremy Mill
Bsides CT
· 2023
Technical
Red
Talk
Open →
2023-10
35:31
Evading EDRs for Fun and Profit: A Quick and Dirty Overview
Panagiotis Fiskilis
BSides Sofia
· 2025
Technical
Red
Talk
Open →
2025-04
57:51
Will Schroeder & Max Harley - Meet Your Nemesis: Fighting Data With Data
Will Schroeder
Max Harley
BSides Augusta
· 2023
Technical
DFIR
Threat Intel
Advanced
Red
Talk
Open →
2023-10
43:26
Malware Campaign Tracking Using Big Data Analytics And Machine Learning Clustering
Daniel Johnston
BSides London
· 2025
Research
Technical
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-02
24:58
What's Inside The Open Directory From 96 Different Threat Actors?
Alana Witten
BSides London
· 2025
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
24:14
Abusing native cloud services for Command and Control
Stephen Bradshaw
BSides Canberra
· 2025
Technical
Red
Talk
Open →
2025-11
39:14
Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents
Johann Rehberger
BSides Vancouver Island
· 2025
Technical
AI Security
Reverse Engineering
Web AppSec
Advanced
Blue
Red
Talk
Open →
2026-02
44:57
Your Friendly Penguin: Using Linux And WSL To Stay Under The Radar
Idan Ron
Max De Lacey
BSides London
Technical
Purple
Red
Talk
Open →
2024-02
49:33
Building Penetration Testing Dropboxes
Chris Carlis
BSides Prishtina
· 2026
Technical
Hardware Hacking
Intermediary
Red
Technical Deep-dives
Talk
Open →
2026-02
49:51
Movement After Initial Compromise
Matthew Batten
Collyn Hartley
BSides Augusta
· 2018
Technical
Active Directory
Threat Intel
Red
Talk
Open →
2018-11
51:43
Get in the Box: Containerizing Red Team Infrastructure
Dan Astor
John Callahan
BSides Philly
· 2023
Technical
DevSecOps
Red
Talk
Open →
2024-01
58:29
The Business of Ransomware
Stephen Semmelroth
Adrian Tilston
Sean Eyre
BSides Augusta
· 2022
War Stories
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2022-10
27:44
Containing the Threat: Analyzing Cryptomining Campaigns
Bogdan Trufanda
Mihai Vasilescu
BSides Budabest
· 2025
Technical
Talk
Open →
2025-09
23:37
D'oH The Simpsons Look at the Growth of DoH in Malware - Allan Liska
BSides Bournemouth
Open →
2025-09
59:08
Alexander Andersson - Demystifying Cloud Infrastructure Attacks (BSidesFrankfurt 2024)
BSides Frankfurt
Open →
2025-04
37:03
Ransomware Threat Hunting: Commonly Overlooked Areas for Stopping Ransomware Intruders - Allan Liska
BSides Peru
Open →
2022-09
43:09
Stephen Hilt - From Guardian to Threat: The Double Life of Security Tools
BSides Knoxville
Open →
2025-07
42:24
Intelligence-Driven Response to UNC5174 by Alessandra Rizzo
Alessandra Rizzo
BSides Edmonton
· 2025
Technical
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-10
23:03
Innovative, Shiny, and Vulnerable: Four Ways to Exploit Modern SaaS Data Platforms
Ben Kofman
Ali Kabeel
BSides Las Vegas
· 2025
Technical
Cloud IAM
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12