Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring SQLite
25
talks mention this tool across
19
BSides chapters.
Talks featuring SQLite
59:59
Windows 10 Forensics
Mariusz Litwin
BSides Warsaw
· 2018
Technical
Talk
Open →
2018-10
52:03
"Wi-Bear: Intelligent Autonomous Wi-Fi Honeypot Detection" - Vivek Ramachandran
Vivek Ramachandran
BSides Canberra
· 2019
Technical
Wireless Security
Talk
Open →
2019-05
20:43
Application Fingerprinting with Kitsune
Peter Vicherek
BSides Toronto
· 2015
Technical
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2015-11
29:47
Heard you liked access, so we built Access to manage your access for Access
Peter Collins
Elisa Guerrant
BSidesSF
· 2024
Technical
Talk
Open →
2024-07
31:30
Keep it Like a Secret: When Android Apps Contain Private Keys
Will Dormann
BSidesSF
· 2018
Research
Cryptography
Mobile Security
Supply Chain Security
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
32:37
The Forgotten Art of Filesystem Magic
Gergely Kálmán
BSides Budabest 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
14:30
LLM-Powered Network Intrusion Detection
Taeyang Kim
BSides SLC
· 2025
Technical
AI Security
Detection Engineering
Network Security
Blue
Talk
Open →
2025-06
20:34
Getting Started With CTF’s by Jeff Moye
Jeff Moye
BSides London
Talk
Open →
2022-01
22:10
Code C.A.I.N – Keeping Your Source Code Under Control
Rotem Reiss
BSides TLV
· 2022
Technical
Detection Engineering
OSINT
Supply Chain Security
Talk
Open →
2022-07
30:42
Follow the Trace: How Traditional AppSec Tools Have Failed Us
Kennedy Toomey
BSidesSF
· 2025
Technical
Detection Engineering
Web AppSec
Talk
Open →
2025-10
45:26
Stealing Browser Cookies: Bypassing Chrome's Latest Security Measures
Rafael Felix
BSides Las Vegas
· 2025
Technical
Cryptography
Reverse Engineering
Web AppSec
Advanced
Red
Demo
Talk
Open →
2025-12
57:51
A Hackers Guide to Using the YubiKey: Adding Inexpensive Two-Factor Authentication to Your Projects
Russ Gritzo
BSides Las Vegas
· 2015
Technical
Talk
Open →
2016-12
40:20
Offensive Mobile Forensics Joey Peloquin Security BSides Boston 2014
BSides Boston
Open →
2014-05
13:42
maraki1982: A Management Tool for OAuth2 Phishing
Yiannis Koukouras
Dimitris Tsikopoulos
BSides Athens
· 2021
Technical
Cloud IAM
Web AppSec
Red
Open →
2021-07
48:45
Methods for Parsing New Mobile Apps: All about that data
Jessica Hyde
BSidesROC
· 2019
Technical
Methodology
Talk
Open →
2019-08
29:19
File History: Deconstructing the Catalog
Kenneth Johnson
BSides Iowa
· 2015
Technical
DFIR
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2015-04
49:27
Beginning Pentesting Android Applications
James McKee
BSides Boulder
· 2020
Technical
Intro
Talk
Open →
2020-11
24:44
0 to 100 with Mobile Application Pentesting
James Kennedy
BSides KC
· 2019
Technical
Mobile Security
Talk
Open →
2019-06
23:00
Accidental Honeypot: How I Ended Up Receiving Thousands of Emails Meant for No One
Cory Solovewicz
BSides PDX 2025
War Stories
OSINT
Privacy
Intro
Talk
Open →
2025-12
24:18
Mapping the Dark Web with Python
Zack Smith
BSides 312
· 2025
Technical
OSINT
Threat Intel
Talk
Open →
2025-09
11:45:07
Waging War on an Entire City
Andrew Morris
BSides Charleston
· 2013
Talk
Open →
2014-11
49:33
Just Breakable Enough
Alex Curtiss
BSides Boulder
· 2023
Technical
Talk
Open →
2024-02
26:39
Gitdigger: Creating Useful Wordlists From Public GitHub Repositories
WiK
Mubix
BSides Las Vegas
· 2013
Technical
Tooling
OSINT
Vulnerability Research
Talk
Open →
2017-01
52:23
Asynchronous Intelligence Gathering with Python
Jeff Bowie
BSides Denver
· 2020
Technical
OSINT
Tooling
Web AppSec
Red
Talk
Open →
2020-10
43:52
JOINing Across the Stack: Structured Security Analytics for the Modern Attack Surface
Eric Kaiser
BSides Las Vegas
· 2021
Technical
Cloud IAM
Container Security
Detection Engineering
Blue
Talk
Open →
2021-08