Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Volatility
92
talks mention this tool across
45
BSides chapters.
Talks featuring Volatility
49:41
Open Source Malware Lab
Robert Simmons
BSides London
· 2016
Technical
DFIR
Detection Engineering
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2016-07
47:57
Exploit Development Is Dead, Long Live Exploit Development!
Connor McGarr
BSides KC
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-11
50:57
Kevin Breen - DarkComet From Defense To Offense - Identify your Attacker
Kevin Breen
BSides London
· 2015
Technical
Case Studies and Incidents Analysis
Talk
Open →
2015-07
1:05:41
Hunting for Credential Dumping Attacks in Modern Windows Environments
Andrew Case
BSides Philly
· 2023
Technical
Active Directory
DFIR
Malware Analysis
Blue
Talk
Open →
2024-01
35:03
Offensive Anti-Analysis - Holly Williams
Holly Williams
BSides London
Technical
Talk
Open →
2016-07
47:22
BSidesCharm 2023 - Detecting and Triaging Modern Windows Rootkits - Andrew Case
BSides Charm
Open →
2023-05
3:19:17
Malware Reverse Engineering
Muhammad Irshad
Muhammad Umair
BSides Islamabad
· 2021
Technical
Malware Analysis
Reverse Engineering
Workshop
Open →
2021-02
29:09
Implementing a Kick-Butt Training Program: BLUE TEAM GO!
Ryan Chapman
BSidesSF
· 2019
Career
Blue
Talk
Open →
2019-03
29:48
Kevin Breen: RATs and IOC's - The Easy Way
Kevin Breen
BSides London
· 2014
Technical
DFIR
Malware Analysis
Threat Intel
Talk
Open →
2014-05
50:58
It, Do it Live (PowerShell Digital Forensics)
Jared Atkinson
BSides DC
· 2015
Technical
Blue
Demo
Talk
Open →
2015-11
41:13
Memory Analysis During Incident Response
BSides Detroit
Open →
2012-06
26:36
Latest evasion techniques in fileless malware - fl3uryz & Andrew Hay
BSides Las Vegas
Open →
2016-08
41:04
Hunt Or Be Hunted
Alex Davies
BSides London
· 2017
Technical
Blue
Talk
Open →
2017-06
4:37:44
Day Two: Malware Reverse Engineering
Umair
Irshad
BSides Islamabad
· 2021
Technical
Advanced
Workshop
Open →
2021-02
29:35
LSASS - What should we be doing?
Robert Wilson
BSides Augusta
· 2021
Technical
Active Directory
Threat Modeling
Intermediary
Blue
Talk
Open →
2021-10
44:49
Mo' Monero Mo' Problems: An Analysis of Cryptomining Malware
Joshua Reynolds
BSides Edmonton
· 2018
Technical
Talk
Open →
2018-09
52:56
Alissa Torres - Building "Muscle Memory" with Rekall Memory Forensic Framework
Alissa Torres
BSides Augusta
· 2015
Technical
Talk
Open →
2015-09
57:55
Seriously? You Want Me To Believe Cyber-Spies Want My Data
BSides Detroit
Open →
2012-06
24:36
The Security of Emojis
Adrian Justice
BSides Canberra
· 2021
Technical
Technical Deep-dives
Talk
Open →
2021-04
22:40
Pensieve: Finding Malicious Artifacts in Container Environments
Yathi Naik
BSidesSF
· 2018
Technical
Container Security
DFIR
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2018-04
55:07
Exposing the Neutrino EK: All the Naughty Bits
Ryan Chapman
BSides Las Vegas
· 2016
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2016-08
32:28
Forensic artifacts that make you go "Mmm.."
Yossi Sassi
Nir Jacob Saias
BSides TLV
· 2021
Technical
Purple
Talk
Open →
2021-08
20:25
Leveraging Osquery for DFIR at Scale
Sohini Mukherjee
BSidesSF
· 2020
Technical
DFIR
Detection Engineering
Intermediary
Talk
Open →
2020-03
51:42
Modern Memory Forensics with Volatility 3
Andrew Case
BSides Seattle
Technical
Talk
Open →
2024-10
33:42
Assessing the Embedded Devices On Your Network
David Tomaschik
BSidesSF
· 2017
Technical
Hardware Hacking
IoT
Threat Modeling
Red
Talk
Open →
2017-03
30:15
Incident Response Evidence Collection & Triage
John Meyers
BSides Peru
· 2017
Technical
DFIR
Malware Analysis
Blue
Demo
Talk
Open →
2017-06
22:43
Let's Learn MIPS and Japanese: Reverse Engineering Final Fantasy VII
Philippe Laulheret
BSides PDX
Technical
Hardware Hacking
Reverse Engineering
Talk
Open →
2018-03
45:13
Analyzing volatile memory on a Google Kubernetes Engine node
Marcus Hallberg
BSides NYC
· 2023
Technical
Cloud IAM
Container Security
DFIR
Demo
Talk
Open →
2023-06
37:47
Don't Google 'PowerShell Hunting'
Josh Rykowski
Sean Eyre
BSides Augusta
· 2017
Technical
DFIR
Detection Engineering
Malware Analysis
Talk
Open →
2017-09
58:14
Velociraptor: Digging Deeper
Michael Cohen
BSides Sydney
· 2019
Technical
DFIR
Threat Intel
Blue
Demo
Talk
Open →
2019-09
38:25
Matriux Leandros: An Open Source Penetration Testing and Forensic Distribution
Prajwal Panchmahalkar
BSides Las Vegas
· 2013
Technical
DFIR
Tooling
Talk
Open →
2017-01
38:01
Living on the Edge: Evicting Threat Actors from Perimeter Appliances
Evgen Blohm
Marius Genheimer
BSides Frankfurt
· 2025
Technical
DFIR
Network Security
Vulnerability Research
Advanced
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2025-12
38:34
Overview of Python: Flying Made Simple Without the NyQuil Hangover
Keith Dixon
BSides Detroit
· 2012
Technical
Intro
Talk
Open →
2012-06
47:45
Windows 10 DFIR and InfoSec Challenges
Andrew Case
BSides Las Vegas
· 2019
Technical
DFIR
Malware Analysis
Blue
Technical Deep-dives
Talk
Open →
2019-10
29:06
EDR Bypass: From Zero to Success
Jia Hu
BSides Edmonton
· 2025
Technical
Red
Talk
Open →
2025-10
37:29
Crazy Sexy Hacking
Mark Baggett
BSides Augusta
· 2014
Talk
Open →
2014-09
29:29
Breaking The Ransomware Tool Set: When An Opsec Failure Became A Intel Goldmine
Nicklas Keijser
BSides Munich
· 2023
Technical
Talk
Open →
2023-10
45:25
How occult ransomware gangs will sacrifice your domain admin
Nikos Mantas
BSides Tallinn
· 2021
Technical
Active Directory
Case Studies and Incidents Analysis
Talk
Open →
2021-11
38:59
Fully Automated Luxury Malware Detection
Camilla Montonen
BSides Oslo
· 2019
Technical
Talk
Open →
2019-06
44:59
Tactical, Practical, Digital Forensics - John Grim
BSides Peru
Open →
2018-06
47:46
BSidesSLC 2016 -- Preparing 4 PowerShellmageddon -- Chad Tilbury
BSides SLC
Open →
2016-05
58:05
The Rise of Ransomware: A Look at CryptoWall, TeslaCrypt and Locky
Paul Burbage
BSides Charlotte
· 2016
Technical
Talk
Open →
2016-05
44:59
Tony Lambert - Spotting Lateral Movement with Endpoint Data
Tony Lambert
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
43:31
CTF de BSides Colombia 2025
BSides Colombia
· 2025
Community
Open →
2025-05
46:48
InfoSec, Just Doing It
Rob Jorgensen
BSides SLC
· 2015
Career
Career & Soft Skills
Intro
Talk
Open →
2015-04
30:17
Evasion On Aisle Five: From Bacon To Beacon
Brad Storan
BSides Leeds
· 2023
Talk
Open →
2023-07
47:00
Spying on your employees using memory
Jacob Williams
BSides Augusta
· 2014
Technical
Talk
Open →
2014-09
47:01
Effective DFIR Triage Techniques to Detect Modern Rootkits
BSides Dallas/Fort Worth
Open →
2022-11
21:59
Hunting unsigned DLLs to find APT
Daniela Shalev
BSides Sofia
· 2023
Technical
Talk
Open →
2023-03
55:07
Brandon George - Hunt Like You Mean It
BSides Columbus
Open →
2020-08
41:45
I'm Cuckoo for Malware: Cuckoo Sandbox and Dynamic Malware Analysis
Lane Huff
BSides Philly
· 2017
Technical
Malware Analysis
Intro
Talk
Open →
2017-08
21:17
Automated, Generic System Call Hooking, And Interpretation
Markus Partheymüller
BSides Luxembourg
· 2018
Technical
Talk
Open →
2018-10
40:24
Deductive Reasoning: File Analysis Techniques
John Laycock
Chris Rogers
BSides DC
· 2015
Technical
DFIR
Malware Analysis
Intro
Talk
Open →
2015-11
16:01
How Digital Forensics And A Batch Script Helped Me Understand The Infection Chain - Ataur Rahman
Ataur Rahman
BSides London
· 2025
Technical
DFIR
Malware Analysis
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2026-03
31:55
A walkthrough of the CERT Australia BSides 2017 Incident Response challenge
Andrew Clark
BSides Canberra
· 2018
Technical
Talk
Open →
2019-02
36:38
In Your Mems — Windows AV Evasion Using in Memory Techniques
iDigitalFlame
BSides Delaware
· 2016
Technical
Talk
Open →
2016-11
30:24
BSides Sofia 2025: Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Juho Jauhiainen
BSides Sofia
· 2025
Technical
Case Studies and Incidents Analysis
Talk
Open →
2025-04
54:39
Yara For Hunting Malwares
Lakshya Dubey
Bsides CT
· 2020
Technical
Talk
Open →
2020-11
48:45
Methods for Parsing New Mobile Apps: All about that data
Jessica Hyde
BSidesROC
· 2019
Technical
Methodology
Talk
Open →
2019-08
50:25
Dear Blue Team: Proactive Steps to Supercharge your IR
Joe Gray
BSides KC
· 2018
Technical
Blue
Talk
Open →
2018-06
41:47
Windows Search Index: The Forensic Artifact You've Been Searching For
Phalgun Kulkarni
Bsides CT
· 2023
Technical
DFIR
Blue
Technical Deep-dives
Talk
Open →
2023-10
25:53
Fileless malware -Jim Van De Ryt
BSides Peru
Open →
2018-06
38:52
Too Many Secrets: You Can Run But You Can't Hide From Windows Forensics
Angie McKeown
BSides Cheltenham
Technical
Blue
Talk
Open →
2024-07
26:50
BSides Cape Town 2017 - Hacker Jeopardy
BSides Cape Town
· 2017
Community
Open →
2017-12
38:07
Timothy De Block - The Blue Team Starter Kit
Timothy De Block
BSides Augusta
· 2015
Technical
Blue
Talk
Open →
2015-09
31:48
Let's Play with WinDBG & .NET
Paul Rascagneres
BSides Belfast
· 2017
Technical
Malware Analysis
Reverse Engineering
Tooling
Talk
Open →
2017-10
43:45
BSides Rochester 2017: int0x80: Anti Forensics AF
BSidesROC
Open →
2018-01
24:56
PG - Messing with Forensic Analysts: Modifying VSS Snapshots - James Clawson
BSides Las Vegas
Open →
2017-08
49:15
Inside the Information Stealer Ecosystem: From Compromise to Countermeasure
Olivier Bilodeau
BSidesSF
· 2025
Technical
Advanced
Talk
Open →
2025-10
33:29
Joe Gray - Dear Blue Team: Forensics Advice to Supercharge your DFIR Capabilities and Timing
BSides Knoxville
Open →
2019-06
48:47
Human Hunting
Sean Gillespie
BSidesSF
· 2015
Talk
Open →
2023-12
48:48
BG - Invasive Roots of Anti-Cheat Software - Alissa Torres
BSides Las Vegas
Open →
2016-12
45:18
Using Volatility 3 to Detect Sophisticated Malware
Andrew Case
BSides NYC
· 2025
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Talk
Open →
2025-11
31:09
See You Later, Allocator!: Updating Volatility's Analysis of Modern Linux Memory Allocators
Daniel A Donze
BSides Las Vegas
· 2022
Research
Technical
DFIR
Malware Analysis
Advanced
Talk
Open →
2022-09
46:43
Detecting and analyzing fileless malware
Christopher Williams
Evan Wagner
BSides Tampa
· 2021
Technical
Intermediary
Blue
Demo
Open →
2021-04
22:54
PG - CTF All the Things: Leveraging Gamification to Up Your Security Game - Matt Pardo
BSides Las Vegas
Open →
2017-08
48:42
Facilitating Fluffy Forensics
Andrew Hay
BSides Boston
· 2016
Technical
Cloud IAM
DFIR
Talk
Open →
2016-07
28:49
Boston BSides Bringing Down the Great Cryptowall - Weston Hecker
BSides Boston
Open →
2016-08
37:20
Operation WordDrone: Cyber Threats in the Drone Industry
Ilia Dafchev
BSides Sofia
· 2025
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-04
43:26
DFIR 101 - Clones, drones, & prison phones
Mike Judd
BSides Augusta
· 2023
Technical
Intro
Talk
Open →
2023-10
25:24
Brian Bell - Detection of malicious capabilities using YARA
BSides Augusta
Open →
2016-09
37:41
Threat hunting .NET malware with YARA
Martin Pontiroli
BSides NYC
· 2018
Technical
Malware Analysis
Reverse Engineering
Threat Intel
Blue
Talk
Open →
2023-04
41:30
Tracking Down the Rogue Node
Donovan Farrow
BSides Oklahoma
· 2017
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Talk
Open →
2017-04
25:03
Forensics: We're Not Just Byte-Sized
Ben Hodson
BSides Basingstoke
· 2025
Technical
Talk
Open →
2025-09
28:28
2019 - Memory Analysis is the Ground Truth - Itai Tevet
BSides Denver
Open →
2019-09
48:24
CG - Yes, You Too Can Perform Daring Acts of Live Acquisition - D0n Quix0te
BSides Las Vegas
Open →
2016-12
29:19
GT - Comparing Function Embeddings - Rob Brandon
BSides Las Vegas
Open →
2019-10
24:34
Captain MassJacker Sparrow: Uncovering the Malware's Buried Treasure
Ari Novick
BSides TLV 2026
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2026-03
55:30
Comparing Malicious Files
Robert Simmons
BSides Charm
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2021-05
48:44
You Need a PROcess to Check Your Running Processes and Modules
Michael Goff
BSides Newcastle
· 2020
Technical
DFIR
Malware Analysis
Blue
Technical Deep-dives
Talk
Open →
2020-11
43:58
Adventures in Edge Device Memory Forensics
Richard Tuffin
BSides Exeter
· 2026
Technical
DFIR
Hardware Security
Reverse Engineering
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2026-05
15:38
Ransomware detection based on comparative hybridised analysis
Alida Øvermo Mortensen
BSides Kristiansand
· 2026
Research
Technical
Detection Engineering
Malware Analysis
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2026-02