Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring x64dbg
24
talks mention this tool across
20
BSides chapters.
Talks featuring x64dbg
1:04:53
Smashing the Stack to Building ROP Chains with Gadgets
Doug Rodgers
BSides Charlotte
· 2016
Technical
Reverse Engineering
Vulnerability Research
Intro
Red
Demo
Open →
2016-05
3:19:17
Malware Reverse Engineering
Muhammad Irshad
Muhammad Umair
BSides Islamabad
· 2021
Technical
Malware Analysis
Reverse Engineering
Workshop
Open →
2021-02
4:37:44
Day Two: Malware Reverse Engineering
Umair
Irshad
BSides Islamabad
· 2021
Technical
Advanced
Workshop
Open →
2021-02
27:15
Writing Nim-less Nim - Tyler Randolph
Tyler Randolph
BSides KC
· 2024
Technical
Talk
Open →
2024-05
25:27
ROP - From Zero to Nation State In 25 Minutes
Omer Yair
BSides TLV
· 2020
Technical
Talk
Open →
2020-07
24:11
PG - Introduction to Reversing and Pwning - David Weinman
BSides Las Vegas
Open →
2017-08
21:57
Rush B, Blyat! - Game Hacking for Noobs
Philipp Schmied
BSides Munich
· 2020
Technical
Intro
Talk
Open →
2020-09
53:26
Bringing Harmony to IIS: Using game mods to protect (or nuke) your web server
Adrian Justice
BSides Canberra
· 2023
Technical
Reverse Engineering
Threat Intel
Web AppSec
Advanced
Demo
Talk
Open →
2023-10
21:33
FRIDA, The "Hooker"
Barnabás Sztán-Kovács
BSides Budabest
· 2019
Technical
Malware Analysis
Reverse Engineering
Red
Talk
Open →
2019-06
53:08
The History and Analysis of Stuxnet
Lilly Chalupowski
BSides Fredericton
· 2018
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-12
53:40
Subverting the Windows Kernel with Exploits and Rootkits
Juan Sacco
BSides Frankfurt
· 2025
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Demo
+1
Open →
2025-12
51:52
Exploiting Classic Stack Overflow, By Owais Mehtab
BSides Islamabad
Open →
2020-11
30:24
BSides Sofia 2025: Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Juho Jauhiainen
BSides Sofia
· 2025
Technical
Case Studies and Incidents Analysis
Talk
Open →
2025-04
24:28
Buffer Overflows Demystified – Exploits & Patching
Chaitanya Rahalkar
BSides SLC
· 2025
Technical
Blue
Red
Demo
Talk
Open →
2025-06
28:20
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Juho Jauhiainen
BSides Dublin
Technical
Talk
Open →
2025-10
41:23
The Age of Zygote Injection
Tricta
BSides Las Vegas
· 2025
Technical
Mobile Security
Reverse Engineering
Advanced
Talk
Open →
2025-12
29:36
Finding A Vulnerability In Half Life by Ryan Saridar
Ryan Saridar
BSides Basingstoke
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2024-03
43:08
Highway 64
Michael Gonzalez
BSides Sydney
· 2025
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Open →
2025-02
39:37
Selling Formbook
Borja Rodriguez
Victor Acin
BSides Barcelona
Technical
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-01
39:21
Your Game Is My Game: Reverse Engineering, Cheat Detection, and Security in Gaming
BSides Cairo
· 2022
Technical
AI Security
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2023-02
33:24
Malware: Then, Now and How
Cody J. Winkler
BSides Springfield
· 2017
Technical
IoT
Malware Analysis
Reverse Engineering
Talk
Open →
2018-02
1:00:30
Stolen Laptops: Modern Physical Access Attacks with DMA and Firmware Exploitation
Pierre Nicolas Allard Coutu
BSides Vancouver Island
· 2025
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Advanced
Blue
Red
Technical Deep-dives
+1
Open →
2026-03
26:46
Shellcode: What It Is and Why It's Loved by Cybercriminals
Trym Skilleås
BSides Kristiansand
· 2026
Technical
Malware Analysis
Reverse Engineering
Red
Talk
Open →
2026-02
43:08
Highway 64
Michael Gonzalez
BSides Sydney
· 2025
Technical
Reverse Engineering
Vulnerability Research
Red
Talk
Open →
2025-02