To say that 2020 was a difficult year is an understatement. What got me through it were friends, family, and community. Luckily for me, the latter takes place on Discord and Twitch.
This was also the year where virtual conferences became the new norm. Already being involved with various communities, and by being a Nahomie, I was asked to help build and moderate several cons. It was a great experience.
A plus of this new trend was that the barrier of entry was lowered, allowing more people access to amazing talks.
I’ll list the ones that stood out to me. Make sure to follow their social media and show your support!
Zseano, web app hacker + founder BugBountyHunt3r @ VirSecCon
Unique Mindset - Hacking with Zseano
Breanne Boland, appsec engineer @ Levelup0x07
How to do Chrome Extension code reviews
A look at how to do effective code reviews on Chrome extensions, what tools you can use to perform them, and some common tells of security issues. I took a stab at making an extension for Google SERP.
Hakluke, manager training + QA Bugcrowd @ Levelup0x07
How to Crush Bug Bounties in the first 12 Months
This talk is perfect for anyone who has just started, or is about to start bug bounties. More seasoned hackers will also glean some tips to improve their workflow. Repping the BugCrowd community.
Katie Paxton-Fear, lecturer + PhD @ GrayHat
How to Get Into Bug Bounty
Always wanted to know how to get into bug bounty? Katie lays it all out for you. It's introductory, helpful for anyone interested in bug bounties but not sure what to do next! Her community is awesome.
Jason Haddix, head of security + risk management Ubisoft @ Red Team Village
The Bug Hunter’s Methodology v4
The Bug Hunter’s Methodology is an ongoing yearly installment on the newest tools and techniques for bug hunters and red teamers. Jason explores both common and lesser-known techniques to find assets for a target. Check out his recon interview with NahamSec.
Rhys Elsmore, product engineer Heroku + firefighter @ levelup0x06
Recognition Primed Bug Bounty Hunting
TomNomNom, tech lead security research Detectify @ NahamCon2020
Who, What, Where, When, Wordlist
Everything you need to know about wordlists. Tom expertly teaches you how to create target specific, custom wordlists using various sources and tools. Check out Tom's recon talk.
securinti, community manager Intigriti @ NahamCon2020
You've Got Pwned - Exploiting E-Mail Systems
TomNomNom, tech lead security research Detectify @ VirSecCon2020
Bug Bounties With Bash
Jr0ch17, sr. application security advisor Videotron @ [email protected]
Beyond the Borders of Scope
No spam. Unsubscribe at any time.
What does it look like?






Don't leave, there's more content below! 👇
d0nutptr, lead security engineer graplsec @ VirSecCon 2020
Practical Exploitation of Math.random on V8
A talk about V8's Math.random, what it is and how to break it practically. V8 JavaScript is used in Chrome and Node.js. PoC || GTFO. Currently building recon platform resync.
James Kettle, head of research PortSwigger @ Black Hat
HTTP Desync Attacks - Request Smuggling Reborn
STÖK, educational content + hacker Truesec @ [email protected]
How I became a HackerOne MVH without writing a single line of python
Daniel Miessler, cybersecurity expert + writer @ Red Team Village
Mechanizing the Methodology
Alethe Denis, security consultant + DefCon black badge @ conINT
Phishy Little Liars - Pretexts That Kill
Chloé Messdaghi, vp strategy Point3 security @ OWASP DevSlop
The Act of Balancing - Burnout in Cybersecurity
Chloé Messdaghi, vp strategy Point3 security @ WWHF Deadwood 2020 Virtual
A Quick Guide to Your Hacker Rights
Jonathan Birch, senior security software engineer Microsoft @ Black Hat
HostSplit - Exploitable Antipatterns in Unicode Normalization
Louis Nyffenegger, security engineer + founder PentesterLab @ levelup0x06
Code that gets you pwn(s|'d)
Eva Galperin, director cybersecurity EFF @ AppSecCali
The Electronic Frontier Foundation (Closing Keynote)
The Electronic Frontier Foundation is the leading nonprofit defending digital privacy, free speech, and innovation for 30 years and counting. Eva Galperin explains what the EFF stands for, who they help, and what they do. Her work is primarily focused on providing privacy and security for vulnerable populations around the world.
Heath Adams, founder TCM Security @ CIA
My Journey to Cybersecurity (Keynote)
Jason Blanchard, Content & Community Director @ Black Hills Information Security