Hackers of India
Home
Timeline
About
RoadMap
Deepsec
2019/11/28
Talk
:
Deepsec
:
Mastering AWS Pentesting and Methodology
-
Ankit Giri
2018/11/29
Talk
:
Deepsec
:
DNS Exfiltration and Out-of-Band Attacks
-
Nitesh Shilpkar
2017/11/17
Talk
:
Deepsec
:
How Secure Are Your VoLTE And VoWiFi Calls?
-
Sreepriya Chalakkal
2017/11/17
Talk
:
Deepsec
:
Intel AMT: Using & Abusing The Ghost In The Machine
-
Parth Shukla
2016/11/11
Talk
:
Deepsec
:
AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That
-
Nikhil Mittal
2016/11/11
Talk
:
Deepsec
:
Human vs Artificial intelligence – Battle of Trust
-
Hemil Shah
2015/11/19
Talk
:
Deepsec
:
Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends.
-
Nikhil Mittal
2013/11/21
Talk
:
Deepsec
:
Automation In Android & iOS Application Security Review
-
Hemil Shah
2013/11/21
Talk
:
Deepsec
:
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
-
Parth Shukla
2012/11/29
Talk
:
Deepsec
:
Bad Things in Good Packages - Creative Exploit Delivery
-
Saumil Shah
2011/11/17
Talk
:
Deepsec
:
Behavioral Security: 10 steps forward 5 steps backward
-
Sourabh Satish
2011/11/17
Talk
:
Deepsec
:
FakeAntiVirus - Journey from Trojan to a Persisent Threat
-
Jagadeesh Chandraiah
2010/11/25
Talk
:
Deepsec
:
Developers are from Mars, Compliance Auditors are from Venus
-
Neelay S Shah
2009/11/19
Talk
:
Deepsec
:
Ownage 2.0
-
Saumil Shah
2009/11/19
Talk
:
Deepsec
:
Top 10 Security Issues Developers Don’t Know About
-
Neelay S Shah
2008/11/13
Talk
:
Deepsec
:
Game of Web 2.0 Security - Attacking Next Generation Apps
-
Shreeraj Shah
2007/11/20
Talk
:
Deepsec
:
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
-
Shreeraj Shah
2007/11/20
Talk
:
Deepsec
:
Breaking and Securing Web Applications
-
Nitesh Dhanjani