| 2025-08-07 | Talk | Blackhat |
Weaponizing Apple AI for Offensive Operations
| Hari Shanmugam | ai |
| 2025-04-29 | Talk | Rsac |
XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World
| Aanchal Gupta | ai |
| 2025-03-01 | Panel | Nullcon |
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense
| Ajit Hatti, Varun Singla | ai |
| 2025-03-01 | Talk | Nullcon |
MLOps Under Attack: Threat Modeling Modern AI Systems
| Sandeep Singh | aiml |
| 2025-03-01 | Talk | Nullcon |
Reversing Large Deep learning AI Models
| Yashodhan Vivek Mandke | ai |
| 2024-11-28 | Talk | Blackhat |
Threat Modelling the Generative AI
| Atul Kumar | ai |
| 2024-11-27 | Talk | Blackhat |
AI-Powered Cybersecurity: Promises & Perils
| Lakshmi Hanspal | ai |
| 2024-11-27 | Talk | Blackhat |
Generative AI in Supply Chain Security: Enhancing Container Protection Amid Regulatory Challenges
| Syed Aamiruddin | ai-securitysupply-chainsupply-chain-security+1 |
| 2024-11-26 | Talk | Blackhat |
The Gen AI Double Agent Dilemma: Ally or Adversary
| Lakshmi Hanspal | ai |
| 2024-11-15 | Talk | C0c0n |
GenAI and Autonomous Security in the Age of Zero Trust
| Philip Varughese Vayarakunnil | ai |
| 2024-11-15 | Talk | C0c0n |
Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques
| Adrip Mukherjee, Vinay Kumar | machine-learning |
| 2024-10-29 | Talk | Blackhat |
Hacking Deepfake Image Detection System with White and Black Box Attacks
| Sagar Bhure | deepfake |
| 2024-08-29 | Tool demo | Hitb Sec Conf |
AI Assisted Code Reviewer
| Rajanish Pathak, Hardik Mehta | ai |
| 2024-08-07 | Tool demo | Blackhat |
Hacking generative AI with PyRIT
| Raja Sekhar Rao Dheekonda | ai |
| 2023-12-06 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh, Umair Nehri | ai |
| 2023-09-24 | Panel | Nullcon |
INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI
| Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey | ai |
| 2023-09-23 | Panel | Nullcon |
WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI
| Rahul Neel Mani, Manish Tiwari, Yogesh Kulkarni, Ambarish Kumar Singh | ai |
| 2023-08-25 | Talk | Hitb Sec Conf |
Breaking ML Services: Finding 0-days in Azure Machine Learning
| Nitesh Surana | machine-learning |
| 2023-08-10 | Talk | Blackhat |
AI Assisted Decision Making of Security Review Needs for New Features
| Mrityunjay Gautam | ai |
| 2023-08-09 | Tool demo | Blackhat |
AntiSquat - An AI-Powered Phishing Domain Finder
| Owais Shaikh, Umair Nehri | ai |
| 2023-08-07 | Talk | C0c0n |
Putting a leash on AI
| Aditya Vasekar | ai |
| 2023-08-06 | Talk | C0c0n |
AI in Cyber Security and Crime Prevention
| Vishal Salvi | ai |
| 2023-08-06 | Talk | C0c0n |
Cybersecurity in the Era of AI
| Suvin Mullaseril | ai |
| 2022-08-11 | Tool demo | Blackhat |
Octopii - AI-powered Personal Identifiable Information (PII) scanner
| Owais Shaikh | ai |
| 2021-10-08 | Talk | Shell Con |
Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking
| Tamaghna Basu | ai |
| 2021-08-05 | Talk | Blackhat |
The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks
| Ambrish Rawat | ai |
| 2020-12-10 | Talk | Blackhat |
Effective Vulnerability Discovery with Machine Learning
| Asankhaya Sharma | pentestmachine-learning |
| 2020-10-09 | Talk | Shell Con |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | ai |
| 2020-10-07 | Talk | Rootcon |
ReconPal: Leveraging NLP for Infosec
| Nishant Sharma, Jeswin Mathai | reconredteamnlp+1 |
| 2020-09-18 | Talk | C0c0n |
How I created my clone using AI - next-gen Social Engineering
| Tamaghna Basu | aicloneimpersonation |
| 2020-09-18 | Talk | C0c0n |
Deep Learning for Intrusion Attempt Detection
| Varun Kohli | deep-learningmachine-learningblueteam |
| 2020-08-06 | Talk | Blackhat |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | aiclonesocial-engineering+1 |
| 2020-08-05 | Talk | Blackhat |
Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic
| Harini Kannan | machine-learningexploit-detectionblueteam |
| 2020-03-06 | Talk | Nullcon |
InfoSec Deep Learning in Action
| Satnam Singh | mldeep-learningblueteam |
| 2019-10-17 | Talk | Hitb Sec Conf |
Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure
| Anima Anandkumar | aideep-learning |
| 2019-09-27 | Talk | C0c0n |
AI, ML and Security
| Varun Kohli | aimachine-learning |
| 2019-09-27 | Talk | C0c0n |
Detection of TOR Sources using Artificial Intelligence
| Roshy John | torairedteam |
| 2019-09-27 | Talk | C0c0n |
Offensive Machine Learning for Pentesters and Red Teams
| Tamaghna Basu | machine-learningpentestredteam |
| 2019-08-08 | Talk | Blackhat |
Death to the IOC: What’s Next in Threat Intelligence
| Bhavna Soman | threat-intelligencemachine-learningblueteam |
| 2019-08-07 | Talk | Blackhat |
Defense Against Rapidly Morphing DDOS
| Mudit Tyagi | ddosblueteammachine-learning |
| 2019-05-21 | Talk | Phdays |
GDALR: an efficient model duplication attack on black-box machine learning models
| Rewanth Tammana, Nikhil Joshi | redteammachine-learning |
| 2019-05-09 | Talk | Hitb Sec Conf |
GDALR: Duplicating Black Box Machine Learning Models
| Rewanth Tammana, Nikhil Joshi | machine-learningredteamcloud |
| 2019-03-28 | Tool demo | Blackhat |
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research
| Nilaksh Das | cloudmachine-learningblueteam |
| 2018-12-06 | Talk | Blackhat |
AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace
| Vijay Thaware, Niranjan Agnihotri | aiblueteamdeepfake |
| 2018-11-27 | Talk | Hitb Sec Conf |
COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding
| Vikash Yadav | deep-learningblueteam |
| 2018-10-05 | Talk | C0c0n |
Artificial Intelligence and Social Media Analytics in Criminal Investigation
| Amit Dubey | ai |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | machine-learningblueteam |
| 2018-09-06 | Talk | Grrcon |
Analyzing Multi-Dimensional Malware Dataset
| Ankur Tyagi | blueteamanalysismachine-learning |
| 2018-03-01 | Talk | Nullcon |
A Game between Adversary and AI Scientist
| Satnam Singh | aiblueteam |
| 2017-12-07 | Tool demo | Blackhat |
THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL
| Raghudeep Kannavara | Automationthreat-intelligencemachine-learning+1 |
| 2017-11-20 | Talk | Hackfest |
How my SV Machine nailed your Malware
| Nikhil P Kulkarni | mobileandroidmachine-learning+1 |
| 2017-08-18 | Talk | C0c0n |
Catching Network anomalies using Deep learning
| Aditya Vasekar | machine-learningdeep-learningnetwork |
| 2017-08-18 | Talk | C0c0n |
Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis
| Furqan Khan, Siddharth Anbalahan | machine-learningpentest |
| 2017-07-26 | Talk | Blackhat |
Wire Me Through Machine Learning
| Ankit Singh, Vijay Thaware | machine-learningredteam |
| 2017-05-23 | Talk | Phdays |
Practical machine learning in infosecurity
| Anto Joseph | machine-learningapache-sparkredteam+2 |
| 2017-03-03 | Talk | Nullcon |
Tale of training a Web Terminator!
| Bharadwaj Machiraju | webmlpentest |
| 2016-11-11 | Talk | Deepsec |
Human vs Artificial intelligence – Battle of Trust
| Hemil Shah | ai |
| 2016-05-17 | Talk | Phdays |
Security Automation Based on Artificial Intelligence
| Rahul Sasi | aiAutomationblueteam |
| 2016-03-11 | Talk | Nullcon |
Making Machines think about security for fun and profit
| Rahul Sasi | Automationblueteamweb+2 |