πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

πŸ” Application Security

Security practices and techniques for securing software applications

533
Contributors
558
Talks
203
Tool Demos
17
Panels
3
Keynotes
6
Awards

Top Contributors

Saumil Shah(31) Lavakumar Kuppan(21) Shreeraj Shah(21) Aditya K Sood(13) Gursev Singh Kalra(12)

Related Tags (17)

Show all 17 tags...

All Entries (787 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat From Triage to Threat Modeling: Open-Source Security LLM in Action Source Code Dhruv Kedia, Sajana Weerawardhena#ai-security#threat-modeling#vulnerability-assessment+1
2025-12-11Tool demoBlackhat SupplyShield: Protecting Your Software Supply Chain Source Code Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar#supply-chain#sbom#software-composition-analysis+3
2025-12-11Tool demoBlackhat Cloud Sec AI BOT Nandan Gupta, K v Prashant, Swarup Natukula#cloud-security-posture-management#aws#azure+2
2025-12-11Tool demoBlackhat ReForge: Where Crashes Become Weapons Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Abinav Harsha, Danindu Gammanpilage#fuzzing#exploit-development#vulnerability-assessment+1
2025-12-11Tool demoBlackhat IOCTL-hammer - Parameter-Centric IOCTL Fuzzer for Windows Drivers Source Code Mohit Kulamkolly, Mohanraj Ravichandran#fuzzing#windows#vulnerability-assessment+1
2025-12-11Tool demoBlackhat ThreatShield – The Intelligent Way of Threat Modelling Source Code Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi#threat-modeling#security-strategy#architecture+1
2025-12-10Tool demoBlackhat Catch the Flow: Securing CI/CD Workflows with Flowlyt Source Code Hare Krishna Rai, K v Prashant, Nandan Gupta#ci-cd#supply-chain#devsecops+1
2025-12-10Tool demoBlackhat Securing Secrets from Dev Machine to Deployments Using SLV Source Code Shibly Meeran, Sriram Krishnan, Keshav Kandasamy#devsecops#cicd-security#supply-chain
2025-12-10Tool demoBlackhat EKSi-lite: Simple & Lightweight EKS Cluster Listing & Security Tool Source Code Divyanshu Shukla, Anjali Singh Shukla#aws#kubernetes#cloud-security-posture-management+4
2025-12-10Tool demoBlackhat Kubernetes Goat – A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#container-security#cloud-pentesting+1
2025-12-10Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#penetration-testing-tools#docker#security-testing+1
2025-12-10Tool demoBlackhat SBOM Play Source Code Anant Shrivastava#sbom#supply-chain#vulnerability-assessment+1
2025-12-10Tool demoBlackhat Spotter – Universal Kubernetes Security Engine Source Code Madhu Akula#kubernetes#container-security#cloud-security-posture-management+1
2025-12-10Tool demoBlackhat Breaking the Tunnel: Real-Time API Interception in MDM-Locked Mobile Apps with KnoxSpy Source Code Subho Halder#mobile-pentesting#vulnerability-assessment#android-security
2025-10-10TalkC0c0n Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits Source Code Suchith Narayan#supply-chain#supply-chain-attack#devsecops+1
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Subramanian#security-assessment#application-pentesting#vulnerability-assessment+1
2025-08-07Tool demoBlackhat AzDevRecon - Azure DevOps Enumeration Tool Source Code Raunak Parmar#azure#devsecops#iam
2025-08-07Tool demoBlackhat Spotter – Universal Kubernetes Security Scanner & Policy Enforcer Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2025-08-07Tool demoBlackhat Kubernetes Goat - A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+3
2025-08-07Tool demoBlackhat Kubernetes Security Scanner Source Code Video Krishna Priya#kubernetes#cloud-workload-protection#container-security+4
2025-08-07Tool demoBlackhat Halberd : Multi-Cloud Agentic Attack Tool Source Code Arpan Abani Sarkar#cloud-access-security-broker#cloud-pentesting#security-testing+3
2025-08-07TalkBlackhat Weaponizing Apple AI for Offensive Operations Video Hari Shanmugam#ai#macos#ai-security+2
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjar#attack-surface#vulnerability-assessment#asset-management+2
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkar#incident-management#web-security#architecture+1
2025-08-06Tool demoBlackhat Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs Source Code Satinder Khasriya#api-security#web-security#owasp+1
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solanki#container-security#docker#static-analysis+3
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Datta#static-analysis#software-security#devsecops+2
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Manna#reverse-engineering#binary-analysis#code-analysis+4
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-08-06Tool demoBlackhat ThreatShield - The Intelligent way of Threat Modelling Source Code Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar#threat-modeling#architecture#devsecops+1
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Presentation Whitepaper Video Varun Sharma, Ashish Kurmi#ci-cd#incident-management#devsecops+2
2025-08-06Tool demoBlackhat MORF – Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm#app-security#mobile-pentesting#static-analysis+3
2025-08-06Tool demoBlackhat ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis Source Code Mohammed Tanveer#reverse-engineering#binary-analysis#static-analysis+3
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chaganti#web-security#secure-coding#security-assessment+2
2025-08-06TalkBlackhat Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience Presentation Video Shanit Gupta, Zhisheng Hu, Cooper De Nicola#automotive-cybersecurity#security-testing#control-systems
2025-08-06Tool demoBlackhat ARC – Artifact Reuse Comparator Rushikesh D Nandedkar#static-analysis#reverse-engineering#binary-analysis+3
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishra#web-security#malware-detection#browser-security+2
2025-06-27TalkLehack From HTML Injection to Full AWS Account Takeover: Discovering Critical Risks in PDF Generation Video Raunak Parmar#ssrf#aws#web-security+2
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Whitepaper Video Akash Mukherjee, Saurabh Shintre#secure-development#devsecops#data-protection+1
2025-04-29TalkRsac XPIA Attacksβ€”Rethinking Defense in Depth for an AI-Powered World Video Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero#ai#ai-security#input-validation+3
2025-04-04Tool demoBlackhat Intro to CICDGuard - How to have visibility and security OF CICD ecosystem Source Code Pramod Rana#cicd-pipeline#cicd-security#secure-development+3
2025-04-04Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-04-04Tool demoBlackhat Kubernetes Goat: A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2025-04-04Tool demoBlackhat RedInfraCraft : Automate Complex Red Team Infra Source Code Yash Bharadwaj, Manish Gupta#cloud-access-security-broker#cloud-compliance#cloud-pentesting+1
2025-04-04Tool demoBlackhat Agneyastra - Firebase Misconfiguration Detection Toolkit V2 Source Code Bhavarth Karmarkar, Devang Solanki#misconfiguration#cloud-pentesting#security-tools+1
2025-04-04TalkBlackhat Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM Presentation Vikas Gupta, Peter Garba#reverse-engineering#code-analysis#software-security
2025-04-03Tool demoBlackhat MobXplore Source Code Aman Pareek, Akarsh Singh#application-pentesting#ios-security#dynamic-analysis+4
2025-04-03Tool demoBlackhat SmuggleShield 2.0 - Basic Protection Against HTML Smuggling Source Code Dhiraj Mishra#application-pentesting#input-validation#security-testing
2025-04-03TalkBlackhat ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! Video Vivek Balachandran, Nikhil Bartake, Zi Jie See Toh, Michael Kasper#secure-coding#quantum-computing#software-security
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-04-03Tool demoBlackhat KubeSF V1.2 - Kubernetes Security Posture Audit Suite Abhishek S, Ajith Prabhu#kubernetes#cloud-workload-protection#container-security+4
2025-04-03Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Anikait Panigrahi, Aparna Balaji#fuzzing#ics-security#industrial-control-systems+2
2025-04-03Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solanki, Bhavarth Karmarkar#docker#container-security#vulnerability-assessment
2025-03-14TalkInsomnihack The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) Dhiraj Mishra#endpoint-protection#security-testing#malware-distribution
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Video Kartik Lalan#risk-management#architecture#data-leak+4
2025-03-02PanelNullcon From Code to Defense: Why Developers Are the New Security Leaders Vaibhav Gupta, Vikas Goyal, Hilal Lone, Gene Golovinsky#secure-development#secure-coding#security-testing+3
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Presentation Video Kumar Ashwin#secure-coding#devsecops#architecture
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishna#embedded-security#firmware-analysis#secure-coding+1
2025-03-01TalkNullcon Drawing parallels between iOS and macOS Pentesting with DVMA Source Code Vaibhav Lakhani#macos#ios#application-pentesting+3
2025-03-01TalkNullcon MLOps Under Attack: Threat Modeling Modern AI Systems Presentation Sandeep Singh#ai#ml#ai-security+4
2025-03-01TalkNullcon The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties Video Anto Joseph#bug-bounty#secure-development#security-testing+2
2024-12-12Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#application-pentesting#code-review#secure-development+3
2024-12-12Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#dynamic-analysis+2
2024-12-12Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#cloud-workload-protection#security-testing+3
2024-12-12Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehri#genzai#iot-device-management#iot-pentesting+4
2024-12-12Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE) - Knowing the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chaganti#browser-security#web-security#web-pentesting
2024-12-11Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#network-forensics+1
2024-12-11Tool demoBlackhat Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel Source Code Amit Parjapat, Vedant Wayal#android#application-pentesting#mobile-application-management+4
2024-12-11Tool demoBlackhat Open Source Tool to Shift Left Security Testing by Leveraging AI Shivam Rawat, Shivansh Agrawal#ai-security#secure-development#security-testing+2
2024-11-21TalkSecurityfest Wheels of Wonder Video Hrishikesh Somchatwar#automotive-cybersecurity#car-hacking#embedded-systems+4
2024-11-21TalkSecurityfest Breaking Container Boundary Using Side Channel Attack Video Adhokshaj Mishra#container-security#docker#security-testing+1
2024-11-21TalkSecurityfest UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities Video Priyank Nigam#web-security#appsec#iam
2024-11-16TalkC0c0n Invisible Invaders: Bypassing Email Security with Legitimate Tools Dhruv Bisani#bypassing#phishing#social-engineering+2
2024-11-16TalkC0c0n Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides Rakesh Seal, Diptisha Samanta#exploitation#ethical-hacking#network-pentesting+1
2024-11-16TalkC0c0n Serverless Phishing Factory: Automate, Attack, Adapt Yash Bharadwaj, Manish Gupta#phishing#serverless#cloud-workload-protection+2
2024-11-15TalkC0c0n PCI 4.0, Javascript Security for product security teams Video Anand Kumar Ganesan, Mohammad Arif#web-security#secure-coding#application-pentesting+2
2024-11-15TalkC0c0n CISO’s take on BYOAI Video Venugopal Parameswara#risk-management#security-governance#security-compliance+3
2024-11-15TalkC0c0n Know your Enemies: Deep Dive into Ransomware Threat Groups Video Niranjan Jayanand#ransomware#endpoint-protection#dynamic-analysis
2024-11-06TalkBlackalps IDAT Loader: The Malware’s Camouflaged Weapon Niranjan Jayanand#endpoint-protection#dynamic-analysis#security-testing
2024-10-29TalkBlackhat Hacking Deepfake Image Detection System with White and Black Box Attacks Video Sagar Bhure#deepfake#ai-security#deep-learning+4
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjit, Mangatas Tondang#blueteam#oauth#application-pentesting+4
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singh#automated-scanning#vulnerability-assessment#security-assessment+2
2024-10-23Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Vishnu Dev, Vivek N J#fuzzing#ics-security#industrial-control-systems+1
2024-09-26TalkRootcon How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#application-hardening#cicd-pipeline+4
2024-08-30TalkHitbsecconf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajput#web-security#security-assessment#exploitation+2
2024-08-29Tool demoHitbsecconf CICDGuard Source Code Pramod Rana#ci-cd#cicd-pipeline#cicd-security+3
2024-08-29Tool demoHitbsecconf AI Assisted Code Reviewer Rajanish Pathak, Hardik Mehta#ai#ai-security#code-review+4
2024-08-29Tool demoHitbsecconf Mantis Source Code Bharath Kumar, Akshay Jain#asset-inventory#dast#anti-phishing
2024-08-15TalkUsenix TYGR: Type Inference on Stripped Binaries using Graph Neural Networks Presentation Whitepaper Video Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik#binary-analysis#reverse-engineering#deep-learning+1
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Video Vivek Ramachandran, Shourya Pratap Singh#web-security#security-assessment#application-pentesting+4
2024-08-10TalkDefcon Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming Presentation Whitepaper Video Shiva Shashank, Bramwell Brizendine#process-injection#dynamic-analysis#exploit-delivery+1
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#swg#cloud-access-security-broker#application-pentesting+4
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#ssl#application-pentesting#secure-coding+3
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2024-08-08Tool demoBlackhat Open Source LLM Security Source Code Ankita Gupta 1, Ankush Jain#ai-security#application-pentesting#security-testing+3
2024-08-08Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Anand Tiwari, Harsha Koushik#cloud-security-posture-management#cloud-pentesting#security-testing+1
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikh#red-teaming#ai-security#nlp+2
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nain#ics-security#scada#plc-security+2
2024-08-07Tool demoBlackhat Hacking generative AI with PyRIT Source Code Video Raja Sekhar Rao Dheekonda#ai#ai-security#machine-learning+4
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigam#security-assessment#api-security#secure-development
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arora, Parthasarathi Chakraborty#architecture#devsecops#risk-management+1
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2024-04-19Tool demoBlackhat AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs Source Code Asankhaya Sharma#static-analysis#ai#vulnerability-assessment+1
2024-04-19Tool demoBlackhat AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud Source Code Sherin Stephen, Nishant Sharma, Rishappreet Singh Moonga#aws#ai-security#ai+4
2024-04-19Tool demoBlackhat GearGoat : Car Vulnerabilities Simulator Source Code Nishant Sharma, Pranjal Soni, Sanjeev Mahunta#car-hacking#iot-device-management#iot-pentesting+3
2024-04-18Tool demoBlackhat BinderAPI Scanner & BASS Source Code Krishnaprasad Subramaniam, Jeffrey Gaor, Valen Sai, Eric Tee Hock Nian#api-security#application-pentesting#dynamic-analysis+3
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeran#blueteam#application-hardening#secure-coding+2
2024-04-18Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Version 2 Govind Krishna, Xian Xiang Chang#audit#application-pentesting#ai-security+4
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2024-04-18Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#cloud-pentesting+3
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussain#asset-inventory#architecture#devsecops+1
2024-04-18Tool demoBlackhat APKDeepLens - Android security insights in full spectrum Source Code Atul Singh, Deepanshu Gajbhiye#android-security#static-analysis#mobile-pentesting+1
2024-04-18TalkBlackhat Breaking Managed Identity Barriers In Azure Services Presentation Nitesh Surana, David Fiser#azure#cloud-pentesting#access-management+3
2024-04-18Tool demoBlackhat R0fuzz Source Code Season Cherian, Vishnu Dev#fuzzing#ics-security#ics+2
2024-04-18Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE) - Unfold the risks for your Browser Supplements Source Code Abhinav Khanna#browser-security#web-security#vulnerability-assessment
2024-03-12TalkNullcon Secure Web Gateways are dead. What’s next? Vivek Ramachandran#browser-security#application-hardening#security-strategy+2
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jati#vulnerability-assessment#embedded-systems#firmware-analysis
2023-12-07Tool demoBlackhat Akto - Open Source API Security Tool Source Code Ankush Jain#api-security#secure-development#security-testing+3
2023-12-07Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abraham#android-security#ios-security#mobile-pentesting+2
2023-12-07TalkBlackhat Unmasking APTs: An Automated Approach for Real-World Threat Attribution Presentation Video Aakansha Saha#machine-learning#ai-security#static-analysis+1
2023-12-06Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Jeswin Mathai, Shourya Pratap Singh#threat-intelligence-analysis#application-pentesting#application-hardening+3
2023-12-06TalkBlackhat AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers Presentation Video Ankit Gangwal, Shubham Singh, Abhijeet Srivastava#mobile-hacking#android-security#application-pentesting+2
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben#vulnerability-assessment#honeypot#security-testing+2
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-12-06Tool demoBlackhat SSH into any device from anywhere with ZERO Open Network ports Source Code Anthony Prakash, Colin Constable#ssh#zero-trust#secure-development+1
2023-12-06Tool demoBlackhat Octopii v2 Source Code Owais Shaikh, Umair Nehri#ai#data-protection#nlp+4
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-09-23TalkNullcon Secure Your Angular App Using JWT And GraphQL Presentation Ankit Sharma#blueteam#api-security#secure-development+1
2023-09-23TalkNullcon Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities Presentation Video Nitesh Surana#azure#cloud-pentesting#application-hardening+4
2023-09-23TalkNullcon How I hacked your bank account: A detailed look at UPI Security Video Abhay Rana#hacking#application-hardening#input-validation+2
2023-09-23TalkNullcon Android-SigMorph: Covert Communication Exploiting Android Signing Schemes Presentation Video Ayan Saha, Achute Sharma#android#application-pentesting#static-analysis+1
2023-09-23TalkNullcon Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In iOS Presentation Shubham Sharma#ios#ios-security#application-pentesting+3
2023-09-23TalkNullcon Secure Coding: Fix From The Root Presentation Saddam Hussain, Gopika Subramanian#secure-coding#application-pentesting#code-review+4
2023-09-23TalkNullcon The Curious Case Of The Rogue SOAR Presentation Video Mukesh Sai Kumar, Jaden Furtado#blueteam#application-pentesting#dynamic-analysis+3
2023-09-23TalkNullcon The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis Presentation Video Nikhil Ashok Hegde#malware-detection#linux#dynamic-analysis+2
2023-09-23PanelNullcon SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAM’S JOURNEY TO EXCELLENCE Dinesh Varma, Satish Kumar Dwibhashi, Manoj Kumar#secure-development#security-tools#cicd-security+2
2023-09-23TalkNullcon Your App Is Probably A Spyware…Or Is It? Presentation Gaurav Gogia, Pandurang Patil#spyware#secure-development#security-testing+3
2023-09-16TalkRomhack Hacking into the iOS’s VOLTE implementation Video Hardik Mehta, Rajanish Pathak#ios#application-pentesting#security-testing
2023-08-25Tool demoHitbsecconf iGoat Source Code Swaroop Yermalkar#ios#application-pentesting#secure-coding+3
2023-08-24Tool demoHitbsecconf Vajra Source Code Raunak Parmar#aws#azure#cloud-pentesting+3
2023-08-12Tool demoDefcon Open Source API Security for devsecops Source Code Ankush Jain, Ankita Gupta 1#api-security#devsecops#ci-cd+2
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Video Vandana Verma Sehgal, Viraj Gandhi#secure-development#devsecops#risk-management+2
2023-08-12PanelDefcon Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert Trupti Shiralkar, Kiran Shirali#appsec#alert-fatigue#vulnerability-assessment
2023-08-11Tool demoDefcon vAPI : Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#owasp#authorization
2023-08-11TalkDefcon Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications Video Ankur Chowdhary#web-security#xss#application-pentesting+3
2023-08-11TalkDefcon Getting a Migraine - uncovering a unique SIP bypass on macOS Presentation Video Anurag Bohra, Jonathan Bar Or, Michael Pearse#macos#endpoint-protection#bypassing+2
2023-08-10Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#authorization#security-testing+3
2023-08-10Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#sast#secure-development+4
2023-08-10TalkBlackhat AI Assisted Decision Making of Security Review Needs for New Features Presentation Mrityunjay Gautam, Pavan Kolachoor#ai#ai-security#deep-learning+3
2023-08-09Tool demoBlackhat Akto - Open Source API Security Tool Source Code Ankush Jain, Ankita Gupta 1#api-security#application-pentesting#security-testing+3
2023-08-09Tool demoBlackhat AntiSquat - An AI-Powered Phishing Domain Finder Source Code Owais Shaikh, Umair Nehri#ai#ai-security#phishing+2
2023-08-09Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android-security#application-pentesting#dynamic-analysis+3
2023-08-09Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2023-08-09Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Ajit Hatti#secure-coding#code-review#secure-development+1
2023-08-09Tool demoBlackhat ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections Video Ankit Anurag, Ashwath Kumar, Manikandan Rajappan#cloud-access-security-broker#incident-management#security-tools+2
2023-08-07TalkC0c0n Serverless Siege: AWS Lambda Pentesting Video Anjali Singh Shukla, Divyanshu Shukla#aws#serverless#cloud-pentesting+2
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshy#encryption#architecture#data-protection+1
2023-08-07TalkC0c0n Shifting left blockchain development for safer DApps Video Dhanith Krishna#smart-contracts#secure-development#devsecops+2
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M G#devsecops#secure-development#static-analysis+3
2023-08-07TalkC0c0n Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos Video Nikhil Prabhakar#android-security#reverse-engineering#dynamic-analysis
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogi#smart-contracts#phishing#secure-coding+1
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-08-06TalkC0c0n Mitigating SSRF at scale the right way with IMDSv2! Video Ayush Priya#web-security#api-security#aws+2
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutani#secure-development#devsecops#software-security+3
2023-08-06TalkC0c0n Influence of Artificial Intelligence in GRC Space Mahesh Kalyanaraman#security-governance#risk-management#security-compliance+2
2023-08-06TalkC0c0n Surviving In Dependency Hell Video Kumar Ashwin#secure-development#devsecops#software-security
2023-08-06TalkC0c0n Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector Video Anshu Kumar, Pavan Sorab#devsecops#ci-cd#cicd-pipeline+2
2023-06-01TalkSecurityfest Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#reverse-engineering#appsec#endpoint-protection+4
2023-05-12Tool demoBlackhat GCPGoat : A Damn Vulnerable GCP Infrastructure Source Code Shantanu Kale, Rishappreet Singh Moonga, Ravi Verma, Govind Krishna#gcp#cloud-pentesting#cloud-workload-protection+4
2023-05-12Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#static-analysis#sast+2
2023-05-12Tool demoBlackhat Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration Source Code Ravi Rajput#automobile#automotive-cybersecurity#embedded-systems+4
2023-05-11Tool demoBlackhat APKHunt | OWASP MASVS Static Analyzer Source Code Mrunal Chawda, Sumit Kalaria#owasp#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Atharva Chincholkar, Srishti Chaubey#secure-coding#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat Damn Vulnerable Bank Source Code Rewanth Tammana, Hrushikesh Kakade, Akshansh Jaiswal#android-security#application-pentesting#dynamic-analysis+3
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-05-11Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2023-05-11Tool demoBlackhat KernelGoat Source Code Shivankar Madaan#kernel#secure-development#security-training
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhure, Shain Singh#encryption#quantum-computing#secure-development+3
2023-05-11Tool demoBlackhat AzureGoat : A Damn Vulnerable Azure Infrastructure Source Code Nishant Sharma, Dasari Yashwanth Babu#azure#cloud-pentesting#cloud-workload-protection+2
2023-05-11Tool demoBlackhat Kubernetes Goat: Interactive Kubernetes Security Learning Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekar, Apoorva Phadke#secure-development#devsecops#software-security+2
2023-04-26TalkRsac Is Increasing Security Maturity And Decreasing Operational Load Possible? Video Rohit Dhamankar#risk-management#architecture#security-governance+1
2023-03-23TalkInsomnihack How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#devsecops#supply-chain-security+3
2023-03-09PanelNullcon How to make security easier for your developers Video Santosh Yadav, Frida Kiriakos, Marie Theresa Brosig, Xavier Rene Corail#secure-development#security-testing#secure-coding+3
2023-03-09PanelNullcon Elements of a Successful Security Strategy: A Comprehensive Approach Video Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock#security-strategy#security-testing#secure-development+4
2023-01-26TalkUsenix Building an Automated Machine for Discovering Privacy Violations at Scale Video Suchakra Sharma#static-analysis#secure-coding#data-protection+2
2022-12-08Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+4
2022-12-07Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#application-pentesting#secure-development+4
2022-12-07TalkBlackhat Cross-Contract Ricochet Attacks & Off-Chain-On-Chain Manipulation of Billion Dollar NFT Collections Presentation Nitesh Dhanjani#exploit#smart-contracts#solidity+4
2022-12-07Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+1
2022-09-28TalkRootcon AWSGoat : A Damn Vulnerable AWS Infrastructure Presentation Video Jeswin Mathai, Shantanu Kale, Sanjeev Mahunta#aws#cloud-pentesting#cloud-workload-protection+4
2022-09-24TalkC0c0n Building Smart, Resilient and Sustainable Cyber Eco System Navin Kumar Singh#risk-management#cybersecurity-strategy#architecture+4
2022-09-24TalkC0c0n In production with GRC for cloud Mahesh Kalyanaraman#cloud-compliance#security-governance#risk-management+1
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Ali#web-security#static-analysis#sast+1
2022-09-24TalkC0c0n Web3 Security - Security in MetaVerse, and the new world of web3 Rohit Srivastwa#web3#decentralized-systems#smart-contracts+2
2022-09-23TalkC0c0n Securing your APIs for a cloud native future Navendu Pottekkat#api-security#secure-development#devsecops
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan M#api-security#threat-landscape#threat-hunting+1
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagatti#devsecops#architecture#threat-detection+2
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathi#secure-development#devsecops#software-security+2
2022-09-23TalkC0c0n Hyperledger Fabric & Ethereum Apps: Security Deep Dive Alex Devassy, Dhanith Krishna#smart-contracts#solidity#decentralized-systems+2
2022-09-23TalkC0c0n Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? Presentation Abhijith B R#risk-management#architecture#devsecops
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwal#android-security#mobile-pentesting#reverse-engineering+2
2022-09-23TalkC0c0n Hacking SmartContracts Anto Joseph#smart-contracts#reverse-engineering#secure-coding
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju K#secure-development#risk-management#architecture
2022-09-23TalkC0c0n Common Misconfigurations in your Kubernetes Cluster and What can you do about it? Kumar Ashwin#kubernetes#cloud-workload-protection#container-security+4
2022-09-08Tool demoNullcon ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs Presentation Rohit Sehgal, Varun Kakumani#owasp#api-security#cloud-workload-protection+3
2022-09-08TalkNullcon Pushing Security Left By Mutating Byte Code Presentation Video Gaurav Gogia#secure-coding#application-hardening#static-analysis+1
2022-09-08TalkNullcon Web3.0 - Smart Contracts Could Be Leaky Presentation Video Riddhi Shree#smart-contracts#web3#decentralized-systems+3
2022-09-08TalkNullcon Automate Your Whatsapp Chats Presentation Video Aditi Bhatnagar#android#application-pentesting#ai-security+2
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software – One bug at a time Video Sandeep Singh, Laurie Mercer#open-source-security#supply-chain#code-review+4
2022-09-08TalkNullcon Raining CVEs On WordPress Plugins With Semgrep Presentation Video Shreya Pohekar, Syed Sheeraz Ali#static-analysis#code-review#secure-coding+3
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-09-07TalkNullcon Hacking 5G Is No Rocket Science Presentation Video Altaf Shaik, Matteo Strada#api-security#application-pentesting#security-testing
2022-09-07TalkNullcon Hacking Android Foreground Services Escalation Of Privileges Presentation Video Rony Das#android#android-security#mobile-hacking+3
2022-09-07TalkNullcon Scale hacking to secure your cloud and beyond Video Anand Prakash#cloud-pentesting#cloud-security-posture-management#container-security+4
2022-09-07TalkNullcon Do PDF Tools Conform To The Specification? Presentation Video Prashant Anantharaman#pdf#data-protection#static-analysis+4
2022-09-07TalkNullcon ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron Video Mohan Sri Rama Krishna Pedhapati, Maxwell Garrett#red-teaming#application-pentesting#dynamic-analysis+4
2022-09-07TalkNullcon Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls Presentation Video Shyam Sundar Ramaswami, Rakesh Mahanthi#vulnerability-assessment#hmi#data-protection+1
2022-09-06PanelNullcon Consumer Tech Bug Bounty Panel: Hear from the Program Managers Video Sandeep Singh, Rishika Hooda, Omar Benbouazza#bug-bounty#security-testing#application-hardening+3
2022-09-06PanelNullcon Securing the Software Video Mrudul Uchil, Abhisek Datta, Harish Goel, Matthew Bohne#software-security#secure-development#security-testing+3
2022-08-26TalkHitbsecconf CAN A FUZZER MATCH A HUMAN Presentation Bhargava Shastry#fuzzing#solidity#smart-contracts+4
2022-08-25TalkHitbsecconf MPT: Pentest In Action Presentation Video Jyoti Raval#security-assessment#application-pentesting#asset-management+2
2022-08-12TalkDefcon Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years Video Vivek Ponnada#secure-coding#devsecops#owasp
2022-08-12PanelDefcon Agility Broke AppSec. Now It’s Going to Fix It. Video Vandana Verma Sehgal, Roy Erlich, Emil Vaagland, Seth Kirschner#security-testing#secure-development#cicd-pipeline
2022-08-11Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+4
2022-08-11TalkBlackhat ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron Presentation Mohan Sri Rama Krishna Pedhapati, Aaditya Purani, Max Garrett, William Bowling#red-teaming#application-pentesting#code-review+4
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikh#ai#ai-security#data-protection+4
2022-08-11TalkBlackhat Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol Presentation Whitepaper Subhechha Subudhi, Clara Maine, Akke Toeter, Victoria Bosch#zero-day#smart-contracts#security-development-lifecycle+2
2022-08-10TalkBlackhat Attacks From a New Front Door in 4G & 5G Mobile Networks Presentation Video Altaf Shaik, Shinjo Park, Matteo Strada#api-security#access-management#identity-theft+4
2022-08-10Tool demoBlackhat AWSGoat : A Damn Vulnerable AWS Infrastructure Source Code Nishant Sharma, Jeswin Mathai, Sanjeev Mahunta#aws#cloud-pentesting#cloud-workload-protection+4
2022-08-10Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#code-review#secure-development+4
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Manna#reverse-engineering#dynamic-analysis#network-pentesting+4
2022-08-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Amrudesh Balakrishnan, Rahul Sani, Abhishek Jm#android#android-security#application-pentesting+4
2022-08-10Tool demoBlackhat ArcherySec - Manage and Automate your Vulnerability Assessment Source Code Anand Tiwari#application-pentesting#ci-cd#dynamic-analysis+3
2022-08-10Tool demoBlackhat HazProne : Cloud Hacking Source Code Devansh Patel, Staford Titus S#cloud-pentesting#cloud-workload-protection#aws+4
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Source Code Ajit Hatti#secure-coding#secure-development#security-tools+3
2022-08-10Tool demoBlackhat AzureGoat : A Damn Vulnerable Azure Infrastructure Source Code Jeswin Mathai, Nishant Sharma, Rachna Umaraniya#azure#cloud-pentesting#cloud-workload-protection+3
2022-06-07TalkRsac Continuous Security - Integrating Pipeline Security Presentation Vandana Verma Sehgal#ci-cd#cicd-pipeline#cicd-security+3
2022-06-01TalkSecurityfest Exploitation and automated detection of threats to modern cloud infrastructure Video Krishnaa Srinivasa, Maithri Nadig#aws#vulnerability-assessment#cloud-monitoring+4
2022-05-12Tool demoBlackhat Node Security Shield Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+3
2022-05-12Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2022-05-12Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+4
2022-05-12TalkBlackhat Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems Presentation Prashant Rajput, Michail Maniatakos#ics-security#control-systems#hardware-embedded+3
2022-05-12Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#secure-development+1
2022-04-08TalkNullcon Attack Surfaces for 5G Networks Video Altaf Shaik#application-pentesting#security-development-lifecycle#api-security
2022-04-08TalkNullcon Bheem OS - A next-generation reasonably secure OS using Rust MicroVM Video Akram Ansari, Subash Sn#os#virtual-machine#container-security+3
2022-03-25TalkInsomnihack Hook, Line and Sinker - Pillaging API Webhooks Video Abhay Bhargav#web-security#api-security#ssrf+1
2021-11-18TalkHackinparis Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS Kavisha Sheth#aws#cloud-workload-protection#cloud-pentesting+3
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgal#code-review#static-analysis#reverse-engineering+2
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamath#incident-management#security-training#devsecops+1
2021-11-13TalkC0c0n Cybersecurity in the era of Resilience - A walk through people, process and technology Babitha B P#risk-management#cyber-resilience#architecture+3
2021-11-13TalkC0c0n Server-side javascript Injection Presentation Kavisha Sheth#web-security#secure-coding#web-pentesting
2021-11-13TalkC0c0n Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application Gayatri Nayak#web-security#authentication#authorization+2
2021-11-12TalkC0c0n Dissecting Malicious Software and Analysis Shrutirupa Banerjiee#reverse-engineering#dynamic-analysis#static-analysis
2021-11-11Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10) Source Code Tushar Kulkarni#api-security#application-pentesting#security-testing+4
2021-11-11Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android#android-security#application-pentesting+3
2021-11-11Tool demoBlackhat Kubernetes Goat: Interactive Kubernetes Security Learning Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2021-11-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jaiswal, Abhishek Jm, Rahul Sani#android#application-pentesting#code-review+4
2021-11-10Tool demoBlackhat Kubestriker: A Blazing Fast Security Auditing Tool Source Code Vasant Kumar#kubernetes#cloud-workload-protection#container-security+3
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiya#aws#security-monitoring#iam+1
2021-10-15TalkRootcon The Curious case of knowing the unknown Video Vandana Verma Sehgal#secure-coding#devsecops#software-security
2021-10-08KeynoteShellcon Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking Video Tamaghna Basu#ai#ai-security#deep-learning+4
2021-08-27TalkHitbsecconf Securing Webviews and The Story Behind CVE-2021–21136 Presentation Video Shiv Sahni, Imdadullah Mohammed#android-security#secure-coding#security-testing+2
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishna#secure-coding#security-assessment#ethical-hacking+2
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnada, Sarah Fluchs#ics-security#secure-coding#control-systems+1
2021-08-07Tool demoDefcon Tenacity- An Adversary Emulation Tool for Persistence Video Atul Nair, Harshal Tupsamudre#incident-management#security-testing#attack-surface
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest#security-testing#incident-management#red-teaming+3
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B R#red-teaming#ethical-hacking#vulnerability-assessment+2
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Verma#security-assessment#vulnerability-assessment#application-pentesting+1
2021-08-05TalkBlackhat The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks Presentation Ambrish Rawat, Killian Levacher, Mathieu Sinn#ai#ai-security#deep-learning+4
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkar, Mauricio Espinosa#network-defense#application-pentesting#attack-surface+1
2021-08-04Tool demoBlackhat ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing Source Code Parbati Kumar Manna#reverse-engineering#application-pentesting#code-review+4
2021-08-04TalkBlackhat Siamese Neural Networks for Detecting Brand Impersonation Presentation Jugal Parikh, Nitin Kumar Goel, Justin Grana, Yuchao Dai#impersonation#ai-security#deep-learning+4
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekonda, Will Pearce#vulnerability-assessment#ai-security#machine-learning+2
2021-08-04Tool demoBlackhat Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool Source Code Pralhad Chaskar, Vasant Kumar#kubernetes#cloud-workload-protection#container-security+4
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dash#kubernetes#audit#secure-coding+1
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithane#windows#process-injection#blueteam+1
2021-03-06TalkNullcon Bug hunter adventures Video Shreyas Dighe, Yuvraj Dighe#bug-hunting#application-pentesting#bug-bounty+3
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-11-21TalkAppsecindonesia Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory Abhi M Balakrishnan#web-security#owasp#application-pentesting+1
2020-11-21TalkAppsecindonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshi#architecture#devsecops#risk-management+1
2020-11-20TalkDeepsec What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Presentation Shyam Sundar Ramaswami#malware-detection#sandbox#static-analysis+1
2020-11-11TalkPowerofcommunity My Hacking Adventures With Safari Reader Mode Presentation Nikhil Mittal 1#browser-security#ios-security#vulnerability-assessment+1
2020-10-02Tool demoBlackhat MalViz.ai Source Code Vasu Sethia, Shivam Kataria#blueteam#machine-learning#deep-learning+3
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky#embedded-systems#firmware-analysis#static-analysis+1
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan#security-assessment#vulnerability-assessment#network-pentesting+3
2020-10-01Tool demoBlackhat OWASP Python Honeypot Source Code Sri Harsha Gajavalli, Ali Razmjoo#web-security#owasp#security-assessment+1
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Gupta#security-assessment#vulnerability-assessment#devsecops
2020-09-18TalkC0c0n Introducing SniperPhish: A Web-Email Spear Phishing Toolkit Source Code Video Sreehari Haridas, Gem George#phishing#application-pentesting#security-development-lifecycle+4
2020-09-18TalkC0c0n Web Application hacking with WebZGround Video Parveen Yadav, Narendra Kumar#web-security#web-pentesting#security-assessment+3
2020-09-18KeynoteC0c0n Data protection and Privacy Data protection and Privacy Video Kris Gopalakrishnan#ai-security#data-protection#identity-theft+2
2020-09-18TalkC0c0n Demystifying Zero Trust - A Real world Video Sandeep Variyam#zero-trust#architecture#security-governance+1
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giri#bug-hunting#bug-bounty#security-testing+3
2020-09-18TalkC0c0n Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment Source Code Video Madhu Akula#kubernetes#red-teaming#cloud-workload-protection+3
2020-09-18TalkC0c0n Broken Cryptography & Account Takeover Harsh Bothra#encryption#ssl#security-testing+2
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-08-22TalkThedianainitiative Hacking into Android Ecosystem Video Aditi Bhatnagar#android#android-security#application-pentesting+3
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgal#owasp#secure-development#devsecops+3
2020-07-26TalkHitbsecconf Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company Himanshu Sharma, Aman Sachdev#red-teaming#application-pentesting#incident-management+2
2020-04-25TalkHitbsecconf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#vulnerability-assessment#security-assessment#blueteam
2020-03-06Tool demoNullcon FRISPY Source Code Tejas Girme, Parmanand Mishra#spyware#red-teaming#api-security+3
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Dutta#intrusion-detection#machine-learning#application-pentesting+3
2020-03-06Tool demoNullcon Callidus Source Code Chirag Savla#red-teaming#azure#application-pentesting+2
2020-03-06Tool demoNullcon spike2kill Source Code Manish Singh#web-scraping#ai-security#nlp+4
2020-03-06Tool demoNullcon F.R.I.D.A.Y Source Code Shyam Sundar Ramaswami#blueteam#dynamic-analysis#sandbox+2
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahan#linux#secure-coding#web-security+3
2020-03-06Tool demoNullcon Talisman Source Code Suhas Vishwanath#secure-development#macos#linux+3
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2019-12-04Tool demoBlackhat DumpTheGit Source Code Malkit Singh#reconnaissance#data-leak#data-protection+1
2019-11-07TalkPowerofcommunity Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’?? Kushal Shah#vulnerability-assessment#fuzzing#reverse-engineering+2
2019-11-01TalkHackfest The Mechanics of Malware’s Darkside Presentation Video Yagnesh Waran P, Laura Harris#dynamic-analysis#static-analysis#security-testing+1
2019-11-01TalkAppsecdayaustralia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-10-16Tool demoHitbsecconf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shah#arm#linux#firmware-analysis+4
2019-10-11TalkTexascybersummit Exploit The State of Embedded Web Security in IoT Devices ! Aditya K Sood#iot-security-testing#web-security#embedded-security
2019-10-10TalkBrucon Security transition from 4G to 5G: are we secure enough? Presentation Video Altaf Shaik, Ravishankar Borgaonkar#5g#4g#network-architecture+3
2019-09-28TalkRomhack Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it Presentation Video Samit Anwer#oauth#phishing#csrf+2
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singh#code-review#secure-coding#static-analysis+3
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathan#devsecops#secure-development#software-security+2
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hatti#authentication#identity-management#secure-development+1
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastava#security-assessment#red-teaming#secure-coding
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharma#secure-coding#security-assessment#serverless+4
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurien#financial-institutions#secure-development#risk-management+2
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2019-09-27PanelC0c0n Shouldn’t Organization disclose breaches - The need for a shared platform Video Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary#data-leak#data-protection#security-testing+4
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhan#authentication#identity-management#vulnerability-assessment+3
2019-09-13Talk44con One Person Army – Playbook on how to be the first Security Engineer at a company Video Kashish Mittal#devsecops#application-hardening#secure-development+4
2019-09-13TalkGlobalappsec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#purpleteam#cloud-workload-protection#serverless+3
2019-09-13TalkGlobalappsec Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center Amol Sarwate#aws#siem#devsecops
2019-09-12KeynoteGlobalappsec Making a Change, One at a time - Diversity: More than just Gender Vandana Verma Sehgal#security-training#human-factor#cybersecurity-strategy+3
2019-08-30TalkHitbsecconf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshi#secure-coding#red-teaming#blueteam+1
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkar#ios-security#application-pentesting#security-assessment+3
2019-08-11TalkDefcon Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants Presentation Vandana Verma Sehgal#devsecops#secure-development#ci-cd+2
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singh#phishing#api-security#web-security+2
2019-08-08TalkBlackhat Preventing Authentication Bypass: A Tale of Two Researchers Presentation Ravi Jaiswal, Terry Zhang, Ron Chan#security-development-lifecycle#identity-management#authentication+4
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashant, Ade Yoseman Putra#blueteam#application-pentesting#security-monitoring+1
2019-08-08TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#ci-cd#cicd-pipeline+4
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shah#cloud-pentesting#post-exploitation#architecture+1
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Presentation Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#application-hardening+4
2019-08-07Tool demoBlackhat Medaudit: Auditing Medical Devices and Healthcare Infrastructure Source Code Anirudh Duggal#security-assessment#application-pentesting#network-architecture+1
2019-05-28TalkSecurityfest Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it Video Samit Anwer#web-security#iam#appsec
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshi#red-teaming#machine-learning#api-security+3
2019-05-21TalkPhdays Breaking Microsoft Edge extensions security policies Presentation Nikhil Mittal#application-pentesting#code-review#security-testing+2
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2019-05-09TalkHitbsecconf GDALR: Duplicating Black Box Machine Learning Models Presentation Video Rewanth Tammana, Nikhil Joshi#machine-learning#red-teaming#api-security+2
2019-05-04TalkThotcon What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing Priyank Nigam#frida#application-pentesting#dynamic-analysis+3
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargava#secure-coding#blueteam#application-pentesting+4
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappa#blueteam#application-pentesting#security-monitoring+4
2019-03-28TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#secure-coding#ci-cd+3
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhuni, Izar Tarandach#secure-coding#threat-modeling#red-teaming
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami#network-pentesting#vulnerability-assessment#firewall+3
2019-03-02PanelNullcon The Myth of Sisyphus Secure Product Development Video Bipin Upadhyay, Minatee Mishra, Neelu Tripathy, Vaibhav Gupta, Vishal Sahani#secure-development#secure-coding#security-testing+3
2019-03-02PanelNullcon Navigating Risk in the Changing Business and Technology Landscape Video Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil#risk-management#cybersecurity-strategy#business-resilience+4
2019-03-02PanelNullcon CISO Strategy for OT and IoT risk and Threat Management Video Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal#ics-security#iot-pentesting#cybersecurity-strategy+3
2019-02-28TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Video Lavakumar Kuppan, Ankit Gupta#security-assessment#application-pentesting#application-hardening+3
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjve#red-teaming#application-pentesting#network-architecture+2
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desai#secure-coding#security-assessment#dynamic-analysis+4
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharaman#blueteam#secure-development#input-validation+4
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli#secure-coding#blueteam#application-hardening+4
2018-12-05Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Mohan Kallepalli#audit#security-testing#secure-development+4
2018-11-27TalkHitbsecconf BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit Presentation Source Code Video Rewanth Tammana#red-teaming#application-pentesting#browser-security+2
2018-10-19TalkAppsecdayaustralia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargav#threat-modeling#devsecops#application-hardening+4
2018-10-19TalkAppsecdayaustralia Continuous Integration and Delivery with Docker Containers Video Vasant Kumar#docker#blueteam#container-security+4
2018-10-10TalkBrucon Simplifying the art of instrumentation Krishnakant Patil, Rushikesh D Nandedkar#reverse-engineering#static-analysis#dynamic-analysis+2
2018-10-05TalkC0c0n Pentesting GraphQL Applications Presentation Source Code Neelu Tripathy#security-assessment#application-pentesting#dynamic-analysis+4
2018-10-05TalkC0c0n DomGoat - the DOM Security Playground Source Code Lavakumar Kuppan#xss#web-security#input-validation+4
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishra#reverse-engineering#dynamic-analysis#malware-research+1
2018-10-05TalkC0c0n Unconventional vulnerabilities in Google Cloud Platform Pranav Venkat#gcp#red-teaming#cloud-pentesting+3
2018-10-05TalkC0c0n Using Fault Injection for Forensics Yashin Mehaboobe#forensics#digital-forensics#security-testing+2
2018-10-04TalkConfidence Hacking 50 Million users using 123456 Aman Sachdev, Himanshu Sharma#web-security#authentication#ethical-hacking+2
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagi#malware-detection#static-analysis#dynamic-analysis+3
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaan#aws#secure-coding#web-security+2
2018-09-12Talk44con Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#security-tools+3
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagi#blueteam#machine-learning#dynamic-analysis+1
2018-09-06TalkGrrcon Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI Presentation Video Pranshu Bajpai, Richard Enbody#encryption#ransomware#dynamic-analysis+1
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura#security-assessment#architecture#application-hardening+4
2018-08-11TalkDefcon Compression Oracle Attacks on VPN Networks Presentation Ahamed Nafeez#vpn#network-architecture#application-pentesting+3
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-11Tool demoDefcon Sh00tβ€”An open platform for manual security testers & bug hunters Source Code Pavan Mohan#security-assessment#bug-hunting#secure-coding+1
2018-08-09Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Sagar Popat, Mohan Kallepalli#audit#security-testing#automated-scanning+4
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2018-08-08Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Ankur Bhargava, Prajal Kulkarni, Sagar Popat#security-assessment#rest-api#api-security+4
2018-08-08Tool demoBlackhat ThreatPlaybook Source Code Abhay Bhargav, Sharath Kumar#threat-modeling#ci-cd#security-development-lifecycle+4
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hatti#blueteam#secure-coding#smart-contracts+4
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumar#secure-development#architecture#devsecops
2018-06-04TalkConfidence From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days Himanshu Sharma, Aman Sachdev#red-teaming#ethical-hacking#security-assessment+2
2018-05-30TalkAuscert How to Bypass Authentication & Authorization Presentation Sarwar Jahan#authentication#authorization#web-security+1
2018-05-29Award Data Exfiltration via Formula Injection #Part1 Source Code Ajay Prashar, Balaji Gopal#data-leak#exploitation#web-security+1
2018-05-13TalkDefcon Androsia: Securing ‘Data in Process’ for your Android Apps Presentation Whitepaper Video Samit Anwer#android#blueteam#android-security+4
2018-03-22Tool demoBlackhat Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data Source Code Samit Anwer#android#blueteam#application-hardening+4
2018-03-22TalkBlackhat XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Presentation Video Ravi Sahita, Daiping Liu, Mingwei Zhang#blueteam#application-hardening#code-review+4
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharla#secure-development#data-protection#architecture
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyan#red-teaming#application-pentesting#api-security+4
2018-03-01TalkNullcon Security through obscurity and fear Presentation Video Abhinav Srivastava#application-pentesting#secure-development#security-testing+3
2018-01-31TalkOwaspappseccalifornia Hunter – Optimize your Pentesters time Video Kiran Shirali#application-pentesting#security-assessment#devsecops
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-10-19TalkHacklu Are your VoLTE and VoWiFi calls secure? Video Sreepriya Chalakkal#volte#vowifi#sip+2
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkar#vulnerability-assessment#security-assessment#secure-coding+1
2017-09-21TalkAppsecusa iGoat – A Self Learning Tool for iOS App Pentesting and Security Video Swaroop Yermalkar#ios#application-pentesting#ios-security+4
2017-09-21TalkAppsecusa Androsia: A tool for securing in memory sensitive data Video Samit Anwer#android-security#static-analysis#secure-coding
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan#secure-development#risk-management#architecture
2017-08-19PanelC0c0n Security in Banking - Being one step aheadt Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony#financial-institutions#secure-development#security-strategy
2017-08-18TalkC0c0n Case study: Security of Digital Wallet apps in India Ashwath Kumar, Sandesh Mysore Anand#appsec#mobile-pentesting#application-hardening+4
2017-08-18TalkC0c0n Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis Furqan Khan, Siddharth Anbalahan#machine-learning#security-assessment#nlp+4
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogi#dynamic-analysis#reverse-engineering#binary-analysis+1
2017-08-18TalkC0c0n Yarafying Android Malware: A Missing Step Before Malware Analysis Shivang Desai#android#blueteam#android-security+3
2017-08-18TalkUsenix DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Presentation Whitepaper Video Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna#linux#kernel#static-analysis+4
2017-08-18TalkC0c0n Androsia: A tool for securing in memory sensitive data Source Code Samit Anwer#secure-coding#android#security-assessment
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkar#ios#security-assessment#blueteam+1
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotra#red-teaming#malware-research#bypassing+2
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Gupta#bluetooth#red-teaming#mobile-hacking+3
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michael#blueteam#iot-device-management#iot-pentesting+4
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shah#encryption#security-assessment#audit+1
2017-07-27Tool demoBlackhat Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday Source Code Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Rao#fuzzing#rest-api#security-assessment+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hatti#secure-coding#reconnaissance#encryption+3
2017-07-27Tool demoBlackhat Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes Source Code Anshuman Bhartiya#security-assessment#bug-hunting#cloud-workload-protection+3
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Mane#ics-security#security-assessment#embedded-systems+4
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddi#vulnerability-assessment#bug-bounty#network-pentesting+1
2017-07-26Tool demoBlackhat Devknox - Autocorrect Security Issues from Android Studio Source Code Subho Halder#android#code-analysis#secure-coding
2017-06-26Tool demoBlackhat DiffDroid Source Code Anto Joseph#android#security-assessment#web-security
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abraham#blueteam#secure-development#sqli+4
2017-04-14TalkHitbsecconf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#data-protection+3
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K A#code-injection#red-teaming#malware-research+4
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-03-30Tool demoBlackhat Devknox - Autocorrect Security Issues from Android Studio Source Code Subho Halder#android#code-analysis#secure-coding
2017-03-24TalkInsomnihack How we hacked Distributed Configuration Management Systems Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Bharadwaj Machiraju, Francis Alexander#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-04PanelNullcon Application Security Opportunities and Challenges in a DevOps World Video Abhay Bhargav, Ajay Bongirwar, Arun Jadhav, Pravesh Sharma, Adam Leaonard#secure-development#security-testing#dynamic-analysis+3
2017-03-03TalkNullcon Hacking medical devices and infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#security-testing
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machiraju#ml#security-assessment#application-pentesting+4
2017-03-03TalkNullcon DevOpSec: Rapid Security in the Cloud with AWS and CIS Presentation Video Mikhail Advani, Rajesh Tamhane#devsecops#aws#cloud-compliance+4
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Presentation Swamy Shivaganga Nagaraju#windows#blueteam#security-development-lifecycle+2
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2017-01-25TalkOwaspappseccalifornia DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shirali, Srinivasa Rao Chirathanagandla#dynamic-analysis#dast#devsecops+2
2017-01-25TalkOwaspappseccalifornia OCSP Stapling in the Wild Video Devdatta Akhawe, Emily Stark#web-security#architecture#devsecops
2016-11-11TalkDeepsec Human vs Artificial intelligence – Battle of Trust Video Hemil Shah#ai#application-pentesting#application-hardening+4
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittal#blueteam#amsi#endpoint-protection+1
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Gupta#firmware#security-assessment#embedded-systems+3
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2016-11-03Tool demoBlackhat DataSploit Presentation Source Code Shubham Mittal, Nutan Kumar Panda#osint#reconnaissance#security-tools+3
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-14TalkAppsecusa Automating API Penetration Testing using fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi#fuzzing#api-security#application-pentesting+4
2016-10-14TalkAppsecusa DevOps to DevSecOps: a 2-dimensional view of security for DevOps Presentation Sanjeev Sharma#application-hardening#secure-coding#security-development-lifecycle+3
2016-10-13TalkAppsecusa Lightning Talk - Demystifying Windows Application Rupali Dash#windows#application-hardening#secure-coding+4
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-10-07TalkDeepsec Inside Stegosploit Presentation Video Saumil Shah#web-security#exploitation#security-assessment
2016-09-23TalkRootcon Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomas#secure-coding#reconnaissance#red-teaming+1
2016-08-19TalkC0c0n App Sec in the Time of Docker Containers Akash Mahajan#docker#application-pentesting#container-security+4
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basu#authentication#iam#architecture+1
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratap#red-teaming#ethical-hacking#exploit-delivery+2
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikar#xss#red-teaming#code-injection+3
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen#automated-exploit-detection#reverse-engineering#vulnerability-assessment+1
2016-08-06Tool demoDefcon Android-InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-04TalkBlackhat DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes Presentation Whitepaper Video Rohit Mothe, Rodrigo Rubira Branco#security-assessment#application-pentesting#dynamic-analysis+3
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2016-08-04Tool demoBlackhat Maltese (Malware Traffic Emulating Software) Source Code Sasi Siddharth#dns#secure-coding#malware-detection+2
2016-08-04Tool demoBlackhat Droid-FF: Android Fuzzing Framework Source Code Anto Joseph#android#fuzzing#secure-coding+1
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-03Tool demoBlackhat Android-InsecureBankv2 Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-07-01TalkHackinparis DIFFDroid - Dynamic Analysis Made Easier for Android Source Code Video Anto Joseph#android#security-assessment#web-security
2016-05-26TalkHitbsecconf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvi, Tony Trummer#android#ios#security-assessment+2
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul Sasi#ai#blueteam#ai-security+4
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2016-04-01Tool demoBlackhat LIMON-SANDBOX FOR ANALYZING LINUX MALWARES Presentation Whitepaper Source Code Monnappa K A#linux#dynamic-analysis#static-analysis+2
2016-03-15TalkGroundzerosummit Web App Security Harpreet Singh, Himanshu Sharma, Nipun Jaswal#web-security#api-security#secure-coding+3
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggal#red-teaming#blueteam#application-pentesting+1
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul Sasi#blueteam#ml#application-pentesting+4
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2015-11-19TalkDeepsec Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. Video Nikhil Mittal#red-teaming#ci-cd#cicd-security+3
2015-11-13TalkBlackhat Continuous Intrusion: Why CI tools are an Attacker’s Best Friends Presentation Video Nikhil Mittal#red-teaming#ci-cd#application-pentesting+4
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-11-12Tool demoBlackhat Android InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2015-11-05TalkGroundzerosummit Authentication flaw in Automatic Bank Passbook printing machine. Indrajeet Bhuyan#authentication#identity-management#application-pentesting+3
2015-11-05TalkGroundzerosummit Dissecting Android Malware Anto Joseph#android#application-pentesting#dynamic-analysis+3
2015-11-05TalkGroundzerosummit Thanks for the free cookies Anshul Saxena, Nishant Yadav#red-teaming#application-pentesting#security-testing
2015-11-05TalkGroundzerosummit XSS - The art of evading web application filters! Anirudh Anand#xss#application-pentesting#input-validation+2
2015-11-05TalkGroundzerosummit Elliptical Curve Cryptography Aneesha S#encryption#elliptic-curve-cryptography#secure-development+1
2015-11-05TalkGroundzerosummit Trailing Terror in the Darknets Shesh Sarangdhar#deep-web#tor#cryptocurrency+1
2015-11-05TalkGroundzerosummit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Sood#ics-security#web-security#firmware-analysis+2
2015-10-25TalkToorcon PixelCAPTCHA – A Unicode Based CAPTCHA Scheme Gursev Singh Kalra#web-security#authentication#bypassing
2015-10-21TalkHacklu Stegosploit - Delivering Drive-By Exploits With Only Images Presentation Saumil Shah#red-teaming#steganography#application-pentesting+1
2015-10-08TalkBrucon The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#network-pentesting#security-testing+2
2015-09-25TalkAppsecusa The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)! Aditya K Sood#scada#hmi#web-security+1
2015-09-24TalkAppsecusa Continuous Cloud Security Automation Video Rohit Pitke#aws#devsecops#architecture
2015-09-11Talk44con Stegosploit – Drive-by Browser Exploits using only Images Presentation Source Code Video Saumil Shah#steganography#red-teaming#web-security+1
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekar#security-assessment#ethical-hacking#vulnerability-assessment+2
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notani#blueteam#security-analytics#malware-research+2
2015-08-05Tool demoBlackhat PixelCaptcha: A unicode based captcha scheme Whitepaper Source Code Gursev Singh Kalra#secure-coding#application-hardening#input-validation+3
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddi#red-teaming#application-pentesting#attack-surface+2
2015-08-01TalkC0c0n NoPo - The NoSQL HoneyPot Framework Source Code Francis Alexander#secure-coding#application-pentesting#security-testing+2
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastava#owasp#blueteam#security-testing+4
2015-08-01TalkC0c0n Demystifying and Breaking BLE Yashin Mehaboobe#bluetooth#mobile-hacking#exploit-delivery+1
2015-08-01TalkC0c0n Hacking RFIDs under 2000 INR Jayesh Chauhan, Divya S John#rfid#hardware-embedded#embedded-systems+3
2015-07-06TalkBlackhat DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS Presentation Video Ahamed Nafeez#red-teaming#xss#application-pentesting+2
2015-06-16TalkBlackhat The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvi, Tony Trummer#ssl#mobile-application-management#application-pentesting+1
2015-05-28TalkHitbsecconf The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvi, Tony Trummer#ssl#security-assessment#mobile-application-management+1
2015-05-28TalkHitbsecconf Stegosploit: Hacking With Pictures Presentation Saumil Shah#red-teaming#steganography#web-security
2015-05-26TalkPhdays iOS Application Exploitation Presentation Prateek Gianchandani, Egor Tolstoy#ios#red-teaming#application-pentesting+4
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohanty#blueteam#code-review#secure-coding+4
2015-03-27TalkSyscan Stegosploit - Hacking with Pictures Presentation Video Saumil Shah#steganography#red-teaming#web-security+1
2015-03-15TalkDefcon TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS Lavakumar Kuppan#fuzzing#application-pentesting#dynamic-analysis+1
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwate#automated-scanning#vulnerability-assessment#risk-management+1
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwate#red-teaming#application-pentesting#data-protection+1
2015-02-06TalkNullcon Pentesting a website with million lines of Javascript Presentation Lavakumar Kuppan, Ahamed Nafeez#web-security#security-assessment#application-pentesting+2
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay#secure-development#devsecops#security-compliance+3
2015-02-06TalkNullcon Toliman, a Hadoop Pentesting Tool Source Code Jitendra Chauhan#security-assessment#security-tools#cloud-workload-protection+2
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomas#security-assessment#network-pentesting#vulnerability-assessment+1
2015-01-27TalkOwaspappseccalifornia The Savage Curtain : Mobile SSL Failures Tushar Dalvi, Tony Trummer#ssl#application-pentesting#dynamic-analysis
2015-01-27TalkOwaspappseccalifornia The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Video Devdatta Akhawe#web-security#xss#csrf+2
2014-11-21TalkDeepsec Mobile SSL Failures Video Tushar Dalvi, Tony Trummer#ssl#android-security#ios-security+3
2014-11-13TalkGroundzerosummit Attacking Web-Proxies like never before Ahamed Nafeez#red-teaming#application-hardening#security-testing
2014-11-13TalkGroundzerosummit Cyber ‘BrahMos’ - Static analysis driven secure coding Joy Sen#secure-coding#static-analysis#sast+4
2014-11-13TalkGroundzerosummit Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF Bhaumik Merchant#red-teaming#application-pentesting#security-testing+1
2014-11-13TalkGroundzerosummit Fuzzing Asynchronous Protocols built over Websockets Lavakumar Kuppan#fuzzing#red-teaming#application-pentesting+2
2014-11-13TalkGroundzerosummit How I won Browser Fuzzing Amol Naik#fuzzing#red-teaming#security-testing+4
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-10-23TalkHacklu Hacking with Images - Evil Pictures Presentation Saumil Shah#red-teaming#steganography#application-pentesting+3
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkar#imsi#red-teaming#android+4
2014-09-26TalkVirusbulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiah, Anna Szalay#android-security#static-analysis#reverse-engineering
2014-09-25TalkVirusbulletin Optimized mal-ops. Hack the ad network like a boss Presentation Video Rahul Kashyap, Vadim Kotov#browser-security#web-security#malware-distribution+1
2014-09-24TalkBrucon OWASP: OWTF Source Code Video Bharadwaj Machiraju#security-assessment#application-pentesting#dynamic-analysis+2
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Gupta#purpleteam#mobile-application-management#mobile-hacking+4
2014-08-22TalkC0c0n Exploiting NoSQL Like Never Before Francis Alexander#red-teaming#application-pentesting#security-testing
2014-08-22TalkC0c0n Lesser Known Attack - XML Injection Amol Naik#red-teaming#application-pentesting#code-review+3
2014-08-22TalkC0c0n Still Single with a bleeding heart (Tool Release) Tamaghna Basu#secure-development#application-pentesting#secure-coding+1
2014-08-22TalkC0c0n My tryst with Source Code Review Presentation Anant Shrivastava#code-review#secure-coding#security-testing
2014-08-21TalkUsenix The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhawe, Zhiwei Li, Warren He, Dawn Song#web-security#xss#csrf+2
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Sood#red-teaming#security-assessment#ics-security+3
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexander#secure-coding#security-assessment#application-pentesting+4
2014-03-27TalkBlackhat JS Suicide: Using JavaScript Security Features to Kill JS Security Presentation Video Ahamed Nafeez#web-security#red-teaming#csrfguard+1
2014-03-15TalkHitbsecconf JS Suicide: Using Javascript Security Features to Kill Itself Presentation Ahamed Nafeez#web-security#application-pentesting#code-review+3
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwate#reverse-engineering#security-assessment#security-testing
2014-02-15Tool demoNullcon DrupSnipe Ranjeet Sengar, Sukesh Pappu#drupal#security-assessment#application-pentesting+2
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon OWASP OWTF - The Offensive (Web) Testing Framework Source Code Bharadwaj Machiraju, Abraham Aranguren#security-assessment#application-pentesting#security-tools+3
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalani#blueteam#application-hardening#application-pentesting+4
2014-02-14TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Presentation Video Ankita Gupta, Lavakumar Kuppan#security-assessment#application-pentesting#security-development-lifecycle+3
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyagi#security-assessment#malware-detection#network-monitoring+2
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekar#glibc#red-teaming#blueteam+2
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwate#scada#blueteam#ics-security+4
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2014-02-14TalkNullcon A security analysis of Browser Extensions Presentation Abhay Rana#browser-security#web-security#vulnerability-assessment
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandla#pdf#web-security#red-teaming+2
2014-01-28TalkOwaspappseccalifornia Application Sandboxes: Know thy limits Video Rahul Kashyap#application-pentesting#reverse-engineering#exploit-development
2013-11-21TalkAppsecusa Wassup MOM? Owning the Message Oriented Middleware Video Gursev Singh Kalra#api-security#secure-coding#application-pentesting
2013-11-21TalkDeepsec Automation In Android & iOS Application Security Review Presentation Hemil Shah#android#ios#application-pentesting+4
2013-11-20TalkAppsecusa Why is SCADA Security an Uphill Battle? Video Amol Sarwate#scada#application-pentesting#application-hardening+4
2013-11-20TalkAppsecusa Project Talk: OWASP OpenSAMM Project Presentation Pravir Chandra, Seba Deleersnyder#software-security#secure-development#devsecops+4
2013-11-20PanelAppsecusa Aim-Ready-Fire Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather#appsec#secure-development#security-strategy
2013-11-07TalkGroundzerosummit IronWASP Source Code Lavakumar Kuppan#security-assessment#application-pentesting#security-tools+2
2013-10-19TalkToorcon Static Malware Analysis with PyTriage Presentation Yashin Mehaboobe#malware-detection#static-analysis#malware-research+1
2013-10-17TalkHitbsecconf Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis Presentation Rahul Sasi#blueteam#static-analysis#automated-exploit-detection
2013-09-27TalkC0c0n Blur Captcha Anirudh Duggal, Abhinav Mohanty#red-teaming#security-testing#application-pentesting+1
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandran#devsecops#secure-development#security-assessment+2
2013-09-27TalkC0c0n Sandy - The Malicious Analysis Whitepaper Source Code Rahul Sasi#reverse-engineering#static-analysis#dynamic-analysis
2013-09-27TalkC0c0n Static analysis of malware with PyTriage Presentation Yashin Mehaboobe#secure-coding#static-analysis#dynamic-analysis+2
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhan#red-teaming#secure-coding#ethical-hacking+1
2013-09-27TalkC0c0n Snake Bites Presentation Anant Shrivastava#secure-coding#security-assessment#xss
2013-09-13TalkRootcon My Experiments with truth: a different route to bug hunting Presentation Devesh Bhatt#bug-hunting#bug-bounty#security-testing+3
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkar#security-assessment#forensics#digital-forensics+1
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawe, David Wagner, Matthew Finifter#bug-bounty#software-security#risk-management+2
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe, Adrienne Felt#web-security#security-training#architecture+2
2013-08-02TalkDefcon Interactive Web Security Testing with IronWASP Lavakumar Kuppan#application-pentesting#dynamic-analysis#security-testing+3
2013-08-01TalkBlackhat Hot knives through butter: Bypassing automated analysis systems Presentation Whitepaper Video Abhishek Singh, Zheng Bu#red-teaming#dynamic-analysis#malware-research+1
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Sood#secure-coding#audit#blueteam
2013-08-01Tool demoBlackhat XENOTIX xBOT Source Code Ajin Abraham#botnet#linux#windows+3
2013-07-31TalkBlackhat Javascript static security analysis made easy with JSPrime Presentation Whitepaper Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#web-security#blueteam#application-hardening+4
2013-05-28TalkConfidence My Experiments with truth: a different route to bug hunting Video Devesh Bhatt#security-assessment#vulnerability-assessment#secure-development+2
2013-03-22TalkInsomnihack Guns and Smoke to fight Mobile Malware Ruchna Nigam#android-security#malware-research#reverse-engineering+2
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyap, Rafal Wojtczuk#blueteam#application-pentesting#dynamic-analysis+3
2013-03-15TalkBlackhat Vulnerability analysis of 2013 SCADA issues Presentation Video Amol Sarwate#scada#ics-security#attack-surface+2
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayak#csrf#blueteam#application-pentesting+4
2013-03-01TalkNullcon Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+3
2013-03-01TalkNullcon Inception of graphical passwords Video Rishi Narang#authentication#application-pentesting#secure-development+3
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shah#code-analysis#secure-development#blueteam+4
2013-03-01TalkNullcon Automating JavaScript Static Analysis Lavakumar Kuppan#web-security#security-assessment#blueteam
2012-12-06TalkBlackhat Attacking ODATA Presentation Whitepaper Source Code Gursev Singh Kalra#red-teaming#api-security#application-pentesting+2
2012-12-06TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2012-12-06TalkBlackhat Poking servers with Facebook(and other web applications) Presentation Whitepaper Source Code Riyaz Walikar#xspa#red-teaming#application-pentesting+2
2012-12-06TalkBlackhat The art of exploiting logical flaws in web apps Presentation Whitepaper Sumit Siddharth, Richard Dean#red-teaming#secure-coding#application-pentesting+1
2012-12-05TalkBlackhat Droid Exploitation Saga Presentation Whitepaper Source Code Aditya Gupta, Subho Halder#android#red-teaming#android-security+3
2012-12-01TalkClubhack Content-Type attack -Dark hole in the secure environment Presentation Video Raman Gupta#red-teaming#application-pentesting#pdf+3
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+4
2012-12-01TalkClubhack Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher Presentation Video Vishal Kalro#zero-day#application-pentesting#secure-development+1
2012-12-01TalkClubhack HAWAS – Hybrid Analyzer for Web Application Security Presentation Video Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2012-12-01TalkClubhack Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Halder#nfc#red-teaming#android-security+4
2012-12-01TalkClubhack XSSshell Presentation Video Vandan Joshi#xss#application-pentesting#code-review+4
2012-12-01TalkClubhack FatCat Web Based SQL Injector Presentation Source Code Video Sandeep Kamble#sqli#red-teaming#input-validation+4
2012-11-29TalkDeepsec Bad Things in Good Packages - Creative Exploit Delivery Presentation Saumil Shah#red-teaming#exploit-delivery#security-testing
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawde#windows-phone#red-teaming#mobile-device-management+3
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumar#android#red-teaming#malware-research+3
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhat#red-teaming#bypassing#exploit-delivery+3
2012-11-23TalkMalcon Tampering in Energy Meters Presentation Mohit Arora#energy-theft#embedded-systems#firmware-analysis+2
2012-11-07Award Cross Site Port Attack (XSPA) Source Code Riyaz Walikar#application-pentesting#security-testing#dynamic-analysis+3
2012-10-26TalkAppsecusa XSS & CSRF with HTML5 - Attack, Exploit and Defense Video Shreeraj Shah#xss#csrf#dynamic-analysis+3
2012-10-26TalkAppsecusa The 7 Qualities of Highly Secure Software Video Mano Paul#secure-development#software-security#secure-coding+3
2012-10-25TalkAppsecusa Cross Site Port Scanning Video Riyaz Walikar#web-security#owasp#api-security
2012-09-28TalkNullcon Alert(/xss/) - How to catch an XSS before someone exploits / reports it? Ahamed Nafeez#web-security#xss#secure-coding+2
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Sood, Dr. Richard J Enbody#red-teaming#botnet#dynamic-analysis+1
2012-09-26TalkNullcon Opening the kimono: Automating behavioral analysis for mobile apps Video Pradeep Kulkarni, Michael Sutton#application-pentesting#security-testing#dynamic-analysis+1
2012-09-26TalkNullcon The art of Passive Web Vul Analysis with IronWASP Video Lavakumar Kuppan#security-assessment#application-pentesting#security-testing+2
2012-09-26TalkNullcon How secure is internet banking in India Video Ajit Hatti#web-security#authentication#financial-institutions+1
2012-09-05Talk44con Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Video Jitender Arora#data-protection#security-strategy#threat-modeling+3
2012-08-29TalkOwaspappsecindia Find me if you can Smart fuzzing and discovery! Presentation Shreeraj Shah#fuzzing#application-pentesting#dynamic-analysis+3
2012-08-15Award Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select) Source Code Gursev Singh Kalra#api-security#web-pentesting#security-tools
2012-08-03TalkC0c0n Easy Money with UI-Redressing Amol Naik#bug-hunting#application-pentesting#dynamic-analysis+4
2012-08-03TalkC0c0n Evil JavaScript Bishan Singh#red-teaming#web-security#application-pentesting+4
2012-08-03TalkC0c0n WebApp Remote Code Execution using Server Side Scripting Engines Presentation Rahul Sasi#red-teaming#security-assessment#application-pentesting+4
2012-08-03TalkC0c0n Gathering security requirements K v Prashant, Saleem Ahamed#security-testing#secure-development#security-development-lifecycle+2
2012-07-28TalkDefcon Botnets Die Hard - Owned and Operated Presentation Video Aditya K Sood, Richard J Enbody#botnet#blueteam#malware-detection+2
2012-07-26Tool demoBlackhat Bypassing Every CAPTCHA provider with clipcaptcha Source Code Gursev Singh Kalra#web-security#bypassing#security-tools
2012-07-25Tool demoBlackhat Oyedata for OData Assessments Source Code Gursev Singh Kalra#api-security#web-pentesting#security-tools
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Sood#botnet#web-security#reverse-engineering+1
2012-05-24TalkHitbsecconf CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants Presentation Video Rahul Sasi#security-assessment#ivr#application-pentesting+2
2012-05-13TalkCarolinacon Attacking CAPTCHAs for Fun and Profit Gursev Singh Kalra#web-security#bypassing#exploitation
2012-03-15TalkNullcon An App(le) a day keeps the wallet away Antriksh Shah#security-assessment#web-security#api-security+1
2012-03-15TalkOwaspappsecindia The Magic of Passive Web Vulnerability Analysis Lavakumar Kuppan#application-pentesting#security-testing#static-analysis+2
2012-03-14TalkBlackhat Hacking XPATH 2.0 Presentation Whitepaper Video Sumit Siddharth, Tom Forbes#red-teaming#application-pentesting#input-validation+1
2012-03-02Award CAPTCHA Re-Riding Attack Source Code Gursev Singh Kalra#web-security#bypassing#authentication
2012-02-15TalkNullcon Application security cost management Video Ketan Vyas#blueteam#application-pentesting#secure-development+2
2012-02-15TalkNullcon Attacking Backup Software Video Nibin Varghese#red-teaming#application-pentesting#security-testing
2012-02-15TalkNullcon CAPTCHAs for fun and Profit Video Gursev Singh Kalra#red-teaming#application-pentesting#input-validation+2
2012-02-15TalkNullcon IVR Security: Internal Network attacks via phone lines Video Rahul Sasi#ivrs#red-teaming#application-pentesting+1
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwal#blueteam#threat-modeling#secure-development
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kamble#red-teaming#xss#web-security+2
2012-02-15TalkNullcon Javascript static analysis with IronWASP Presentation Video Lavakumar Kuppan#web-security#security-assessment#blueteam
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singh#web-security#red-teaming#blueteam+1
2011-12-04TalkClubhack Hacking your Droid Presentation Aditya Gupta#red-teaming#android#mobile-hacking+4
2011-12-04TalkClubhack One Link Facebook Presentation Anand Pandey#red-teaming#application-pentesting#phishing+1
2011-12-04TalkClubhack DOM XSS – Encounters of the 3rd Kind Presentation Video Bishan Singh#xss#red-teaming#secure-coding+4
2011-12-04TalkClubhack Android Forensics Presentation Manish Chasta#android#forensics#android-security+4
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soi#blueteam#exploit-kit#malware-detection+3
2011-11-17Award CAPTCHA Hax With TesserCap Source Code Gursev Singh Kalra#web-security#bypassing#authentication
2011-10-13TalkHitbsecconf Femtocells: A Poisonous Needle in the Operator’s Hay Stack Presentation Video Ravishankar Borgaonkar, Kevin Redon, Nico Golde#3g#red-teaming#application-pentesting
2011-10-13TalkHitbsecconf Web Wars 3 Saumil Shah#cyber-war#exploit-delivery#application-pentesting+1
2011-10-07TalkC0c0n Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications Riyaz Walikar#red-teaming#application-pentesting#application-hardening+1
2011-10-07TalkC0c0n iPhone Jailbreak Antriksh Shah#ios#ios-security#jailbreak+3
2011-10-07TalkC0c0n Paranoid Android Ankur Bhargava, Mrigesh#android#android-security#mobile-hacking+3
2011-10-07TalkC0c0n Pentesting iPhone Applications Presentation Satish Bommisetty#ios#security-assessment#application-pentesting+4
2011-10-07TalkC0c0n Secure HTTP Headers or How I can finally convince management to let go of IE6 Presentation Akash Mahajan#application-pentesting#secure-development#security-testing+1
2011-10-07TalkC0c0n Security Threats in Custom ROM’s (Android) Presentation Whitepaper Anant Shrivastava#android#android-security#application-pentesting+3
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasi#purpleteam#application-pentesting#backdoor-detection+4
2011-10-07TalkC0c0n Automated Malware Analysis - Setting up the Environment Presentation K v Prashant, Pushkar Pashupat#security-assessment#dynamic-analysis#malware-research+1
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandra#software-security#secure-development#devsecops+4
2011-09-19TalkBrucon Botnets and Browsers, Brothers in a Ghost Shell Presentation Aditya K Sood#botnet#red-teaming#dynamic-analysis+1
2011-09-07TalkSecuritybyte Social Web & Privacy – An evolving world Bala Sathiamurthy, Aridaman Tripathi#data-protection#api-security#security-compliance+2
2011-09-07TalkSecuritybyte Mobile Devices – Boon or Curse? Presentation Kishor Sonawane, Oliver Ng#mobile-device-management#mobile-application-management#application-hardening+4
2011-09-07TalkSecuritybyte IronWASP - A Web Application Security Testing Platform Presentation Source Code Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imran#blueteam#application-pentesting#secure-development+4
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookhey#secure-coding#secure-development#web-security+3
2011-09-06TalkSecuritybyte Botnets at Application+ layer Presentation Raj Shastrakar#bot#red-teaming#application-pentesting+4
2011-09-06TalkSecuritybyte Runtime thread injection and execution in Linux processes Presentation Aseem Jakhar#thread-injection#linux#process-injection+2
2011-09-06TalkSecuritybyte Enabling Un-trusted Mashups Presentation Bishan Singh#web-security#xss#csrf+4
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Raman#social-engineering#web-security#security-training+1
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-08-03TalkBlackhat Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex Presentation Whitepaper Video Shreeraj Shah#reverse-engineering#ajax#web-security+1
2011-05-19TalkHitbsecconf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Sood#blueteam#botnet#endpoint-protection+4
2011-03-30TalkTroopers Femtocell: Femtostep to the Holy Grail Presentation Ravishankar Borgaonkar, Kevin Redon#red-teaming#application-pentesting#mobile-hacking+1
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2011-02-25TalkNullcon Fuzzing with complexities Presentation Whitepaper Video Vishwas Sharma#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon JSON Fuzzing: New approach to old problems Presentation Whitepaper K v Prashant, Tamaghna Basu#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon Lessons Learned From 2010 Presentation Video Saumil Shah#red-teaming#exploit-delivery#social-engineering+2
2011-02-25TalkNullcon Reversing microsoft patches to reveal vulnerable code Presentation Whitepaper Harsimran Singh Walia#reverse-engineering#code-review#static-analysis+1
2011-02-25TalkNullcon Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) Presentation Whitepaper Sunil Kumar#dynamic-binary-instrumentation#code-analysis#dynamic-analysis+3
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumar#xss#sqli#blueteam+1
2010-12-04TalkClubhack Attacking with HTML5 Presentation Lavakumar Kuppan#red-teaming#application-pentesting#security-testing
2010-12-04TalkClubhack Firefox Security! Presentation Prasanna Kanagasabai#application-pentesting#secure-development#security-testing+4
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shah#security-compliance#security-governance#risk-management+4
2010-11-11TalkBlackhat Attacking with HTML5 Presentation Lavakumar Kuppan#web-security#xss#web-pentesting+1
2010-10-27TalkHacklu Exploit Delivery - Tricks and Techniques Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+4
2010-10-14TalkHitbsecconf Exploit Delivery Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+2
2010-10-13TalkHitbsecconf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shah#red-teaming#web-security#ajax+3
2010-08-01TalkC0c0n Code Disclosure over HTTP Anant Kochhar#red-teaming#application-hardening#code-review+4
2010-08-01TalkC0c0n Last line of defense - Host Intrusion Prevention and Secure application development. Avinash Shenoi#blueteam#application-hardening#secure-coding+3
2010-08-01TalkC0c0n Client Side Exploits using PDF Presentation Ankur Bhargava, Tamaghna Basu#red-teaming#pdf#data-leak+2
2010-08-01TalkC0c0n Dangers and dynamic Malware analysis Chandrasekar#forensics#dynamic-analysis#malware-detection+4
2010-08-01TalkC0c0n Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle Praseed Pai#windows#red-teaming#secure-coding
2010-08-01TalkC0c0n Concept, Methodology and Challenges in Computer Forensics Sebastian Edassery#forensics#digital-forensics#incident-management+2
2010-07-30TalkDefcon Hacking Oracle From Web Apps Video Sumit Siddharth#sql-injection#application-pentesting#security-testing+2
2010-07-29TalkBlackhat Hacking Browser’s DOM - Exploiting Ajax and RIA Presentation Whitepaper Shreeraj Shah#red-teaming#ajax#application-pentesting+4
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharth#red-teaming#sql-injection#application-pentesting+3
2010-07-01TalkHitbsecconf The Travelling Hacksmith 2009 – 2010 Saumil Shah#red-teaming#application-pentesting#phishing+2
2010-06-18TalkSyscan REVERSE ENGINEERING WEB 2.0 APPLICATIONS Shreeraj Shah#reverse-engineering#ajax#web-security+1
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindane#secure-coding#red-teaming#security-assessment
2010-03-15TalkBlackhat 400 Apps in 40 Days Presentation Video Nish Bhalla, Sahba Kazerooni#risk-management#application-pentesting#attack-surface+1
2010-03-02Award Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution Source Code Lavakumar Kuppan#clickjacking#application-hardening#security-testing+1
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2010-02-25TalkNullcon Penetration Testing versus Source Code Presentation Nikhil Wagholikar#security-assessment#code-analysis#application-pentesting+4
2010-02-25TalkNullcon Software Fuzzing with Wireplay. Presentation Whitepaper Source Code Abhisek Datta#fuzzing#red-teaming#network-pentesting+3
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patil#botnet#blueteam#malware-detection+4
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppan#phishing#red-teaming#security-testing+1
2009-12-05TalkClubhack India Cyber Crime Scene - Caught in the Crossfire Presentation Vinoo Thomas, Rahul Mohandas#cyber-crime#data-leak#pdf+3
2009-12-05TalkClubhack Incident Handling and Log Analysis for Web Based Incidents Presentation Manindra Kishore#incident-management#forensics#application-pentesting+2
2009-12-05TalkClubhack Mobile Application Security Testing Presentation Gursev Singh Kalra#security-assessment#mobile-pentesting#application-pentesting+4
2009-12-05TalkClubhack Revealing the Secrets: Source Code Disclosure, Techniques and Impacts Presentation Anant Kochhar#secure-development#secure-coding#code-review+2
2009-12-04TalkClubhack Facilitate Collaboration with Information Rights Management Abhijit Tannu#information-rights-management#data-protection#application-hardening+4
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shah#secure-coding#devsecops#software-security+2
2009-11-18TalkSecuritybyte Hacking Oracle From Web Presentation Sumit Siddharth#red-teaming#sql-injection#application-hardening+1
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintala#blueteam#application-pentesting#secure-development+4
2009-11-18TalkSecuritybyte Rumbling Infections – Web Malware Ontology Presentation Aditya K Sood#dynamic-analysis#malware-research#sandbox+2
2009-11-17TalkSecuritybyte Applications - The new cyber security frontier Presentation Mano Paul#secure-development#devsecops#software-security+2
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguru#data-protection#architecture#security-training+2
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyal#forensics#digital-forensics#data-leak+4
2009-07-31TalkDefcon Advancing Video Application Attacks with Video Interception, Recording, and Replay Presentation Video Arjun Sambamoorthy, Jason Ostrom#red-teaming#security-tools#application-hardening
2009-05-19TalkSyscan Securing Enterprise Applications Shreeraj Shah#web-security#ajax#xss+4
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkTroopers Browser Design Flaws – Hacking by Breaking in Architectures Presentation Aditya K Sood#red-teaming#application-pentesting#secure-development+1
2009-04-22TalkTroopers SQL Injections: More Fun and Profit Presentation Sumit Siddharth#red-teaming#application-pentesting#code-review+4
2009-04-22TalkHitbsecconf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shah#blueteam#footprinting#firewall+1
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2009-02-19TalkBlackhat Blinded by Flash: Widespread Security Risks Flash Developers Don’t See Presentation Video Prajakta Jagdale#flash#blueteam#application-pentesting+2
2008-12-06TalkClubhack Hacking Client Side Insecurities Presentation Aditya K Sood#red-teaming#application-pentesting#input-validation+1
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohli#secure-development#secure-coding#blueteam+1
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alex#secure-coding#reverse-engineering#red-teaming+2
2008-11-13TalkDeepsec Game of Web 2.0 Security - Attacking Next Generation Apps Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+2
2008-10-29TalkHitbsecconf Browser Exploits - A New Model for Browser Security Video Saumil Shah#red-teaming#application-pentesting#code-review+3
2008-10-29TalkHitbsecconf Top 10 Web 2.0 Attacks Presentation Video Shreeraj Shah#web-security#ajax#xss+4
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Presentation Saumil Shah#red-teaming#application-hardening#browser-security+4
2008-08-20TalkOwaspappsecindia Web Application Security: Too Costly To Ignore Presentation Rajesh Nayak#appsec#blueteam#application-hardening+4
2008-08-20TalkOwaspappsecindia Case Study: Testing 200+ applications in a $10 Billion Enterprise Presentation Roshen Chandran#security-assessment#application-pentesting#security-testing+4
2008-08-20TalkOwaspappsecindia Building Enterprise AppSec Program Nish Bhalla#appsec#secure-development#security-testing+4
2008-08-20TalkOwaspappsecindia Application Security Trends & Challenges Presentation Kamlesh Bajaj#owasp#appsec#secure-development+4
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Gupta#red-teaming#rdp#application-pentesting+1
2008-04-16TalkHitbsecconf Securing Next Generation Applications Γ’β‚¬β€œ Scan, Detect and Mitigate Shreeraj Shah#web-security#ajax#xss+4
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandra, Jacob West, Brian Chess, Sean Fay#ethical-hacking#secure-development#devsecops
2007-12-19TalkClubhack Backdoor 2.0: Hacking Firefox to steal his web secrets Presentation Sunil Arora#red-teaming#application-pentesting#browser-security+2
2007-12-09TalkClubhack Hacking Web 2.0 Art and Science of Vulnerability Detection Presentation Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2007-12-09TalkClubhack The future of automated web application testing Presentation Amish Shah, Umesh Nagori#security-assessment#application-pentesting#security-testing+3
2007-12-09TalkClubhack Subtle Security flaws: Why you must follow the basic principles of software security Presentation Varun Sharma#blueteam#software-security#secure-coding+4
2007-12-09TalkClubhack Analysis of Adversarial Code: The Role of Malware Kits! Presentation Rahul Mohandas#red-teaming#malware-research#dynamic-analysis+1
2007-11-20TalkDeepsec Web 2.0 Application Kung-Fu - Securing Ajax & Web Services Presentation Video Shreeraj Shah#ajax#web-security#blueteam
2007-09-06TalkHitbsecconf Hacking Ajax and Web Services Γ’β‚¬β€œ Next Generation Web Attacks on the Rise Presentation Video Shreeraj Shah#red-teaming#ajax#web-security
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belani#forensics#incident-management#digital-forensics+4
2007-04-05TalkHitbsecconf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+2
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhalla#blueteam#purpleteam#application-pentesting+4
2007-03-15TalkBlackhat Exploit-Me Series – Free Firefox Application Penetration Testing Suite Launch Presentation Video Nish Bhalla, Rohit Sethi#web-security#xss#sql-injection+4
2006-11-29TalkPacsec Smashing Heap by Free Simulation Presentation Sandip Chaudhari#heap#red-teaming#exploit-delivery+4
2006-10-19TalkHacklu Smashing Heap by Free Simulation: Presentation Sandip Chaudhari#heap#red-teaming#exploit-development+2
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-09-21TalkHitbsecconf Finding Secrets in ISAPI Presentation Nish Bhalla#secure-coding#reverse-engineering#application-pentesting+4
2006-09-21TalkHitbsecconf Smashing the Stack for Profit - Period Presentation Video Rohyt Belani#red-teaming#application-pentesting#code-review+3
2006-08-02TalkBlackhat Web Application Incident Response & Forensics: A Whole New Ball Game! Presentation Whitepaper Rohyt Belani, Chuck Willis#application-pentesting#code-review#incident-management+3
2006-08-02TalkBlackhat SQL Injections by Truncation Presentation Bala Neerumalla#web-security#sql-injection#secure-coding
2006-08-01TalkBlackhat Writing Metasploit Plugins - from Vulnerability to Exploit Video Saumil Shah#metasploit#exploit-development#secure-coding+2
2006-04-13TalkHitbsecconf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotia#secure-coding#blueteam#static-analysis+1
2005-09-29TalkHitbsecconf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4
2005-09-29TalkHitbsecconf Analyzing Code for Security Defects Presentation Nish Bhalla#code-analysis#blueteam#secure-coding
2005-09-26TalkHitbsecconf Web hacking Kung-Fu and Art of Defense Presentation Shreeraj Shah#blueteam#application-pentesting#code-review+4
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4
2005-06-10TalkSyscan .Net Web Security-Attack And Defense Shreeraj Shah#.net#web-security#web-pentesting
2005-04-12TalkHitbsecconf Web Application Kung-Fu, The Art of Defense Presentation Shreeraj Shah#blueteam#application-hardening#secure-coding+4
2005-03-31TalkBlackhat Defeating Automated Web Assessment Tools Presentation Saumil Shah#red-teaming#security-testing#application-pentesting+1
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookhey#blueteam#intrusion-detection#application-pentesting+3
2004-07-28TalkBlackhat Defeating Automated Web Assessment Tools Video Saumil Shah#red-teaming#application-pentesting#application-hardening+2
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#automated-scanning+2
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#application-pentesting+3
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3
2003-12-12TalkHitbsecconf Defending Web Applications: Strategies, methods and practices Video Shreeraj Shah#blueteam#secure-coding#firewall+1
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
2001-11-21TalkBlackhat One-Way SQL Hacking : Futility of Firewalls in Web Hacking Presentation Video Saumil Shah#firewall#red-teaming#sql-injection+2
2001-04-26TalkBlackhat Web Hacking Presentation Saumil Shah#red-teaming#application-pentesting#security-testing+4
2001-02-14TalkBlackhat Web Hacking Presentation Video Saumil Shah#red-teaming#application-pentesting#dynamic-analysis+3