| 2025-08-07 | Tool demo | Blackhat |
Frogy 2.0 - Automated external attack surface analysis toolkit
| Chintan Gurjar | attack-surfacevulnerability-assessmentasset-management+2 |
| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | incident-responseweb-securityvulnerability-management+2 |
| 2025-08-07 | Tool demo | Blackhat |
Pentest Copilot: Cursor for Pentesters
| Dhruva Goyal, Sitaraman S | pentestingapplication-pentestingvulnerability-assessment+2 |
| 2025-08-07 | Tool demo | Blackhat |
AzDevRecon - Azure DevOps Enumeration Tool
| Raunak Parmar | azuredevsecopsiam+1 |
| 2025-08-06 | Tool demo | Blackhat |
Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements
| Abhinav Khanna, Krishna Chaganti | web-securitysecure-codingpentesting+3 |
| 2025-08-06 | Tool demo | Blackhat |
Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs
| Satinder Khasriya | api-securityweb-securityowasp+1 |
| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | web-securitymalware-detectionbrowser-security+2 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | reverse-engineeringbinary-analysiscode-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker V2
| Devang Solanki | container-securitydockerstatic-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
vet: Proactive Guardrails against Malicious OSS using Code Analysis
| Abhisek Datta | static-analysissoftware-securitydevsecops+3 |
| 2025-08-06 | Tool demo | Blackhat |
ARC – Artifact Reuse Comparator
| Rushikesh D Nandedkar | static-analysisreverse-engineeringbinary-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
MORF – Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm | mobile-securityapp-securitymobile-pentesting+4 |
| 2025-08-06 | Tool demo | Blackhat |
Realtic
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat | pentestingvulnerability-assessmentstatic-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis
| Mohammed Tanveer | reverse-engineeringbinary-analysisstatic-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ThreatShield - The Intelligent way of Threat Modelling
| Ashwin Shenoi, Satyam Nagpal, Sayooj B Kumar | threat_modelingsecurity-architecturedevsecops+1 |
| 2025-08-06 | Talk | Blackhat |
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach
| Varun Sharma, Ashish Kurmi | ci-cdincident-responsedevsecops+3 |
| 2025-08-06 | Talk | Blackhat |
Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience
| Shanit Gupta | automotive-cybersecurityvulnerability-managementsecurity-testing+1 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora | secure-developmentdevsecopsvulnerability-management+5 |
| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee | secure-developmentdevsecopsdata-protection+2 |
| 2025-04-04 | Talk | Blackhat |
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
| Vikas Gupta | reverse-engineeringcode-analysissoftware-security |
| 2025-04-03 | Talk | Blackhat |
ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking!
| Vivek Balachandran | secure-coding |
| 2025-03-02 | Talk | Nullcon |
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
| Shyam Kumar Arshid, Chinmay Krishna | embedded-securityfirmware-analysishardware-security+3 |
| 2025-03-02 | Talk | Nullcon |
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
| Kumar Ashwin | vulnerability-managementsecure-codingdevsecops+1 |
| 2025-03-01 | Talk | Nullcon |
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
| Anto Joseph | vulnerability-managementbug-bountysecure-development |
| 2024-11-28 | Talk | Blackhat |
A Tale of Pwning 500+ Vehicle Anti-theft Devices
| Umair Nehri | mobile-securityvulnerability-assessmentiot-pentesting+1 |
| 2024-11-27 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker
| Kunal Aggarwal | container-securitydockerpentesting+3 |
| 2024-11-27 | Talk | Blackhat |
The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies
| Mahesh Babu Kanigiri | risk-managementvulnerability-managementsecurity-architecture+2 |
| 2024-11-26 | Talk | Blackhat |
Cyber Security & Resiliency: a perspective with emerging technologies and Innovation
| Atul Kumar | cybersecurity-strategiesrisk-managementcyber-resilience+2 |
| 2024-11-26 | Talk | Blackhat |
The Double Edge Sword - Cybersecurity & AI
| Karmendra Kohli | security-architecturerisk-managementdevsecops+1 |
| 2024-11-15 | Talk | C0c0n |
CISO’s take on BYOAI
| Venugopal Parameswara | risk-managementsecurity-governancecompliance+4 |
| 2024-10-23 | Tool demo | Blackhat |
Cyber Arsenal47
| Simardeep Singh | automated-scanningvulnerability-assessmentpentesting+3 |
| 2024-08-30 | Talk | Hitb Sec Conf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | web-securitypentestingexploitation+4 |
| 2024-08-29 | Tool demo | Hitb Sec Conf |
Mantis
| Bharath Kumar, Akshay Jain | vulnerability-managementasset-inventorydast+2 |
| 2024-08-10 | Talk | Defcon |
Sneaky Extensions: The MV3 Escape Artists
| Vivek Ramachandran, Shourya Pratap Singh | web-securitypentestingvulnerability-management |
| 2024-08-08 | Tool demo | Blackhat |
ICSGoat: A Damn Vulnerable ICS Infrastructure
| Shantanu Kale, Divya Nain | ics-securityscadaplc+3 |
| 2024-06-27 | Talk | Troopers |
The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps
| Priyank Nigam | mobile-securitypentestingapi-security+2 |
| 2024-05-07 | Talk | Rsac |
A Proven Approach on Automated Security Architectural Pattern Validation
| Sunil Arora | security-architecturedevsecopsvulnerability-management+2 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | asset-inventoryvulnerability-managementsecurity-architecture+3 |
| 2024-03-11 | Talk | Nullcon |
Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC
| Arpan Jati | vulnerability-assessment |
| 2023-12-06 | Tool demo | Blackhat |
Honeyscanner: a vulnerability analyzer for Honeypots
| Shreyas Srinivasa | vulnerability-assessment |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | cicd-securitydevsecopsvulnerability-management+6 |
| 2023-09-23 | Talk | Nullcon |
Secure Coding: Fix From The Root
| Saddam Hussain, Gopika Subramanian | secure-coding |
| 2023-08-12 | Tool demo | Defcon |
Open Source API Security for devsecops
| Ankush Jain, Ankita Gupta 1 | api-securitydevsecopsci-cd+3 |
| 2023-08-12 | Talk | Defcon |
Getting More Bang for your Buck:Appsec on a Limited Budget
| Vandana Verma Sehgal, Viraj Gandhi | secure-developmentdevsecopsrisk-management+3 |
| 2023-08-11 | Talk | Defcon |
Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications
| Ankur Chowdhary | web-securityxssapplication-pentesting+3 |
| 2023-08-11 | Tool demo | Defcon |
vAPI : Vulnerable Adversely Programmed Interface
| Tushar Kulkarni | api-securityowaspauthorization+1 |
| 2023-08-09 | Tool demo | Blackhat |
CASPR - Code Trust Auditing Framework
| Ajit Hatti | secure-coding |
| 2023-08-07 | Talk | C0c0n |
Smart Contract Phishing : Attack & Defense
| Tejaswa Rastogi | smart-contractsblockchain-securityphishing+3 |
| 2023-08-07 | Talk | C0c0n |
Start Left SDLC Security with Open-Source DevSecOps Tooling
| Aswin Raj, Shruti M G | devsecopssecure-developmentstatic-analysis+3 |
| 2023-08-07 | Talk | C0c0n |
Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos
| Nikhil Prabhakar | android-securitymobile-securityreverse-engineering+1 |
| 2023-08-07 | Talk | C0c0n |
Serverless Siege: AWS Lambda Pentesting
| Anjali Singh Shukla, Divyanshu Shukla | awsserverlesscloud-pentesting+2 |
| 2023-08-07 | Talk | C0c0n |
Shifting left blockchain development for safer DApps
| Dhanith Krishna | blockchain-securitysmart-contractssecure-development+3 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | encryptionsecurity-architectureprivacy+2 |
| 2023-08-06 | Talk | C0c0n |
Mitigating SSRF at scale the right way with IMDSv2!
| Ayush Priya | web-securityapi-securityaws+3 |
| 2023-08-06 | Talk | C0c0n |
The new way to be secure
| Sakshi Bhutani | secure-developmentdevsecopssoftware-security+3 |
| 2023-08-06 | Talk | C0c0n |
Surviving In Dependency Hell
| Kumar Ashwin | secure-developmentdevsecopsvulnerability-management+1 |
| 2023-08-06 | Talk | C0c0n |
Influence of Artificial Intelligence in GRC Space
| Mahesh Kalyanaraman | governancerisk-managementcompliance+3 |
| 2023-08-06 | Talk | C0c0n |
Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector
| Anshu Kumar, Pavan Sorab | devsecopsci-cdcicd-pipeline+3 |
| 2023-05-11 | Tool demo | Blackhat |
CASPR - Code Trust Auditing Framework
| Atharva Chincholkar, Srishti Chaubey | secure-coding |
| 2023-04-26 | Talk | Rsac |
Designing Product Security for a Brighter Smile and a Healthier Tomorrow
| Lokesh Pidawekar | secure-developmentdevsecopssoftware-security+2 |
| 2023-04-26 | Talk | Rsac |
Is Increasing Security Maturity And Decreasing Operational Load Possible?
| Rohit Dhamankar | Automationrisk-managementsecurity-architecture+2 |
| 2022-09-24 | Talk | C0c0n |
Raining CVEs on Wordpress plugins with Semgrep
| Shreya Pohekar, Syed Sheeraz Ali | web-securitystatic-analysissast+2 |
| 2022-09-24 | Talk | C0c0n |
Web3 Security - Security in MetaVerse, and the new world of web3
| Rohit Srivastwa | blockchain-securityweb3decentralized-systems+3 |
| 2022-09-24 | Talk | C0c0n |
Building Smart, Resilient and Sustainable Cyber Eco System
| Navin Kumar Singh | risk-managementcybersecurity-strategiessecurity-architecture+4 |
| 2022-09-24 | Talk | C0c0n |
In production with GRC for cloud
| Mahesh Kalyanaraman | cloud-compliancegovernancerisk-management+2 |
| 2022-09-23 | Talk | C0c0n |
Securing your APIs for a cloud native future
| Navendu Pottekkat | api-securitysecure-developmentdevsecops |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | api-securitythreat-landscapethreat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Hacking SmartContracts
| Anto Joseph | blockchain-securitysmart-contractsvulnerability-management+2 |
| 2022-09-23 | Talk | C0c0n |
Pwning Android Apps at Scale
| Sparsh Kulshrestha, Shashank Barthwal | android-securitymobile-securitymobile-pentesting+3 |
| 2022-09-23 | Talk | C0c0n |
Building a Safer and Innovative Digital Ecosystem
| Vijay Pamarathi | secure-developmentdevsecopssoftware-security+2 |
| 2022-09-23 | Talk | C0c0n |
Collaborative efforts for safe digital banking
| Biju K | secure-developmentrisk-managementsecurity-architecture |
| 2022-09-23 | Talk | C0c0n |
Hyperledger Fabric & Ethereum Apps: Security Deep Dive
| Alex Devassy, Dhanith Krishna | blockchain-securitysmart-contractssolidity+3 |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | devsecopssecurity-architecturethreat-detection+3 |
| 2022-09-23 | Talk | C0c0n |
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key?
| Abhijith B R | risk-managementsecurity-architecturedevsecops |
| 2022-09-08 | Talk | Nullcon |
Pushing Security Left By Mutating Byte Code
| Gaurav Gogia | secure-coding |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | vulnerability-assessment |
| 2022-08-12 | Talk | Defcon |
Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years
| Vivek Ponnada | secure-codingvulnerability-managementdevsecops+1 |
| 2022-08-10 | Tool demo | Blackhat |
CASPR - Code Trust Audit Framework
| Ajit Hatti | secure-coding |
| 2021-11-13 | Talk | C0c0n |
Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application
| Gayatri Nayak | web-securityauthenticationauthorization+2 |
| 2021-11-13 | Talk | C0c0n |
Server-side javascript Injection
| Kavisha Sheth | web-securitysecure-codingweb-pentesting |
| 2021-11-13 | Talk | C0c0n |
New way of looking at the hidden mysteries in the code
| Vandana Verma Sehgal | code-reviewstatic-analysisreverse-engineering+2 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | incident-responsesecurity-awarenessdevsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Cybersecurity in the era of Resilience - A walk through people, process and technology
| Babitha B P | risk-managementcyber-resiliencesecurity-architecture+3 |
| 2021-11-12 | Talk | C0c0n |
Dissecting Malicious Software and Analysis
| Shrutirupa Banerjiee | malwarereverse-engineeringdynamic-analysis+1 |
| 2021-11-04 | Talk | Ekoparty |
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system
| Saransh Rana, Divyanshu Mehta, Harsh Varagiya | awssecurity-monitoringiam+2 |
| 2021-10-15 | Talk | Rootcon |
The Curious case of knowing the unknown
| Vandana Verma Sehgal | vulnerability-managementsecure-codingdevsecops+1 |
| 2021-08-08 | Talk | Defcon |
AppSec 101: A Journey from Engineer to Hacker
| Arjun Gopalakrishna | secure-codingpentestingethical-hacking+2 |
| 2021-08-08 | Talk | Defcon |
Top 20 Secure PLC Coding Practices
| Vivek Ponnada | industrial-control-systems-securitysecure-codingvulnerability-management+3 |
| 2021-08-06 | Talk | Defcon |
Adversary village Kick-off
| Abhijith B R | red-teamingethical-hackingvulnerability-assessment+2 |
| 2021-08-05 | Talk | Defcon |
The Bug Hunter’s Recon Methodology
| Tushar Verma | pentestingvulnerability-assessmentapplication-pentesting+1 |
| 2021-08-04 | Tool demo | Blackhat |
Counterfit: Attacking Machine Learning in Blackbox Settings
| Raja Sekhar Rao Dheekonda | vulnerability-assessment |
| 2021-08-04 | Tool demo | Blackhat |
Joern: An Interactive Shell for Code Analysis
| Suchakra Sharma | vulnerability-assessment |
| 2021-05-06 | Tool demo | Blackhat |
Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way
| Vasant Kumar, Rupali Dash | kubernetescloudaudit+4 |
| 2021-05-06 | Tool demo | Blackhat |
FalconEye: Windows Process Injection Techniques - Catch Them All
| Rajiv Kulkarni, Sushant Paithane | windowsprocess-injectionblueteam+2 |
| 2020-11-21 | Talk | App Sec Indonesia |
Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory
| Abhi M Balakrishnan | web-securityowaspapplication-pentesting+2 |
| 2020-11-21 | Talk | App Sec Indonesia |
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration
| Ashwin Vamshi | vulnerability-managementsecurity-architecturedevsecops+2 |
| 2020-10-02 | Tool demo | Blackhat |
OWASP Nettacker
| Sri Harsha Gajavalli | pentestingvulnerability-assessmentnetwork-pentesting+3 |
| 2020-10-01 | Tool demo | Blackhat |
OWASP Python Honeypot
| Sri Harsha Gajavalli | web-securityowasppentesting+1 |
| 2020-09-19 | Talk | C0c0n |
Automate your Recon with ReconNote
| Prasoon Gupta | pentestingvulnerability-assessmentAutomation+1 |
| 2020-09-18 | Talk | C0c0n |
Web Application hacking with WebZGround
| Parveen Yadav, Narendra Kumar | web-securityweb-pentestingpentesting+3 |
| 2020-09-18 | Talk | C0c0n |
Demystifying Zero Trust - A Real world
| Sandeep Variyam | zero-trustsecurity-architecturesecurity-governance+1 |
| 2020-08-09 | Talk | Defcon |
Running an appsec program with open source projects
| Vandana Verma Sehgal | owaspsecure-developmentdevsecops+3 |
| 2020-04-25 | Talk | Hitb Sec Conf |
THE STATE OF ICS SECURITY: THEN AND NOW
| Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot | vulnerability-assessmentpentestinfrastructure+1 |
| 2020-03-06 | Tool demo | Nullcon |
VyAPI
| Riddhi Shree | secure-codingawsamazon-cognito+5 |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | linuxsecure-codingweb-application-security+3 |
| 2020-03-06 | Tool demo | Nullcon |
Talisman
| Suhas Vishwanath | opensourcesecure-developmentdevelopment+5 |
| 2019-12-04 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | macossecure-codingforensic+2 |
| 2019-09-27 | Talk | C0c0n |
autoSource an automated framework for Source Code Review
| Malkit Singh | code-reviewsecure-codingstatic-analysis+3 |
| 2019-09-27 | Talk | C0c0n |
Golang for Pentesters / RedTeamers
| Anant Shrivastava | pentestredteamsecure-coding |
| 2019-09-27 | Talk | C0c0n |
Serverless SOAR
| Sabyasachi Dhal, Suresh Sharma | secure-codingpentest |
| 2019-09-27 | Talk | C0c0n |
VyAPI - The Vulnerable Hybrid Android App
| Riddhi Shree | secure-codingawsamazon-cognito+5 |
| 2019-09-27 | Talk | C0c0n |
Practical Approach to Cyber Security for financial institutions
| Georgie Kurien | financial-institutionssecure-developmentrisk-management+2 |
| 2019-09-27 | Talk | C0c0n |
Security @scale for startups
| Shivanath Somanathan | devsecopssecure-developmentsoftware-security+2 |
| 2019-09-27 | Talk | C0c0n |
Stepping into Password Less Economy
| Ajit Hatti | authenticationidentity-managementsecure-development+1 |
| 2019-09-23 | Talk | Rootcon |
Identity crisis: war stories from authentication failures
| Vishal Chauhan | authenticationidentity-managementvulnerability-assessment+3 |
| 2019-09-13 | Talk | 44 Con |
One Person Army – Playbook on how to be the first Security Engineer at a company
| Kashish Mittal | infrastructuredevsecopsAutomation |
| 2019-09-13 | Talk | Global App Sec |
Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center
| Amol Sarwate | vulnerability-managementawssecurity-information-event-management+1 |
| 2019-08-30 | Talk | Hitb Sec Conf |
COMMSEC: PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | secure-codingredteamblueteam+1 |
| 2019-08-11 | Talk | Defcon |
Exploiting and Securing iOS Apps using OWASP iGoat
| Swaroop Yermalkar | mobile-securityios-securityapplication-pentesting+4 |
| 2019-08-11 | Talk | Defcon |
Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants
| Vandana Verma Sehgal | devsecopssecure-developmentAutomation+4 |
| 2019-08-08 | Talk | Defcon |
Phishing in the cloud era
| Ashwin Vamshi, Abhinav Singh | phishingapi-securityweb-security+2 |
| 2019-08-08 | Talk | Blackhat |
DevSecOps : What, Why and How
| Anant Shrivastava | devsecopsdevelopmentdevops |
| 2019-08-08 | Talk | Defcon |
Anatomy of cloud hacking
| Pratik Shah | cloud-pentestingpost-exploitationcloud-architecture+1 |
| 2019-03-28 | Talk | Blackhat |
DevSecOps : What, Why and How
| Anant Shrivastava | devsecopssecure-coding |
| 2019-03-28 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli, Ankur Bhargava | secure-codingwebblueteam |
| 2019-03-28 | Tool demo | Blackhat |
pytm: A Pythonic Framework for Threat Modeling
| Rohit Shambhuni | secure-codingthreat_modelingredteam |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli | network-pentestingvulnerability-assessmentfirewall+3 |
| 2019-02-28 | Talk | Nullcon |
Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida
| Shivang Desai | secure-codingpentest |
| 2019-02-28 | Talk | Nullcon |
Building Hardened IoT Implementations with LangSec
| Prashant Anantharaman | iotblueteamsecure-development |
| 2018-12-05 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli | secure-codingwebblueteam |
| 2018-10-19 | Talk | App Sec Day Australia |
Threat Modeling-as-Code & Automation for DevSecOps wins
| Abhay Bhargav | threat_modelingdevsecops |
| 2018-10-10 | Talk | Brucon |
Simplifying the art of instrumentation
| Krishnakant Patil, Rushikesh D Nandedkar | reverse-engineeringstatic-analysisdynamic-analysis+2 |
| 2018-10-05 | Talk | C0c0n |
SCANDA: To Unbosom Malware Behavior
| Rajesh Nikam, Parmanand Mishra | malwarereverse-engineeringdynamic-analysis+2 |
| 2018-09-27 | Talk | Rootcon |
Defending cloud Infrastructures with Cloud Security Suite
| Shivankar Madaan | cloudawsinfrastructure+5 |
| 2018-08-11 | Tool demo | Defcon |
Halcyon IDE
| Sanoop Thomas | reconnaissanceredteamnmap+1 |
| 2018-08-11 | Tool demo | Defcon |
Sh00t—An open platform for manual security testers & bug hunters
| Pavan Mohan | pentestbug-huntingopensource+3 |
| 2018-08-08 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | macossecure-codingforensic+2 |
| 2018-08-08 | Tool demo | Blackhat |
Halcyon IDE: For Nmap Script Developers
| Sanoop Thomas | reconnaissanceredteamnmap+1 |
| 2018-08-08 | Tool demo | Blackhat |
SCoDA: Smart COntract Defender and Analyzer
| Ajit Hatti | blueteamanalysissecure-coding |
| 2018-06-27 | Talk | First |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Sunil Kumar | mobile-securitysecure-developmentvulnerability-management+2 |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | mobile-securitysecure-developmentvulnerability-management+2 |
| 2018-01-31 | Talk | Owasp App Sec California |
Hunter – Optimize your Pentesters time
| Kiran Shirali | application-pentestingpentestingvulnerability-management+2 |
| 2017-10-05 | Talk | Brucon |
Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)
| Rushikesh D Nandedkar, Sampada Nandedkar | vulnerability-assessmentpentestingsecure-coding+2 |
| 2017-09-21 | Talk | App Sec Usa |
Androsia: A tool for securing in memory sensitive data
| Samit Anwer | android-securitymobile-securitystatic-analysis+1 |
| 2017-08-19 | Talk | C0c0n |
Building Trust for Digital Transactions in India’s COD Culture
| Parry Aftab | secure-developmentrisk-managementsecurity-architecture |
| 2017-08-18 | Talk | C0c0n |
Androsia: A tool for securing in memory sensitive data
| Samit Anwer | secure-codingandroidmobile+1 |
| 2017-08-18 | Talk | C0c0n |
Cloud_Security Suite - One stop tool for auditing cloud infrastructure
| Shivankar Madaan, Jayesh Chauhan | cloudawsinfrastructure+5 |
| 2017-08-18 | Talk | C0c0n |
iGoat – A Self Learning Tool for iOS App Pentesting and Security
| Swaroop Yermalkar | iosmobilepentest+3 |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | dynamic-analysisreverse-engineeringbinary-analysis+1 |
| 2017-07-30 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | secure-codingredteamblueteam+4 |
| 2017-07-28 | Tool demo | Defcon |
Lamma 1.0
| Ajit Hatti, Antriksh Shah | cryptographypentestaudit+1 |
| 2017-07-27 | Tool demo | Blackhat |
Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday
| Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Rao | fuzzingapirest-api+3 |
| 2017-07-27 | Tool demo | Blackhat |
Gibber Sense
| Ajit Hatti | secure-codingreconnaissancecryptography+3 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | vulnerability-assessmentbug-bountynetwork-pentesting+1 |
| 2017-07-26 | Tool demo | Blackhat |
Devknox - Autocorrect Security Issues from Android Studio
| Subho Halder | androidmobilecode-analysis+1 |
| 2017-06-23 | Talk | Hackinparis |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-05-23 | Talk | Phdays |
Injecting security into web apps in the runtime
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-03-30 | Tool demo | Blackhat |
Devknox - Autocorrect Security Issues from Android Studio
| Subho Halder | androidmobilecode-analysis+1 |
| 2017-03-23 | Talk | Troopers |
How we hacked Distributed Configuration Management Systems
| Bharadwaj Machiraju | pentestingapplication-pentestingvulnerability-assessment+4 |
| 2017-03-23 | Talk | Troopers |
How we hacked Distributed Configuration Management Systems
| Francis Alexander | pentestingapplication-pentestingvulnerability-assessment+4 |
| 2017-03-03 | Talk | Nullcon |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-03-03 | Talk | Nullcon |
DevOpSec: Rapid Security in the Cloud with AWS and CIS
| Mikhail Advani, Rajesh Tamhane | devsecopscloudaws+2 |
| 2017-01-25 | Talk | Owasp App Sec California |
DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context
| Kiran Shirali | dynamic-analysisdastdevsecops+3 |
| 2017-01-25 | Talk | Owasp App Sec California |
OCSP Stapling in the Wild
| Devdatta Akhawe | web-securityvulnerability-managementsecurity-architecture+1 |
| 2016-11-04 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | secure-codingredteamblueteam+4 |
| 2016-10-13 | Talk | App Sec Usa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla | mobile-securityvulnerability-managementreverse-engineering+1 |
| 2016-10-07 | Talk | Deepsec |
Inside Stegosploit
| Saumil Shah | web-securityexploitationpentesting+1 |
| 2016-09-23 | Talk | Rootcon |
Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans
| Sanoop Thomas | secure-codingreconnaissanceredteam+1 |
| 2016-08-19 | Talk | C0c0n |
Kill the password - A new era of authentication
| Tamaghna Basu | authenticationiamsecurity-architecture+1 |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry | automated-exploit-detectionreverse-engineeringvulnerability-assessment+1 |
| 2016-08-06 | Tool demo | Defcon |
LAMMA (beta)
| Ajit Hatti | cryptographypentestaudit+1 |
| 2016-08-04 | Tool demo | Blackhat |
Droid-FF: Android Fuzzing Framework
| Anto Joseph | androidfuzzingsecure-coding+2 |
| 2016-08-04 | Tool demo | Blackhat |
Maltese (Malware Traffic Emulating Software)
| Sasi Siddharth | dnswebsecure-coding |
| 2016-08-04 | Tool demo | Blackhat |
LAMMA
| Ajit Hatti | cryptographypentestaudit+1 |
| 2016-05-26 | Talk | Hitb Sec Conf |
HITB Lab: Mobile Application Security for iOS and Android
| Tushar Dalvi | mobileandroidios+3 |
| 2016-03-15 | Talk | Groundzerosummit |
Web App Security
| Harpreet Singh, Himanshu Sharma, Nipun Jaswal | web-securityapi-securitysecure-coding+3 |
| 2016-03-11 | Talk | Nullcon |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day
| Pallav Jakhotiya, Vipul Sawant | hadoopsecure-developmentblueteam |
| 2015-11-05 | Talk | Ground Zero Summit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | ics-securityweb-securityvulnerability-management+3 |
| 2015-09-24 | Talk | App Sec Usa |
Continuous Cloud Security Automation
| Rohit Pitke | awsdevsecopsAutomation+2 |
| 2015-08-07 | Talk | Defcon |
Hacker’s Practice Ground
| Lokesh Pidawekar | pentestingethical-hackingvulnerability-assessment+2 |
| 2015-08-05 | Tool demo | Blackhat |
PixelCaptcha: A unicode based captcha scheme
| Gursev Singh Kalra | captchasecure-codingdevelopment |
| 2015-08-01 | Talk | C0c0n |
NoPo - The NoSQL HoneyPot Framework
| Francis Alexander | nosqlsecure-coding |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | vulnerability-managementautomated-scanningvulnerability-assessment+2 |
| 2015-03-15 | Talk | Defcon |
TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER
| Anamika Singh | network-pentestingvulnerability-assessmentvulnerability-management+2 |
| 2015-02-06 | Talk | Nullcon |
Building security and compliance into the software delivery process
| Anubhav Bathla, Dinesh Pillai, S Chandrasekhar | secure-developmentdevsecopscompliance+3 |
| 2015-02-06 | Talk | Nullcon |
Building custom scans for real world enterprise network
| Sanoop Thomas | pentestingnetwork-pentestingvulnerability-assessment+2 |
| 2015-01-27 | Talk | Owasp App Sec California |
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | web-securityxsscsrf+3 |
| 2014-11-13 | Talk | Ground Zero Summit |
Cyber ‘BrahMos’ - Static analysis driven secure coding
| Joy Sen | secure-coding |
| 2014-09-26 | Talk | Virus Bulletin |
Evolution of Android exploits from a static analysis tools perspective
| Jagadeesh Chandraiah | android-securitystatic-analysisvulnerability-management+2 |
| 2014-08-22 | Talk | C0c0n |
Still Single with a bleeding heart (Tool Release)
| Tamaghna Basu | secure-developmentvulnerability-management |
| 2014-08-21 | Talk | Usenix |
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | web-securityxsscsrf+3 |
| 2014-06-23 | Talk | Hackinparis |
Pentesting NoSQL DB’s with NoSQL Exploitation Framework
| Francis Alexander | nosqlsecure-codingpentest |
| 2014-03-08 | Talk | Defcon |
WI-Hawk
| Anamika Singh | network-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3 |
| 2014-02-14 | Talk | Nullcon |
Attack of the setuid bit - pt_chown and pwning root terminals
| Siddhesh Poyarekar | glibcredteamblueteam+2 |
| 2014-01-28 | Talk | Owasp App Sec California |
Application Sandboxes: Know thy limits
| Rahul Kashyap | application-pentestingreverse-engineeringvulnerability-management+1 |
| 2013-11-21 | Talk | Appsec Usa |
Wassup MOM? Owning the Message Oriented Middleware
| Gursev Singh Kalra | api-securityvulnerability-managementsecure-coding+1 |
| 2013-11-20 | Talk | App Sec Usa |
Project Talk: OWASP OpenSAMM Project
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2013-09-27 | Talk | C0c0n |
Infiltrating the Intranet with Skanda
| Jayesh Chauhan | redteamsecure-coding |
| 2013-09-27 | Talk | C0c0n |
Snake Bites
| Anant Shrivastava | secure-codingwebpentest+1 |
| 2013-09-27 | Talk | C0c0n |
Static analysis of malware with PyTriage
| Yashin Mehaboobe | secure-coding |
| 2013-09-27 | Talk | C0c0n |
Sandy - The Malicious Analysis
| Rahul Sasi | reverse-engineeringstatic-analysisdynamic-analysis |
| 2013-09-27 | Talk | C0c0n |
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global
| Vivek Ramachandran | devsecopssecure-developmentpentesting+2 |
| 2013-09-13 | Talk | Grrcon |
Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution
| Prajwal Panchmahalkar | pentestingforensicsdigital-forensics+2 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe | web-securitysecurity-awarenesssecurity-architecture+3 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe | vulnerability-managementbug-bountysoftware-security+3 |
| 2013-08-01 | Tool demo | Blackhat |
Sparty
| Aditya K Sood | secure-codingwebaudit+2 |
| 2013-08-01 | Tool demo | Blackhat |
XENOTIX xBOT
| Ajin Abraham | botnetlinuxwindows+3 |
| 2013-03-01 | Talk | Nullcon |
Mobile Code mining for discovery and exploits
| Hemil Shah | mobilecode-analysissecure-development+5 |
| 2012-12-06 | Talk | Blackhat |
The art of exploiting logical flaws in web apps
| Sumit Siddharth | webredteamsecure-coding |
| 2012-10-26 | Talk | App Sec Usa |
The 7 Qualities of Highly Secure Software
| Mano Paul | secure-developmentsoftware-securitysecure-coding+3 |
| 2012-10-25 | Talk | App Sec Usa |
Cross Site Port Scanning
| Riyaz Walikar | web-securityvulnerability-managementowasp+1 |
| 2012-09-28 | Talk | Nullcon |
Alert(/xss/) - How to catch an XSS before someone exploits / reports it?
| Ahamed Nafeez | web-securityxsssecure-coding+2 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | malwarebotnetweb-security+2 |
| 2012-03-15 | Talk | Nullcon |
An App(le) a day keeps the wallet away
| Antriksh Shah | pentestingweb-securityapi-security+1 |
| 2012-02-15 | Talk | Nullcon |
Best practices to improve the security grading of your project
| Hemant Khandelwal | blueteamthreat_modelingsecure-development |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | privacydata-protectionapi-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | secure-codingsecure-developmentweb-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Enabling Un-trusted Mashups
| Bishan Singh | web-securityxsscsrf+4 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | social-engineeringweb-securitysecurity-awareness+2 |
| 2011-02-25 | Talk | Nullcon |
(secure) SiteHoster – Disable XSS & SQL Injection
| Abhishek Kumar | xsssqliblueteam+2 |
| 2010-11-25 | Talk | Deepsec |
Developers are from Mars, Compliance Auditors are from Venus
| Neelay S Shah | compliancegovernancerisk-management+4 |
| 2010-11-11 | Talk | Blackhat |
Attacking with HTML5
| Lavakumar Kuppan | web-securityxssweb-pentesting+1 |
| 2010-04-14 | Talk | Blackhat |
Attacking JAVA Serialized Communication
| Manish Saindane | secure-codingredteamnetwork+1 |
| 2010-03-15 | Talk | Blackhat |
400 Apps in 40 Days
| Nish Bhalla | vulnerability-managementrisk-managementapplication-pentesting+2 |
| 2009-12-05 | Talk | Clubhack |
Revealing the Secrets: Source Code Disclosure, Techniques and Impacts
| Anant Kochhar | secure-developmentsecure-coding |
| 2009-11-19 | Talk | Deepsec |
Top 10 Security Issues Developers Don’t Know About
| Neelay S Shah | secure-codingdevsecopsvulnerability-management+3 |
| 2009-11-17 | Talk | Securitybyte |
Applications - The new cyber security frontier
| Mano Paul | secure-developmentdevsecopssoftware-security+2 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | privacydata-protectionsecurity-architecture+3 |
| 2009-05-19 | Talk | Syscan |
Securing Enterprise Applications
| Shreeraj Shah | blueteamwebweb-application-security+13 |
| 2009-05-19 | Talk | Syscan |
Securing Applications at Gateway with Web Application Firewalls
| Shreeraj Shah | blueteamwebfootprinting+3 |
| 2009-04-22 | Talk | Hitb Sec Conf |
Application Defense Tactics & Strategies - WAF at the Gateway
| Shreeraj Shah | blueteamwebfootprinting+3 |
| 2008-12-06 | Talk | Clubhack |
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching
| Karmendra Kohli | secure-developmentsecure-codingblueteam+2 |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | secure-codingreverse-engineeringredteam+2 |
| 2008-10-29 | Talk | Hitb Sec Conf |
Top 10 Web 2.0 Attacks
| Shreeraj Shah | blueteamweb-application-securityajax+8 |
| 2008-04-16 | Talk | Hitb Sec Conf |
Securing Next Generation Applications – Scan, Detect and Mitigate
| Shreeraj Shah | blueteamweb-application-securityajax+8 |
| 2008-03-27 | Talk | Blackhat |
Iron Chef Black Hat: John Henry Challenge
| Pravir Chandra | ethical-hackingsecure-developmentdevsecops |
| 2007-08-02 | Talk | Blackhat |
Breaking C++ Applications
| Neel Mehta | redteamsecure-codingapi |
| 2007-03-15 | Talk | Blackhat |
Exploit-Me Series – Free Firefox Application Penetration Testing Suite Launch
| Nish Bhalla, Rohit Sethi | web-securityxsssql-injection+4 |
| 2006-09-21 | Talk | Hitb Sec Conf |
Finding Secrets in ISAPI
| Nish Bhalla | secure-codingreverse-engineering |
| 2006-08-02 | Talk | Blackhat |
SQL Injections by Truncation
| Bala Neerumalla | web-securitysql-injectionsecure-coding+1 |
| 2006-01-26 | Talk | Blackhat |
Analysis of Adversarial Code: Problem, Challenges, Results
| Arun Lakhotia | analysissecure-codingblueteam |
| 2005-09-29 | Talk | Hitb Sec Conf |
Analyzing Code for Security Defects
| Nish Bhalla | code-analysisblueteamsecure-coding |
| 2003-12-12 | Talk | Hitb Sec Conf |
Defending Web Applications: Strategies, methods and practices
| Shreeraj Shah | webblueteamsecure-coding+2 |