πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Defensive Security

Blue team operations, detection, defense strategies, and security monitoring

363
Total Entries
287
Contributors
197
Unique Tags
50
Related Tags

Top Contributors

Saumil Shah(14) Shreeraj Shah(14) Ajin Abraham(9) Ankur Tyagi(9) Jayesh Chauhan(9)

Related Tags (18)

Show all 18 tags...

All Entries (363 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Harsha Koushik, Anand Tiwaricloud-pentestingrisk-managementedr
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishraweb-securitymalware-detectionbrowser-security+2
2025-03-02TalkNullcon Securing the chains: Building defensive layers for software supply chains Yadhu Krishna M, Akhil Mahendra, Hritik Vijayblueteam
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallamnetwork-architecturenetwork-hardeningnetwork-monitoring+2
2024-12-11TalkBlackhat The CVSS Deception: How We’ve Been Misled on Vulnerability Severity Presentation Ankur Sandblueteam
2024-11-28TalkBlackhat Hardened Cyber Defense for Tactical & Contested Environment Manu Nayarblueteam
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B Rthreat-hunting
2024-11-16TalkC0c0n Who is holding the Marauders map? Maya R Nairnetwork-pentestingnetwork-monitoringnetwork-traffic-analysis+1
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhureblueteam
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjitblueteam
2024-08-29Tool demoHitb Sec Conf eBPFShield Source Code Sagar Bhureidsincident-responsenetwork-monitoring+1
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Shobhit Mehtaprivacydata-protectionsecurity-operations-center+2
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhureblueteam
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeranblueteam
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+3
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Suranacontainer-securitydockerthreat-hunting+1
2023-09-23TalkNullcon Secure Your Angular App Using JWT And GraphQL Presentation Ankit Sharmablueteam
2023-09-23TalkNullcon The Curious Case Of The Rogue SOAR Presentation Video Mukesh Sai Kumar, Jaden Furtadoblueteam
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanandaptincident-responsethreat-hunting
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubeythreat-huntingdigital-forensicsincident-response+1
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregangeics-securityindustrial-control-systems-securityoperational-technology+2
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Riteshthreat-landscapethreat_modelingthreat-hunting+2
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhandethreat-huntingdigital-forensicsnetwork-forensics+3
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansarithreat-hunting
2022-12-07Tool demoBlackhat h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. Source Code Subhash Popurihoneypot
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittalred-teamingactive-directorythreat-detection
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohliidsnetwork-monitoringthreat-detection+2
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K Msocsecurity-monitoringsecurity-analytics+3
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappanidsnetwork-monitoringnetwork-pentesting+3
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+3
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan Mapi-securitythreat-landscapethreat-hunting+1
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyanthreat-huntingincident-response
2022-09-08TalkNullcon Handling A Bug Bounty program From A Blue Team Perspective Presentation Video Ashwath Kumar, Ankit Anuragblueteam
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Korannethreat-hunting
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnanithreat-detectionsecurity-monitoringvulnerability-management+1
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharmaindustrial-control-systems-securitycritical-infrastructurethreat-hunting+1
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadossmalwaredefense
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasamalwaredefense
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiyaawssecurity-monitoringiam+2
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singhapentestingpost-exploitationprivilege-escalation+2
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkarnetwork-defense
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dashkubernetescloudaudit+4
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithanewindowsprocess-injectionblueteam+2
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiahblueteamredteampurpleteam+1
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwariopensourceblueteampentest+3
2020-12-09Tool demoBlackhat HosTaGe: mobile honeypots for rapid deployment Source Code Shreyas Srinivasahoneypotnetworkblueteam
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Soodcloudblueteampentest+1
2020-11-21TalkApp Sec Indonesia Threat Defense: Defending the ATT&CK with TTP’s Avkash Kathiriyablueteam
2020-10-07TalkRootcon Blockchain Based OT Monitoring Solution (BBOTMS) Presentation Video Asif Hameed Khan, Gagan Jattanaicsblockchainblueteam+1
2020-10-02Tool demoBlackhat MalViz.ai Source Code Vasu Sethia, Shivam Katariablueteamweb
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Ravalphishinginfrastructureblueteam
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2020-10-01Tool demoBlackhat Wi-Fi Access Point Rootkits Nishant Sharma, Jeswin Mathaiwifinetworkblueteam+1
2020-09-18TalkC0c0n Deep Learning for Intrusion Attempt Detection Varun Kohlideep-learningmachine-learningblueteam
2020-08-22TalkThe Diana Initiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautamthreat-huntingAutomation
2020-08-05TalkBlackhat Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic Presentation Video Harini Kannanmachine-learningexploit-detectionblueteam
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Ranaopensourcerisk-analysisblueteam+2
2020-07-05Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abrahammobileblueteamios+3
2020-04-25TalkHitb Sec Conf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotvulnerability-assessmentpentestinfrastructure+1
2020-04-24TalkHitb Sec Conf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotscadablueteampentest+1
2020-03-06Tool demoNullcon F.R.I.D.A.Y Source Code Shyam Sundar Ramaswamiblueteam
2020-03-06Tool demoNullcon Hachi Source Code Parmanand Mishraatt&ckblueteamrest-api+1
2020-03-06TalkNullcon InfoSec Deep Learning in Action Presentation Video Satnam Singhmldeep-learningblueteam
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rananetworkreconnaissanceblueteam
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Ravalphishinginfrastructureblueteam
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shahincident-responselinuxmacos+2
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahanlinuxsecure-codingweb-application-security+3
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar DuttawebAutomationintrusion-detection
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamyblueteamsmartcard
2019-12-04Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit Source Code Jayesh Chauhancloudawsgcp+2
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Aryafuzzingredteamblueteam+1
2019-12-04Tool demoBlackhat RTTM: Real Time Threat Monitoring Tool Source Code Naveen Rudrappa, Murali Krishna Seguscrappingblueteam
2019-11-01TalkApp Sec Day Australia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavredteamblueteampurpleteam+1
2019-11-01TalkApp Sec Day Australia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandranblueteaminfrastructure
2019-10-14TalkHitb Sec Conf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishrawebbrowserblueteam+2
2019-10-14TalkHitb Sec Conf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehtanetworkwifiredteam+2
2019-10-12TalkTexas Cyber Summit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Sudheendra Bhatincident-responsethreat-huntingioc+3
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoorblueteam
2019-09-27TalkC0c0n Block Chain for Secured Automation Sanat Bhatblockchainblueteam
2019-09-27TalkC0c0n Building a cloud security monitoring and auditing framework Nirali Shah, Prasoon Dwivedicloudblueteaminfrastructure
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharmaembedded-systemsblueteam
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singhhealthcareblueteam
2019-09-27TalkC0c0n Doing SecOps for the Cloud using Cloud Native Services Akash Mahajancloudblueteam
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagarinfrastructureblueteam
2019-09-23TalkRootcon Hunting Threats with Wireshark Plugins Presentation Video Nishant Sharma, Jeswin Mathai, Shivam Bathlablueteam
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil BogamredteamAutomationcar-hacking+2
2019-09-13Talk44 Con The CISO’s Dilemma Presentation Video Saumil Shahblueteaminfrastructure
2019-09-13TalkGlobal App Sec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavpurpleteam
2019-08-30TalkHitb Sec Conf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshisecure-codingredteamblueteam+1
2019-08-29KeynoteHitb Sec Conf The CISO’s Dilemma Presentation Video Saumil Shahblueteaminfrastructure
2019-08-29TalkHitb Sec Conf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singhredteamblueteampurpleteam+1
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modireconnaissanceblueteamweb
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-08Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhancloudawsgcp+2
2019-08-08Tool demoBlackhat CSF: Container Security Framework Source Code Vaibhav Guptaopensourceblueteaminfrastructure
2019-08-08TalkBlackhat Death to the IOC: What’s Next in Threat Intelligence Presentation Video Bhavna Somanthreat-intelligencemachine-learningblueteam
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-08Tool demoDefcon Hachi: An Intelligent threat mapper Source Code Parmanand Mishraatt&ckblueteamrest-api+1
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rananetworkreconnaissanceblueteam
2019-08-08Tool demoDefcon PcapXray Source Code Srinivas Piskala Ganesh Babuforensicnetworkwireshark+1
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashantwebiotblueteam
2019-08-07TalkBlackhat Defense Against Rapidly Morphing DDOS Presentation Video Mudit Tyagiddosblueteammachine-learning
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwalvirtual-machineblueteamforensic+2
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hattiincident-responsethreat-hunting
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjveblueteamhoneypotinfrastructure
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwaripentestinfrastructureblueteam+3
2019-03-28Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhanpentestblueteamcloud+4
2019-03-28TalkBlackhat Investigating Malware Using Memory Forensics - A Practical Approach Presentation Video Monnappa K Aforensicblueteam
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargavasecure-codingwebblueteam
2019-03-28Tool demoBlackhat MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research Source Code Nilaksh Dascloudmachine-learningblueteam
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappascrappingblueteam
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangalevoipwiresharknetwork-security+4
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavallinetwork-pentestingvulnerability-assessmentfirewall+3
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singhhealthcareredteamblueteam+1
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharamaniotblueteamsecure-development
2018-12-06TalkBlackhat AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace Presentation Whitepaper Video Vijay Thaware, Niranjan Agnihotriaiblueteamdeepfake
2018-12-06Tool demoBlackhat Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit Source Code Jayesh Chauhancloudawsgcp+2
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepallisecure-codingwebblueteam
2018-11-27TalkHitb Sec Conf COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding Presentation Video Vikash Yadavdeep-learningblueteam
2018-11-02TalkHitb Sec Conf Defending The Enterprise in 2018 Saumil Shahblueteam
2018-10-19TalkApp Sec Day Australia Continuous Integration and Delivery with Docker Containers Video Vasant Kumardockerblueteam
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharmahealthcareblueteam
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basumachine-learningblueteam
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wigbig-datablueteam
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharmablueteam
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyarthreat-landscapethreat-huntingrisk-management+1
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishramalwarereverse-engineeringdynamic-analysis+2
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaancloudawsinfrastructure+5
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagiblueteamanalysismachine-learning
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur TyagiblueteamAutomationpentest+1
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyanthreat-detectionsecurity-architecture
2018-08-12Tool demoDefcon Expl-iotβ€”IoT Security Testing and Exploitation framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur TyagiblueteamAutomationpentest+1
2018-08-11Tool demoDefcon Archeryβ€”Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestinfrastructureblueteam+3
2018-08-11Tool demoDefcon Cloud Security Suiteβ€”One stop tool for AWS, GCP & Azure Security Audit Source Code Jayesh Chauhancloudawsgcp+2
2018-08-11Tool demoDefcon DejaVUβ€”An Open Source Deception Framework Source Code Harish Ramadoss, Bhadreshkumar Patelblueteaminfrastructureweb+1
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modireconnaissanceblueteamweb
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akulasecurity-analyticsthreat-hunting
2018-08-09TalkBlackhat Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina Presentation Source Code Video Bhargava Shastrypentestblueteamdevelopment+2
2018-08-09TalkDefcon 4Gβ€”Who is paying your cellular phone bill? Presentation Video Isha Singh4gipxnetwork+3
2018-08-09TalkBlackhat Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks Presentation Video Jugal Parikhblueteam
2018-08-08Tool demoBlackhat ANWI (All New Wireless IDS): The $5 WIDS Source Code Rishikesh Bhide, Sanket Karpenetworkintrusion-detectionblueteam+2
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwaripentestinfrastructureblueteam+3
2018-08-08Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit Source Code Divya S John, Jayesh Chauhan, Shivankar Madaanpentestblueteamcloud+4
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeezredteamvpnweb+2
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadossblueteaminfrastructureweb+1
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf ShaikltenetworkAutomation+4
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhanvirtual-machineblueteamforensic+2
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hattiblueteamanalysissecure-coding
2018-05-13TalkDefcon Androsia: Securing ‘Data in Process’ for your Android Apps Presentation Whitepaper Video Samit Anwerandroidmobileblueteam
2018-03-23Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit Source Code Jayesh Chauhan, Shivankar Madaancloudawsgcp+2
2018-03-22Tool demoBlackhat Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data Source Code Samit Anwerandroidmobileblueteam
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestinfrastructureredteam+2
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsettypentestredteamblueteam+9
2018-03-22Tool demoBlackhat Mobile Security Framework - MobSF Presentation Source Code Ajin Abrahammobileblueteamios+3
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharlawearablesblueteamredteam+2
2018-03-22TalkBlackhat XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Presentation Video Ravi Sahitablueteam
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatiablueteamwindows
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singhaiblueteam
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajanopensourcephishingbrowser+2
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiryandroidmobilefuzzing+4
2017-12-30Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS Security Audit Source Code Shivankar Madaan, Prajal Kulkarni, Jayesh Chauhanpentestblueteamcloud+4
2017-12-06Tool demoBlackhat ANWI (All New Wireless IDS) - The Β£5 WIDS Source Code Sanket Karpenetworkintrusion-detectionblueteam+2
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhariotpentestredteam+2
2017-11-20TalkHackfest How my SV Machine nailed your Malware Nikhil P Kulkarnimobileandroidmachine-learning+1
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shuklaredteamblueteampurpleteam
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shuklaredteamblueteampurpleteam
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Guptabotnetblueteam
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjvehoneypotinfrastructureblueteam
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhancloudawsinfrastructure+5
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankalblueteam
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkariosmobilepentest+3
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajgurumobile-securityapplication-securitypurpleteam+2
2017-08-18TalkC0c0n Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure Manas Pratim Sarmablueteaminfrastructure
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Dattaredteamblueteampurpleteam
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michaeliotblueteam
2017-08-18TalkC0c0n Yarafying Android Malware: A Missing Step Before Malware Analysis Shivang Desaiandroidmobileblueteam
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawtherthreat-huntingthreat_modelingioc+3
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+4
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifinetworkredteam+2
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-27WorkshopDefcon Attacking and Defending 802.11ac Networks Vivek Ramachandrannetwork802.11wifi+3
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hattisecure-codingreconnaissancecryptography+3
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaiknetworkredteamspying+5
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abrahamwebblueteamsecure-development+6
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Josephmachine-learningapache-sparkredteam+2
2017-04-13KeynoteHitb Sec Conf Redefining Defense Presentation Video Saumil Shahblueteam
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shahblueteam
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifinetworkredteam+2
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Swamy Shivaganga Nagarajuwindowsblueteam
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyedss7pentestblueteam+2
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittalblueteam
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+4
2016-09-14Talk44 Con 2016: The Infosec Crossroads Presentation Video Saumil Shahblueteam
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekarpurpleteamredteamblueteam
2016-08-06Tool demoDefcon Visual Network and File Forensics using Rudra Source Code Video Ankur Tyagianalysisblueteamnetwork+2
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagianalysisblueteamforensic+1
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Pandapentestingvulnerability-managementthreat-hunting
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul SasiaiAutomationblueteam
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-04-01Tool demoBlackhat Rudra: The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggalhealthcareinfrastructureredteam+1
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul SasiAutomationblueteamweb+2
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawanthadoopsecure-developmentblueteam
2015-11-13Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2015-11-05TalkGround Zero Summit Wolves Among Sheep: Defeating Targeted Attacks With Deception Sahir Hidayatullah, Raviraj Doshiblueteam
2015-11-05TalkGround Zero Summit Western Air Command B S Singh Deonetwork-defensenetwork-monitoringnetwork-pentesting+3
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandrannetwork-forensicspacket-analysisnetwork-monitoring+3
2015-08-08TalkDefcon Chigula β€” a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandrannetworkwifiintrusion-detection+2
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Soodscadainfrastructurehmi+6
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvimobileandroidmetasploit+4
2015-08-08Tool demoDefcon Rudra Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-08-06Tool demoBlackhat Chellam Vivek Ramachandranwifinetworkfirewall+2
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notaniwebcloudanalysis+1
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalviandroidredteampentest+2
2015-08-05Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastavawebowaspblueteam
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohantyblueteam
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanianthreat-intelligenceblueteamredteam+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abrahamowaspxssblueteam+3
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanianblueteam
2015-03-15TalkHitb Sec Conf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobenetwork-pentestingpacket-analysisnetwork-monitoring+2
2015-02-06TalkNullcon Analyzing Chrome crash reports at scale Presentation Video Abhishek Aryawebbrowserclusterfuzz+3
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyedredteamblueteampurpleteam+3
2015-02-06TalkNullcon Generic Executable Unpacking using Dynamic Binary Instrumentation Presentation Shubham Bansalanalysisblueteam
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K Aforensicblueteamnetwork
2014-11-13TalkGround Zero Summit APT protection for the Enterprise Deepak Singlablueteaminfrastructure
2014-11-13TalkGround Zero Summit Making and Breaking Embedded Security Presentation Yashin Mehabooberedteamblueteampurpleteam
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Soodredteamreverse-engineeringblueteam+1
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobepurpleteamredteamblueteam
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babublueteam
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Guptamobilepurpleteam
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyaymobilereconnaissanceinfrastructure+2
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Soodbotnetredteamblueteam+1
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abrahamowaspxssblueteam+3
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwatescadainfrastructureblueteam
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekarglibcredteamblueteam+2
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalaniwebbrowserblueteam
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyernetworkwifievil-twin-attack+2
2014-02-14TalkNullcon Multi-value W-Fi What the Heck is it Video Abhijeet Ghoshnetworkwifiblueteam+1
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandlapdfanalysisweb-application-security+4
2014-02-14TalkNullcon The Security Challenge Presentation Video Shantanu Ghoshblueteam
2013-11-07TalkGround Zero Summit Advanced security for advanced threats Kartik Shahaniblueteam
2013-10-17TalkHitb Sec Conf Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis Presentation Rahul Sasianalysisinfrastructureblueteam
2013-09-27TalkC0c0n The Art and Science of Anamoly based Vulnerability Detection Lavakumar Kuppanblueteaminfrastructure
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Soodsecure-codingwebaudit+2
2013-07-31TalkBlackhat Clickjacking revisited: A perceptual view of UI security Presentation Video Devdatta Akhaweclickjackinguiblueteam+1
2013-07-31TalkBlackhat Javascript static security analysis made easy with JSPrime Presentation Whitepaper Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahooweb-application-securityanalysisblueteam
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalrapentestredteamblueteam+1
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyapblueteaminfrastructure
2013-03-01TalkNullcon Automating JavaScript Static Analysis Lavakumar Kuppanweb-application-securitywebpentest+1
2013-03-01TalkNullcon BYOD: How will it shape your wireless network security in future? Video Kiran Deshpandenetworkwifimobile+5
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayakcsrfwebblueteam
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shahmobilecode-analysissecure-development+5
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumarandroidmobilearm+8
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineninetworkipv4mitm+3
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaramannetworkinfrastructureblueteam
2013-03-01TalkNullcon Vulnerability research anyone? Omairinfrastructureredteamblueteam+1
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisettyredteamblueteampurpleteam+2
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremathinfrastructureblueteam
2012-12-01TalkClubhack Smart Grid Security Presentation Video Falgun Rathodblueteaminfrastructure
2012-09-27TalkGrrcon Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! Bharat Jogipentestredteamblueteam+2
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunteforensicanalysisblueteam
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkeyinfrastructureblueteam
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilyablueteaminfrastructure
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishrablueteam
2012-07-28TalkDefcon Botnets Die Hard - Owned and Operated Presentation Video Aditya K Soodbotnetblueteam
2012-02-15TalkNullcon Application security cost management Video Ketan Vyasblueteaminfrastructure
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwalblueteamthreat_modelingsecure-development
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kambleredteamwebxss+3
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoyredteamblueteampurpleteam
2012-02-15TalkNullcon Javascript static analysis with IronWASP Presentation Video Lavakumar Kuppanweb-application-securitywebpentest+1
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singhweb-application-securityredteamblueteam+1
2012-02-15TalkNullcon Ra.2 Blackbox DOM-based XSS scanner Presentation Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahooxsswebblueteam+1
2012-02-15TalkNullcon Sandboxing The deep truth Video Disha Agarwal, Manish Palifuzzingsandboxblueteam
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soiwebblueteam
2011-10-08TalkC0c0n Stratagemizing Security Against Perpetrators In Cloud Infrastructure K S Abhirajinfrastructureblueteamcloud
2011-10-07TalkC0c0n Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network Bala Kumar S, Mohamed Emraanullahinfrastructureblueteam
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasiwebpurpleteam
2011-09-07TalkSecuritybyte Data Protection Dipankar Royblueteaminfrastructure
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imranwebblueteam
2011-08-07TalkDefcon VDLDS β€” All Your Voice Are Belong To Us Presentation Video Ganesh Devarajanblueteamdata-leakcyber-crime
2011-05-19TalkHitb Sec Conf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Soodwebmalwarebrowser+2
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumarxsssqliblueteam+2
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Routinfrastructuredata-leakblueteam
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddyblueteamredteampurpleteam+1
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Guptainfrastructurewikileaksdata-leak+1
2011-02-15TalkNullcon Botnet Detection approach by DNS behavior and clustering analysis Presentation Nilesh Sharma, Pulkit Mehndirattabotnetanalysisdns+1
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnanopensourcebrowserweb+1
2010-10-13TalkHitb Sec Conf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shahwebredteamweb-application-security+5
2010-08-01TalkC0c0n End-point Security Laxi Eshwariblueteaminfrastructure
2010-08-01TalkC0c0n Last line of defense - Host Intrusion Prevention and Secure application development. Avinash Shenoiblueteaminfrastructure
2010-08-01TalkC0c0n VoIP Security Mukund Krishnamurthypurpleteamvoip
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmadnetworkwifiredteam+2
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patilbotnetblueteaminfrastructure
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochharmalwarewebblueteam
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desaiopensourcecryptographysteganography+1
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintalawebblueteam
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharmathreat_modelinginfrastructureblueteam
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbaraoblueteam
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dindeblueteaminfrastructure
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VCblueteam
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyaninetworkwifiinfrastructure+3
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shahblueteamwebfootprinting+3
2009-05-19TalkSyscan Securing Enterprise Applications Shreeraj Shahblueteamwebweb-application-security+13
2009-04-22TalkHitb Sec Conf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shahblueteamwebfootprinting+3
2009-03-16TalkCan Sec West On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil BhalodepentestblueteamAutomation
2009-02-19TalkBlackhat Blinded by Flash: Widespread Security Risks Flash Developers Don’t See Presentation Video Prajakta Jagdaleflashblueteamweb
2008-12-06TalkClubhack AntiSpam - Understanding the good, the bad and the ugly Presentation Aseem Jakharblueteamspam
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hattiblueteam
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohlisecure-developmentsecure-codingblueteam+2
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2008-10-29TalkHitb Sec Conf Top 10 Web 2.0 Attacks Presentation Video Shreeraj Shahblueteamweb-application-securityajax+8
2008-08-21TalkOwasp App Sec India AppSec For Managers Nish Bhallaappsecowaspweb+1
2008-08-20TalkOwasp App Sec India Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shahredteamblueteampurpleteam+4
2008-08-20TalkOwasp App Sec India Web Application Security: Too Costly To Ignore Presentation Rajesh Nayakappsecwebblueteam
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani, Billy Riosphishingblueteam
2008-04-16TalkHitb Sec Conf Securing Next Generation Applications Γ’β‚¬β€œ Scan, Detect and Mitigate Shreeraj Shahblueteamweb-application-securityajax+8
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shahredteamblueteampurpleteam+4
2007-12-09TalkClubhack Subtle Security flaws: Why you must follow the basic principles of software security Presentation Varun Sharmablueteaminfrastrusture
2007-11-20TalkDeepsec Web 2.0 Application Kung-Fu - Securing Ajax & Web Services Presentation Video Shreeraj Shahwebajaxweb-application-security+1
2007-08-01TalkBlackhat PISA: Protocol Identification via Statistical Analysis Presentation Whitepaper Rohit Dhamankaranalysisblueteamnetwork
2007-04-05TalkHitb Sec Conf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shahwebredteamblueteam+3
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhallawebblueteampurpleteam
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotiaanalysissecure-codingblueteam
2005-10-18TalkBlackhat Adware/Spyware Presentation Saumil Shahblueteamadwarespyware
2005-09-29TalkHitb Sec Conf Analyzing Code for Security Defects Presentation Nish Bhallacode-analysisblueteamsecure-coding
2005-09-26TalkHitb Sec Conf Web hacking Kung-Fu and Art of Defense Presentation Shreeraj Shahwebblueteam
2005-04-12TalkHitb Sec Conf Web Application Kung-Fu, The Art of Defense Presentation Shreeraj Shahwebblueteam
2005-04-10TalkHitb Sec Conf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singhnetworkredteamblueteam+2
2004-10-06TalkHitb Sec Conf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shahwebredteamblueteam+1
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookheywebblueteamintrusion-detection+1
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2003-12-12TalkHitb Sec Conf Defending Web Applications: Strategies, methods and practices Shreeraj Shahwebblueteamsecure-coding+2
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shahwebfingerprintingblueteam
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shahwebfingerprintingblueteam
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shahwebfingerprintingblueteam
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shahwebredteamblueteam+1
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Poplipentestprivacyblueteam