πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

βš™οΈ DevSecOps

DevSecOps and related activities

472
Contributors
423
Talks
190
Tool Demos
19
Panels
2
Keynotes
3
Awards

Top Contributors

Saumil Shah(22) Lavakumar Kuppan(18) Shreeraj Shah(14) Anant Shrivastava(9) Madhu Akula(9)

Related Tags (8)


All Entries (637 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat Cloud Sec AI BOT Nandan Gupta, K v Prashant, Swarup Natukula#cloud-security-posture-management#aws#azure+2
2025-12-11Tool demoBlackhat ReForge: Where Crashes Become Weapons Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Abinav Harsha, Danindu Gammanpilage#fuzzing#exploit-development#vulnerability-assessment+1
2025-12-10Tool demoBlackhat Catch the Flow: Securing CI/CD Workflows with Flowlyt Source Code Hare Krishna Rai, K v Prashant, Nandan Gupta#ci-cd#supply-chain#devsecops+1
2025-12-10Tool demoBlackhat Securing Secrets from Dev Machine to Deployments Using SLV Source Code Shibly Meeran, Sriram Krishnan, Keshav Kandasamy#devsecops#cicd-security#supply-chain
2025-12-10Tool demoBlackhat EKSi-lite: Simple & Lightweight EKS Cluster Listing & Security Tool Source Code Divyanshu Shukla, Anjali Singh Shukla#aws#kubernetes#cloud-security-posture-management+4
2025-12-10Tool demoBlackhat Kubernetes Goat – A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#container-security#cloud-pentesting+1
2025-12-10Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#penetration-testing-tools#docker#security-testing+1
2025-12-10Tool demoBlackhat SBOM Play Source Code Anant Shrivastava#sbom#supply-chain#vulnerability-assessment+1
2025-12-10Tool demoBlackhat Spotter – Universal Kubernetes Security Engine Source Code Madhu Akula#kubernetes#container-security#cloud-security-posture-management+1
2025-10-10TalkC0c0n Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits Source Code Suchith Narayan#supply-chain#supply-chain-attack#devsecops+1
2025-08-07Tool demoBlackhat Spotter – Universal Kubernetes Security Scanner & Policy Enforcer Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2025-08-07Tool demoBlackhat Kubernetes Goat - A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+3
2025-08-07Tool demoBlackhat Kubernetes Security Scanner Source Code Video Krishna Priya#kubernetes#cloud-workload-protection#container-security+4
2025-08-07Tool demoBlackhat Halberd : Multi-Cloud Agentic Attack Tool Source Code Arpan Abani Sarkar#cloud-access-security-broker#cloud-pentesting#security-testing+3
2025-08-07TalkBlackhat Weaponizing Apple AI for Offensive Operations Video Hari Shanmugam#ai#macos#ai-security+2
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Presentation Whitepaper Video Varun Sharma, Ashish Kurmi#ci-cd#incident-management#devsecops+2
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chaganti#web-security#secure-coding#security-assessment+2
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Manna#reverse-engineering#binary-analysis#code-analysis+4
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Datta#static-analysis#software-security#devsecops+2
2025-08-06TalkBlackhat Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience Presentation Video Shanit Gupta, Zhisheng Hu, Cooper De Nicola#automotive-cybersecurity#security-testing#control-systems
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishra#web-security#malware-detection#browser-security+2
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Whitepaper Video Akash Mukherjee, Saurabh Shintre#secure-development#devsecops#data-protection+1
2025-04-29TalkRsac XPIA Attacksβ€”Rethinking Defense in Depth for an AI-Powered World Video Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero#ai#ai-security#input-validation+3
2025-04-04Tool demoBlackhat Intro to CICDGuard - How to have visibility and security OF CICD ecosystem Source Code Pramod Rana#cicd-pipeline#cicd-security#secure-development+3
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-04-04Tool demoBlackhat Kubernetes Goat: A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2025-04-04Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2025-04-04Tool demoBlackhat RedInfraCraft : Automate Complex Red Team Infra Source Code Yash Bharadwaj, Manish Gupta#cloud-access-security-broker#cloud-compliance#cloud-pentesting+1
2025-04-04Tool demoBlackhat Agneyastra - Firebase Misconfiguration Detection Toolkit V2 Source Code Bhavarth Karmarkar, Devang Solanki#misconfiguration#cloud-pentesting#security-tools+1
2025-04-03TalkBlackhat ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! Video Vivek Balachandran, Nikhil Bartake, Zi Jie See Toh, Michael Kasper#secure-coding#quantum-computing#software-security
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-04-03Tool demoBlackhat KubeSF V1.2 - Kubernetes Security Posture Audit Suite Abhishek S, Ajith Prabhu#kubernetes#cloud-workload-protection#container-security+4
2025-04-03Tool demoBlackhat MobXplore Source Code Aman Pareek, Akarsh Singh#application-pentesting#ios-security#dynamic-analysis+4
2025-04-03Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Anikait Panigrahi, Aparna Balaji#fuzzing#ics-security#industrial-control-systems+2
2025-04-03Tool demoBlackhat SmuggleShield 2.0 - Basic Protection Against HTML Smuggling Source Code Dhiraj Mishra#application-pentesting#input-validation#security-testing
2025-04-03Tool demoBlackhat Halberd : Multi-Cloud Security Testing Tool Source Code Arpan Abani Sarkar#cloud-access-security-broker#cloud-pentesting#security-tools+2
2025-04-03Tool demoBlackhat VulnScout Samaksh K, Nimit Jain#automated-scanning#security-tools
2025-03-14TalkInsomnihack The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) Dhiraj Mishra#endpoint-protection#security-testing#malware-distribution
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishna#embedded-security#firmware-analysis#secure-coding+1
2025-03-02PanelNullcon From Code to Defense: Why Developers Are the New Security Leaders Vaibhav Gupta, Vikas Goyal, Hilal Lone, Gene Golovinsky#secure-development#secure-coding#security-testing+3
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Presentation Video Kumar Ashwin#secure-coding#devsecops#architecture
2025-03-01TalkNullcon Drawing parallels between iOS and macOS Pentesting with DVMA Source Code Vaibhav Lakhani#macos#ios#application-pentesting+3
2025-03-01TalkNullcon The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties Video Anto Joseph#bug-bounty#secure-development#security-testing+2
2025-03-01TalkNullcon MLOps Under Attack: Threat Modeling Modern AI Systems Presentation Sandeep Singh#ai#ml#ai-security+4
2025-03-01PanelNullcon AI in SecOps: Enhancing Incident Response with Intelligence Mrudul Uchil, Parag Deodhar, Felix Mohan#ai-security#ai#machine-learning+3
2025-03-01TalkNullcon MacOS Lockdown Mode: A Forensic Deep Dive Video Bhargav Rathod#macos#digital-forensics#endpoint-protection+3
2024-12-12Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#application-pentesting#code-review#secure-development+3
2024-12-12Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#cloud-workload-protection#security-testing+3
2024-12-12Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehri#genzai#iot-device-management#iot-pentesting+4
2024-12-11Tool demoBlackhat Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel Source Code Amit Parjapat, Vedant Wayal#android#application-pentesting#mobile-application-management+4
2024-12-11Tool demoBlackhat Open Source Tool to Shift Left Security Testing by Leveraging AI Shivam Rawat, Shivansh Agrawal#ai-security#secure-development#security-testing+2
2024-11-21TalkSecurityfest Wheels of Wonder Video Hrishikesh Somchatwar#automotive-cybersecurity#car-hacking#embedded-systems+4
2024-11-21TalkSecurityfest Breaking Container Boundary Using Side Channel Attack Video Adhokshaj Mishra#container-security#docker#security-testing+1
2024-11-16TalkC0c0n Invisible Invaders: Bypassing Email Security with Legitimate Tools Dhruv Bisani#bypassing#phishing#social-engineering+2
2024-11-16TalkC0c0n Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides Rakesh Seal, Diptisha Samanta#exploitation#ethical-hacking#network-pentesting+1
2024-11-16TalkC0c0n Serverless Phishing Factory: Automate, Attack, Adapt Yash Bharadwaj, Manish Gupta#phishing#serverless#cloud-workload-protection+2
2024-11-15TalkC0c0n PCI 4.0, Javascript Security for product security teams Video Anand Kumar Ganesan, Mohammad Arif#web-security#secure-coding#application-pentesting+2
2024-11-06TalkBlackalps IDAT Loader: The Malware’s Camouflaged Weapon Niranjan Jayanand#endpoint-protection#dynamic-analysis#security-testing
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singh#automated-scanning#vulnerability-assessment#security-assessment+2
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjit, Mangatas Tondang#blueteam#oauth#application-pentesting+4
2024-10-23Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Vishnu Dev, Vivek N J#fuzzing#ics-security#industrial-control-systems+1
2024-09-26TalkRootcon How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#application-hardening#cicd-pipeline+4
2024-08-29Tool demoHitbsecconf CICDGuard Source Code Pramod Rana#ci-cd#cicd-pipeline#cicd-security+3
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Video Vivek Ramachandran, Shourya Pratap Singh#web-security#security-assessment#application-pentesting+4
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#ssl#application-pentesting#secure-coding+3
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#swg#cloud-access-security-broker#application-pentesting+4
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2024-08-08Tool demoBlackhat Open Source LLM Security Source Code Ankita Gupta 1, Ankush Jain#ai-security#application-pentesting#security-testing+3
2024-08-08Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Anand Tiwari, Harsha Koushik#cloud-security-posture-management#cloud-pentesting#security-testing+1
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikh#red-teaming#ai-security#nlp+2
2024-08-07Tool demoBlackhat Hacking generative AI with PyRIT Source Code Video Raja Sekhar Rao Dheekonda#ai#ai-security#machine-learning+4
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigam#security-assessment#api-security#secure-development
2024-04-19Tool demoBlackhat AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud Source Code Sherin Stephen, Nishant Sharma, Rishappreet Singh Moonga#aws#ai-security#ai+4
2024-04-19Tool demoBlackhat GearGoat : Car Vulnerabilities Simulator Source Code Nishant Sharma, Pranjal Soni, Sanjeev Mahunta#car-hacking#iot-device-management#iot-pentesting+3
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2024-04-19Tool demoBlackhat Monitoring and Detecting Leaks with GitAlerts Source Code Nikhil Mittal 1#osint#data-leak#reconnaissance+1
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeran#blueteam#application-hardening#secure-coding+2
2024-04-18Tool demoBlackhat BinderAPI Scanner & BASS Source Code Krishnaprasad Subramaniam, Jeffrey Gaor, Valen Sai, Eric Tee Hock Nian#api-security#application-pentesting#dynamic-analysis+3
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2024-04-18TalkBlackhat Breaking Managed Identity Barriers In Azure Services Presentation Nitesh Surana, David Fiser#azure#cloud-pentesting#access-management+3
2024-04-18Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Version 2 Govind Krishna, Xian Xiang Chang#audit#application-pentesting#ai-security+4
2024-04-18Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#cloud-pentesting+3
2024-04-18Tool demoBlackhat R0fuzz Source Code Season Cherian, Vishnu Dev#fuzzing#ics-security#ics+2
2024-04-18Tool demoBlackhat findmytakeover - find dangling domains in a multi cloud environment Source Code Aniruddha Biyani#dns#cloud-workload-protection#cloud-pentesting+1
2024-03-12TalkNullcon Secure Web Gateways are dead. What’s next? Vivek Ramachandran#browser-security#application-hardening#security-strategy+2
2023-12-07Tool demoBlackhat Akto - Open Source API Security Tool Source Code Ankush Jain#api-security#secure-development#security-testing+3
2023-12-07Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Prateek Thakare, Bharath Kumar, Praveen Kanniah#red-teaming#asset-inventory#asset-management+2
2023-12-07Tool demoBlackhat Route53Sweep: Empowering AWS Route53 Security with Automated Scanning & Comprehensive Inventory Management Source Code Divyanshu Shukla, Anjali Singh Shukla#aws#cloud-access-security-broker#cloud-monitoring+2
2023-12-06TalkBlackhat AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers Presentation Video Ankit Gangwal, Shubham Singh, Abhijeet Srivastava#mobile-hacking#android-security#application-pentesting+2
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-12-06Tool demoBlackhat SSH into any device from anywhere with ZERO Open Network ports Source Code Anthony Prakash, Colin Constable#ssh#zero-trust#secure-development+1
2023-12-06Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Jeswin Mathai, Shourya Pratap Singh#threat-intelligence-analysis#application-pentesting#application-hardening+3
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben#vulnerability-assessment#honeypot#security-testing+2
2023-12-06Tool demoBlackhat Octopii v2 Source Code Owais Shaikh, Umair Nehri#ai#data-protection#nlp+4
2023-12-06Tool demoBlackhat AndroCop: One Click Forensic Investigation & Data Extraction Tool Abhinand N, Aswin M Guptha, Varun Nair#android#android-security#mobile-forensics+4
2023-10-13TalkHackfest Exploring RAM Forensic Analysis for Effective Digital Investigations Video Sneha Banerjee#forensics#memory-forensics#digital-forensics+2
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-09-23PanelNullcon SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAM’S JOURNEY TO EXCELLENCE Dinesh Varma, Satish Kumar Dwibhashi, Manoj Kumar#secure-development#security-tools#cicd-security+2
2023-09-23TalkNullcon Secure Coding: Fix From The Root Presentation Saddam Hussain, Gopika Subramanian#secure-coding#application-pentesting#code-review+4
2023-09-23TalkNullcon Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In iOS Presentation Shubham Sharma#ios#ios-security#application-pentesting+3
2023-09-23TalkNullcon Secure Your Angular App Using JWT And GraphQL Presentation Ankit Sharma#blueteam#api-security#secure-development+1
2023-09-23TalkNullcon Your App Is Probably A Spyware…Or Is It? Presentation Gaurav Gogia, Pandurang Patil#spyware#secure-development#security-testing+3
2023-09-23TalkNullcon How I hacked your bank account: A detailed look at UPI Security Video Abhay Rana#hacking#application-hardening#input-validation+2
2023-09-23TalkNullcon Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities Presentation Video Nitesh Surana#azure#cloud-pentesting#application-hardening+4
2023-09-16TalkRomhack Hacking into the iOS’s VOLTE implementation Video Hardik Mehta, Rajanish Pathak#ios#application-pentesting#security-testing
2023-08-25Tool demoHitbsecconf iGoat Source Code Swaroop Yermalkar#ios#application-pentesting#secure-coding+3
2023-08-25Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#dns#machine-learning#security-tools+1
2023-08-24Tool demoHitbsecconf Vajra Source Code Raunak Parmar#aws#azure#cloud-pentesting+3
2023-08-12Tool demoDefcon Open Source API Security for devsecops Source Code Ankush Jain, Ankita Gupta 1#api-security#devsecops#ci-cd+2
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Video Vandana Verma Sehgal, Viraj Gandhi#secure-development#devsecops#risk-management+2
2023-08-11TalkDefcon Getting a Migraine - uncovering a unique SIP bypass on macOS Presentation Video Anurag Bohra, Jonathan Bar Or, Michael Pearse#macos#endpoint-protection#bypassing+2
2023-08-10Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#sast#secure-development+4
2023-08-10TalkBlackhat AI Assisted Decision Making of Security Review Needs for New Features Presentation Mrityunjay Gautam, Pavan Kolachoor#ai#ai-security#deep-learning+3
2023-08-10Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#authorization#security-testing+3
2023-08-10Tool demoBlackhat MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments Source Code Aditya K Sood#ransomware#malware-detection#security-tools
2023-08-09Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Ajit Hatti#secure-coding#code-review#secure-development+1
2023-08-09Tool demoBlackhat Akto - Open Source API Security Tool Source Code Ankush Jain, Ankita Gupta 1#api-security#application-pentesting#security-testing+3
2023-08-09Tool demoBlackhat ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections Video Ankit Anurag, Ashwath Kumar, Manikandan Rajappan#cloud-access-security-broker#incident-management#security-tools+2
2023-08-09Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android-security#application-pentesting#dynamic-analysis+3
2023-08-09Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2023-08-09Tool demoBlackhat AntiSquat - An AI-Powered Phishing Domain Finder Source Code Owais Shaikh, Umair Nehri#ai#ai-security#phishing+2
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M G#devsecops#secure-development#static-analysis+3
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogi#smart-contracts#phishing#secure-coding+1
2023-08-07TalkC0c0n Shifting left blockchain development for safer DApps Video Dhanith Krishna#smart-contracts#secure-development#devsecops+2
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-08-06TalkC0c0n Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector Video Anshu Kumar, Pavan Sorab#devsecops#ci-cd#cicd-pipeline+2
2023-08-06TalkC0c0n Mitigating SSRF at scale the right way with IMDSv2! Video Ayush Priya#web-security#api-security#aws+2
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutani#secure-development#devsecops#software-security+3
2023-08-06TalkC0c0n Surviving In Dependency Hell Video Kumar Ashwin#secure-development#devsecops#software-security
2023-05-12Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#static-analysis#sast+2
2023-05-12Tool demoBlackhat GCPGoat : A Damn Vulnerable GCP Infrastructure Source Code Shantanu Kale, Rishappreet Singh Moonga, Ravi Verma, Govind Krishna#gcp#cloud-pentesting#cloud-workload-protection+4
2023-05-12Tool demoBlackhat Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration Source Code Ravi Rajput#automobile#automotive-cybersecurity#embedded-systems+4
2023-05-12Tool demoBlackhat eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF Source Code Sagar Bhure#dns#machine-learning#network-monitoring+2
2023-05-11Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Atharva Chincholkar, Srishti Chaubey#secure-coding#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat APKHunt | OWASP MASVS Static Analyzer Source Code Mrunal Chawda, Sumit Kalaria#owasp#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat KernelGoat Source Code Shivankar Madaan#kernel#secure-development#security-training
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-05-11Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhure, Shain Singh#encryption#quantum-computing#secure-development+3
2023-05-11Tool demoBlackhat AzureGoat : A Damn Vulnerable Azure Infrastructure Source Code Nishant Sharma, Dasari Yashwanth Babu#azure#cloud-pentesting#cloud-workload-protection+2
2023-05-11Tool demoBlackhat Damn Vulnerable Bank Source Code Rewanth Tammana, Hrushikesh Kakade, Akshansh Jaiswal#android-security#application-pentesting#dynamic-analysis+3
2023-05-11Tool demoBlackhat Kubernetes Goat: Interactive Kubernetes Security Learning Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2023-05-11Tool demoBlackhat CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansari#threat-hunting#windows#security-tools
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekar, Apoorva Phadke#secure-development#devsecops#software-security+2
2023-04-20TalkHitbsecconf BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES Presentation Video Rohan Aggarwal#hacking#hardware-hacking#bypassing+3
2023-03-23TalkInsomnihack How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#devsecops#supply-chain-security+3
2023-03-09PanelNullcon How to make security easier for your developers Video Santosh Yadav, Frida Kiriakos, Marie Theresa Brosig, Xavier Rene Corail#secure-development#security-testing#secure-coding+3
2023-03-09PanelNullcon Elements of a Successful Security Strategy: A Comprehensive Approach Video Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock#security-strategy#security-testing#secure-development+4
2023-01-26TalkUsenix Building an Automated Machine for Discovering Privacy Violations at Scale Video Suchakra Sharma#static-analysis#secure-coding#data-protection+2
2022-12-08Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+4
2022-12-07Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#application-pentesting#secure-development+4
2022-12-07TalkBlackhat Cross-Contract Ricochet Attacks & Off-Chain-On-Chain Manipulation of Billion Dollar NFT Collections Presentation Nitesh Dhanjani#exploit#smart-contracts#solidity+4
2022-12-07Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+1
2022-09-28TalkRootcon AWSGoat : A Damn Vulnerable AWS Infrastructure Presentation Video Jeswin Mathai, Shantanu Kale, Sanjeev Mahunta#aws#cloud-pentesting#cloud-workload-protection+4
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Ali#web-security#static-analysis#sast+1
2022-09-23TalkC0c0n Hacking SmartContracts Anto Joseph#smart-contracts#reverse-engineering#secure-coding
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathi#secure-development#devsecops#software-security+2
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju K#secure-development#risk-management#architecture
2022-09-23TalkC0c0n Common Misconfigurations in your Kubernetes Cluster and What can you do about it? Kumar Ashwin#kubernetes#cloud-workload-protection#container-security+4
2022-09-23TalkC0c0n Hyperledger Fabric & Ethereum Apps: Security Deep Dive Alex Devassy, Dhanith Krishna#smart-contracts#solidity#decentralized-systems+2
2022-09-23TalkC0c0n Securing your APIs for a cloud native future Navendu Pottekkat#api-security#secure-development#devsecops
2022-09-08TalkNullcon Pushing Security Left By Mutating Byte Code Presentation Video Gaurav Gogia#secure-coding#application-hardening#static-analysis+1
2022-09-08TalkNullcon Raining CVEs On WordPress Plugins With Semgrep Presentation Video Shreya Pohekar, Syed Sheeraz Ali#static-analysis#code-review#secure-coding+3
2022-09-08TalkNullcon Web3.0 - Smart Contracts Could Be Leaky Presentation Video Riddhi Shree#smart-contracts#web3#decentralized-systems+3
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software – One bug at a time Video Sandeep Singh, Laurie Mercer#open-source-security#supply-chain#code-review+4
2022-09-08Tool demoNullcon ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs Presentation Rohit Sehgal, Varun Kakumani#owasp#api-security#cloud-workload-protection+3
2022-09-07TalkNullcon Scale hacking to secure your cloud and beyond Video Anand Prakash#cloud-pentesting#cloud-security-posture-management#container-security+4
2022-09-07TalkNullcon Do PDF Tools Conform To The Specification? Presentation Video Prashant Anantharaman#pdf#data-protection#static-analysis+4
2022-09-07TalkNullcon ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron Video Mohan Sri Rama Krishna Pedhapati, Maxwell Garrett#red-teaming#application-pentesting#dynamic-analysis+4
2022-09-07TalkNullcon Hacking 5G Is No Rocket Science Presentation Video Altaf Shaik, Matteo Strada#api-security#application-pentesting#security-testing
2022-09-07TalkNullcon Hacking Android Foreground Services Escalation Of Privileges Presentation Video Rony Das#android#android-security#mobile-hacking+3
2022-09-06PanelNullcon Securing the Software Video Mrudul Uchil, Abhisek Datta, Harish Goel, Matthew Bohne#software-security#secure-development#security-testing+3
2022-09-06PanelNullcon Consumer Tech Bug Bounty Panel: Hear from the Program Managers Video Sandeep Singh, Rishika Hooda, Omar Benbouazza#bug-bounty#security-testing#application-hardening+3
2022-08-26TalkHitbsecconf CAN A FUZZER MATCH A HUMAN Presentation Bhargava Shastry#fuzzing#solidity#smart-contracts+4
2022-08-25TalkHitbsecconf MPT: Pentest In Action Presentation Video Jyoti Raval#security-assessment#application-pentesting#asset-management+2
2022-08-13PanelDefcon Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs Niru Ragupathy#security-development-lifecycle#security-tools#incident-management+2
2022-08-12PanelDefcon Agility Broke AppSec. Now It’s Going to Fix It. Video Vandana Verma Sehgal, Roy Erlich, Emil Vaagland, Seth Kirschner#security-testing#secure-development#cicd-pipeline
2022-08-12TalkDefcon Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years Video Vivek Ponnada#secure-coding#devsecops#owasp
2022-08-11Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+4
2022-08-11TalkBlackhat Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol Presentation Whitepaper Subhechha Subudhi, Clara Maine, Akke Toeter, Victoria Bosch#zero-day#smart-contracts#security-development-lifecycle+2
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikh#ai#ai-security#data-protection+4
2022-08-11TalkBlackhat ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron Presentation Mohan Sri Rama Krishna Pedhapati, Aaditya Purani, Max Garrett, William Bowling#red-teaming#application-pentesting#code-review+4
2022-08-10Tool demoBlackhat ArcherySec - Manage and Automate your Vulnerability Assessment Source Code Anand Tiwari#application-pentesting#ci-cd#dynamic-analysis+3
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Source Code Ajit Hatti#secure-coding#secure-development#security-tools+3
2022-08-10TalkBlackhat Attacks From a New Front Door in 4G & 5G Mobile Networks Presentation Video Altaf Shaik, Shinjo Park, Matteo Strada#api-security#access-management#identity-theft+4
2022-08-10Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#code-review#secure-development+4
2022-08-10Tool demoBlackhat AWSGoat : A Damn Vulnerable AWS Infrastructure Source Code Nishant Sharma, Jeswin Mathai, Sanjeev Mahunta#aws#cloud-pentesting#cloud-workload-protection+4
2022-08-10Tool demoBlackhat AzureGoat : A Damn Vulnerable Azure Infrastructure Source Code Jeswin Mathai, Nishant Sharma, Rachna Umaraniya#azure#cloud-pentesting#cloud-workload-protection+3
2022-08-10Tool demoBlackhat HazProne : Cloud Hacking Source Code Devansh Patel, Staford Titus S#cloud-pentesting#cloud-workload-protection#aws+4
2022-08-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Amrudesh Balakrishnan, Rahul Sani, Abhishek Jm#android#android-security#application-pentesting+4
2022-08-10Tool demoBlackhat CANalyse (2.0): A vehicle network analysis and attack tool Source Code Kartheek Lade, Rahul Jeyasingh#automobile#car-hacking#iot-device-management+4
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Manna#reverse-engineering#dynamic-analysis#network-pentesting+4
2022-08-10Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+3
2022-06-07TalkRsac Continuous Security - Integrating Pipeline Security Presentation Vandana Verma Sehgal#ci-cd#cicd-pipeline#cicd-security+3
2022-06-01TalkSecurityfest Exploitation and automated detection of threats to modern cloud infrastructure Video Krishnaa Srinivasa, Maithri Nadig#aws#vulnerability-assessment#cloud-monitoring+4
2022-05-12Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2022-05-12Tool demoBlackhat Node Security Shield Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+3
2022-05-12Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#secure-development+1
2022-04-08TalkNullcon Bheem OS - A next-generation reasonably secure OS using Rust MicroVM Video Akram Ansari, Subash Sn#os#virtual-machine#container-security+3
2022-04-08TalkNullcon Attack Surfaces for 5G Networks Video Altaf Shaik#application-pentesting#security-development-lifecycle#api-security
2021-11-18TalkHackinparis Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS Kavisha Sheth#aws#cloud-workload-protection#cloud-pentesting+3
2021-11-13TalkC0c0n Server-side javascript Injection Presentation Kavisha Sheth#web-security#secure-coding#web-pentesting
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgal#code-review#static-analysis#reverse-engineering+2
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singh#incident-management#digital-forensics#forensics+3
2021-11-11Tool demoBlackhat Kubernetes Goat: Interactive Kubernetes Security Learning Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2021-11-11Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10) Source Code Tushar Kulkarni#api-security#application-pentesting#security-testing+4
2021-11-11Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android#android-security#application-pentesting+3
2021-11-10Tool demoBlackhat Kubestriker: A Blazing Fast Security Auditing Tool Source Code Vasant Kumar#kubernetes#cloud-workload-protection#container-security+3
2021-10-15TalkRootcon The Curious case of knowing the unknown Video Vandana Verma Sehgal#secure-coding#devsecops#software-security
2021-08-27TalkHitbsecconf Securing Webviews and The Story Behind CVE-2021–21136 Presentation Video Shiv Sahni, Imdadullah Mohammed#android-security#secure-coding#security-testing+2
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishna#secure-coding#security-assessment#ethical-hacking+2
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnada, Sarah Fluchs#ics-security#secure-coding#control-systems+1
2021-08-07Tool demoDefcon Tenacity- An Adversary Emulation Tool for Persistence Video Atul Nair, Harshal Tupsamudre#incident-management#security-testing#attack-surface
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest#security-testing#incident-management#red-teaming+3
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Verma#security-assessment#vulnerability-assessment#application-pentesting+1
2021-08-05TalkBlackhat The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks Presentation Ambrish Rawat, Killian Levacher, Mathieu Sinn#ai#ai-security#deep-learning+4
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2021-08-04Tool demoBlackhat Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool Source Code Pralhad Chaskar, Vasant Kumar#kubernetes#cloud-workload-protection#container-security+4
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekonda, Will Pearce#vulnerability-assessment#ai-security#machine-learning+2
2021-08-04Tool demoBlackhat ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing Source Code Parbati Kumar Manna#reverse-engineering#application-pentesting#code-review+4
2021-08-04TalkBlackhat Siamese Neural Networks for Detecting Brand Impersonation Presentation Jugal Parikh, Nitin Kumar Goel, Justin Grana, Yuchao Dai#impersonation#ai-security#deep-learning+4
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkar, Mauricio Espinosa#network-defense#application-pentesting#attack-surface+1
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dash#kubernetes#audit#secure-coding+1
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithane#windows#process-injection#blueteam+1
2021-03-06TalkNullcon Bug hunter adventures Video Shreyas Dighe, Yuvraj Dighe#bug-hunting#application-pentesting#bug-bounty+3
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwari#blueteam#security-assessment#ci-cd
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky#embedded-systems#firmware-analysis#static-analysis+1
2020-09-18TalkC0c0n Introducing SniperPhish: A Web-Email Spear Phishing Toolkit Source Code Video Sreehari Haridas, Gem George#phishing#application-pentesting#security-development-lifecycle+4
2020-09-18TalkC0c0n Web Application hacking with WebZGround Video Parveen Yadav, Narendra Kumar#web-security#web-pentesting#security-assessment+3
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giri#bug-hunting#bug-bounty#security-testing+3
2020-09-18TalkC0c0n Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment Source Code Video Madhu Akula#kubernetes#red-teaming#cloud-workload-protection+3
2020-09-18TalkC0c0n Broken Cryptography & Account Takeover Harsh Bothra#encryption#ssl#security-testing+2
2020-09-18KeynoteC0c0n Data protection and Privacy Data protection and Privacy Video Kris Gopalakrishnan#ai-security#data-protection#identity-theft+2
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-08-22TalkThedianainitiative Hacking into Android Ecosystem Video Aditi Bhatnagar#android#android-security#application-pentesting+3
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgal#owasp#secure-development#devsecops+3
2020-08-06Tool demoBlackhat MSTICpy: The Security Analysis Swiss Army Knife Source Code Ashwin Patil, Pete Bryan, Ian Hellen#digital-forensics#incident-management#data-analytics+3
2020-07-26TalkHitbsecconf Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company Himanshu Sharma, Aman Sachdev#red-teaming#application-pentesting#incident-management+2
2020-03-07PanelNullcon Hack the law: Protection for cybersecurity research in India Video Apar Gupta, Manu Zacharia, Raman Jit Singh Chima, Neelu Tripathy#cyber-law#cybersecurity-strategy#security-development-lifecycle
2020-03-06Tool demoNullcon Talisman Source Code Suhas Vishwanath#secure-development#macos#linux+3
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahan#linux#secure-coding#web-security+3
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2020-03-06Tool demoNullcon Callidus Source Code Chirag Savla#red-teaming#azure#application-pentesting+2
2020-03-06Tool demoNullcon spike2kill Source Code Manish Singh#web-scraping#ai-security#nlp+4
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Gupta#red-teaming#security-assessment#network-architecture+2
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2019-12-04Tool demoBlackhat DumpTheGit Source Code Malkit Singh#reconnaissance#data-leak#data-protection+1
2019-11-01TalkAppsecdayaustralia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-11-01TalkHackfest The Mechanics of Malware’s Darkside Presentation Video Yagnesh Waran P, Laura Harris#dynamic-analysis#static-analysis#security-testing+1
2019-10-17TalkHitbsecconf Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure Presentation Video Anima Anandkumar#ai#deep-learning#data-analytics+1
2019-10-16Tool demoHitbsecconf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shah#arm#linux#firmware-analysis+4
2019-10-10TalkBrucon Security transition from 4G to 5G: are we secure enough? Presentation Video Altaf Shaik, Ravishankar Borgaonkar#5g#4g#network-architecture+3
2019-09-28TalkRomhack Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it Presentation Video Samit Anwer#oauth#phishing#csrf+2
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singh#code-review#secure-coding#static-analysis+3
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastava#security-assessment#red-teaming#secure-coding
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharma#secure-coding#security-assessment#serverless+4
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurien#financial-institutions#secure-development#risk-management+2
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathan#devsecops#secure-development#software-security+2
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hatti#authentication#identity-management#secure-development+1
2019-09-27PanelC0c0n Shouldn’t Organization disclose breaches - The need for a shared platform Video Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary#data-leak#data-protection#security-testing+4
2019-09-13Talk44con One Person Army – Playbook on how to be the first Security Engineer at a company Video Kashish Mittal#devsecops#application-hardening#secure-development+4
2019-09-13TalkGlobalappsec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#purpleteam#cloud-workload-protection#serverless+3
2019-09-12KeynoteGlobalappsec Making a Change, One at a time - Diversity: More than just Gender Vandana Verma Sehgal#security-training#human-factor#cybersecurity-strategy+3
2019-08-30TalkHitbsecconf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshi#secure-coding#red-teaming#blueteam+1
2019-08-11TalkDefcon Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants Presentation Vandana Verma Sehgal#devsecops#secure-development#ci-cd+2
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkar#ios-security#application-pentesting#security-assessment+3
2019-08-08TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#ci-cd#cicd-pipeline+4
2019-08-08TalkBlackhat Preventing Authentication Bypass: A Tale of Two Researchers Presentation Ravi Jaiswal, Terry Zhang, Ron Chan#security-development-lifecycle#identity-management#authentication+4
2019-08-08Tool demoBlackhat CSF: Container Security Framework Source Code Vaibhav Gupta#blueteam#container-security#docker+2
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Presentation Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#application-hardening+4
2019-08-07Tool demoBlackhat Medaudit: Auditing Medical Devices and Healthcare Infrastructure Source Code Anirudh Duggal#security-assessment#application-pentesting#network-architecture+1
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hatti#incident-management#threat-hunting#ssl+1
2019-06-02Tool demoDefcon VoIPShark: Open Source VoIP Analysis Platform Presentation Source Code Video Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#sip#network-pentesting+1
2019-05-21TalkPhdays Breaking Microsoft Edge extensions security policies Presentation Nikhil Mittal#application-pentesting#code-review#security-testing+2
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshi#red-teaming#machine-learning#api-security+3
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2019-05-09TalkHitbsecconf GDALR: Duplicating Black Box Machine Learning Models Presentation Video Rewanth Tammana, Nikhil Joshi#machine-learning#red-teaming#api-security+2
2019-05-04TalkThotcon What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing Priyank Nigam#frida#application-pentesting#dynamic-analysis+3
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2019-03-28TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#secure-coding#ci-cd+3
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargava#secure-coding#blueteam#application-pentesting+4
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhuni, Izar Tarandach#secure-coding#threat-modeling#red-teaming
2019-03-21TalkTroopers Evolution of kernel fuzzers in NetBSD Presentation Video Siddharth M#red-teaming#fuzzing#security-development-lifecycle
2019-03-02PanelNullcon The Myth of Sisyphus Secure Product Development Video Bipin Upadhyay, Minatee Mishra, Neelu Tripathy, Vaibhav Gupta, Vishal Sahani#secure-development#secure-coding#security-testing+3
2019-03-02PanelNullcon Navigating Risk in the Changing Business and Technology Landscape Video Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil#risk-management#cybersecurity-strategy#business-resilience+4
2019-03-02PanelNullcon CISO Strategy for OT and IoT risk and Threat Management Video Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal#ics-security#iot-pentesting#cybersecurity-strategy+3
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desai#secure-coding#security-assessment#dynamic-analysis+4
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharaman#blueteam#secure-development#input-validation+4
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjve#red-teaming#application-pentesting#network-architecture+2
2019-02-28TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Video Lavakumar Kuppan, Ankit Gupta#security-assessment#application-pentesting#application-hardening+3
2018-12-06Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Sagar Popat, Harsh Grover#security-assessment#rest-api#ci-cd
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli#secure-coding#blueteam#application-hardening+4
2018-12-05Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Mohan Kallepalli#audit#security-testing#secure-development+4
2018-11-27TalkHitbsecconf BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit Presentation Source Code Video Rewanth Tammana#red-teaming#application-pentesting#browser-security+2
2018-10-19TalkAppsecdayaustralia Continuous Integration and Delivery with Docker Containers Video Vasant Kumar#docker#blueteam#container-security+4
2018-10-19TalkAppsecdayaustralia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargav#threat-modeling#devsecops#application-hardening+4
2018-10-05TalkC0c0n DomGoat - the DOM Security Playground Source Code Lavakumar Kuppan#xss#web-security#input-validation+4
2018-10-05TalkC0c0n Pentesting GraphQL Applications Presentation Source Code Neelu Tripathy#security-assessment#application-pentesting#dynamic-analysis+4
2018-10-05TalkC0c0n Unconventional vulnerabilities in Google Cloud Platform Pranav Venkat#gcp#red-teaming#cloud-pentesting+3
2018-10-05TalkC0c0n Using Fault Injection for Forensics Yashin Mehaboobe#forensics#digital-forensics#security-testing+2
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaan#aws#secure-coding#web-security+2
2018-09-27TalkRootcon Bug Bounty Hunting on Steroids Presentation Video Anshuman Bhartiya#bug-hunting#bug-bounty#security-tools+3
2018-09-12Talk44con Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#security-tools+3
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura#security-assessment#architecture#application-hardening+4
2018-08-11Tool demoDefcon Archeryβ€”Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-11Tool demoDefcon Sh00tβ€”An open platform for manual security testers & bug hunters Source Code Pavan Mohan#security-assessment#bug-hunting#secure-coding+1
2018-08-11Tool demoDefcon HealthyPiβ€”Connected Health Source Code Ashwin Whitchurch#raspberry-pi#hardware-embedded#embedded-systems+4
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-09Tool demoBlackhat Jackhammer: One Security Vulnerability Assessment/Management Tool Source Code Madhusudhan Konda, Rajagopal Vr, Shreyas Chidambara#azure#aws#gcp+3
2018-08-09Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Sagar Popat, Mohan Kallepalli#audit#security-testing#automated-scanning+4
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-08Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Ankur Bhargava, Prajal Kulkarni, Sagar Popat#security-assessment#rest-api#api-security+4
2018-08-08Tool demoBlackhat ThreatPlaybook Source Code Abhay Bhargav, Sharath Kumar#threat-modeling#ci-cd#security-development-lifecycle+4
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hatti#blueteam#secure-coding#smart-contracts+4
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumar#secure-development#architecture#devsecops
2018-05-13TalkDefcon Androsia: Securing ‘Data in Process’ for your Android Apps Presentation Whitepaper Video Samit Anwer#android#blueteam#android-security+4
2018-03-22Tool demoBlackhat Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data Source Code Samit Anwer#android#blueteam#application-hardening+4
2018-03-22TalkBlackhat XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Presentation Video Ravi Sahita, Daiping Liu, Mingwei Zhang#blueteam#application-hardening#code-review+4
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharla#secure-development#data-protection#architecture
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2018-03-01TalkNullcon Security through obscurity and fear Presentation Video Abhinav Srivastava#application-pentesting#secure-development#security-testing+3
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singh#ai#blueteam#ai-security+3
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajan#phishing#blueteam#anti-phishing+1
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-12-07Tool demoBlackhat DataSploit - OSINT Framework Source Code Shubham Mittal#osint#reconnaissance#security-tools+2
2017-10-19TalkHacklu Are your VoLTE and VoWiFi calls secure? Video Sreepriya Chalakkal#volte#vowifi#sip+2
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkar#vulnerability-assessment#security-assessment#secure-coding+1
2017-09-21TalkAppsecusa Androsia: A tool for securing in memory sensitive data Video Samit Anwer#android-security#static-analysis#secure-coding
2017-09-21TalkAppsecusa iGoat – A Self Learning Tool for iOS App Pentesting and Security Video Swaroop Yermalkar#ios#application-pentesting#ios-security+4
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan#secure-development#risk-management#architecture
2017-08-19PanelC0c0n Security in Banking - Being one step aheadt Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony#financial-institutions#secure-development#security-strategy
2017-08-18TalkC0c0n Androsia: A tool for securing in memory sensitive data Source Code Samit Anwer#secure-coding#android#security-assessment
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkar#ios#security-assessment#blueteam+1
2017-08-18TalkC0c0n Case study: Security of Digital Wallet apps in India Ashwath Kumar, Sandesh Mysore Anand#appsec#mobile-pentesting#application-hardening+4
2017-08-18TalkUsenix DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Presentation Whitepaper Video Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna#linux#kernel#static-analysis+4
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotra#red-teaming#malware-research#bypassing+2
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Gupta#bluetooth#red-teaming#mobile-hacking+3
2017-08-18TalkC0c0n Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis Furqan Khan, Siddharth Anbalahan#machine-learning#security-assessment#nlp+4
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michael#blueteam#iot-device-management#iot-pentesting+4
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhan#aws#blueteam#cloud-monitoring+4
2017-08-18TalkC0c0n The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ Rushikesh D Nandedkar#wifi#network-pentesting#security-tools+1
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2017-07-27Tool demoBlackhat Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday Source Code Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Rao#fuzzing#rest-api#security-assessment+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hatti#secure-coding#reconnaissance#encryption+3
2017-07-27Tool demoBlackhat Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes Source Code Anshuman Bhartiya#security-assessment#bug-hunting#cloud-workload-protection+3
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Mane#ics-security#security-assessment#embedded-systems+4
2017-07-26Tool demoBlackhat Devknox - Autocorrect Security Issues from Android Studio Source Code Subho Halder#android#code-analysis#secure-coding
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abraham#blueteam#secure-development#sqli+4
2017-04-14TalkHitbsecconf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#data-protection+3
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-03-30Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Shubham Mittal#osint#reconnaissance#security-tools+3
2017-03-30Tool demoBlackhat Devknox - Autocorrect Security Issues from Android Studio Source Code Subho Halder#android#code-analysis#secure-coding
2017-03-04PanelNullcon Application Security Opportunities and Challenges in a DevOps World Video Abhay Bhargav, Ajay Bongirwar, Arun Jadhav, Pravesh Sharma, Adam Leaonard#secure-development#security-testing#dynamic-analysis+3
2017-03-03TalkNullcon DevOpSec: Rapid Security in the Cloud with AWS and CIS Presentation Video Mikhail Advani, Rajesh Tamhane#devsecops#aws#cloud-compliance+4
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Presentation Swamy Shivaganga Nagaraju#windows#blueteam#security-development-lifecycle+2
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2017-03-03TalkNullcon Hacking medical devices and infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#security-testing
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machiraju#ml#security-assessment#application-pentesting+4
2017-01-25TalkOwaspappseccalifornia DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shirali, Srinivasa Rao Chirathanagandla#dynamic-analysis#dast#devsecops+2
2016-11-11TalkDeepsec Human vs Artificial intelligence – Battle of Trust Video Hemil Shah#ai#application-pentesting#application-hardening+4
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittal#blueteam#amsi#endpoint-protection+1
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2016-11-03Tool demoBlackhat DataSploit Presentation Source Code Shubham Mittal, Nutan Kumar Panda#osint#reconnaissance#security-tools+3
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-14TalkAppsecusa Automating API Penetration Testing using fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi#fuzzing#api-security#application-pentesting+4
2016-10-14TalkAppsecusa DevOps to DevSecOps: a 2-dimensional view of security for DevOps Presentation Sanjeev Sharma#application-hardening#secure-coding#security-development-lifecycle+3
2016-10-13TalkAppsecusa Lightning Talk - Demystifying Windows Application Rupali Dash#windows#application-hardening#secure-coding+4
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-09-23TalkRootcon Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomas#secure-coding#reconnaissance#red-teaming+1
2016-08-19TalkC0c0n App Sec in the Time of Docker Containers Akash Mahajan#docker#application-pentesting#container-security+4
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratap#red-teaming#ethical-hacking#exploit-delivery+2
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikar#xss#red-teaming#code-injection+3
2016-08-19TalkC0c0n SSD Forensics : A Nightmare for Forensic Investigators Santosh Khadsare#forensics#memory-forensics#incident-management+2
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2016-08-06Tool demoDefcon Android-InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-08-04Tool demoBlackhat Droid-FF: Android Fuzzing Framework Source Code Anto Joseph#android#fuzzing#secure-coding+1
2016-08-04Tool demoBlackhat Maltese (Malware Traffic Emulating Software) Source Code Sasi Siddharth#dns#secure-coding#malware-detection+2
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2016-08-03Tool demoBlackhat Android-InsecureBankv2 Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-05-26TalkHitbsecconf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvi, Tony Trummer#android#ios#security-assessment+2
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul Sasi#ai#blueteam#ai-security+4
2016-04-01Tool demoBlackhat LIMON-SANDBOX FOR ANALYZING LINUX MALWARES Presentation Whitepaper Source Code Monnappa K A#linux#dynamic-analysis#static-analysis+2
2016-03-15TalkGroundzerosummit Web App Security Harpreet Singh, Himanshu Sharma, Nipun Jaswal#web-security#api-security#secure-coding+3
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggal#red-teaming#blueteam#application-pentesting+1
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul Sasi#blueteam#ml#application-pentesting+4
2015-11-19TalkDeepsec Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. Video Nikhil Mittal#red-teaming#ci-cd#cicd-security+3
2015-11-13TalkBlackhat Continuous Intrusion: Why CI tools are an Attacker’s Best Friends Presentation Video Nikhil Mittal#red-teaming#ci-cd#application-pentesting+4
2015-11-05TalkGroundzerosummit XSS - The art of evading web application filters! Anirudh Anand#xss#application-pentesting#input-validation+2
2015-11-05TalkGroundzerosummit Elliptical Curve Cryptography Aneesha S#encryption#elliptic-curve-cryptography#secure-development+1
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-11-05TalkGroundzerosummit Authentication flaw in Automatic Bank Passbook printing machine. Indrajeet Bhuyan#authentication#identity-management#application-pentesting+3
2015-11-05TalkGroundzerosummit Thanks for the free cookies Anshul Saxena, Nishant Yadav#red-teaming#application-pentesting#security-testing
2015-11-05TalkGroundzerosummit Trailing Terror in the Darknets Shesh Sarangdhar#deep-web#tor#cryptocurrency+1
2015-11-05TalkGroundzerosummit chellam – a Wi-Fi IDS/Firewall for Windows Vivek Ramachandran#wifi#firewall#ids+3
2015-11-05TalkGroundzerosummit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Panda#osint#deep-web#data-leak+4
2015-10-21TalkHacklu Stegosploit - Delivering Drive-By Exploits With Only Images Presentation Saumil Shah#red-teaming#steganography#application-pentesting+1
2015-10-08TalkBrucon The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#network-pentesting#security-testing+2
2015-08-05Tool demoBlackhat PixelCaptcha: A unicode based captcha scheme Whitepaper Source Code Gursev Singh Kalra#secure-coding#application-hardening#input-validation+3
2015-08-01TalkC0c0n NoPo - The NoSQL HoneyPot Framework Source Code Francis Alexander#secure-coding#application-pentesting#security-testing+2
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastava#owasp#blueteam#security-testing+4
2015-08-01TalkC0c0n From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) Anto Joseph#android#mobile-device-management#embedded-systems+2
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddi#red-teaming#application-pentesting#attack-surface+2
2015-08-01TalkC0c0n Demystifying and Breaking BLE Yashin Mehaboobe#bluetooth#mobile-hacking#exploit-delivery+1
2015-08-01TalkC0c0n Hacking RFIDs under 2000 INR Jayesh Chauhan, Divya S John#rfid#hardware-embedded#embedded-systems+3
2015-07-06TalkBlackhat DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS Presentation Video Ahamed Nafeez#red-teaming#xss#application-pentesting+2
2015-06-16TalkBlackhat The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvi, Tony Trummer#ssl#mobile-application-management#application-pentesting+1
2015-05-28TalkHitbsecconf The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvi, Tony Trummer#ssl#security-assessment#mobile-application-management+1
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohanty#blueteam#code-review#secure-coding+4
2015-05-26TalkPhdays iOS Application Exploitation Presentation Prateek Gianchandani, Egor Tolstoy#ios#red-teaming#application-pentesting+4
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanian#blueteam#security-tools#automated-scanning+2
2015-03-15TalkDefcon TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS Lavakumar Kuppan#fuzzing#application-pentesting#dynamic-analysis+1
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay#secure-development#devsecops#security-compliance+3
2015-02-06TalkNullcon Pentesting a website with million lines of Javascript Presentation Lavakumar Kuppan, Ahamed Nafeez#web-security#security-assessment#application-pentesting+2
2015-02-06TalkNullcon Toliman, a Hadoop Pentesting Tool Source Code Jitendra Chauhan#security-assessment#security-tools#cloud-workload-protection+2
2015-01-27TalkOwaspappseccalifornia The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Video Devdatta Akhawe#web-security#xss#csrf+2
2014-11-21TalkDeepsec Mobile SSL Failures Video Tushar Dalvi, Tony Trummer#ssl#android-security#ios-security+3
2014-11-13TalkGroundzerosummit Cyber ‘BrahMos’ - Static analysis driven secure coding Joy Sen#secure-coding#static-analysis#sast+4
2014-11-13TalkGroundzerosummit Attacking Web-Proxies like never before Ahamed Nafeez#red-teaming#application-hardening#security-testing
2014-11-13TalkGroundzerosummit Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF Bhaumik Merchant#red-teaming#application-pentesting#security-testing+1
2014-11-13TalkGroundzerosummit Fuzzing Asynchronous Protocols built over Websockets Lavakumar Kuppan#fuzzing#red-teaming#application-pentesting+2
2014-11-13TalkGroundzerosummit How I won Browser Fuzzing Amol Naik#fuzzing#red-teaming#security-testing+4
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-09-24TalkBrucon OWASP: OWTF Source Code Video Bharadwaj Machiraju#security-assessment#application-pentesting#dynamic-analysis+2
2014-09-11Talk44con Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#imsi#endpoint-protection#security-tools
2014-08-22TalkC0c0n My tryst with Source Code Review Presentation Anant Shrivastava#code-review#secure-coding#security-testing
2014-08-22TalkC0c0n Still Single with a bleeding heart (Tool Release) Tamaghna Basu#secure-development#application-pentesting#secure-coding+1
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Gupta#purpleteam#mobile-application-management#mobile-hacking+4
2014-08-22TalkC0c0n Exploiting NoSQL Like Never Before Francis Alexander#red-teaming#application-pentesting#security-testing
2014-08-22TalkC0c0n Lesser Known Attack - XML Injection Amol Naik#red-teaming#application-pentesting#code-review+3
2014-08-21TalkUsenix The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhawe, Zhiwei Li, Warren He, Dawn Song#web-security#xss#csrf+2
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Sood#red-teaming#security-assessment#ics-security+3
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexander#secure-coding#security-assessment#application-pentesting+4
2014-03-15TalkHitbsecconf JS Suicide: Using Javascript Security Features to Kill Itself Presentation Ahamed Nafeez#web-security#application-pentesting#code-review+3
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwate#reverse-engineering#security-assessment#security-testing
2014-02-15Tool demoNullcon DrupSnipe Ranjeet Sengar, Sukesh Pappu#drupal#security-assessment#application-pentesting+2
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon OWASP OWTF - The Offensive (Web) Testing Framework Source Code Bharadwaj Machiraju, Abraham Aranguren#security-assessment#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon XMLChor Source Code Harshal Jamdade#exploitation#web-pentesting#security-tools
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekar#glibc#red-teaming#blueteam+2
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalani#blueteam#application-hardening#application-pentesting+4
2014-02-14TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Presentation Video Ankita Gupta, Lavakumar Kuppan#security-assessment#application-pentesting#security-development-lifecycle+3
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwate#scada#blueteam#ics-security+4
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2013-11-21TalkAppsecusa Wassup MOM? Owning the Message Oriented Middleware Video Gursev Singh Kalra#api-security#secure-coding#application-pentesting
2013-11-21TalkDeepsec Automation In Android & iOS Application Security Review Presentation Hemil Shah#android#ios#application-pentesting+4
2013-11-20TalkAppsecusa Why is SCADA Security an Uphill Battle? Video Amol Sarwate#scada#application-pentesting#application-hardening+4
2013-11-20PanelAppsecusa Aim-Ready-Fire Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather#appsec#secure-development#security-strategy
2013-11-20TalkAppsecusa Project Talk: OWASP OpenSAMM Project Presentation Pravir Chandra, Seba Deleersnyder#software-security#secure-development#devsecops+4
2013-11-07TalkGroundzerosummit How I built a pentest lab in under 70 USD Swaroop Yermalkar#security-assessment#ethical-hacking#bug-bounty+1
2013-11-07TalkGroundzerosummit IronWASP Source Code Lavakumar Kuppan#security-assessment#application-pentesting#security-tools+2
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhan#red-teaming#secure-coding#ethical-hacking+1
2013-09-27TalkC0c0n Snake Bites Presentation Anant Shrivastava#secure-coding#security-assessment#xss
2013-09-27TalkC0c0n Static analysis of malware with PyTriage Presentation Yashin Mehaboobe#secure-coding#static-analysis#dynamic-analysis+2
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandran#devsecops#secure-development#security-assessment+2
2013-09-27TalkC0c0n Blur Captcha Anirudh Duggal, Abhinav Mohanty#red-teaming#security-testing#application-pentesting+1
2013-09-27TalkC0c0n Pwning WiFi Devices! Swaroop Yermalkar#wifi#red-teaming#network-pentesting+2
2013-09-13TalkRootcon My Experiments with truth: a different route to bug hunting Presentation Devesh Bhatt#bug-hunting#bug-bounty#security-testing+3
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2013-08-02TalkDefcon Interactive Web Security Testing with IronWASP Lavakumar Kuppan#application-pentesting#dynamic-analysis#security-testing+3
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Sood#secure-coding#audit#blueteam
2013-08-01Tool demoBlackhat XENOTIX xBOT Source Code Ajin Abraham#botnet#linux#windows+3
2013-07-31TalkBlackhat Javascript static security analysis made easy with JSPrime Presentation Whitepaper Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#web-security#blueteam#application-hardening+4
2013-05-28TalkConfidence My Experiments with truth: a different route to bug hunting Video Devesh Bhatt#security-assessment#vulnerability-assessment#secure-development+2
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyap, Rafal Wojtczuk#blueteam#application-pentesting#dynamic-analysis+3
2013-03-15TalkBlackhat Vulnerability analysis of 2013 SCADA issues Presentation Video Amol Sarwate#scada#ics-security#attack-surface+2
2013-03-01TalkNullcon Inception of graphical passwords Video Rishi Narang#authentication#application-pentesting#secure-development+3
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shah#code-analysis#secure-development#blueteam+4
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2013-03-01TalkNullcon Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+3
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayak#csrf#blueteam#application-pentesting+4
2012-12-06TalkBlackhat The art of exploiting logical flaws in web apps Presentation Whitepaper Sumit Siddharth, Richard Dean#red-teaming#secure-coding#application-pentesting+1
2012-12-06TalkBlackhat Attacking ODATA Presentation Whitepaper Source Code Gursev Singh Kalra#red-teaming#api-security#application-pentesting+2
2012-12-06TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2012-12-06TalkBlackhat Poking servers with Facebook(and other web applications) Presentation Whitepaper Source Code Riyaz Walikar#xspa#red-teaming#application-pentesting+2
2012-12-01TalkClubhack Content-Type attack -Dark hole in the secure environment Presentation Video Raman Gupta#red-teaming#application-pentesting#pdf+3
2012-12-01TalkClubhack FatCat Web Based SQL Injector Presentation Source Code Video Sandeep Kamble#sqli#red-teaming#input-validation+4
2012-12-01TalkClubhack XSSshell Presentation Video Vandan Joshi#xss#application-pentesting#code-review+4
2012-12-01TalkClubhack Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher Presentation Video Vishal Kalro#zero-day#application-pentesting#secure-development+1
2012-12-01TalkClubhack HAWAS – Hybrid Analyzer for Web Application Security Presentation Video Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2012-12-01TalkClubhack Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Halder#nfc#red-teaming#android-security+4
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+4
2012-11-29TalkDeepsec Bad Things in Good Packages - Creative Exploit Delivery Presentation Saumil Shah#red-teaming#exploit-delivery#security-testing
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhat#red-teaming#bypassing#exploit-delivery+3
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumar#android#red-teaming#malware-research+3
2012-11-23TalkMalcon Tampering in Energy Meters Presentation Mohit Arora#energy-theft#embedded-systems#firmware-analysis+2
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawde#windows-phone#red-teaming#mobile-device-management+3
2012-11-07Award Cross Site Port Attack (XSPA) Source Code Riyaz Walikar#application-pentesting#security-testing#dynamic-analysis+3
2012-10-26TalkAppsecusa The 7 Qualities of Highly Secure Software Video Mano Paul#secure-development#software-security#secure-coding+3
2012-10-26TalkAppsecusa XSS & CSRF with HTML5 - Attack, Exploit and Defense Video Shreeraj Shah#xss#csrf#dynamic-analysis+3
2012-09-28TalkNullcon Alert(/xss/) - How to catch an XSS before someone exploits / reports it? Ahamed Nafeez#web-security#xss#secure-coding+2
2012-09-26TalkNullcon Opening the kimono: Automating behavioral analysis for mobile apps Video Pradeep Kulkarni, Michael Sutton#application-pentesting#security-testing#dynamic-analysis+1
2012-09-26TalkNullcon The art of Passive Web Vul Analysis with IronWASP Video Lavakumar Kuppan#security-assessment#application-pentesting#security-testing+2
2012-09-05Talk44con Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Video Jitender Arora#data-protection#security-strategy#threat-modeling+3
2012-08-29TalkOwaspappsecindia Find me if you can Smart fuzzing and discovery! Presentation Shreeraj Shah#fuzzing#application-pentesting#dynamic-analysis+3
2012-08-15Award Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select) Source Code Gursev Singh Kalra#api-security#web-pentesting#security-tools
2012-08-03TalkC0c0n Evil JavaScript Bishan Singh#red-teaming#web-security#application-pentesting+4
2012-08-03TalkC0c0n Gathering security requirements K v Prashant, Saleem Ahamed#security-testing#secure-development#security-development-lifecycle+2
2012-08-03TalkC0c0n Easy Money with UI-Redressing Amol Naik#bug-hunting#application-pentesting#dynamic-analysis+4
2012-08-03TalkC0c0n WebApp Remote Code Execution using Server Side Scripting Engines Presentation Rahul Sasi#red-teaming#security-assessment#application-pentesting+4
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2012-07-26Tool demoBlackhat Bypassing Every CAPTCHA provider with clipcaptcha Source Code Gursev Singh Kalra#web-security#bypassing#security-tools
2012-07-25Tool demoBlackhat Oyedata for OData Assessments Source Code Gursev Singh Kalra#api-security#web-pentesting#security-tools
2012-05-24TalkHitbsecconf CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants Presentation Video Rahul Sasi#security-assessment#ivr#application-pentesting+2
2012-03-15TalkNullcon An App(le) a day keeps the wallet away Antriksh Shah#security-assessment#web-security#api-security+1
2012-03-15TalkOwaspappsecindia The Magic of Passive Web Vulnerability Analysis Lavakumar Kuppan#application-pentesting#security-testing#static-analysis+2
2012-03-14TalkBlackhat Hacking XPATH 2.0 Presentation Whitepaper Video Sumit Siddharth, Tom Forbes#red-teaming#application-pentesting#input-validation+1
2012-02-15TalkNullcon Application security cost management Video Ketan Vyas#blueteam#application-pentesting#secure-development+2
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwal#blueteam#threat-modeling#secure-development
2012-02-15TalkNullcon Attacking Backup Software Video Nibin Varghese#red-teaming#application-pentesting#security-testing
2012-02-15TalkNullcon CAPTCHAs for fun and Profit Video Gursev Singh Kalra#red-teaming#application-pentesting#input-validation+2
2012-02-15TalkNullcon IVR Security: Internal Network attacks via phone lines Video Rahul Sasi#ivrs#red-teaming#application-pentesting+1
2011-12-04TalkClubhack DOM XSS – Encounters of the 3rd Kind Presentation Video Bishan Singh#xss#red-teaming#secure-coding+4
2011-12-04TalkClubhack Android Forensics Presentation Manish Chasta#android#forensics#android-security+4
2011-12-04TalkClubhack Hacking your Droid Presentation Aditya Gupta#red-teaming#android#mobile-hacking+4
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soi#blueteam#exploit-kit#malware-detection+3
2011-10-13TalkHitbsecconf Web Wars 3 Saumil Shah#cyber-war#exploit-delivery#application-pentesting+1
2011-10-07TalkC0c0n Paranoid Android Ankur Bhargava, Mrigesh#android#android-security#mobile-hacking+3
2011-10-07TalkC0c0n Secure HTTP Headers or How I can finally convince management to let go of IE6 Presentation Akash Mahajan#application-pentesting#secure-development#security-testing+1
2011-10-07TalkC0c0n Security Threats in Custom ROM’s (Android) Presentation Whitepaper Anant Shrivastava#android#android-security#application-pentesting+3
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasi#purpleteam#application-pentesting#backdoor-detection+4
2011-10-07TalkC0c0n Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications Riyaz Walikar#red-teaming#application-pentesting#application-hardening+1
2011-10-07TalkC0c0n iPhone Jailbreak Antriksh Shah#ios#ios-security#jailbreak+3
2011-10-07TalkC0c0n Pentesting iPhone Applications Presentation Satish Bommisetty#ios#security-assessment#application-pentesting+4
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandra#software-security#secure-development#devsecops+4
2011-09-07TalkSecuritybyte Mobile Devices – Boon or Curse? Presentation Kishor Sonawane, Oliver Ng#mobile-device-management#mobile-application-management#application-hardening+4
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imran#blueteam#application-pentesting#secure-development+4
2011-09-07TalkSecuritybyte IronWASP - A Web Application Security Testing Platform Presentation Source Code Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookhey#secure-coding#secure-development#web-security+3
2011-09-06TalkSecuritybyte Enabling Un-trusted Mashups Presentation Bishan Singh#web-security#xss#csrf+4
2011-09-06TalkSecuritybyte Botnets at Application+ layer Presentation Raj Shastrakar#bot#red-teaming#application-pentesting+4
2011-09-06TalkSecuritybyte Runtime thread injection and execution in Linux processes Presentation Aseem Jakhar#thread-injection#linux#process-injection+2
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumar#xss#sqli#blueteam+1
2011-02-25TalkNullcon JSON Fuzzing: New approach to old problems Presentation Whitepaper K v Prashant, Tamaghna Basu#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) Presentation Whitepaper Sunil Kumar#dynamic-binary-instrumentation#code-analysis#dynamic-analysis+3
2010-12-04TalkClubhack Firefox Security! Presentation Prasanna Kanagasabai#application-pentesting#secure-development#security-testing+4
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-12-04TalkClubhack Attacking with HTML5 Presentation Lavakumar Kuppan#red-teaming#application-pentesting#security-testing
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shah#security-compliance#security-governance#risk-management+4
2010-10-27TalkHacklu Exploit Delivery - Tricks and Techniques Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+4
2010-10-14TalkHitbsecconf Exploit Delivery Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+2
2010-08-01TalkC0c0n Code Disclosure over HTTP Anant Kochhar#red-teaming#application-hardening#code-review+4
2010-08-01TalkC0c0n Last line of defense - Host Intrusion Prevention and Secure application development. Avinash Shenoi#blueteam#application-hardening#secure-coding+3
2010-08-01TalkC0c0n Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle Praseed Pai#windows#red-teaming#secure-coding
2010-08-01TalkC0c0n Concept, Methodology and Challenges in Computer Forensics Sebastian Edassery#forensics#digital-forensics#incident-management+2
2010-08-01TalkC0c0n Client Side Exploits using PDF Presentation Ankur Bhargava, Tamaghna Basu#red-teaming#pdf#data-leak+2
2010-08-01TalkC0c0n Wireless MITM Prashant Mahajan#red-teaming#network-pentesting#security-tools
2010-07-30TalkDefcon Hacking Oracle From Web Apps Video Sumit Siddharth#sql-injection#application-pentesting#security-testing+2
2010-07-29TalkBlackhat Hacking Browser’s DOM - Exploiting Ajax and RIA Presentation Whitepaper Shreeraj Shah#red-teaming#ajax#application-pentesting+4
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharth#red-teaming#sql-injection#application-pentesting+3
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindane#secure-coding#red-teaming#security-assessment
2010-03-02Award Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution Source Code Lavakumar Kuppan#clickjacking#application-hardening#security-testing+1
2010-02-25TalkNullcon Penetration Testing versus Source Code Presentation Nikhil Wagholikar#security-assessment#code-analysis#application-pentesting+4
2010-02-25TalkNullcon Software Fuzzing with Wireplay. Presentation Whitepaper Source Code Abhisek Datta#fuzzing#red-teaming#network-pentesting+3
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppan#phishing#red-teaming#security-testing+1
2009-12-05TalkClubhack Revealing the Secrets: Source Code Disclosure, Techniques and Impacts Presentation Anant Kochhar#secure-development#secure-coding#code-review+2
2009-12-05TalkClubhack Indian IT Act 2000 vs 2009 Presentation Rohas Nagpal#cyber-law#embedded-systems#firmware-analysis+4
2009-12-05TalkClubhack Mobile Application Security Testing Presentation Gursev Singh Kalra#security-assessment#mobile-pentesting#application-pentesting+4
2009-12-04TalkClubhack Facilitate Collaboration with Information Rights Management Abhijit Tannu#information-rights-management#data-protection#application-hardening+4
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shah#secure-coding#devsecops#software-security+2
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintala#blueteam#application-pentesting#secure-development+4
2009-11-18TalkSecuritybyte Hacking Oracle From Web Presentation Sumit Siddharth#red-teaming#sql-injection#application-hardening+1
2009-11-18TalkSecuritybyte Rumbling Infections – Web Malware Ontology Presentation Aditya K Sood#dynamic-analysis#malware-research#sandbox+2
2009-11-17TalkSecuritybyte Applications - The new cyber security frontier Presentation Mano Paul#secure-development#devsecops#software-security+2
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyal#forensics#digital-forensics#data-leak+4
2009-07-31TalkDefcon Advancing Video Application Attacks with Video Interception, Recording, and Replay Presentation Video Arjun Sambamoorthy, Jason Ostrom#red-teaming#security-tools#application-hardening
2009-05-19TalkSyscan Securing Enterprise Applications Shreeraj Shah#web-security#ajax#xss+4
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkHitbsecconf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkTroopers Browser Design Flaws – Hacking by Breaking in Architectures Presentation Aditya K Sood#red-teaming#application-pentesting#secure-development+1
2009-04-22TalkTroopers SQL Injections: More Fun and Profit Presentation Sumit Siddharth#red-teaming#application-pentesting#code-review+4
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2009-02-19TalkBlackhat Blinded by Flash: Widespread Security Risks Flash Developers Don’t See Presentation Video Prajakta Jagdale#flash#blueteam#application-pentesting+2
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohli#secure-development#secure-coding#blueteam+1
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alex#secure-coding#reverse-engineering#red-teaming+2
2008-12-06TalkClubhack Hacking Client Side Insecurities Presentation Aditya K Sood#red-teaming#application-pentesting#input-validation+1
2008-11-13TalkDeepsec Game of Web 2.0 Security - Attacking Next Generation Apps Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+2
2008-10-29TalkHitbsecconf Top 10 Web 2.0 Attacks Presentation Video Shreeraj Shah#web-security#ajax#xss+4
2008-10-29TalkHitbsecconf Browser Exploits - A New Model for Browser Security Video Saumil Shah#red-teaming#application-pentesting#code-review+3
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Presentation Saumil Shah#red-teaming#application-hardening#browser-security+4
2008-08-20TalkOwaspappsecindia Building Enterprise AppSec Program Nish Bhalla#appsec#secure-development#security-testing+4
2008-08-20TalkOwaspappsecindia Case Study: Testing 200+ applications in a $10 Billion Enterprise Presentation Roshen Chandran#security-assessment#application-pentesting#security-testing+4
2008-08-20TalkOwaspappsecindia Application Security Trends & Challenges Presentation Kamlesh Bajaj#owasp#appsec#secure-development+4
2008-08-20TalkOwaspappsecindia Web Application Security: Too Costly To Ignore Presentation Rajesh Nayak#appsec#blueteam#application-hardening+4
2008-04-16TalkHitbsecconf Securing Next Generation Applications Γ’β‚¬β€œ Scan, Detect and Mitigate Shreeraj Shah#web-security#ajax#xss+4
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandra, Jacob West, Brian Chess, Sean Fay#ethical-hacking#secure-development#devsecops
2007-12-09TalkClubhack Hacking Web 2.0 Art and Science of Vulnerability Detection Presentation Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2007-12-09TalkClubhack Subtle Security flaws: Why you must follow the basic principles of software security Presentation Varun Sharma#blueteam#software-security#secure-coding+4
2007-12-09TalkClubhack The future of automated web application testing Presentation Amish Shah, Umesh Nagori#security-assessment#application-pentesting#security-testing+3
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belani#forensics#incident-management#digital-forensics+4
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhalla#blueteam#purpleteam#application-pentesting+4
2006-11-29TalkPacsec Smashing Heap by Free Simulation Presentation Sandip Chaudhari#heap#red-teaming#exploit-delivery+4
2006-10-19TalkHacklu Smashing Heap by Free Simulation: Presentation Sandip Chaudhari#heap#red-teaming#exploit-development+2
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-09-21TalkHitbsecconf Finding Secrets in ISAPI Presentation Nish Bhalla#secure-coding#reverse-engineering#application-pentesting+4
2006-08-05TalkDefcon Zulu A Command Line Wireless Frame Generator Whitepaper Source Code Video Anmol Sheth, Damon Mccoy#debugging#network-pentesting#linux+1
2006-08-02TalkBlackhat SQL Injections by Truncation Presentation Bala Neerumalla#web-security#sql-injection#secure-coding
2006-08-02TalkBlackhat Web Application Incident Response & Forensics: A Whole New Ball Game! Presentation Whitepaper Rohyt Belani, Chuck Willis#application-pentesting#code-review#incident-management+3
2006-08-01TalkBlackhat Writing Metasploit Plugins - from Vulnerability to Exploit Video Saumil Shah#metasploit#exploit-development#secure-coding+2
2006-04-13TalkHitbsecconf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotia#secure-coding#blueteam#static-analysis+1
2005-09-29TalkHitbsecconf Analyzing Code for Security Defects Presentation Nish Bhalla#code-analysis#blueteam#secure-coding
2005-09-26TalkHitbsecconf Web hacking Kung-Fu and Art of Defense Presentation Shreeraj Shah#blueteam#application-pentesting#code-review+4
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4
2005-04-12TalkHitbsecconf Web Application Kung-Fu, The Art of Defense Presentation Shreeraj Shah#blueteam#application-hardening#secure-coding+4
2005-03-31TalkBlackhat Defeating Automated Web Assessment Tools Presentation Saumil Shah#red-teaming#security-testing#application-pentesting+1
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookhey#blueteam#intrusion-detection#application-pentesting+3
2004-07-28TalkBlackhat Defeating Automated Web Assessment Tools Video Saumil Shah#red-teaming#application-pentesting#application-hardening+2
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#automated-scanning+2
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#application-pentesting+3
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3
2003-12-12TalkHitbsecconf Defending Web Applications: Strategies, methods and practices Video Shreeraj Shah#blueteam#secure-coding#firewall+1
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
2001-04-26TalkBlackhat Web Hacking Presentation Saumil Shah#red-teaming#application-pentesting#security-testing+4
2001-02-14TalkBlackhat Web Hacking Presentation Video Saumil Shah#red-teaming#application-pentesting#dynamic-analysis+3