| 2025-12-11 | Tool demo | Blackhat |
IOCTL-hammer - Parameter-Centric IOCTL Fuzzer for Windows Drivers
| Mohit Kulamkolly, Mohanraj Ravichandran | #fuzzing#windows#vulnerability-assessment+1 |
| 2025-08-07 | Tool demo | Blackhat |
Cloud Offensive Breach and Risk Assessment (COBRA)
| Harsha Koushik, Anand Tiwari | #cloud-pentesting#risk-management#edr |
| 2025-08-07 | Talk | Blackhat |
Weaponizing Apple AI for Offensive Operations
| Hari Shanmugam | #ai#macos#ai-security+2 |
| 2025-04-04 | Tool demo | Blackhat |
Decoy Mutex
| Madhukar Raina | #ransomware#endpoint-protection#malware-prevention+3 |
| 2025-03-14 | Talk | Insomnihack |
The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques)
| Dhiraj Mishra | #endpoint-protection#security-testing#malware-distribution |
| 2025-03-01 | Talk | Nullcon |
MacOS Lockdown Mode: A Forensic Deep Dive
| Bhargav Rathod | #macos#digital-forensics#endpoint-protection+3 |
| 2025-03-01 | Talk | Nullcon |
Drawing parallels between iOS and macOS Pentesting with DVMA
| Vaibhav Lakhani | #macos#ios#application-pentesting+3 |
| 2024-12-12 | Tool demo | Blackhat |
DarkWidow: Customizable Dropper Tool Targeting Windows
| Soumyanil Biswas | #darkwidow#windows#dynamic-analysis+2 |
| 2024-11-16 | Talk | C0c0n |
Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac
| Ajay Sk | #security-assessment#linux#macos |
| 2024-11-15 | Talk | C0c0n |
Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques
| Adrip Mukherjee, Vinay Kumar | #machine-learning#endpoint-protection#edr+1 |
| 2024-11-15 | Talk | C0c0n |
Know your Enemies: Deep Dive into Ransomware Threat Groups
| Niranjan Jayanand | #ransomware#endpoint-protection#dynamic-analysis |
| 2024-11-06 | Talk | Blackalps |
IDAT Loader: The Malwareβs Camouflaged Weapon
| Niranjan Jayanand | #endpoint-protection#dynamic-analysis#security-testing |
| 2024-10-23 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#endpoint-protection+2 |
| 2024-10-23 | Tool demo | Blackhat |
DarkWidow: Customizable Dropper Tool Targeting Windows
| Soumyanil Biswas | #darkwidow#windows#exploit-delivery+4 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-08-07 | Tool demo | Blackhat |
RedCloud OS : Cloud Adversary Simulation Operating System
| Manish Gupta, Yash Bharadwaj | #os#cloud-pentesting#aws+4 |
| 2024-08-07 | Tool demo | Blackhat |
DarkWidow: Dropper/PostExploitation Tool targeting Windows
| Soumyanil Biswas, Chirag Savla | #red-teaming#malware-research#post-exploitation+2 |
| 2024-05-27 | Talk | Confidence |
Beyond the Kernel: eBPF’s Trailblazing Role in Reinventing Cloud Security Dynamics
| Rohit Sehgal | #cloud-monitoring#ebpf#linux+4 |
| 2024-04-18 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#security-analytics+3 |
| 2024-04-18 | Tool demo | Blackhat |
RedCloud OS : Cloud Adversary Simulation Operating System
| Manish Gupta, Yash Bharadwaj | #os#cloud-pentesting#aws+4 |
| 2024-04-18 | Tool demo | Blackhat |
DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows
| Soumyanil Biswas | #red-teaming#post-exploitation#windows |
| 2023-09-23 | Talk | Nullcon |
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers
| Rishit Bansal | #reverse-engineering#linux#firmware-analysis |
| 2023-09-23 | Talk | Nullcon |
The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis
| Nikhil Ashok Hegde | #malware-detection#linux#dynamic-analysis+2 |
| 2023-08-11 | Talk | Defcon |
Getting a Migraine - uncovering a unique SIP bypass on macOS
| Anurag Bohra, Jonathan Bar Or, Michael Pearse | #macos#endpoint-protection#bypassing+2 |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-08-07 | Talk | C0c0n |
Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux
| Pranav Sivvam | #red-teaming#linux#memory-forensics+2 |
| 2023-06-01 | Talk | Securityfest |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #reverse-engineering#appsec#endpoint-protection+4 |
| 2023-05-11 | Talk | Blackhat |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #hacking#bypassing#mobile-hacking+1 |
| 2023-05-11 | Tool demo | Blackhat |
ThreatSeeker - Threat Hunting via Windows Event Logs
| Ashish Bhangale, G Khartheesvar, Arafat Ansari | #threat-hunting#windows#security-tools |
| 2023-04-20 | Talk | Hitbsecconf |
BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES
| Rohan Aggarwal | #hacking#hardware-hacking#bypassing+3 |
| 2022-09-08 | Talk | Nullcon |
Automate Your Whatsapp Chats
| Aditi Bhatnagar | #android#application-pentesting#ai-security+2 |
| 2022-09-08 | Talk | Nullcon |
The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple
| Amit Malik, Pratik Jeware | #macos#malware-detection#endpoint-protection |
| 2022-09-06 | Panel | Nullcon |
Does your SOC sucks?
| Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur | #security-training#incident-management#alert-fatigue+3 |
| 2022-04-08 | Talk | Nullcon |
Bheem OS - A next-generation reasonably secure OS using Rust MicroVM
| Akram Ansari, Subash Sn | #os#virtual-machine#container-security+3 |
| 2021-11-12 | Panel | C0c0n |
Stopping Breaches with CrowdStrike
| Sandeep Rao | #endpoint-protection#incident-management#security-monitoring+2 |
| 2021-10-13 | Tool demo | Rootcon |
Buzzard : Crafting your post exploitation framework against odds
| Aravindha Hariharan, Subhajeet Singha | #security-assessment#post-exploitation#privilege-escalation+2 |
| 2021-08-05 | Talk | Blackhat |
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors
| Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen | #hardware-embedded#endpoint-protection#incident-management+1 |
| 2021-05-06 | Tool demo | Blackhat |
FalconEye: Windows Process Injection Techniques - Catch Them All
| Rajiv Kulkarni, Sushant Paithane | #windows#process-injection#blueteam+1 |
| 2020-12-09 | Tool demo | Blackhat |
HosTaGe: mobile honeypots for rapid deployment
| Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou | #honeypot#blueteam#endpoint-protection+2 |
| 2020-10-01 | Tool demo | Blackhat |
Wi-Fi Access Point Rootkits
| Nishant Sharma, Jeswin Mathai | #wifi#blueteam#iot-pentesting+1 |
| 2020-10-01 | Tool demo | Blackhat |
Mobexler: An All-in-One Mobile Pentest VM
| Abhinav Mishra | #android#ios#security-assessment+2 |
| 2020-08-22 | Talk | Thedianainitiative |
Hacking into Android Ecosystem
| Aditi Bhatnagar | #android#android-security#application-pentesting+3 |
| 2020-08-06 | Tool demo | Blackhat |
Dynamic Labs: Windows & Active Directory Exploitation
| Rohan Durve | #windows#active-directory#security-training |
| 2020-07-05 | Tool demo | Blackhat |
Mobile Security Framework - MobSF
| Ajin Abraham | #blueteam#ios#android+1 |
| 2020-03-06 | Tool demo | Nullcon |
Mobexler
| Abhinav Mishra, Abhishek Jaiswal | #android#ios#security-assessment+2 |
| 2020-03-06 | Tool demo | Nullcon |
Providence
| Swapnil Kumbhar, Akshay Shah | #incident-management#linux#macos+2 |
| 2020-03-06 | Tool demo | Nullcon |
Talisman
| Suhas Vishwanath | #secure-development#macos#linux+3 |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | #linux#secure-coding#web-security+3 |
| 2020-03-06 | Tool demo | Nullcon |
SASTRI
| Rushikesh D Nandedkar, Lalit Bhandari | #security-assessment#virtual-machine#static-analysis+3 |
| 2019-12-04 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | #macos#secure-coding#forensics+1 |
| 2019-10-16 | Tool demo | Hitbsecconf |
Introducing ARM-X - The ARM IoT Firmware Emulation Framework
| Saumil Shah | #arm#linux#firmware-analysis+4 |
| 2019-10-10 | Talk | Brucon |
Security transition from 4G to 5G: are we secure enough?
| Altaf Shaik, Ravishankar Borgaonkar | #5g#4g#network-architecture+3 |
| 2019-09-23 | Talk | Rootcon |
APAD: An EDR Grade Agent for Wi-Fi Access Points
| Vivek Ramachandran | #wifi#edr#linux |
| 2019-08-10 | Talk | Defcon |
RACE - Minimal Rights and ACE for Active Directory Dominance
| Nikhil Mittal | #active-directory#red-teaming#windows |
| 2019-08-07 | Tool demo | Blackhat |
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan, Kunal Aggarwal | #virtual-machine#blueteam#forensics+2 |
| 2019-08-07 | Tool demo | Blackhat |
SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/
| Rushikesh D Nandedkar, Lalit Bhandari | #security-assessment#virtual-machine#application-hardening+4 |
| 2019-05-21 | Talk | Phdays |
Active defense using Honeypots v2
| Rahul Binjve | #blueteam#honeypot#network-defense+4 |
| 2018-10-10 | Talk | Brucon |
Forging Trusts for Deception in Active Directory
| Nikhil Mittal | #windows#active-directory#red-teaming |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | #incident-management#architecture#windows+3 |
| 2018-09-06 | Talk | Grrcon |
Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI
| Pranshu Bajpai, Richard Enbody | #encryption#ransomware#dynamic-analysis+1 |
| 2018-08-16 | Talk | Usenix |
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
| Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura | #security-assessment#architecture#application-hardening+4 |
| 2018-08-11 | Tool demo | Defcon |
ADRecon: Active Directory Recon
| Prashant Mahajan | #active-directory#windows#reconnaissance+1 |
| 2018-08-09 | Talk | Blackhat |
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
| Bhargava Shastry, Vincent Ulitzsch, Dominik Maier | #security-assessment#blueteam#linux+1 |
| 2018-08-08 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | #macos#secure-coding#forensics+1 |
| 2018-08-08 | Talk | Blackhat |
Back to the Future: A Radical Insecure Design of KVM on ARM
| Baibhav Singh, Rahul Kashyap | #red-teaming#linux#virtual-machine+1 |
| 2018-08-08 | Tool demo | Blackhat |
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan | #virtual-machine#blueteam#forensics+2 |
| 2018-08-08 | Tool demo | Blackhat |
ADRecon: Active Directory Recon
| Prashant Mahajan | #active-directory#windows#reconnaissance+1 |
| 2018-03-22 | Tool demo | Blackhat |
ADRecon: Active Directory Recon
| Prashant Mahajan | #active-directory#windows#reconnaissance+1 |
| 2018-03-22 | Tool demo | Blackhat |
Mobile Security Framework - MobSF
| Ajin Abraham | #blueteam#ios#android+1 |
| 2018-03-15 | Talk | Troopers |
Defending Microsoft Environments at Scale
| Vineet Bhatia | #blueteam#windows#azure+4 |
| 2017-12-06 | Talk | Blackhat |
DIFUZZING ANDROID KERNEL DRIVERS
| Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Jake Corina, Shuang Hao | #android#red-teaming#linux+2 |
| 2017-09-13 | Talk | 44con |
Red Team Revenge : Attacking Microsoft ATA
| Nikhil Mittal | #windows#red-teaming#active-directory+4 |
| 2017-08-18 | Talk | Usenix |
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
| Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna | #linux#kernel#static-analysis+4 |
| 2017-07-27 | Talk | Blackhat |
Evading Microsoft ATA for Active Directory Domination
| Nikhil Mittal | #active-directory#red-teaming#security-assessment+1 |
| 2017-04-19 | Talk | Brucon |
Evading Microsoft ATA for Active Directory Domination
| Nikhil Mittal | #active-directory#red-teaming#windows |
| 2017-04-14 | Talk | Hitbsecconf |
Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#application-pentesting#data-protection+3 |
| 2017-03-03 | Talk | Nullcon |
Agility with security mitigations in Windows 10
| Swamy Shivaganga Nagaraju | #windows#blueteam#security-development-lifecycle+2 |
| 2016-11-11 | Talk | Deepsec |
AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That
| Nikhil Mittal | #blueteam#amsi#endpoint-protection+1 |
| 2016-11-05 | Talk | Hackfest |
LockPicker: Leaking data from live LUKS partition
| Adhokshaj Mishra | #linux#red-teaming#data-leak |
| 2016-11-04 | Talk | Blackhat |
Randomization Can’t Stop BPF JIT Spray
| N Asokan, Filippo Bonazzi, Elena Reshetova | #linux#red-teaming#exploit-development |
| 2016-11-04 | Tool demo | Blackhat |
AppMon: Runtime Security Testing & Profiling Framework for Native Apps
| Nishant Das Patnaik | #security-assessment#ios#macos+1 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twinβ¦!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | #reverse-engineering#evil-twin-attack#network-monitoring+3 |
| 2016-10-13 | Talk | Appsecusa |
Lightning Talk - Demystifying Windows Application
| Rupali Dash | #windows#application-hardening#secure-coding+4 |
| 2016-10-05 | Talk | Virusbulletin |
One-Click Fileless Infection
| Himanshu Anand, Chastine Menrige | #reverse-engineering#incident-management#endpoint-protection+3 |
| 2016-08-04 | Talk | Blackhat |
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
| Anirudh Duggal | #ics-security#risk-management#application-pentesting+3 |
| 2016-08-04 | Tool demo | Blackhat |
AppMon
| Nishant Das Patnaik | #ios#macos#android+1 |
| 2016-08-03 | Talk | Blackhat |
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
| Nikhil Mittal | #windows#amsi#powershell+1 |
| 2016-08-03 | Tool demo | Blackhat |
Nishang: The Goodness of Offensive PowerShell
| Nikhil Mittal | #windows#red-teaming#powershell |
| 2016-04-01 | Tool demo | Blackhat |
LIMON-SANDBOX FOR ANALYZING LINUX MALWARES
| Monnappa K A | #linux#dynamic-analysis#static-analysis+2 |
| 2016-04-01 | Tool demo | Blackhat |
HackSys Extreme Vulnerable Driver
| Ashfaq Ansari | #red-teaming#security-assessment#windows |
| 2015-11-13 | Talk | Blackhat |
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX
| Monnappa K A | #linux#security-assessment#malware-research+4 |
| 2015-11-12 | Tool demo | Blackhat |
Nishang - Tracking A Windows User
| Nikhil Mittal | #windows#red-teaming#endpoint-protection+1 |
| 2015-11-12 | Tool demo | Blackhat |
Kautilya: Fastest shells you will ever get
| Nikhil Mittal | #hid#red-teaming#windows |
| 2015-11-05 | Talk | Groundzerosummit |
chellam β a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | #wifi#firewall#ids+3 |
| 2015-08-06 | Tool demo | Blackhat |
Chellam
| Vivek Ramachandran | #wifi#firewall#blueteam+1 |
| 2015-08-06 | Tool demo | Blackhat |
Kautilya
| Nikhil Mittal | #hid#red-teaming#windows |
| 2015-08-01 | Talk | C0c0n |
A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws.
| Riyaz Walikar | #windows#red-teaming#security-assessment |
| 2015-05-29 | Talk | Hitbsecconf |
Hacking Samsungβs Tizen: The OS of Everything
| Ajin Abraham | #os#wearables#red-teaming |
| 2015-05-29 | Talk | Hitbsecconf |
PowerShell for Penetration Testers
| Nikhil Mittal | #red-teaming#windows#powershell+1 |
| 2015-03-26 | Tool demo | Blackhat |
SecPod Saner
| Preeti Subramanian | #blueteam#security-tools#automated-scanning+2 |
| 2015-02-06 | Talk | Nullcon |
Anatomy of a credit card stealing POS malware
| Amol Sarwate | #red-teaming#application-pentesting#data-protection+1 |
| 2015-02-06 | Talk | Nullcon |
Hacking Tizen: The OS of Everything
| Ajin Abraham | #os#wearables#red-teaming |
| 2014-10-23 | Talk | T2 |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #android#endpoint-protection#android-security+2 |
| 2014-09-16 | Talk | Deepsec |
Advanced Powershell Threat β Lethal Client Side Attacks
| Nikhil Mittal | #powershell#red-teaming#endpoint-protection+4 |
| 2014-09-11 | Talk | 44con |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #imsi#endpoint-protection#security-tools |
| 2014-05-29 | Talk | Hitbsecconf |
LOL (Layers On Layers) β Bypassing Endpoint Security for Fun and Profit
| Rahul Kashyap, Rafal Wojtzcuk | #red-teaming#windows#kernel |
| 2014-05-21 | Talk | Phdays |
ARM Exploitation
| Aseem Jakhar | #arm#linux#android |
| 2014-02-14 | Talk | Nullcon |
Chrome - OS Security 2014: New and future hotness
| Sumit Gwalani | #blueteam#application-hardening#application-pentesting+4 |
| 2014-02-14 | Talk | Nullcon |
Hacking YOu’r Cable TV Network.
| Rahul Sasi, Ahamed Nafeez | #red-teaming#network-pentesting#endpoint-protection+1 |
| 2013-09-12 | Talk | Grrcon |
The Droid Exploitation Saga β All Over Again!
| Aditya Gupta, Subho Halder | #android#red-teaming#android-security+4 |
| 2013-08-03 | Talk | Defcon |
PowerPreter: Post Exploitation Like a Boss
| Nikhil Mittal | #red-teaming#powershell#windows |
| 2013-08-01 | Tool demo | Blackhat |
XENOTIX xBOT
| Ajin Abraham | #botnet#linux#windows+3 |
| 2013-03-15 | Talk | Blackhat |
The Sandbox Roulette- Are you ready for the gamble?
| Rahul Kashyap, Rafal Wojtczuk | #blueteam#application-pentesting#dynamic-analysis+3 |
| 2013-03-15 | Tool demo | Blackhat |
Prasadhak (And Offensive Powershell)
| Nikhil Mittal | #powershell#windows#red-teaming |
| 2013-03-01 | Talk | Nullcon |
SMS to Meterpreter - Fuzzing USB Modems
| Rahul Sasi | #red-teaming#fuzzing#network-pentesting+2 |
| 2013-03-01 | Talk | Nullcon |
Pawing the Droid: Twisting the ARM
| Divyanshu Shekhar, Anshul Kumar | #android#arm#linux+4 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-09-20 | Talk | Ekoparty |
Dirty use of USSD Codes in Cellular Network
| Ravishankar Borgaonkar | #red-teaming#android-security#endpoint-protection+1 |
| 2011-12-15 | Talk | Blackhat |
Kautilya: Teensy Beyond Shell
| Nikhil Mittal | #hid#red-teaming#endpoint-protection+3 |
| 2011-12-04 | Talk | Clubhack |
Android Forensics
| Manish Chasta | #android#forensics#android-security+4 |
| 2011-11-25 | Talk | Malcon |
Advanced Malware for Apple Products
| Atul Alex | #red-teaming#macos#ios |
| 2011-11-25 | Talk | Malcon |
Mareech : Look itβs a HID made up of gold
| Nikhil Mittal | #hid#red-teaming#keylogging+2 |
| 2011-10-07 | Talk | C0c0n |
Security Threats in Custom ROM’s (Android)
| Anant Shrivastava | #android#android-security#application-pentesting+3 |
| 2011-10-07 | Talk | C0c0n |
Runtime thread injection and execution in Linux processes
| Aseem Jakhar | #linux#red-teaming#code-injection+1 |
| 2011-09-19 | Talk | Brucon |
Wifi malware for fun and profit
| Vivek Ramachandran | #wifi#red-teaming#endpoint-protection+3 |
| 2011-09-19 | Talk | Hacklu |
Linux thread injection - The jugaad way
| Aseem Jakhar | #linux#thread-injection#red-teaming |
| 2011-09-07 | Talk | Securitybyte |
Mobile Devices β Boon or Curse?
| Kishor Sonawane, Oliver Ng | #mobile-device-management#mobile-application-management#application-hardening+4 |
| 2011-09-06 | Talk | Securitybyte |
Runtime thread injection and execution in Linux processes
| Aseem Jakhar | #thread-injection#linux#process-injection+2 |
| 2011-08-05 | Talk | Defcon |
Jugaad β Linux Thread Injection Kit
| Aseem Jakhar | #linux#thread-injection#red-teaming |
| 2011-05-19 | Talk | Hitbsecconf |
Spying on SpyEye β What Lies Beneath?
| Aditya K Sood | #blueteam#botnet#endpoint-protection+4 |
| 2011-02-25 | Talk | Nullcon |
Chupa Rustam
| Abhijeet Hatekar | #surveillance#red-teaming#application-pentesting+2 |
| 2011-02-25 | Talk | Nullcon |
Jugaad Beta: Linux Thread Injection malware PoC
| Aseem Jakhar | #linux#red-teaming#malware-research+2 |
| 2010-12-04 | Talk | Clubhack |
Mantra β Free and Open Source security framework based on browser platform
| Abhi M Balakrishnan | #blueteam#endpoint-protection#application-pentesting+3 |
| 2010-12-04 | Talk | Clubhack |
Windows Memory Forensic Analysis
| Aashish Kunte | #windows#forensics#memory-forensics+3 |
| 2010-10-14 | Talk | Hitbsecconf |
Exploit Delivery
| Saumil Shah | #red-teaming#exploit#exploit-delivery+2 |
| 2010-08-01 | Talk | C0c0n |
End-point Security
| Laxi Eshwari | #blueteam#endpoint-protection#endpoint-hardening+3 |
| 2010-08-01 | Talk | C0c0n |
Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle
| Praseed Pai | #windows#red-teaming#secure-coding |
| 2009-12-05 | Talk | Clubhack |
Advance Computer Forensic concepts (windows)
| Kush Wadhwa | #forensics#windows#data-protection |
| 2009-11-17 | Talk | Securitybyte |
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#boot-sector+1 |
| 2009-04-22 | Talk | Hitbsecconf |
Vbootkit 2.0: Attacking Windows 7 via Boot Sectors
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#boot-sector |
| 2008-12-06 | Talk | Clubhack |
Introduction to backtrack
| Kunal Sehgal | #security-assessment#linux#ethical-hacking+1 |
| 2007-12-09 | Talk | Clubhack |
Mining Digital Evidence in Microsoft Windows β Answering Who, When, Why and How?
| Chetan Gupta | #forensics#windows#data-loss-prevention+4 |
| 2007-04-04 | Talk | Hitbsecconf |
Vboot Kit: Compromising Windows Vista Security
| Vipin Kumar, Nitin Kumar | #windows#boot-sector#endpoint-protection+1 |
| 2007-03-29 | Talk | Blackhat |
Vboot Kit: Compromising Windows Vista Security
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#kernel |
| 2006-08-05 | Talk | Defcon |
Zulu A Command Line Wireless Frame Generator
| Anmol Sheth, Damon Mccoy | #debugging#network-pentesting#linux+1 |