πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

πŸ’» Endpoint Security

Security for endpoints and devices

117
Contributors
95
Talks
48
Tool Demos
2
Panels

Top Contributors

Nikhil Mittal(17) Aseem Jakhar(6) Ajin Abraham(5) Nitin Kumar(4) Ravishankar Borgaonkar(4)

Related Tags (11)

Show all 11 tags...

All Entries (145 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat IOCTL-hammer - Parameter-Centric IOCTL Fuzzer for Windows Drivers Source Code Mohit Kulamkolly, Mohanraj Ravichandran#fuzzing#windows#vulnerability-assessment+1
2025-08-07Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#risk-management#edr
2025-08-07TalkBlackhat Weaponizing Apple AI for Offensive Operations Video Hari Shanmugam#ai#macos#ai-security+2
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-03-14TalkInsomnihack The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) Dhiraj Mishra#endpoint-protection#security-testing#malware-distribution
2025-03-01TalkNullcon MacOS Lockdown Mode: A Forensic Deep Dive Video Bhargav Rathod#macos#digital-forensics#endpoint-protection+3
2025-03-01TalkNullcon Drawing parallels between iOS and macOS Pentesting with DVMA Source Code Vaibhav Lakhani#macos#ios#application-pentesting+3
2024-12-12Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#dynamic-analysis+2
2024-11-16TalkC0c0n Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac Ajay Sk#security-assessment#linux#macos
2024-11-15TalkC0c0n Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques Adrip Mukherjee, Vinay Kumar#machine-learning#endpoint-protection#edr+1
2024-11-15TalkC0c0n Know your Enemies: Deep Dive into Ransomware Threat Groups Video Niranjan Jayanand#ransomware#endpoint-protection#dynamic-analysis
2024-11-06TalkBlackalps IDAT Loader: The Malware’s Camouflaged Weapon Niranjan Jayanand#endpoint-protection#dynamic-analysis#security-testing
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#endpoint-protection+2
2024-10-23Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#exploit-delivery+4
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-08-07Tool demoBlackhat RedCloud OS : Cloud Adversary Simulation Operating System Source Code Manish Gupta, Yash Bharadwaj#os#cloud-pentesting#aws+4
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savla#red-teaming#malware-research#post-exploitation+2
2024-05-27TalkConfidence Beyond the Kernel: eBPF’s Trailblazing Role in Reinventing Cloud Security Dynamics Video Rohit Sehgal#cloud-monitoring#ebpf#linux+4
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#security-analytics+3
2024-04-18Tool demoBlackhat RedCloud OS : Cloud Adversary Simulation Operating System Source Code Manish Gupta, Yash Bharadwaj#os#cloud-pentesting#aws+4
2024-04-18Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows Source Code Soumyanil Biswas#red-teaming#post-exploitation#windows
2023-09-23TalkNullcon Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers Presentation Video Rishit Bansal#reverse-engineering#linux#firmware-analysis
2023-09-23TalkNullcon The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis Presentation Video Nikhil Ashok Hegde#malware-detection#linux#dynamic-analysis+2
2023-08-11TalkDefcon Getting a Migraine - uncovering a unique SIP bypass on macOS Presentation Video Anurag Bohra, Jonathan Bar Or, Michael Pearse#macos#endpoint-protection#bypassing+2
2023-08-09Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. Source Code Sagar Bhure#kernel#machine-learning#forensics+4
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-06-01TalkSecurityfest Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#reverse-engineering#appsec#endpoint-protection+4
2023-05-11TalkBlackhat Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#hacking#bypassing#mobile-hacking+1
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansari#threat-hunting#windows#security-tools
2023-04-20TalkHitbsecconf BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES Presentation Video Rohan Aggarwal#hacking#hardware-hacking#bypassing+3
2022-09-08TalkNullcon Automate Your Whatsapp Chats Presentation Video Aditi Bhatnagar#android#application-pentesting#ai-security+2
2022-09-08TalkNullcon The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple Video Amit Malik, Pratik Jeware#macos#malware-detection#endpoint-protection
2022-09-06PanelNullcon Does your SOC sucks? Video Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur#security-training#incident-management#alert-fatigue+3
2022-04-08TalkNullcon Bheem OS - A next-generation reasonably secure OS using Rust MicroVM Video Akram Ansari, Subash Sn#os#virtual-machine#container-security+3
2021-11-12PanelC0c0n Stopping Breaches with CrowdStrike Sandeep Rao#endpoint-protection#incident-management#security-monitoring+2
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singha#security-assessment#post-exploitation#privilege-escalation+2
2021-08-05TalkBlackhat PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors Presentation Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen#hardware-embedded#endpoint-protection#incident-management+1
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithane#windows#process-injection#blueteam+1
2020-12-09Tool demoBlackhat HosTaGe: mobile honeypots for rapid deployment Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou#honeypot#blueteam#endpoint-protection+2
2020-10-01Tool demoBlackhat Wi-Fi Access Point Rootkits Nishant Sharma, Jeswin Mathai#wifi#blueteam#iot-pentesting+1
2020-10-01Tool demoBlackhat Mobexler: An All-in-One Mobile Pentest VM Source Code Abhinav Mishra#android#ios#security-assessment+2
2020-08-22TalkThedianainitiative Hacking into Android Ecosystem Video Aditi Bhatnagar#android#android-security#application-pentesting+3
2020-08-06Tool demoBlackhat Dynamic Labs: Windows & Active Directory Exploitation Source Code Rohan Durve#windows#active-directory#security-training
2020-07-05Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abraham#blueteam#ios#android+1
2020-03-06Tool demoNullcon Mobexler Source Code Abhinav Mishra, Abhishek Jaiswal#android#ios#security-assessment+2
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shah#incident-management#linux#macos+2
2020-03-06Tool demoNullcon Talisman Source Code Suhas Vishwanath#secure-development#macos#linux+3
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahan#linux#secure-coding#web-security+3
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2019-10-16Tool demoHitbsecconf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shah#arm#linux#firmware-analysis+4
2019-10-10TalkBrucon Security transition from 4G to 5G: are we secure enough? Presentation Video Altaf Shaik, Ravishankar Borgaonkar#5g#4g#network-architecture+3
2019-09-23TalkRootcon APAD: An EDR Grade Agent for Wi-Fi Access Points Presentation Video Vivek Ramachandran#wifi#edr#linux
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittal#active-directory#red-teaming#windows
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwal#virtual-machine#blueteam#forensics+2
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Presentation Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#application-hardening+4
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjve#blueteam#honeypot#network-defense+4
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittal#windows#active-directory#red-teaming
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatia#incident-management#architecture#windows+3
2018-09-06TalkGrrcon Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI Presentation Video Pranshu Bajpai, Richard Enbody#encryption#ransomware#dynamic-analysis+1
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura#security-assessment#architecture#application-hardening+4
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-08-09TalkBlackhat Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina Presentation Source Code Video Bhargava Shastry, Vincent Ulitzsch, Dominik Maier#security-assessment#blueteam#linux+1
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2018-08-08TalkBlackhat Back to the Future: A Radical Insecure Design of KVM on ARM Presentation Whitepaper Video Baibhav Singh, Rahul Kashyap#red-teaming#linux#virtual-machine+1
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan#virtual-machine#blueteam#forensics+2
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-03-22Tool demoBlackhat Mobile Security Framework - MobSF Presentation Source Code Ajin Abraham#blueteam#ios#android+1
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatia#blueteam#windows#azure+4
2017-12-06TalkBlackhat DIFUZZING ANDROID KERNEL DRIVERS Presentation Whitepaper Video Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Jake Corina, Shuang Hao#android#red-teaming#linux+2
2017-09-13Talk44con Red Team Revenge : Attacking Microsoft ATA Presentation Video Nikhil Mittal#windows#red-teaming#active-directory+4
2017-08-18TalkUsenix DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Presentation Whitepaper Video Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna#linux#kernel#static-analysis+4
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#security-assessment+1
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#windows
2017-04-14TalkHitbsecconf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#data-protection+3
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Presentation Swamy Shivaganga Nagaraju#windows#blueteam#security-development-lifecycle+2
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittal#blueteam#amsi#endpoint-protection+1
2016-11-05TalkHackfest LockPicker: Leaking data from live LUKS partition Adhokshaj Mishra#linux#red-teaming#data-leak
2016-11-04TalkBlackhat Randomization Can’t Stop BPF JIT Spray Presentation Whitepaper Video N Asokan, Filippo Bonazzi, Elena Reshetova#linux#red-teaming#exploit-development
2016-11-04Tool demoBlackhat AppMon: Runtime Security Testing & Profiling Framework for Native Apps Source Code Nishant Das Patnaik#security-assessment#ios#macos+1
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-13TalkAppsecusa Lightning Talk - Demystifying Windows Application Rupali Dash#windows#application-hardening#secure-coding+4
2016-10-05TalkVirusbulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#incident-management#endpoint-protection+3
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggal#ics-security#risk-management#application-pentesting+3
2016-08-04Tool demoBlackhat AppMon Source Code Nishant Das Patnaik#ios#macos#android+1
2016-08-03TalkBlackhat AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It Presentation Nikhil Mittal#windows#amsi#powershell+1
2016-08-03Tool demoBlackhat Nishang: The Goodness of Offensive PowerShell Source Code Nikhil Mittal#windows#red-teaming#powershell
2016-04-01Tool demoBlackhat LIMON-SANDBOX FOR ANALYZING LINUX MALWARES Presentation Whitepaper Source Code Monnappa K A#linux#dynamic-analysis#static-analysis+2
2016-04-01Tool demoBlackhat HackSys Extreme Vulnerable Driver Presentation Whitepaper Source Code Ashfaq Ansari#red-teaming#security-assessment#windows
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittal#windows#red-teaming#endpoint-protection+1
2015-11-12Tool demoBlackhat Kautilya: Fastest shells you will ever get Source Code Nikhil Mittal#hid#red-teaming#windows
2015-11-05TalkGroundzerosummit chellam – a Wi-Fi IDS/Firewall for Windows Vivek Ramachandran#wifi#firewall#ids+3
2015-08-06Tool demoBlackhat Chellam Vivek Ramachandran#wifi#firewall#blueteam+1
2015-08-06Tool demoBlackhat Kautilya Source Code Nikhil Mittal#hid#red-teaming#windows
2015-08-01TalkC0c0n A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. Riyaz Walikar#windows#red-teaming#security-assessment
2015-05-29TalkHitbsecconf Hacking Samsung’s Tizen: The OS of Everything Presentation Whitepaper Ajin Abraham#os#wearables#red-teaming
2015-05-29TalkHitbsecconf PowerShell for Penetration Testers Presentation Nikhil Mittal#red-teaming#windows#powershell+1
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanian#blueteam#security-tools#automated-scanning+2
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwate#red-teaming#application-pentesting#data-protection+1
2015-02-06TalkNullcon Hacking Tizen: The OS of Everything Presentation Video Ajin Abraham#os#wearables#red-teaming
2014-10-23TalkT2 Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#android#endpoint-protection#android-security+2
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-09-11Talk44con Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#imsi#endpoint-protection#security-tools
2014-05-29TalkHitbsecconf LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit Presentation Rahul Kashyap, Rafal Wojtzcuk#red-teaming#windows#kernel
2014-05-21TalkPhdays ARM Exploitation Video Aseem Jakhar#arm#linux#android
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalani#blueteam#application-hardening#application-pentesting+4
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeez#red-teaming#network-pentesting#endpoint-protection+1
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2013-08-03TalkDefcon PowerPreter: Post Exploitation Like a Boss Presentation Source Code Video Nikhil Mittal#red-teaming#powershell#windows
2013-08-01Tool demoBlackhat XENOTIX xBOT Source Code Ajin Abraham#botnet#linux#windows+3
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyap, Rafal Wojtczuk#blueteam#application-pentesting#dynamic-analysis+3
2013-03-15Tool demoBlackhat Prasadhak (And Offensive Powershell) Source Code Nikhil Mittal#powershell#windows#red-teaming
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasi#red-teaming#fuzzing#network-pentesting+2
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumar#android#arm#linux+4
2012-12-01TalkClubhack Real Time Event Recording System, the tool for Digital Forensics Investigation Presentation Video Madhav Limaye#digital-forensics#endpoint-protection#endpoint-hardening+4
2012-09-20TalkEkoparty Dirty use of USSD Codes in Cellular Network Whitepaper Video Ravishankar Borgaonkar#red-teaming#android-security#endpoint-protection+1
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittal#hid#red-teaming#endpoint-protection+3
2011-12-04TalkClubhack Android Forensics Presentation Manish Chasta#android#forensics#android-security+4
2011-11-25TalkMalcon Advanced Malware for Apple Products Atul Alex#red-teaming#macos#ios
2011-11-25TalkMalcon Mareech : Look it’s a HID made up of gold Nikhil Mittal#hid#red-teaming#keylogging+2
2011-10-07TalkC0c0n Security Threats in Custom ROM’s (Android) Presentation Whitepaper Anant Shrivastava#android#android-security#application-pentesting+3
2011-10-07TalkC0c0n Runtime thread injection and execution in Linux processes Aseem Jakhar#linux#red-teaming#code-injection+1
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandran#wifi#red-teaming#endpoint-protection+3
2011-09-19TalkHacklu Linux thread injection - The jugaad way Source Code Aseem Jakhar#linux#thread-injection#red-teaming
2011-09-07TalkSecuritybyte Mobile Devices – Boon or Curse? Presentation Kishor Sonawane, Oliver Ng#mobile-device-management#mobile-application-management#application-hardening+4
2011-09-06TalkSecuritybyte Runtime thread injection and execution in Linux processes Presentation Aseem Jakhar#thread-injection#linux#process-injection+2
2011-08-05TalkDefcon Jugaad – Linux Thread Injection Kit Presentation Source Code Video Aseem Jakhar#linux#thread-injection#red-teaming
2011-05-19TalkHitbsecconf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Sood#blueteam#botnet#endpoint-protection+4
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakhar#linux#red-teaming#malware-research+2
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-12-04TalkClubhack Windows Memory Forensic Analysis Presentation Aashish Kunte#windows#forensics#memory-forensics+3
2010-10-14TalkHitbsecconf Exploit Delivery Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+2
2010-08-01TalkC0c0n End-point Security Laxi Eshwari#blueteam#endpoint-protection#endpoint-hardening+3
2010-08-01TalkC0c0n Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle Praseed Pai#windows#red-teaming#secure-coding
2009-12-05TalkClubhack Advance Computer Forensic concepts (windows) Presentation Kush Wadhwa#forensics#windows#data-protection
2009-11-17TalkSecuritybyte Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumar#windows#red-teaming#boot-sector+1
2009-04-22TalkHitbsecconf Vbootkit 2.0: Attacking Windows 7 via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumar#windows#red-teaming#boot-sector
2008-12-06TalkClubhack Introduction to backtrack Presentation Kunal Sehgal#security-assessment#linux#ethical-hacking+1
2007-12-09TalkClubhack Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? Presentation Chetan Gupta#forensics#windows#data-loss-prevention+4
2007-04-04TalkHitbsecconf Vboot Kit: Compromising Windows Vista Security Presentation Vipin Kumar, Nitin Kumar#windows#boot-sector#endpoint-protection+1
2007-03-29TalkBlackhat Vboot Kit: Compromising Windows Vista Security Presentation Whitepaper Nitin Kumar, Vipin Kumar#windows#red-teaming#kernel
2006-08-05TalkDefcon Zulu A Command Line Wireless Frame Generator Whitepaper Source Code Video Anmol Sheth, Damon Mccoy#debugging#network-pentesting#linux+1