| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | incident-responseweb-securityvulnerability-management+2 |
| 2025-08-06 | Talk | Blackhat |
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach
| Varun Sharma, Ashish Kurmi | ci-cdincident-responsedevsecops+3 |
| 2024-12-11 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve | active-directory |
| 2024-11-28 | Talk | Blackhat |
From Breach to Blueprint: Building a Resilient Future
| Amit Ghodekar | incident-responsevulnerability-managementpentesting+3 |
| 2024-11-26 | Talk | Blackhat |
Critical Exposures: Lessons from a Decade of Vulnerability Research
| Nikhil Shrivastava | vulnerability-managementsql-injectionpentesting+2 |
| 2024-11-16 | Talk | C0c0n |
Active Directory Deception Strategies
| Madhukar Raina, Sayan Mitra | active-directory |
| 2024-08-29 | Talk | Hitb Sec Conf |
COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts
| Chetan Raghuprasad | reverse-engineeringpentestingincident-response |
| 2024-08-29 | Tool demo | Hitb Sec Conf |
eBPFShield
| Sagar Bhure | idsincident-responsenetwork-monitoring+1 |
| 2024-08-08 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve | active-directory |
| 2024-05-07 | Talk | Rsac |
Anatomy of a Vulnerability Response - A View from the Inside
| Mohit Arora | vulnerability-managementincident-responserisk-management+1 |
| 2024-03-21 | Talk | Can Sec West |
Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server
| Arif Hussain | vulnerability-managementpentestingsecurity-architecture+1 |
| 2023-10-13 | Talk | Hackfest |
Exploring RAM Forensic Analysis for Effective Digital Investigations
| Sneha Banerjee | forensic |
| 2023-08-07 | Talk | C0c0n |
Chinese APT against Government officials using G7 summit lure
| Niranjan Jayanand | aptincident-responsethreat-hunting |
| 2023-08-07 | Talk | C0c0n |
Cyber Threats to Global Financial Systems
| Lince Lawrence | incident-responserisk-management |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | threat-huntingdigital-forensicsincident-response+1 |
| 2023-08-07 | Talk | C0c0n |
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs
| Sathwik RAM Prakki | aptreverse-engineeringincident-response |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | incident-responsethreat-huntingsecurity-monitoring+1 |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | incident-responsesecurity-architecturerisk-management+2 |
| 2023-08-07 | Talk | C0c0n |
Cellibrite Premium Mobile Forensic tool iPhone analysis
| Vaibhav Kumar | mobile-securitymobile-forensicsreverse-engineering+3 |
| 2023-08-06 | Talk | C0c0n |
Cybercrimes Victim Compensation : Legal Remedies and Process
| Nisheeth Dixit | compliancegovernancerisk-management+1 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | threat-huntingdigital-forensicsnetwork-forensics+3 |
| 2023-08-06 | Talk | C0c0n |
Insider Threats - Best Practices and Common Pitfalls
| Georgie Kurien | insider-threatsrisk-managementsecurity-awareness+1 |
| 2023-08-06 | Talk | C0c0n |
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable
| Abhijith B R | incident-responsevulnerability-managementrisk-management |
| 2023-08-06 | Talk | C0c0n |
Russia-Ukraine Warfare โ A Shift in Cyber Threat Landscape
| Jaydev Joshi, Simran Kothari | threat-landscapeincident-responsevulnerability-management |
| 2023-08-06 | Talk | C0c0n |
Survivability in the Cyber World
| Sunil Varkey | incident-responserisk-managementsecurity-architecture |
| 2022-09-29 | Talk | Brucon |
0wn-premises: Bypassing Microsoft Defender for Identity
| Nikhil Mittal | red-teamingactive-directorythreat-detection |
| 2022-09-24 | Talk | C0c0n |
Cryptocurrency Forensics
| Bhushan Gulabrao Borase | forensicsdigital-forensicsblockchain-security+2 |
| 2022-09-23 | Talk | C0c0n |
Battle of 300 Crore - how they lost it and got most of it back
| Prashant Choudhary | incident-responsevulnerability-managementrisk-management+1 |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | ransomwareincident-responsevulnerability-management |
| 2022-09-23 | Talk | C0c0n |
Tracking the Bad guys. An interesting story of how the criminal underground operates
| Aarushi Koolwal, Anjana Sathyan | threat-huntingincident-response |
| 2021-11-13 | Talk | C0c0n |
Decoding new age hackers and Criminal Investigation
| Amit Dubey | incident-responsedigital-forensicsreverse-engineering |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma | industrial-control-systems-securitycritical-infrastructurethreat-hunting+1 |
| 2021-11-13 | Talk | C0c0n |
Case Study - Cyber Heist in a Bank and Recovery of Systems and Money
| Prashant Choudhary | incident-responseforensicsrecovery+1 |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | mobile-securityincident-responsevulnerability-management |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | cybersecurity-strategiesthreat-landscaperisk-management+4 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | incident-responsesecurity-awarenessdevsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | risk-managementincident-responsesecurity-awareness+3 |
| 2021-11-13 | Talk | C0c0n |
Cyber Warfare & Securing Critical Infrastructures
| Faruk Kazi | critical-infrastructureindustrial-control-systems-securityincident-response+1 |
| 2021-11-13 | Talk | C0c0n |
Emerging trends in cyber crimes : Investigation tools & techniques
| Triveni Singh | incident-responsevulnerability-managementdigital-forensics |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | threat-huntingthreat-detectionthreat_modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Painting Your Organizations with Shades of Red, Blue & Purple
| Hidayath Khan | red-teamingethical-hackingthreat_modeling+2 |
| 2021-11-12 | Talk | C0c0n |
2021 Supply Chain Attacks Analysis
| Ajit Hatti | vulnerability-managementincident-responserisk-management+2 |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | malwareforensic |
| 2021-08-07 | Tool demo | Defcon |
Tenacity- An Adversary Emulation Tool for Persistence
| Atul Nair, Harshal Tupsamudre | incident-responsevulnerability-management |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey | incident-responserisk-management |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | risk-managementsecurity-awarenesscompliance-governance+1 |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | iotforensic |
| 2020-08-06 | Tool demo | Blackhat |
MSTICpy: The Security Analysis Swiss Army Knife
| Ashwin Patil | data-forensicsincident-response |
| 2020-08-06 | Tool demo | Blackhat |
Dynamic Labs: Windows & Active Directory Exploitation
| Rohan Durve | windowsactive-directory |
| 2020-03-06 | Tool demo | Nullcon |
Providence
| Swapnil Kumbhar, Akshay Shah | incident-responselinuxmacos+2 |
| 2019-12-04 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | macossecure-codingforensic+2 |
| 2019-10-12 | Talk | Texas Cyber Summit |
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | incident-responsethreat-huntingioc+3 |
| 2019-09-27 | Talk | C0c0n |
RANSOMWARE - to pay or not to pay
| Seshaprakash Kusuma Sreenivasa | ransomwareincident-responserisk-management |
| 2019-08-10 | Talk | Defcon |
RACE - Minimal Rights and ACE for Active Directory Dominance
| Nikhil Mittal | active-directoryredteamwindows |
| 2019-08-08 | Tool demo | Defcon |
PcapXray
| Srinivas Piskala Ganesh Babu | forensicnetworkwireshark+1 |
| 2019-08-07 | Tool demo | Blackhat |
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan, Kunal Aggarwal | virtual-machineblueteamforensic+2 |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | incident-responsethreat-hunting |
| 2019-03-28 | Talk | Blackhat |
Investigating Malware Using Memory Forensics - A Practical Approach
| Monnappa K A | forensicblueteam |
| 2018-10-10 | Talk | Brucon |
Forging Trusts for Deception in Active Directory
| Nikhil Mittal | windowsactive-directoryredteam |
| 2018-10-05 | Talk | C0c0n |
Using Fault Injection for Forensics
| Yashin Mehaboobe | forensic |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | incident-responsevulnerability-managementsecurity-architecture |
| 2018-09-06 | Talk | Grrcon |
Angad: A Malware Detection Framework using Multi-Dimensional Visualization
| Ankur Tyagi | blueteamAutomationpentest+1 |
| 2018-08-11 | Tool demo | Defcon |
ADRecon: Active Directory Recon
| Prashant Mahajan | active-directorywindowsreconnaissance+1 |
| 2018-08-11 | Tool demo | Defcon |
Angad: A Malware Detection Framework using Multi-Dimensional Visualization
| Ankur Tyagi | blueteamAutomationpentest+1 |
| 2018-08-09 | Tool demo | Blackhat |
rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | opensourceincident-responserest-api+1 |
| 2018-08-08 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | macossecure-codingforensic+2 |
| 2018-08-08 | Tool demo | Blackhat |
ADRecon: Active Directory Recon
| Prashant Mahajan | active-directorywindowsreconnaissance+1 |
| 2018-08-08 | Tool demo | Blackhat |
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan | virtual-machineblueteamforensic+2 |
| 2018-03-22 | Tool demo | Blackhat |
ADRecon: Active Directory Recon
| Prashant Mahajan | active-directorywindowsreconnaissance+1 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab | social-engineeringsecurity-awarenessrisk-management+1 |
| 2017-08-18 | Talk | C0c0n |
Cyber bullying-Screen the Mean
| Nitin Awade, Surjata Awade | security-awarenessincident-responsedigital-forensics |
| 2017-07-27 | Talk | Blackhat |
Evading Microsoft ATA for Active Directory Domination
| Nikhil Mittal | active-directoryredteampentest+1 |
| 2017-04-19 | Talk | Brucon |
Evading Microsoft ATA for Active Directory Domination
| Nikhil Mittal | active-directoryredteamwindows |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | incident-responsevulnerability-managementrisk-management+2 |
| 2016-10-05 | Talk | Virus Bulletin |
One-Click Fileless Infection
| Himanshu Anand | reverse-engineeringincident-responsevulnerability-management |
| 2016-08-19 | Talk | C0c0n |
SSD Forensics : A Nightmare for Forensic Investigators
| Santosh Khadsare | forensic |
| 2016-08-06 | Tool demo | Defcon |
Visual Network and File Forensics using Rudra
| Ankur Tyagi | analysisblueteamnetwork+2 |
| 2016-08-03 | Tool demo | Blackhat |
Visual Network and File Forensics Using Rudra
| Ankur Tyagi | analysisblueteamforensic+1 |
| 2016-04-01 | Tool demo | Blackhat |
Rudra: The Destroyer of Evil
| Ankur Tyagi | analysisblueteamnetwork+2 |
| 2015-11-13 | Tool demo | Blackhat |
Rudra - The Destroyer of Evil
| Ankur Tyagi | analysisblueteamnetwork+2 |
| 2015-11-05 | Talk | Ground Zero Summit |
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
| Jiten Jain | incident-responsereverse-engineeringpentesting |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | network-forensicspacket-analysisnetwork-monitoring+3 |
| 2015-08-08 | Talk | Defcon |
Chigula โ a framework for Wi-Fi Intrusion Detection and Forensics
| Vivek Ramachandran | networkwifiintrusion-detection+2 |
| 2015-08-08 | Tool demo | Defcon |
Rudra
| Ankur Tyagi | analysisblueteamnetwork+2 |
| 2015-08-05 | Tool demo | Blackhat |
Rudra - The Destroyer of Evil
| Ankur Tyagi | analysisblueteamnetwork+2 |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | vulnerability-managementautomated-scanningvulnerability-assessment+2 |
| 2015-02-06 | Talk | Nullcon |
Hunting and Decrypting Ghost communications using Memory Forensics
| Monnappa K A | forensicblueteamnetwork |
| 2015-01-27 | Talk | Owasp App Sec California |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | reverse-engineeringvulnerability-managementincident-response+1 |
| 2014-11-13 | Talk | Ground Zero Summit |
Detecting Fake Cell Phone Towers
| Vijay Mukhi | network-pentestingnetwork-forensicsmobile-security+2 |
| 2014-09-18 | Talk | App Sec Usa |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | reverse-engineeringmemory-forensicsincident-response+1 |
| 2013-11-07 | Talk | Ground Zero Summit |
Approach to containing the outbreak of malicious information in online social networks
| Sriniketh Vijayaraghavan | incident-responsesocial-engineering |
| 2013-11-07 | Talk | Ground Zero Summit |
Understanding the anatomy of advanced targeted attacks โ The Trend Micro approach
| Tarun Gupta | forensic |
| 2013-09-13 | Talk | Grrcon |
Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution
| Prajwal Panchmahalkar | pentestingforensicsdigital-forensics+2 |
| 2012-09-29 | Talk | Nullcon |
Next-gen Forensics
| K K Mookhey | forensicsdigital-forensicsincident-response+2 |
| 2012-09-26 | Talk | Nullcon |
Forensics Timeline Analysis
| Aashish Kunte | forensicanalysisblueteam |
| 2012-08-03 | Talk | C0c0n |
I haz you and pwn your maal
| Harsimran Singh Walia | androidmobilereverse-engineering+1 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | malwarebotnetweb-security+2 |
| 2011-12-04 | Talk | Clubhack |
Android Forensics
| Manish Chasta | mobileandroidforensic |
| 2011-10-07 | Talk | C0c0n |
Digital Evidence
| Sushanth Samudrala | forensic |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | incident-responsedata-analytics |
| 2011-02-25 | Talk | Nullcon |
Incident Management and Beyond
| Dinesh O Bareja | incident-responseincident-managementinfrastructure |
| 2010-12-04 | Talk | Clubhack |
Windows Memory Forensic Analysis
| Aashish Kunte | windowsforensicanalysis |
| 2010-08-01 | Talk | C0c0n |
Concept, Methodology and Challenges in Computer Forensics
| Sebastian Edassery | forensic |
| 2010-08-01 | Talk | C0c0n |
Dangers and dynamic Malware analysis
| Chandrasekar | forensic |
| 2009-12-05 | Talk | Clubhack |
Incident Handling and Log Analysis for Web Based Incidents
| Manindra Kishore | incident-responselogsweb+2 |
| 2009-12-05 | Talk | Clubhack |
Advance Computer Forensic concepts (windows)
| Kush Wadhwa | forensicwindows |
| 2009-11-17 | Talk | Securitybyte |
Behind the scenes at the MSRC
| Suresh Venkateswaran | incident-responseforensic |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | business-continuityrisk-managementbusiness-resilience+3 |
| 2009-08-06 | Talk | C0c0n |
Cyber Victimisation
| K Jaishankar | cybersecurity-educationsecurity-awarenessrisk-management+2 |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | forensic |
| 2007-12-09 | Talk | Clubhack |
Mining Digital Evidence in Microsoft Windows โ Answering Who, When, Why and How?
| Chetan Gupta | forensicwindows |
| 2007-08-02 | Talk | Blackhat |
Smoke ’em Out!
| Rohyt Belani | forensicincident-responseweb |
| 2007-08-02 | Talk | Blackhat |
The Evolution Of Phishing To Organized Crime
| Rohyt Belani | social-engineeringphishingthreat_modeling+2 |
| 2004-04-21 | Talk | Can Sec West |
Cisco PSIRT TCP/BGP
| Sharad Ahlawat | incident-responseforensic |