| 2026-03-01 | Talk | Nullcon |
Phantom Code: Evading Windows 11 25H2 Through POSIX-Based Self-Deletion and Stealth Injection
| Jakkaraju Varshith, Vivek Joshi | #evasion#windows#process-injection+2 |
| 2026-02-28 | Talk | Nullcon |
Demystifying Driver Research: A systematic approach for vulnerability hunting
| Priyanshu Sharma | #fuzzing#vulnerability-research#zero-day+2 |
| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | #web-security#malware-detection#browser-security+2 |
| 2025-08-06 | Tool demo | Blackhat |
ARC – Artifact Reuse Comparator
| Rushikesh D Nandedkar | #static-analysis#reverse-engineering#binary-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | #reverse-engineering#binary-analysis#code-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
ProcessInjection
| Chirag Savla | #security-assessment#red-teaming#reverse-engineering+1 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#exploitation#security-assessment+2 |
| 2025-08-06 | Tool demo | Blackhat |
ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis
| Mohammed Tanveer | #reverse-engineering#binary-analysis#static-analysis+3 |
| 2025-04-04 | Tool demo | Blackhat |
Decoy Mutex
| Madhukar Raina | #ransomware#endpoint-protection#malware-prevention+3 |
| 2025-04-04 | Talk | Blackhat |
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
| Vikas Gupta, Peter Garba | #reverse-engineering#code-analysis#software-security |
| 2025-03-14 | Talk | Insomnihack |
The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques)
| Dhiraj Mishra | #endpoint-protection#security-testing#malware-distribution |
| 2025-03-01 | Talk | Nullcon |
MacOS Lockdown Mode: A Forensic Deep Dive
| Bhargav Rathod | #macos#digital-forensics#endpoint-protection+3 |
| 2024-12-12 | Tool demo | Blackhat |
DarkWidow: Customizable Dropper Tool Targeting Windows
| Soumyanil Biswas | #darkwidow#windows#dynamic-analysis+2 |
| 2024-11-16 | Talk | C0c0n |
Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers
| Nihar Sawant, Jaydev Joshi | #ransomware#phishing#supply-chain-security |
| 2024-11-15 | Talk | C0c0n |
Know your Enemies: Deep Dive into Ransomware Threat Groups
| Niranjan Jayanand | #ransomware#endpoint-protection#dynamic-analysis |
| 2024-11-15 | Talk | C0c0n |
Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate
| Kartik Lalan | #automotive-cybersecurity#reverse-engineering#security-assessment+1 |
| 2024-10-02 | Talk | Virusbulletin |
Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study
| Sathwik RAM Prakki | #reverse-engineering#apt#malware-reverse-engineering |
| 2024-08-30 | Talk | Hitbsecconf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | #web-security#security-assessment#exploitation+2 |
| 2024-08-29 | Talk | Hitbsecconf |
COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts
| Chetan Raghuprasad, Joey Chen | #reverse-engineering#security-assessment#incident-management |
| 2024-08-15 | Talk | Usenix |
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks
| Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik | #binary-analysis#reverse-engineering#deep-learning+1 |
| 2024-08-14 | Talk | Usenix |
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | #reverse-engineering#architecture#security-assessment |
| 2024-08-09 | Panel | Defcon |
Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors
| Abhijith B R, Nikhil Mittal, Adam Pennington, Ken Kato, Ashley Stryker | #ransomware#apt#dfir+2 |
| 2024-08-07 | Tool demo | Blackhat |
DarkWidow: Dropper/PostExploitation Tool targeting Windows
| Soumyanil Biswas, Chirag Savla | #red-teaming#malware-research#post-exploitation+2 |
| 2024-04-19 | Tool demo | Blackhat |
Malware clustering using unsupervised ML : CalMal
| Himanshu Anand | #machine-learning#ai-security#malware-detection+3 |
| 2023-11-17 | Talk | Deepsec |
Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption
| Shubham Dubey | #reverse-engineering#exploitation#architecture |
| 2023-09-23 | Talk | Nullcon |
The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis
| Nikhil Ashok Hegde | #malware-detection#linux#dynamic-analysis+2 |
| 2023-09-23 | Talk | Nullcon |
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers
| Rishit Bansal | #reverse-engineering#linux#firmware-analysis |
| 2023-09-23 | Talk | Nullcon |
Your App Is Probably A Spyware…Or Is It?
| Gaurav Gogia, Pandurang Patil | #spyware#secure-development#security-testing+3 |
| 2023-08-24 | Talk | Hitbsecconf |
Hardware Backdooring an eScooter
| Arun Mane | #reverse-engineering#ics-security#automotive-cybersecurity |
| 2023-08-13 | Tool demo | Blackhat |
Advanced ROP Framework: Pushing ROP to Its Limits
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#security-assessment#exploitation+2 |
| 2023-08-10 | Tool demo | Blackhat |
MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments
| Aditya K Sood | #ransomware#malware-detection#security-tools |
| 2023-08-10 | Talk | Defcamp |
Hardware Backdooring an e-Scooter
| Arun Mane | #reverse-engineering#ics-security#automotive-cybersecurity |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | #firmware-analysis#reverse-engineering#automotive-cybersecurity |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-08-07 | Talk | C0c0n |
Cellibrite Premium Mobile Forensic tool iPhone analysis
| Vaibhav Kumar | #mobile-forensics#reverse-engineering#forensics+2 |
| 2023-08-07 | Talk | C0c0n |
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs
| Sathwik RAM Prakki | #apt#reverse-engineering#incident-management |
| 2023-08-07 | Talk | C0c0n |
Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos
| Nikhil Prabhakar | #android-security#reverse-engineering#dynamic-analysis |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | #threat-hunting#digital-forensics#network-forensics+3 |
| 2023-08-06 | Talk | C0c0n |
Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape
| Jaydev Joshi, Simran Kothari | #threat-landscape#incident-management#cyber-war+1 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | #architecture#security-training#reverse-engineering |
| 2023-06-01 | Talk | Securityfest |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #reverse-engineering#appsec#endpoint-protection+4 |
| 2022-09-24 | Talk | C0c0n |
Cryptocurrency Forensics
| Bhushan Gulabrao Borase | #forensics#digital-forensics#cryptocurrency+1 |
| 2022-09-24 | Panel | C0c0n |
Ransom Trends in India
| Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran | #ransomware#data-loss-prevention#incident-management+2 |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | #embedded-security#firmware-analysis#security-assessment+1 |
| 2022-09-23 | Talk | C0c0n |
Log4j vulnerability continuous to be favourite for APT groups through mid 2022
| Niranjan Jayanand | #security-assessment#apt#exploit-kit+1 |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | #ransomware#incident-management#malware-prevention+2 |
| 2022-09-23 | Talk | C0c0n |
Hacking SmartContracts
| Anto Joseph | #smart-contracts#reverse-engineering#secure-coding |
| 2022-09-23 | Talk | C0c0n |
Pwning Android Apps at Scale
| Sparsh Kulshrestha, Shashank Barthwal | #android-security#mobile-pentesting#reverse-engineering+2 |
| 2022-09-23 | Talk | C0c0n |
TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor
| Saurabh Sharma, Noushin Shabab | #reverse-engineering#security-assessment#iot-pentesting |
| 2022-09-08 | Talk | Nullcon |
The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple
| Amit Malik, Pratik Jeware | #macos#malware-detection#endpoint-protection |
| 2022-08-25 | Talk | Hitbsecconf |
Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle
| Rahul Sasi, Vishal Singh | #social-engineering#security-assessment#botnet+1 |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | #reverse-engineering#dynamic-analysis#network-pentesting+4 |
| 2022-07-23 | Talk | Hope |
Combating Ransom-War: Evolving Landscape of Ransomware Infections in Cloud Databases
| Aditya K Sood | #ransomware#cloud-pentesting#data-protection |
| 2022-05-18 | Talk | Cansecwest |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | #firmware-analysis#reverse-engineering#embedded-security |
| 2021-11-18 | Talk | Hackinparis |
{Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets
| Aditya K Sood | #iot-pentesting#iot-security-testing#botnet |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | #threat-detection#threat-hunting#malware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Decoding new age hackers and Criminal Investigation
| Amit Dubey | #incident-management#digital-forensics#reverse-engineering |
| 2021-11-13 | Talk | C0c0n |
New way of looking at the hidden mysteries in the code
| Vandana Verma Sehgal | #code-review#static-analysis#reverse-engineering+2 |
| 2021-11-12 | Talk | C0c0n |
Dissecting Malicious Software and Analysis
| Shrutirupa Banerjiee | #reverse-engineering#dynamic-analysis#static-analysis |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | #threat-hunting#threat-modeling#architecture+1 |
| 2021-08-04 | Tool demo | Blackhat |
ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing
| Parbati Kumar Manna | #reverse-engineering#application-pentesting#code-review+4 |
| 2020-11-20 | Talk | Deepsec |
What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis
| Shyam Sundar Ramaswami | #malware-detection#sandbox#static-analysis+1 |
| 2020-10-07 | Talk | Rootcon |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | #red-teaming#security-assessment#reverse-engineering |
| 2020-10-02 | Tool demo | Blackhat |
MalViz.ai
| Vasu Sethia, Shivam Kataria | #blueteam#machine-learning#deep-learning+3 |
| 2020-10-01 | Tool demo | Blackhat |
Adhrit: Android Security Suite
| Abhishek Jm, Akhil Mahendra | #android#code-analysis#reverse-engineering+1 |
| 2020-09-18 | Talk | C0c0n |
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux
| Munawwar Hussain Shelia | #reverse-engineering#firmware-analysis#embedded-systems+4 |
| 2020-03-18 | Talk | Cansecwest |
The ARM-X Firmware Emulation Framework
| Saumil Shah | #red-teaming#arm#firmware+4 |
| 2020-03-06 | Tool demo | Nullcon |
F.R.I.D.A.Y
| Shyam Sundar Ramaswami | #blueteam#dynamic-analysis#sandbox+2 |
| 2020-03-06 | Tool demo | Nullcon |
FRISPY
| Tejas Girme, Parmanand Mishra | #spyware#red-teaming#api-security+3 |
| 2019-11-09 | Talk | Toorcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Ang Cui | #reverse-engineering#hardware-reverse-engineering#architecture+2 |
| 2019-11-07 | Talk | Powerofcommunity |
Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’??
| Kushal Shah | #vulnerability-assessment#fuzzing#reverse-engineering+2 |
| 2019-10-22 | Talk | Hacklu |
Intro to Dark Arts: Getting Started with CTFs
| Geethna T K, Shruti Dixit, Sowmya Potluri | #reverse-engineering#binary-analysis#exploitation+1 |
| 2019-10-12 | Talk | Texascybersummit |
HX-3012 PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | #reverse-engineering#binary-analysis#executable-analysis+1 |
| 2019-10-03 | Talk | Virusbulletin |
Curious tale of 8.t used by multiple campaigns against South Asia
| Niranjan Jayanand, Ivan Macalintal, Debalina Ghosh | #reverse-engineering#apt#malware-reverse-engineering |
| 2019-09-27 | Talk | C0c0n |
Advanced Persistent Threat and counter measures
| A a Gafoor | #blueteam#apt#network-defense+4 |
| 2019-09-27 | Talk | C0c0n |
RANSOMWARE - to pay or not to pay
| Seshaprakash Kusuma Sreenivasa | #ransomware#incident-management#risk-management |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Rick Housley, Ang Cui | #reverse-engineering#architecture#hardware-reverse-engineering+1 |
| 2019-08-09 | Award | |
Thrangrycat - Pwnie Award for Most Under-Hyped Research
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#firmware-analysis+2 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#exploit-delivery+3 |
| 2019-08-08 | Talk | Defcon |
Hacking ICS devices for Fun Penetration Testing of Vehicle Components
| Arun Mane | #automotive-cybersecurity#can-bus#ics-security+2 |
| 2019-03-28 | Talk | Blackhat |
Investigating Malware Using Memory Forensics - A Practical Approach
| Monnappa K A | #forensics#blueteam#malware-detection+1 |
| 2018-11-29 | Talk | Deepsec |
DNS Exfiltration and Out-of-Band Attacks
| Nitesh Shilpkar | #dns#red-teaming#malware-detection |
| 2018-10-15 | Talk | Hacklu |
Come to the dark side! We have radical insurance groups & ransomware
| Ankit Gangwal, Eireann Leverett | #ransomware#risk-management#cyber-insurance+2 |
| 2018-10-10 | Talk | Brucon |
Simplifying the art of instrumentation
| Krishnakant Patil, Rushikesh D Nandedkar | #reverse-engineering#static-analysis#dynamic-analysis+2 |
| 2018-10-05 | Talk | C0c0n |
SCANDA: To Unbosom Malware Behavior
| Rajesh Nikam, Parmanand Mishra | #reverse-engineering#dynamic-analysis#malware-research+1 |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | #malware-detection#static-analysis#dynamic-analysis+3 |
| 2018-09-06 | Talk | Grrcon |
Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI
| Pranshu Bajpai, Richard Enbody | #encryption#ransomware#dynamic-analysis+1 |
| 2018-07-21 | Talk | Hope |
Evidential Study of IoT Botnets - The Bad and The Ugly!
| Aditya K Sood | #botnet#iot-security-testing#malware-research |
| 2017-11-20 | Talk | Hackfest |
How my SV Machine nailed your Malware
| Nikhil Prabhakar | #android-security#machine-learning#malware-detection |
| 2017-10-05 | Talk | Virusbulletin |
The router of all evil: more than just default passwords and silly scripts
| Himanshu Anand, Chastine Menrige | #reverse-engineering#security-assessment#firmware-analysis |
| 2017-08-18 | Talk | C0c0n |
Hunting Botnets with Analytics
| Shomiron Das Gupta | #botnet#blueteam#security-analytics+2 |
| 2017-08-18 | Talk | C0c0n |
Anti-Virus Bypassing for Fun and Profit
| Vanshit Malhotra | #red-teaming#malware-research#bypassing+2 |
| 2017-08-18 | Talk | C0c0n |
Yarafying Android Malware: A Missing Step Before Malware Analysis
| Shivang Desai | #android#blueteam#android-security+3 |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | #dynamic-analysis#reverse-engineering#binary-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Your friendly neighbourhood exploit
| Aseem Jakhar | #exploitation#security-assessment#reverse-engineering |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala, Lukasz Chmielewski | #reverse-engineering#architecture#embedded-security |
| 2017-06-24 | Talk | Lehack |
How my SV Machine nailed your Malware
| Nikhil Prabhakar | #android-security#machine-learning#malware-detection |
| 2017-04-13 | Keynote | Hitbsecconf |
Redefining Defense
| Saumil Shah | #blueteam#security-strategy#incident-management+2 |
| 2017-03-31 | Talk | Blackhat |
WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION
| Monnappa K A | #code-injection#red-teaming#malware-research+4 |
| 2016-11-06 | Talk | Groundzerosummit |
Hacking The Droids
| Anto Joseph | #android-security#reverse-engineering#security-assessment+2 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | #reverse-engineering#evil-twin-attack#network-monitoring+3 |
| 2016-10-13 | Talk | Appsecusa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah | #reverse-engineering#secure-development#ble+4 |
| 2016-10-05 | Talk | Virusbulletin |
One-Click Fileless Infection
| Himanshu Anand, Chastine Menrige | #reverse-engineering#incident-management#endpoint-protection+3 |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen | #automated-exploit-detection#reverse-engineering#vulnerability-assessment+1 |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2016-08-04 | Tool demo | Blackhat |
Maltese (Malware Traffic Emulating Software)
| Sasi Siddharth | #dns#secure-coding#malware-detection+2 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2016-05-26 | Talk | Hitbsecconf |
HITB Lab: Mobile Application Security for iOS and Android
| Tushar Dalvi, Tony Trummer | #android#ios#security-assessment+2 |
| 2016-05-17 | Talk | Phdays |
Fingerprinting and Attacking a Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#fingerprinting#ransomware+4 |
| 2016-04-01 | Tool demo | Blackhat |
LIMON-SANDBOX FOR ANALYZING LINUX MALWARES
| Monnappa K A | #linux#dynamic-analysis#static-analysis+2 |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh, Lea Paul | #security-assessment#ethical-hacking#privilege-escalation+2 |
| 2016-03-11 | Talk | Nullcon |
Physical Lock Security
| Amey Gat, Swapnil Wadwalkar | #security-assessment#reverse-engineering#hardware-hacking |
| 2015-11-13 | Talk | Blackhat |
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX
| Monnappa K A | #linux#security-assessment#malware-research+4 |
| 2015-11-12 | Tool demo | Blackhat |
Nishang - Tracking A Windows User
| Nikhil Mittal | #windows#red-teaming#endpoint-protection+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Browser based Malware attacks
| Harsh Daftary | #red-teaming#keylogging#phishing |
| 2015-11-05 | Talk | Groundzerosummit |
Dissecting Android Malware
| Anto Joseph | #android#application-pentesting#dynamic-analysis+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
| Jiten Jain | #incident-management#reverse-engineering#security-assessment |
| 2015-08-07 | Talk | Defcon |
Getting into the Trust Store We Trust
| Ajit Hatti | #reverse-engineering#architecture#security-strategy |
| 2015-08-06 | Talk | Blackhat |
Harnessing Intelligence from Malware Repositories
| Arun Lakhotia, Vivek Notani | #blueteam#security-analytics#malware-research+2 |
| 2015-08-01 | Talk | C0c0n |
Reversing and Deciphering the Cyber Espionage Malware Communications
| Monnappa K A | #reverse-engineering#decipher#malware-research+3 |
| 2015-03-15 | Talk | Hitbsecconf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | #network-pentesting#packet-analysis#network-monitoring+2 |
| 2015-02-06 | Talk | Nullcon |
Hunting and Decrypting Ghost communications using Memory Forensics
| Monnappa K A | #forensics#blueteam#memory-forensics+2 |
| 2015-01-27 | Talk | Owaspappseccalifornia |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | #reverse-engineering#incident-management#architecture |
| 2014-10-16 | Talk | Grrcon |
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#reverse-engineering#blueteam+1 |
| 2014-09-26 | Talk | Virusbulletin |
Evolution of Android exploits from a static analysis tools perspective
| Jagadeesh Chandraiah, Anna Szalay | #android-security#static-analysis#reverse-engineering |
| 2014-09-25 | Talk | Virusbulletin |
Optimized mal-ops. Hack the ad network like a boss
| Rahul Kashyap, Vadim Kotov | #browser-security#web-security#malware-distribution+1 |
| 2014-09-18 | Talk | Appsecusa |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | #reverse-engineering#memory-forensics#incident-management |
| 2014-09-16 | Talk | Deepsec |
Advanced Powershell Threat – Lethal Client Side Attacks
| Nikhil Mittal | #powershell#red-teaming#endpoint-protection+4 |
| 2014-08-22 | Talk | C0c0n |
Piracy Tracker
| Vargheese Babu | #blueteam#network-monitoring#security-analytics+3 |
| 2014-08-06 | Talk | Blackhat |
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels!
| Aditya K Sood | #botnet#red-teaming#blueteam+1 |
| 2014-05-29 | Talk | Hitbsecconf |
Hacking Your Cable TV Network: Die Hard Style
| Rahul Sasi | #red-teaming#iptv#reverse-engineering |
| 2014-03-15 | Talk | Blackhat |
Anatomy of a Credit Card Stealing POS Malware
| Amol Sarwate | #reverse-engineering#security-assessment#security-testing |
| 2014-02-14 | Talk | Nullcon |
Flowinspect - A Network Inspection Tool
| Ankur Tyagi | #security-assessment#malware-detection#network-monitoring+2 |
| 2014-01-28 | Talk | Owaspappseccalifornia |
Application Sandboxes: Know thy limits
| Rahul Kashyap | #application-pentesting#reverse-engineering#exploit-development |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2013-11-07 | Talk | Groundzerosummit |
Malware for Firefox Mobile OS
| Shantanu Gawde | #mobile-malware#malware-detection#malware-research+2 |
| 2013-11-07 | Talk | Groundzerosummit |
Approach to containing the outbreak of malicious information in online social networks
| Sriniketh Vijayaraghavan | #incident-management#social-engineering#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Understanding the anatomy of advanced targeted attacks – The Trend Micro approach
| Tarun Gupta | #forensics#malware-research#attack-surface |
| 2013-10-19 | Talk | Toorcon |
Static Malware Analysis with PyTriage
| Yashin Mehaboobe | #malware-detection#static-analysis#malware-research+1 |
| 2013-09-27 | Talk | C0c0n |
ARM, Thumb and the Finger
| Aseem Jakhar | #reverse-engineering#binary-analysis#assembly-analysis+2 |
| 2013-09-27 | Talk | C0c0n |
Sandy - The Malicious Analysis
| Rahul Sasi | #reverse-engineering#static-analysis#dynamic-analysis |
| 2013-08-01 | Tool demo | Blackhat |
XENOTIX xBOT
| Ajin Abraham | #botnet#linux#windows+3 |
| 2013-08-01 | Talk | Blackhat |
Hot knives through butter: Bypassing automated analysis systems
| Abhishek Singh, Zheng Bu | #red-teaming#dynamic-analysis#malware-research+1 |
| 2013-03-22 | Talk | Insomnihack |
Guns and Smoke to fight Mobile Malware
| Ruchna Nigam | #android-security#malware-research#reverse-engineering+2 |
| 2013-03-15 | Talk | Blackhat |
The Sandbox Roulette- Are you ready for the gamble?
| Rahul Kashyap, Rafal Wojtczuk | #blueteam#application-pentesting#dynamic-analysis+3 |
| 2012-11-23 | Talk | Malcon |
Advanced Malware Engine
| Mohit Kumar | #android#red-teaming#malware-research+3 |
| 2012-11-23 | Talk | Malcon |
Windows Phone 8 Malware Prototype
| Shantanu Gawde | #windows-phone#red-teaming#mobile-device-management+3 |
| 2012-11-23 | Talk | Malcon |
Surprise paper!
| Atul Alex | #reverse-engineering#ios-security#mobile-hacking |
| 2012-10-25 | Talk | Appsecusa |
Cracking the Code of Mobile Application
| Sreenarayan Ashokkumar | #reverse-engineering#mobile-pentesting#android-security+2 |
| 2012-10-23 | Talk | Hacklu |
Buster: Android Security Buster
| Atul Alex | #android-security#reverse-engineering#mobile-malware |
| 2012-09-28 | Talk | Nullcon |
Attacking Angry Droids
| Aditya Gupta, Subho Halder | #android-security#reverse-engineering#security-assessment+1 |
| 2012-09-27 | Talk | Grrcon |
The Realm of Third Generation Botnet Attacks
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#botnet#dynamic-analysis+1 |
| 2012-08-03 | Talk | C0c0n |
Cracking the Mobile Application Source Code
| Sreenarayan Ashokkumar | #android#ios#blackberry+2 |
| 2012-08-03 | Talk | C0c0n |
I haz you and pwn your maal
| Harsimran Singh Walia | #android#reverse-engineering#forensics |
| 2012-07-28 | Talk | Defcon |
Botnets Die Hard - Owned and Operated
| Aditya K Sood, Richard J Enbody | #botnet#blueteam#malware-detection+2 |
| 2012-07-22 | Tool demo | Blackhat |
Kautilya and Nishang
| Nikhil Mittal | #post-exploitation#ethical-hacking#security-assessment+1 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | #botnet#web-security#reverse-engineering+1 |
| 2012-03-21 | Talk | Troopers |
More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard
| Nikhil Mittal | #security-assessment#red-teaming#keylogging |
| 2012-02-15 | Talk | Nullcon |
Binary God
| Atul Alex | #red-teaming#emulator#assembler+2 |
| 2012-02-15 | Talk | Nullcon |
Sandboxing The deep truth
| Disha Agarwal, Manish Pali | #fuzzing#sandbox#blueteam |
| 2011-12-15 | Talk | Blackhat |
Kautilya: Teensy Beyond Shell
| Nikhil Mittal | #hid#red-teaming#endpoint-protection+3 |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | #red-teaming#exploit-kit#malware-distribution+4 |
| 2011-12-04 | Talk | Clubhack |
Wi-Fi malware for Fun and Profit
| Vivek Ramachandran | #wifi#malware-distribution#exploit-delivery |
| 2011-11-25 | Talk | Malcon |
Exploit the Exploit kits
| Dhruv Soi | #blueteam#exploit-kit#malware-detection+3 |
| 2011-11-25 | Talk | Malcon |
Mareech : Look it’s a HID made up of gold
| Nikhil Mittal | #hid#red-teaming#keylogging+2 |
| 2011-11-17 | Talk | Deepsec |
FakeAntiVirus - Journey from Trojan to a Persisent Threat
| Jagadeesh Chandraiah | #trojan#reverse-engineering#security-assessment |
| 2011-11-04 | Talk | Hackfest |
Here are your keystrokes
| Nikhil Mittal | #red-teaming#keylogging#security-assessment+1 |
| 2011-10-07 | Talk | C0c0n |
Wi-Fi Malware for Fun and Profit
| Vivek Ramachandran | #red-teaming#network-pentesting#malware-distribution+2 |
| 2011-10-07 | Talk | Virusbulletin |
Browser exploit packs - exploitation paradigm
| Aditya K Sood, Richard J Enbody | #exploit-kit#malware-research#browser-security+1 |
| 2011-10-07 | Talk | C0c0n |
Automated Malware Analysis - Setting up the Environment
| K v Prashant, Pushkar Pashupat | #security-assessment#dynamic-analysis#malware-research+1 |
| 2011-09-19 | Talk | Brucon |
Botnets and Browsers, Brothers in a Ghost Shell
| Aditya K Sood | #botnet#red-teaming#dynamic-analysis+1 |
| 2011-09-19 | Talk | Brucon |
Wifi malware for fun and profit
| Vivek Ramachandran | #wifi#red-teaming#endpoint-protection+3 |
| 2011-09-07 | Talk | Securitybyte |
Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit
| Vivek Ramachandran | #wifi#worm#botnet+1 |
| 2011-09-06 | Talk | Securitybyte |
Botnets at Application+ layer
| Raj Shastrakar | #bot#red-teaming#application-pentesting+4 |
| 2011-08-03 | Talk | Blackhat |
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex
| Shreeraj Shah | #reverse-engineering#ajax#web-security+1 |
| 2011-05-19 | Talk | Hitbsecconf |
Spying on SpyEye – What Lies Beneath?
| Aditya K Sood | #blueteam#botnet#endpoint-protection+4 |
| 2011-02-25 | Talk | Nullcon |
Jugaad Beta: Linux Thread Injection malware PoC
| Aseem Jakhar | #linux#red-teaming#malware-research+2 |
| 2011-02-25 | Talk | Nullcon |
Reversing microsoft patches to reveal vulnerable code
| Harsimran Singh Walia | #reverse-engineering#code-review#static-analysis+1 |
| 2011-02-15 | Talk | Nullcon |
Botnet Detection approach by DNS behavior and clustering analysis
| Nilesh Sharma, Pulkit Mehndiratta | #botnet#dns#blueteam |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar, Kevin Redon | #reverse-engineering#device-security#hardware-embedded+3 |
| 2010-08-01 | Talk | C0c0n |
Dangers and dynamic Malware analysis
| Chandrasekar | #forensics#dynamic-analysis#malware-detection+4 |
| 2010-08-01 | Talk | C0c0n |
Horses, Rats and Bots
| Jairam Ramesh | #botnet#reverse-engineering#security-assessment |
| 2010-06-18 | Talk | Syscan |
REVERSE ENGINEERING WEB 2.0 APPLICATIONS
| Shreeraj Shah | #reverse-engineering#ajax#web-security+1 |
| 2010-02-25 | Talk | Nullcon |
Botnet mitigation, monitoring and management.
| Harshad Patil | #botnet#blueteam#malware-detection+4 |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | #blueteam#malware-detection#application-pentesting+3 |
| 2009-11-18 | Talk | Securitybyte |
Rumbling Infections – Web Malware Ontology
| Aditya K Sood | #dynamic-analysis#malware-research#sandbox+2 |
| 2009-08-01 | Talk | Defcon |
The Making of the second SQL injection Worm
| Sumit Siddharth | #sqli#red-teaming#worm |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering for exploit writers
| Nibin Varghese | #red-teaming#reverse-engineering#exploit-development |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | #secure-coding#reverse-engineering#red-teaming+2 |
| 2008-03-28 | Talk | Blackhat |
Spam-Evolution
| Aseem Jakhar | #social-engineering#malware-detection#anti-phishing |
| 2007-12-19 | Talk | Clubhack |
Backdoor 2.0: Hacking Firefox to steal his web secrets
| Sunil Arora | #red-teaming#application-pentesting#browser-security+2 |
| 2007-12-09 | Talk | Clubhack |
Analysis of Adversarial Code: The Role of Malware Kits!
| Rahul Mohandas | #red-teaming#malware-research#dynamic-analysis+1 |
| 2006-09-21 | Talk | Hitbsecconf |
Finding Secrets in ISAPI
| Nish Bhalla | #secure-coding#reverse-engineering#application-pentesting+4 |
| 2005-10-18 | Talk | Blackhat |
Adware/Spyware
| Saumil Shah, Dave Cole | #blueteam#adware#spyware |