| 2025-08-07 | Talk | Blackhat |
Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing
| Kanika Gupta | reverse-engineeringfirmware-analysismobile-security+2 |
| 2025-08-06 | Tool demo | Blackhat |
ARC β Artifact Reuse Comparator
| Rushikesh D Nandedkar | static-analysisreverse-engineeringbinary-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | reverse-engineeringbinary-analysiscode-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
ProcessInjection
| Chirag Savla | pentestingred-teamingreverse-engineering+1 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank | reverse-engineeringexploitationpentesting+3 |
| 2025-08-06 | Tool demo | Blackhat |
ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis
| Mohammed Tanveer | reverse-engineeringbinary-analysisstatic-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
MORF β Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm | mobile-securityapp-securitymobile-pentesting+4 |
| 2025-08-06 | Tool demo | Blackhat |
Realtic
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat | pentestingvulnerability-assessmentstatic-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker V2
| Devang Solanki | container-securitydockerstatic-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
vet: Proactive Guardrails against Malicious OSS using Code Analysis
| Abhisek Datta | static-analysissoftware-securitydevsecops+3 |
| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | web-securitymalware-detectionbrowser-security+2 |
| 2025-04-04 | Talk | Blackhat |
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
| Vikas Gupta | reverse-engineeringcode-analysissoftware-security |
| 2025-04-04 | Tool demo | Blackhat |
Decoy Mutex
| Madhukar Raina | ransomware |
| 2025-03-14 | Talk | Insomnihack |
The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques)
| Dhiraj Mishra | malware |
| 2024-11-16 | Talk | C0c0n |
Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers
| Nihar Sawant, Jaydev Joshi | ransomware |
| 2024-11-15 | Talk | C0c0n |
Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate
| Kartik Lalan | automotive-cybersecurityvulnerability-managementreverse-engineering+2 |
| 2024-11-15 | Talk | C0c0n |
Know your Enemies: Deep Dive into Ransomware Threat Groups
| Niranjan Jayanand | ransomware |
| 2024-11-06 | Talk | Blackalps |
IDAT Loader: The Malwareβs Camouflaged Weapon
| Niranjan Jayanand | malware |
| 2024-10-02 | Talk | Virus Bulletin |
Arming WinRAR: deep dive into APTs exploiting WinRARβs 0-day vulnerability - a SideCopy case study
| Sathwik RAM Prakki | reverse-engineeringvulnerability-managementapt+1 |
| 2024-08-30 | Talk | Hitb Sec Conf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | web-securitypentestingexploitation+4 |
| 2024-08-29 | Talk | Hitb Sec Conf |
COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts
| Chetan Raghuprasad | reverse-engineeringpentestingincident-response |
| 2024-08-14 | Talk | Usenix |
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors
| Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay | reverse-engineeringvulnerability-managementsecurity-architecture+1 |
| 2024-04-19 | Tool demo | Blackhat |
Malware clustering using unsupervised ML : CalMal
| Himanshu Anand | malware |
| 2023-11-17 | Talk | Deepsec |
Nostalgic Memory β Remembering All the Wins and Losses for Protecting Memory Corruption
| Shubham Dubey | vulnerability-managementreverse-engineeringexploitation+1 |
| 2023-09-23 | Talk | Nullcon |
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers
| Rishit Bansal | reverse-engineering |
| 2023-09-23 | Talk | Nullcon |
Your App Is Probably A Spyware…Or Is It?
| Gaurav Gogia, Pandurang Patil | spyware |
| 2023-08-13 | Tool demo | Blackhat |
Advanced ROP Framework: Pushing ROP to Its Limits
| Shiva Shashank | reverse-engineeringpentestingexploitation+3 |
| 2023-08-10 | Talk | Defcon |
Hardware Backdooring an e-Scooter
| Arun Mane | reverse-engineeringindustrial-control-systems-securityvulnerability-management+2 |
| 2023-08-10 | Talk | Defcon |
Wheels of Wonder: Unveiling Car Hacking Poetry
| Hrishikesh Somchatwar | firmware-analysisreverse-engineeringautomotive-cybersecurity+1 |
| 2023-08-07 | Talk | C0c0n |
Cellibrite Premium Mobile Forensic tool iPhone analysis
| Vaibhav Kumar | mobile-securitymobile-forensicsreverse-engineering+3 |
| 2023-08-07 | Talk | C0c0n |
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs
| Sathwik RAM Prakki | aptreverse-engineeringincident-response |
| 2023-08-07 | Talk | C0c0n |
Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos
| Nikhil Prabhakar | android-securitymobile-securityreverse-engineering+1 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | malwaresecurity-awarenessrisk-management+2 |
| 2023-08-07 | Talk | C0c0n |
Start Left SDLC Security with Open-Source DevSecOps Tooling
| Aswin Raj, Shruti M G | devsecopssecure-developmentstatic-analysis+3 |
| 2023-08-06 | Talk | C0c0n |
Developments in Deep Fake detection
| Tapas Saini | security-architecturesecurity-awarenessreverse-engineering+1 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | threat-huntingdigital-forensicsnetwork-forensics+3 |
| 2022-09-24 | Talk | C0c0n |
Introduction to RFID/NFC Hacking
| Davis Sojan | embedded-securityfirmware-analysishardware-security+3 |
| 2022-09-24 | Talk | C0c0n |
Raining CVEs on Wordpress plugins with Semgrep
| Shreya Pohekar, Syed Sheeraz Ali | web-securitystatic-analysissast+2 |
| 2022-09-24 | Talk | C0c0n |
Cryptocurrency Forensics
| Bhushan Gulabrao Borase | forensicsdigital-forensicsblockchain-security+2 |
| 2022-09-23 | Talk | C0c0n |
Hacking SmartContracts
| Anto Joseph | blockchain-securitysmart-contractsvulnerability-management+2 |
| 2022-09-23 | Talk | C0c0n |
Pwning Android Apps at Scale
| Sparsh Kulshrestha, Shashank Barthwal | android-securitymobile-securitymobile-pentesting+3 |
| 2022-09-23 | Talk | C0c0n |
TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor
| Saurabh Sharma | reverse-engineeringvulnerability-managementpentesting |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | ransomwareincident-responsevulnerability-management |
| 2022-08-25 | Talk | Hitb Sec Conf |
Building An Army Of Bots By Hijacking A Unicornβs Twitter Handle
| Rahul Sasi, Vishal Singh | social-engineeringpentestingmalware+2 |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 β We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | reverse-engineering |
| 2022-05-18 | Talk | Can Sec West |
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices
| Saumil Shah | firmware-analysisreverse-engineeringembedded-security+1 |
| 2021-11-13 | Talk | C0c0n |
Decoding new age hackers and Criminal Investigation
| Amit Dubey | incident-responsedigital-forensicsreverse-engineering |
| 2021-11-13 | Talk | C0c0n |
New way of looking at the hidden mysteries in the code
| Vandana Verma Sehgal | code-reviewstatic-analysisreverse-engineering+2 |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | threat-detectionthreat-huntingmalware-detection+2 |
| 2021-11-12 | Talk | C0c0n |
Dissecting Malicious Software and Analysis
| Shrutirupa Banerjiee | malwarereverse-engineeringdynamic-analysis+1 |
| 2021-11-11 | Tool demo | Blackhat |
DejaVu ++
| Bhadreshkumar Patel, Harish Ramadoss | malwaredefense |
| 2021-11-10 | Tool demo | Blackhat |
RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot
| Abhimanyu Rawat, Shreyas Srinivasa | malwaredefense |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | malwareforensic |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | threat-huntingthreat_modelingsecurity-architecture+2 |
| 2021-08-04 | Tool demo | Blackhat |
ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing
| Parbati Kumar Manna | reverse-engineering |
| 2020-11-20 | Talk | Deepsec |
What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis
| Shyam Sundar Ramaswami | malware |
| 2020-10-07 | Talk | Rootcon |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | iotredteampentest+1 |
| 2020-10-01 | Tool demo | Blackhat |
Adhrit: Android Security Suite
| Abhishek Jm, Akhil Mahendra | androidcode-analysisreverse-engineering+2 |
| 2020-09-18 | Talk | C0c0n |
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux
| Munawwar Hussain Shelia | reverse-engineeringiot |
| 2020-08-09 | Talk | Defcon |
Running an appsec program with open source projects
| Vandana Verma Sehgal | owaspsecure-developmentdevsecops+3 |
| 2020-03-18 | Talk | Can Sec West |
The ARM-X Firmware Emulation Framework
| Saumil Shah | redteamarmfirmware+5 |
| 2020-03-06 | Tool demo | Nullcon |
FRISPY
| Tejas Girme, Parmanand Mishra | spywareredteam |
| 2019-11-09 | Talk | Toor Con |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringvulnerability-management+3 |
| 2019-11-01 | Talk | Hackfest |
The Mechanics of Malware’s Darkside
| Yagnesh Waran P | analysismalware |
| 2019-10-22 | Talk | Hacklu |
Intro to Dark Arts: Getting Started with CTFs
| Geethna T K, Shruti Dixit, Sowmya Potluri | reverse-engineeringbinary-analysisexploitation+1 |
| 2019-10-12 | Talk | Texas Cyber Summit |
HX-3012 PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | reverse-engineeringmalwarebinary-analysis+3 |
| 2019-10-03 | Talk | Virus Bulletin |
Curious tale of 8.t used by multiple campaigns against South Asia
| Niranjan Jayanand | reverse-engineeringvulnerability-managementapt+1 |
| 2019-09-27 | Talk | C0c0n |
RANSOMWARE - to pay or not to pay
| Seshaprakash Kusuma Sreenivasa | ransomwareincident-responserisk-management |
| 2019-09-27 | Talk | C0c0n |
autoSource an automated framework for Source Code Review
| Malkit Singh | code-reviewsecure-codingstatic-analysis+3 |
| 2019-08-09 | Talk | Defcon |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringvulnerability-managementsecurity-architecture+2 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria | reverse-engineeringhardware/embedded |
| 2019-08-08 | Talk | Defcon |
Hacking ICS devices for Fun Penetration Testing of Vehicle Components
| Arun Mane | automotive-cybersecuritycan-busics-security+3 |
| 2018-10-15 | Talk | Hacklu |
Come to the dark side! We have radical insurance groups & ransomware
| Ankit Gangwal | ransomwarerisk-managementcyber-insurance+2 |
| 2018-10-10 | Talk | Brucon |
Simplifying the art of instrumentation
| Krishnakant Patil, Rushikesh D Nandedkar | reverse-engineeringstatic-analysisdynamic-analysis+2 |
| 2018-10-05 | Talk | C0c0n |
SCANDA: To Unbosom Malware Behavior
| Rajesh Nikam, Parmanand Mishra | malwarereverse-engineeringdynamic-analysis+2 |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | malware |
| 2017-10-05 | Talk | Virus Bulletin |
The router of all evil: more than just default passwords and silly scripts
| Himanshu Anand | vulnerability-managementreverse-engineeringpentesting+1 |
| 2017-09-21 | Talk | App Sec Usa |
Androsia: A tool for securing in memory sensitive data
| Samit Anwer | android-securitymobile-securitystatic-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Dynamic Binary Instrumentation
| Vivek Arora, Bhaskar Rastogi | dynamic-analysisreverse-engineeringbinary-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Your friendly neighbourhood exploit
| Aseem Jakhar | exploitationpentestingreverse-engineering+1 |
| 2017-08-18 | Talk | C0c0n |
Hunting Botnets with Analytics
| Shomiron Das Gupta | botnetblueteam |
| 2017-08-04 | Talk | Sha |
Attacking OpenSSL using Side-channel Attacks: The RSA case study
| Praveen Vadnala | reverse-engineeringvulnerability-managementsecurity-architecture+1 |
| 2017-01-25 | Talk | Owasp App Sec California |
DASTProxy: Donβt let your automated security testing program stall on crawlInstead focus on business context
| Kiran Shirali | dynamic-analysisdastdevsecops+3 |
| 2016-11-06 | Talk | Ground Zero Summit |
Hacking The Droids
| Anto Joseph | android-securitymobile-securityreverse-engineering+3 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twinβ¦!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | malwarereverse-engineering |
| 2016-10-13 | Talk | App Sec Usa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla | mobile-securityvulnerability-managementreverse-engineering+1 |
| 2016-10-05 | Talk | Virus Bulletin |
One-Click Fileless Infection
| Himanshu Anand | reverse-engineeringincident-responsevulnerability-management |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry | automated-exploit-detectionreverse-engineeringvulnerability-assessment+1 |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringfirmware-analysis+3 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria | reverse-engineeringhardware-reverse-engineeringfirmware-analysis+3 |
| 2016-05-26 | Talk | Hitb Sec Conf |
HITB Lab: Mobile Application Security for iOS and Android
| Tushar Dalvi | mobileandroidios+3 |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh | pentestingethical-hackingprivilege-escalation+3 |
| 2016-03-11 | Talk | Nullcon |
Physical Lock Security
| Amey Gat, Swapnil Wadwalkar | pentestingreverse-engineeringvulnerability-management+1 |
| 2015-11-05 | Talk | Ground Zero Summit |
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
| Jiten Jain | incident-responsereverse-engineeringpentesting |
| 2015-11-05 | Talk | Ground Zero Summit |
Browser based Malware attacks
| Harsh Daftary | malwarewebredteam |
| 2015-11-05 | Talk | Ground Zero Summit |
Dissecting Android Malware
| Anto Joseph | mobileandroidmalware |
| 2015-08-07 | Talk | Defcon |
Getting into the Trust Store We Trust
| Ajit Hatti | reverse-engineeringsecurity-architecturevulnerability-management |
| 2015-08-01 | Talk | C0c0n |
Reversing and Deciphering the Cyber Espionage Malware Communications
| Monnappa K A | reverse-engineeringdecipher |
| 2015-03-15 | Talk | Hitb Sec Conf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | network-pentestingpacket-analysisnetwork-monitoring+2 |
| 2015-01-27 | Talk | Owasp App Sec California |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | reverse-engineeringvulnerability-managementincident-response+1 |
| 2014-10-16 | Talk | Grrcon |
Socioware: Dissecting Online Social Network Worms β Insidious Analysis and Design
| Aditya K Sood | redteamreverse-engineeringblueteam+1 |
| 2014-09-26 | Talk | Virus Bulletin |
Evolution of Android exploits from a static analysis tools perspective
| Jagadeesh Chandraiah | android-securitystatic-analysisvulnerability-management+2 |
| 2014-09-18 | Talk | App Sec Usa |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | reverse-engineeringmemory-forensicsincident-response+1 |
| 2014-08-06 | Talk | Blackhat |
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels!
| Aditya K Sood | botnetredteamblueteam+1 |
| 2014-05-29 | Talk | Hitb Sec Conf |
Hacking Your Cable TV Network: Die Hard Style
| Rahul Sasi | networkredteamiptv+1 |
| 2014-05-21 | Talk | Phdays |
Android Exploitation
| Aditya Gupta | mobileandroidredteam+3 |
| 2014-03-15 | Talk | Blackhat |
Anatomy of a Credit Card Stealing POS Malware
| Amol Sarwate | reverse-engineeringpentestingvulnerability-management |
| 2014-01-28 | Talk | Owasp App Sec California |
Application Sandboxes: Know thy limits
| Rahul Kashyap | application-pentestingreverse-engineeringvulnerability-management+1 |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | botnettelnet |
| 2013-10-19 | Talk | Toor Con |
Static Malware Analysis with PyTriage
| Yashin Mehaboobe | malware |
| 2013-09-27 | Talk | C0c0n |
ARM, Thumb and the Finger
| Aseem Jakhar | reverse-engineeringbinary-analysisassembly-analysis+2 |
| 2013-09-27 | Talk | C0c0n |
Sandy - The Malicious Analysis
| Rahul Sasi | reverse-engineeringstatic-analysisdynamic-analysis |
| 2013-08-01 | Tool demo | Blackhat |
XENOTIX xBOT
| Ajin Abraham | botnetlinuxwindows+3 |
| 2012-11-23 | Talk | Malcon |
Surprise paper!
| Atul Alex | malwarereverse-engineeringmobile-security |
| 2012-11-23 | Talk | Malcon |
Advanced Malware Engine
| Mohit Kumar | malwareandroidmobile+1 |
| 2012-11-23 | Talk | Malcon |
Windows Phone 8 Malware Prototype
| Shantanu Gawde | windows-phoneredteammalware |
| 2012-10-25 | Talk | App Sec Usa |
Cracking the Code of Mobile Application
| Sreenarayan Ashokkumar | mobile-securityreverse-engineeringmobile-pentesting+3 |
| 2012-10-23 | Talk | Hacklu |
Buster: Android Security Buster
| Atul Alex | android-securitymobile-securityreverse-engineering+1 |
| 2012-09-28 | Talk | Nullcon |
Attacking Angry Droids
| Aditya Gupta, Subho Halder | android-securitymobile-securityreverse-engineering+2 |
| 2012-09-28 | Talk | Nullcon |
Alert(/xss/) - How to catch an XSS before someone exploits / reports it?
| Ahamed Nafeez | web-securityxsssecure-coding+2 |
| 2012-09-27 | Talk | Grrcon |
Reversing Patches for Exploit Creation, Pen-Testing or Just Fun!
| Bharat Jogi | pentestredteamblueteam+2 |
| 2012-09-27 | Talk | Grrcon |
The Realm of Third Generation Botnet Attacks
| Aditya K Sood | redteambotnetweb+1 |
| 2012-08-03 | Talk | C0c0n |
Cracking the Mobile Application Source Code
| Sreenarayan Ashokkumar | mobileandroidios+3 |
| 2012-08-03 | Talk | C0c0n |
I haz you and pwn your maal
| Harsimran Singh Walia | androidmobilereverse-engineering+1 |
| 2012-08-03 | Talk | C0c0n |
Cyber Weapons
| Sameer Saxena | pentestingexploitationmalware+1 |
| 2012-07-28 | Talk | Defcon |
Botnets Die Hard - Owned and Operated
| Aditya K Sood | botnetblueteam |
| 2012-07-22 | Tool demo | Blackhat |
Kautilya and Nishang
| Nikhil Mittal | post-exploitationethical-hackingpentesting+2 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | malwarebotnetweb-security+2 |
| 2012-02-15 | Talk | Nullcon |
Binary God
| Atul Alex | redteamemulatorassembler+2 |
| 2012-02-15 | Talk | Nullcon |
Sandboxing The deep truth
| Disha Agarwal, Manish Pali | fuzzingsandboxblueteam |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | redteamnetworkexploit-kit |
| 2011-11-25 | Talk | Malcon |
Advanced Malware for Apple Products
| Atul Alex | malwareredteamapple+2 |
| 2011-11-25 | Talk | Malcon |
Mareech : Look itβs a HID made up of gold
| Nikhil Mittal | hidredteammalware |
| 2011-11-17 | Talk | Deepsec |
FakeAntiVirus - Journey from Trojan to a Persisent Threat
| Jagadeesh Chandraiah | malwaretrojanreverse-engineering+1 |
| 2011-09-19 | Talk | Brucon |
Botnets and Browsers, Brothers in a Ghost Shell
| Aditya K Sood | botnetwebredteam |
| 2011-09-07 | Talk | Securitybyte |
Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit
| Vivek Ramachandran | wifiwormbotnet+1 |
| 2011-08-03 | Talk | Blackhat |
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex
| Shreeraj Shah | reverse-engineeringwebajax+6 |
| 2011-05-19 | Talk | Hitb Sec Conf |
Spying on SpyEye β What Lies Beneath?
| Aditya K Sood | webmalwarebrowser+2 |
| 2011-02-25 | Talk | Nullcon |
Reversing microsoft patches to reveal vulnerable code
| Harsimran Singh Walia | reverse-engineering |
| 2011-02-25 | Talk | Nullcon |
Jugaad Beta: Linux Thread Injection malware PoC
| Aseem Jakhar | linuxmalwareredteam |
| 2011-02-15 | Talk | Nullcon |
Botnet Detection approach by DNS behavior and clustering analysis
| Nilesh Sharma, Pulkit Mehndiratta | botnetanalysisdns+1 |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar | mobile-securityreverse-engineeringvulnerability-management |
| 2010-08-01 | Talk | C0c0n |
Horses, Rats and Bots
| Jairam Ramesh | malwarebotnetreverse-engineering+1 |
| 2010-06-18 | Talk | Syscan |
REVERSE ENGINEERING WEB 2.0 APPLICATIONS
| Shreeraj Shah | reverse-engineeringwebajax+6 |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | malwarewebblueteam |
| 2010-02-25 | Talk | Nullcon |
Botnet mitigation, monitoring and management.
| Harshad Patil | botnetblueteaminfrastructure |
| 2009-11-18 | Talk | Securitybyte |
Rumbling Infections β Web Malware Ontology
| Aditya K Sood | webmalware |
| 2009-08-01 | Talk | Defcon |
The Making of the second SQL injection Worm
| Sumit Siddharth | sqlsqliweb+2 |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering for exploit writers
| Nibin Varghese | redteamreverse-engineeringexploit-development |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | secure-codingreverse-engineeringredteam+2 |
| 2006-09-21 | Talk | Hitb Sec Conf |
Finding Secrets in ISAPI
| Nish Bhalla | secure-codingreverse-engineering |
| 2005-10-18 | Talk | Blackhat |
Adware/Spyware
| Saumil Shah | blueteamadwarespyware |