πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🦠 Malware Analysis

Analysis and research of malicious software

271
Contributors
292
Talks
86
Tool Demos
6
Panels
1
Keynotes
3
Awards

Top Contributors

Lavakumar Kuppan(16) Saumil Shah(15) Aditya K Sood(13) Abhishek Jm(10) Shreeraj Shah(10)

Related Tags (17)

Show all 17 tags...

All Entries (388 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat MORF – Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm#app-security#mobile-pentesting#static-analysis+3
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-08-06Tool demoBlackhat ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis Source Code Mohammed Tanveer#reverse-engineering#binary-analysis#static-analysis+3
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishra#web-security#malware-detection#browser-security+2
2025-08-06Tool demoBlackhat ARC – Artifact Reuse Comparator Rushikesh D Nandedkar#static-analysis#reverse-engineering#binary-analysis+3
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Manna#reverse-engineering#binary-analysis#code-analysis+4
2025-08-06Tool demoBlackhat ProcessInjection Source Code Chirag Savla#security-assessment#red-teaming#reverse-engineering+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashank, Bramwell Brizendine#reverse-engineering#exploitation#security-assessment+2
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solanki#container-security#docker#static-analysis+3
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Datta#static-analysis#software-security#devsecops+2
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-04-04TalkBlackhat Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM Presentation Vikas Gupta, Peter Garba#reverse-engineering#code-analysis#software-security
2025-04-04Tool demoBlackhat Intro to CICDGuard - How to have visibility and security OF CICD ecosystem Source Code Pramod Rana#cicd-pipeline#cicd-security#secure-development+3
2025-04-04Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2025-04-03Tool demoBlackhat MobXplore Source Code Aman Pareek, Akarsh Singh#application-pentesting#ios-security#dynamic-analysis+4
2025-03-14TalkInsomnihack The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) Dhiraj Mishra#endpoint-protection#security-testing#malware-distribution
2025-03-01TalkNullcon Drawing parallels between iOS and macOS Pentesting with DVMA Source Code Vaibhav Lakhani#macos#ios#application-pentesting+3
2025-03-01TalkNullcon MacOS Lockdown Mode: A Forensic Deep Dive Video Bhargav Rathod#macos#digital-forensics#endpoint-protection+3
2024-12-12Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#dynamic-analysis+2
2024-12-12Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#application-pentesting#code-review#secure-development+3
2024-12-11Tool demoBlackhat Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel Source Code Amit Parjapat, Vedant Wayal#android#application-pentesting#mobile-application-management+4
2024-12-11Tool demoBlackhat Open Source Tool to Shift Left Security Testing by Leveraging AI Shivam Rawat, Shivansh Agrawal#ai-security#secure-development#security-testing+2
2024-11-16TalkC0c0n Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers Nihar Sawant, Jaydev Joshi#ransomware#phishing#supply-chain-security
2024-11-15TalkC0c0n Know your Enemies: Deep Dive into Ransomware Threat Groups Video Niranjan Jayanand#ransomware#endpoint-protection#dynamic-analysis
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Video Kartik Lalan#automotive-cybersecurity#reverse-engineering#security-assessment+1
2024-11-06TalkBlackalps IDAT Loader: The Malware’s Camouflaged Weapon Niranjan Jayanand#endpoint-protection#dynamic-analysis#security-testing
2024-10-29TalkBlackhat Hacking Deepfake Image Detection System with White and Black Box Attacks Video Sagar Bhure#deepfake#ai-security#deep-learning+4
2024-10-02TalkVirusbulletin Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study Presentation Whitepaper Video Sathwik RAM Prakki#reverse-engineering#apt#malware-reverse-engineering
2024-08-30TalkHitbsecconf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajput#web-security#security-assessment#exploitation+2
2024-08-29TalkHitbsecconf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasad, Joey Chen#reverse-engineering#security-assessment#incident-management
2024-08-29Tool demoHitbsecconf AI Assisted Code Reviewer Rajanish Pathak, Hardik Mehta#ai#ai-security#code-review+4
2024-08-15TalkUsenix TYGR: Type Inference on Stripped Binaries using Graph Neural Networks Presentation Whitepaper Video Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik#binary-analysis#reverse-engineering#deep-learning+1
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#reverse-engineering#architecture#security-assessment
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Video Vivek Ramachandran, Shourya Pratap Singh#web-security#security-assessment#application-pentesting+4
2024-08-10TalkDefcon Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming Presentation Whitepaper Video Shiva Shashank, Bramwell Brizendine#process-injection#dynamic-analysis#exploit-delivery+1
2024-08-09PanelDefcon Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors Abhijith B R, Nikhil Mittal, Adam Pennington, Ken Kato, Ashley Stryker#ransomware#apt#dfir+2
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savla#red-teaming#malware-research#post-exploitation+2
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2024-04-19Tool demoBlackhat AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs Source Code Asankhaya Sharma#static-analysis#ai#vulnerability-assessment+1
2024-04-18Tool demoBlackhat APKDeepLens - Android security insights in full spectrum Source Code Atul Singh, Deepanshu Gajbhiye#android-security#static-analysis#mobile-pentesting+1
2024-04-18Tool demoBlackhat BinderAPI Scanner & BASS Source Code Krishnaprasad Subramaniam, Jeffrey Gaor, Valen Sai, Eric Tee Hock Nian#api-security#application-pentesting#dynamic-analysis+3
2024-04-18Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Version 2 Govind Krishna, Xian Xiang Chang#audit#application-pentesting#ai-security+4
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-12-07Tool demoBlackhat Akto - Open Source API Security Tool Source Code Ankush Jain#api-security#secure-development#security-testing+3
2023-12-07Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abraham#android-security#ios-security#mobile-pentesting+2
2023-12-07TalkBlackhat Unmasking APTs: An Automated Approach for Real-World Threat Attribution Presentation Video Aakansha Saha#machine-learning#ai-security#static-analysis+1
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben#vulnerability-assessment#honeypot#security-testing+2
2023-12-06Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Jeswin Mathai, Shourya Pratap Singh#threat-intelligence-analysis#application-pentesting#application-hardening+3
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Presentation Shubham Dubey#reverse-engineering#exploitation#architecture
2023-09-23TalkNullcon Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In iOS Presentation Shubham Sharma#ios#ios-security#application-pentesting+3
2023-09-23TalkNullcon Secure Coding: Fix From The Root Presentation Saddam Hussain, Gopika Subramanian#secure-coding#application-pentesting#code-review+4
2023-09-23TalkNullcon The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis Presentation Video Nikhil Ashok Hegde#malware-detection#linux#dynamic-analysis+2
2023-09-23TalkNullcon The Curious Case Of The Rogue SOAR Presentation Video Mukesh Sai Kumar, Jaden Furtado#blueteam#application-pentesting#dynamic-analysis+3
2023-09-23TalkNullcon Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers Presentation Video Rishit Bansal#reverse-engineering#linux#firmware-analysis
2023-09-23TalkNullcon Your App Is Probably A Spyware…Or Is It? Presentation Gaurav Gogia, Pandurang Patil#spyware#secure-development#security-testing+3
2023-09-23TalkNullcon Android-SigMorph: Covert Communication Exploiting Android Signing Schemes Presentation Video Ayan Saha, Achute Sharma#android#application-pentesting#static-analysis+1
2023-08-24TalkHitbsecconf Hardware Backdooring an eScooter Video Arun Mane#reverse-engineering#ics-security#automotive-cybersecurity
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashank, Bramwell Brizendine#reverse-engineering#security-assessment#exploitation+2
2023-08-10Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#authorization#security-testing+3
2023-08-10Tool demoBlackhat MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments Source Code Aditya K Sood#ransomware#malware-detection#security-tools
2023-08-10TalkDefcamp Hardware Backdooring an e-Scooter Video Arun Mane#reverse-engineering#ics-security#automotive-cybersecurity
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwar#firmware-analysis#reverse-engineering#automotive-cybersecurity
2023-08-09Tool demoBlackhat Akto - Open Source API Security Tool Source Code Ankush Jain, Ankita Gupta 1#api-security#application-pentesting#security-testing+3
2023-08-09Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android-security#application-pentesting#dynamic-analysis+3
2023-08-09Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. Source Code Sagar Bhure#kernel#machine-learning#forensics+4
2023-08-09Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M G#devsecops#secure-development#static-analysis+3
2023-08-07TalkC0c0n Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos Video Nikhil Prabhakar#android-security#reverse-engineering#dynamic-analysis
2023-08-07TalkC0c0n Cellibrite Premium Mobile Forensic tool iPhone analysis Vaibhav Kumar#mobile-forensics#reverse-engineering#forensics+2
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakki#apt#reverse-engineering#incident-management
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhande#threat-hunting#digital-forensics#network-forensics+3
2023-08-06TalkC0c0n Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape Video Jaydev Joshi, Simran Kothari#threat-landscape#incident-management#cyber-war+1
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Saini#architecture#security-training#reverse-engineering
2023-06-01TalkSecurityfest Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#reverse-engineering#appsec#endpoint-protection+4
2023-05-12Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#static-analysis#sast+2
2023-05-11Tool demoBlackhat Damn Vulnerable Bank Source Code Rewanth Tammana, Hrushikesh Kakade, Akshansh Jaiswal#android-security#application-pentesting#dynamic-analysis+3
2023-05-11Tool demoBlackhat APKHunt | OWASP MASVS Static Analyzer Source Code Mrunal Chawda, Sumit Kalaria#owasp#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Atharva Chincholkar, Srishti Chaubey#secure-coding#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-05-11Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhure, Shain Singh#encryption#quantum-computing#secure-development+3
2023-03-09PanelNullcon How to make security easier for your developers Video Santosh Yadav, Frida Kiriakos, Marie Theresa Brosig, Xavier Rene Corail#secure-development#security-testing#secure-coding+3
2023-01-26TalkUsenix Building an Automated Machine for Discovering Privacy Violations at Scale Video Suchakra Sharma#static-analysis#secure-coding#data-protection+2
2022-12-08Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+4
2022-12-07Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#application-pentesting#secure-development+4
2022-09-24TalkC0c0n Cryptocurrency Forensics Bhushan Gulabrao Borase#forensics#digital-forensics#cryptocurrency+1
2022-09-24PanelC0c0n Ransom Trends in India Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran#ransomware#data-loss-prevention#incident-management+2
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojan#embedded-security#firmware-analysis#security-assessment+1
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Ali#web-security#static-analysis#sast+1
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwal#android-security#mobile-pentesting#reverse-engineering+2
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanand#security-assessment#apt#exploit-kit+1
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bp#ransomware#incident-management#malware-prevention+2
2022-09-23TalkC0c0n Hacking SmartContracts Anto Joseph#smart-contracts#reverse-engineering#secure-coding
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharma, Noushin Shabab#reverse-engineering#security-assessment#iot-pentesting
2022-09-08Tool demoNullcon ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs Presentation Rohit Sehgal, Varun Kakumani#owasp#api-security#cloud-workload-protection+3
2022-09-08TalkNullcon The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple Video Amit Malik, Pratik Jeware#macos#malware-detection#endpoint-protection
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software – One bug at a time Video Sandeep Singh, Laurie Mercer#open-source-security#supply-chain#code-review+4
2022-09-08TalkNullcon Pushing Security Left By Mutating Byte Code Presentation Video Gaurav Gogia#secure-coding#application-hardening#static-analysis+1
2022-09-08TalkNullcon Raining CVEs On WordPress Plugins With Semgrep Presentation Video Shreya Pohekar, Syed Sheeraz Ali#static-analysis#code-review#secure-coding+3
2022-09-07TalkNullcon ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron Video Mohan Sri Rama Krishna Pedhapati, Maxwell Garrett#red-teaming#application-pentesting#dynamic-analysis+4
2022-09-07TalkNullcon Do PDF Tools Conform To The Specification? Presentation Video Prashant Anantharaman#pdf#data-protection#static-analysis+4
2022-09-06PanelNullcon Securing the Software Video Mrudul Uchil, Abhisek Datta, Harish Goel, Matthew Bohne#software-security#secure-development#security-testing+3
2022-08-26TalkHitbsecconf CAN A FUZZER MATCH A HUMAN Presentation Bhargava Shastry#fuzzing#solidity#smart-contracts+4
2022-08-25TalkHitbsecconf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Video Rahul Sasi, Vishal Singh#social-engineering#security-assessment#botnet+1
2022-08-11TalkBlackhat ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron Presentation Mohan Sri Rama Krishna Pedhapati, Aaditya Purani, Max Garrett, William Bowling#red-teaming#application-pentesting#code-review+4
2022-08-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Amrudesh Balakrishnan, Rahul Sani, Abhishek Jm#android#android-security#application-pentesting+4
2022-08-10Tool demoBlackhat ArcherySec - Manage and Automate your Vulnerability Assessment Source Code Anand Tiwari#application-pentesting#ci-cd#dynamic-analysis+3
2022-08-10Tool demoBlackhat AWSGoat : A Damn Vulnerable AWS Infrastructure Source Code Nishant Sharma, Jeswin Mathai, Sanjeev Mahunta#aws#cloud-pentesting#cloud-workload-protection+4
2022-08-10Tool demoBlackhat HazProne : Cloud Hacking Source Code Devansh Patel, Staford Titus S#cloud-pentesting#cloud-workload-protection#aws+4
2022-08-10Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#code-review#secure-development+4
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Manna#reverse-engineering#dynamic-analysis#network-pentesting+4
2022-07-23TalkHope Combating Ransom-War: Evolving Landscape of Ransomware Infections in Cloud Databases Video Aditya K Sood#ransomware#cloud-pentesting#data-protection
2022-05-18TalkCansecwest Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shah#firmware-analysis#reverse-engineering#embedded-security
2022-05-12Tool demoBlackhat Node Security Shield Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+3
2022-05-12TalkBlackhat Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems Presentation Prashant Rajput, Michail Maniatakos#ics-security#control-systems#hardware-embedded+3
2022-05-12Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2021-11-18TalkHackinparis {Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets Video Aditya K Sood#iot-pentesting#iot-security-testing#botnet
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohli#threat-detection#threat-hunting#malware-detection+2
2021-11-13TalkC0c0n Decoding new age hackers and Criminal Investigation Amit Dubey#incident-management#digital-forensics#reverse-engineering
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgal#code-review#static-analysis#reverse-engineering+2
2021-11-12TalkC0c0n Dissecting Malicious Software and Analysis Shrutirupa Banerjiee#reverse-engineering#dynamic-analysis#static-analysis
2021-11-11Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android#android-security#application-pentesting+3
2021-11-11Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10) Source Code Tushar Kulkarni#api-security#application-pentesting#security-testing+4
2021-11-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jaiswal, Abhishek Jm, Rahul Sani#android#application-pentesting#code-review+4
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgal#threat-hunting#threat-modeling#architecture+1
2021-08-04Tool demoBlackhat ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing Source Code Parbati Kumar Manna#reverse-engineering#application-pentesting#code-review+4
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-11-20TalkDeepsec What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Presentation Shyam Sundar Ramaswami#malware-detection#sandbox#static-analysis+1
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwad#red-teaming#security-assessment#reverse-engineering
2020-10-02Tool demoBlackhat MalViz.ai Source Code Vasu Sethia, Shivam Kataria#blueteam#machine-learning#deep-learning+3
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky#embedded-systems#firmware-analysis#static-analysis+1
2020-10-01Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jm, Akhil Mahendra#android#code-analysis#reverse-engineering+1
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Shelia#reverse-engineering#firmware-analysis#embedded-systems+4
2020-08-22TalkThedianainitiative Hacking into Android Ecosystem Video Aditi Bhatnagar#android#android-security#application-pentesting+3
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgal#owasp#secure-development#devsecops+3
2020-03-18TalkCansecwest The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shah#red-teaming#arm#firmware+4
2020-03-06Tool demoNullcon F.R.I.D.A.Y Source Code Shyam Sundar Ramaswami#blueteam#dynamic-analysis#sandbox+2
2020-03-06Tool demoNullcon FRISPY Source Code Tejas Girme, Parmanand Mishra#spyware#red-teaming#api-security+3
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2019-11-09TalkToorcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Ang Cui#reverse-engineering#hardware-reverse-engineering#architecture+2
2019-11-07TalkPowerofcommunity Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’?? Kushal Shah#vulnerability-assessment#fuzzing#reverse-engineering+2
2019-11-01TalkHackfest The Mechanics of Malware’s Darkside Presentation Video Yagnesh Waran P, Laura Harris#dynamic-analysis#static-analysis#security-testing+1
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potluri#reverse-engineering#binary-analysis#exploitation+1
2019-10-12TalkTexascybersummit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshi#reverse-engineering#binary-analysis#executable-analysis+1
2019-10-03TalkVirusbulletin Curious tale of 8.t used by multiple campaigns against South Asia Niranjan Jayanand, Ivan Macalintal, Debalina Ghosh#reverse-engineering#apt#malware-reverse-engineering
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-09-27TalkC0c0n RANSOMWARE - to pay or not to pay Seshaprakash Kusuma Sreenivasa#ransomware#incident-management#risk-management
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singh#code-review#secure-coding#static-analysis+3
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Rick Housley, Ang Cui#reverse-engineering#architecture#hardware-reverse-engineering+1
2019-08-09Award Thrangrycat - Pwnie Award for Most Under-Hyped Research Source Code Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#firmware-analysis+2
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Mane#automotive-cybersecurity#can-bus#ics-security+2
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Presentation Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#application-hardening+4
2019-05-21TalkPhdays Breaking Microsoft Edge extensions security policies Presentation Nikhil Mittal#application-pentesting#code-review#security-testing+2
2019-05-04TalkThotcon What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing Priyank Nigam#frida#application-pentesting#dynamic-analysis+3
2019-03-28TalkBlackhat Investigating Malware Using Memory Forensics - A Practical Approach Presentation Video Monnappa K A#forensics#blueteam#malware-detection+1
2019-03-02PanelNullcon The Myth of Sisyphus Secure Product Development Video Bipin Upadhyay, Minatee Mishra, Neelu Tripathy, Vaibhav Gupta, Vishal Sahani#secure-development#secure-coding#security-testing+3
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desai#secure-coding#security-assessment#dynamic-analysis+4
2019-02-28TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Video Lavakumar Kuppan, Ankit Gupta#security-assessment#application-pentesting#application-hardening+3
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharaman#blueteam#secure-development#input-validation+4
2018-12-05Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Mohan Kallepalli#audit#security-testing#secure-development+4
2018-11-29TalkDeepsec DNS Exfiltration and Out-of-Band Attacks Video Nitesh Shilpkar#dns#red-teaming#malware-detection
2018-10-19TalkAppsecdayaustralia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargav#threat-modeling#devsecops#application-hardening+4
2018-10-15TalkHacklu Come to the dark side! We have radical insurance groups & ransomware Video Ankit Gangwal, Eireann Leverett#ransomware#risk-management#cyber-insurance+2
2018-10-10TalkBrucon Simplifying the art of instrumentation Krishnakant Patil, Rushikesh D Nandedkar#reverse-engineering#static-analysis#dynamic-analysis+2
2018-10-05TalkC0c0n Pentesting GraphQL Applications Presentation Source Code Neelu Tripathy#security-assessment#application-pentesting#dynamic-analysis+4
2018-10-05TalkC0c0n DomGoat - the DOM Security Playground Source Code Lavakumar Kuppan#xss#web-security#input-validation+4
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishra#reverse-engineering#dynamic-analysis#malware-research+1
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagi#malware-detection#static-analysis#dynamic-analysis+3
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagi#blueteam#machine-learning#dynamic-analysis+1
2018-09-06TalkGrrcon Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI Presentation Video Pranshu Bajpai, Richard Enbody#encryption#ransomware#dynamic-analysis+1
2018-08-09Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Sagar Popat, Mohan Kallepalli#audit#security-testing#automated-scanning+4
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hatti#blueteam#secure-coding#smart-contracts+4
2018-08-08Tool demoBlackhat ThreatPlaybook Source Code Abhay Bhargav, Sharath Kumar#threat-modeling#ci-cd#security-development-lifecycle+4
2018-07-21TalkHope Evidential Study of IoT Botnets - The Bad and The Ugly! Video Aditya K Sood#botnet#iot-security-testing#malware-research
2018-05-13TalkDefcon Androsia: Securing ‘Data in Process’ for your Android Apps Presentation Whitepaper Video Samit Anwer#android#blueteam#android-security+4
2018-03-22Tool demoBlackhat Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data Source Code Samit Anwer#android#blueteam#application-hardening+4
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-11-20TalkHackfest How my SV Machine nailed your Malware Nikhil Prabhakar#android-security#machine-learning#malware-detection
2017-10-05TalkVirusbulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#security-assessment#firmware-analysis
2017-09-21TalkAppsecusa Androsia: A tool for securing in memory sensitive data Video Samit Anwer#android-security#static-analysis#secure-coding
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Gupta#botnet#blueteam#security-analytics+2
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogi#dynamic-analysis#reverse-engineering#binary-analysis+1
2017-08-18TalkC0c0n Yarafying Android Malware: A Missing Step Before Malware Analysis Shivang Desai#android#blueteam#android-security+3
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotra#red-teaming#malware-research#bypassing+2
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakhar#exploitation#security-assessment#reverse-engineering
2017-08-18TalkUsenix DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Presentation Whitepaper Video Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna#linux#kernel#static-analysis+4
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Video Praveen Vadnala, Lukasz Chmielewski#reverse-engineering#architecture#embedded-security
2017-06-24TalkLehack How my SV Machine nailed your Malware Video Nikhil Prabhakar#android-security#machine-learning#malware-detection
2017-04-13KeynoteHitbsecconf Redefining Defense Presentation Video Saumil Shah#blueteam#security-strategy#incident-management+2
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K A#code-injection#red-teaming#malware-research+4
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-03-04PanelNullcon Application Security Opportunities and Challenges in a DevOps World Video Abhay Bhargav, Ajay Bongirwar, Arun Jadhav, Pravesh Sharma, Adam Leaonard#secure-development#security-testing#dynamic-analysis+3
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machiraju#ml#security-assessment#application-pentesting+4
2017-01-25TalkOwaspappseccalifornia DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shirali, Srinivasa Rao Chirathanagandla#dynamic-analysis#dast#devsecops+2
2016-11-06TalkGroundzerosummit Hacking The Droids Anto Joseph#android-security#reverse-engineering#security-assessment+2
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Gupta#firmware#security-assessment#embedded-systems+3
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-14TalkAppsecusa DevOps to DevSecOps: a 2-dimensional view of security for DevOps Presentation Sanjeev Sharma#application-hardening#secure-coding#security-development-lifecycle+3
2016-10-13TalkAppsecusa Lightning Talk - Demystifying Windows Application Rupali Dash#windows#application-hardening#secure-coding+4
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-10-05TalkVirusbulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#incident-management#endpoint-protection+3
2016-08-19TalkC0c0n App Sec in the Time of Docker Containers Akash Mahajan#docker#application-pentesting#container-security+4
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen#automated-exploit-detection#reverse-engineering#vulnerability-assessment+1
2016-08-06Tool demoDefcon Android-InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-08-04TalkBlackhat DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes Presentation Whitepaper Video Rohit Mothe, Rodrigo Rubira Branco#security-assessment#application-pentesting#dynamic-analysis+3
2016-08-04Tool demoBlackhat Maltese (Malware Traffic Emulating Software) Source Code Sasi Siddharth#dns#secure-coding#malware-detection+2
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-05-26TalkHitbsecconf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvi, Tony Trummer#android#ios#security-assessment+2
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul Sasi#ai#blueteam#ai-security+4
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2016-04-01Tool demoBlackhat LIMON-SANDBOX FOR ANALYZING LINUX MALWARES Presentation Whitepaper Source Code Monnappa K A#linux#dynamic-analysis#static-analysis+2
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singh, Lea Paul#security-assessment#ethical-hacking#privilege-escalation+2
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkar#security-assessment#reverse-engineering#hardware-hacking
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-11-12Tool demoBlackhat Android InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittal#windows#red-teaming#endpoint-protection+1
2015-11-05TalkGroundzerosummit Dissecting Android Malware Anto Joseph#android#application-pentesting#dynamic-analysis+3
2015-11-05TalkGroundzerosummit Browser based Malware attacks Harsh Daftary#red-teaming#keylogging#phishing
2015-11-05TalkGroundzerosummit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jain#incident-management#reverse-engineering#security-assessment
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hatti#reverse-engineering#architecture#security-strategy
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notani#blueteam#security-analytics#malware-research+2
2015-08-01TalkC0c0n NoPo - The NoSQL HoneyPot Framework Source Code Francis Alexander#secure-coding#application-pentesting#security-testing+2
2015-08-01TalkC0c0n Reversing and Deciphering the Cyber Espionage Malware Communications Monnappa K A#reverse-engineering#decipher#malware-research+3
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastava#owasp#blueteam#security-testing+4
2015-07-06TalkBlackhat DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS Presentation Video Ahamed Nafeez#red-teaming#xss#application-pentesting+2
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohanty#blueteam#code-review#secure-coding+4
2015-03-15TalkDefcon TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS Lavakumar Kuppan#fuzzing#application-pentesting#dynamic-analysis+1
2015-03-15TalkHitbsecconf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobe#network-pentesting#packet-analysis#network-monitoring+2
2015-02-06TalkNullcon Pentesting a website with million lines of Javascript Presentation Lavakumar Kuppan, Ahamed Nafeez#web-security#security-assessment#application-pentesting+2
2015-02-06TalkNullcon Toliman, a Hadoop Pentesting Tool Source Code Jitendra Chauhan#security-assessment#security-tools#cloud-workload-protection+2
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K A#forensics#blueteam#memory-forensics+2
2015-01-27TalkOwaspappseccalifornia The Savage Curtain : Mobile SSL Failures Tushar Dalvi, Tony Trummer#ssl#application-pentesting#dynamic-analysis
2015-01-27TalkOwaspappseccalifornia Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#incident-management#architecture
2014-11-13TalkGroundzerosummit Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF Bhaumik Merchant#red-teaming#application-pentesting#security-testing+1
2014-11-13TalkGroundzerosummit Fuzzing Asynchronous Protocols built over Websockets Lavakumar Kuppan#fuzzing#red-teaming#application-pentesting+2
2014-11-13TalkGroundzerosummit How I won Browser Fuzzing Amol Naik#fuzzing#red-teaming#security-testing+4
2014-11-13TalkGroundzerosummit Cyber ‘BrahMos’ - Static analysis driven secure coding Joy Sen#secure-coding#static-analysis#sast+4
2014-10-23TalkHacklu Hacking with Images - Evil Pictures Presentation Saumil Shah#red-teaming#steganography#application-pentesting+3
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Sood, Dr. Richard J Enbody#red-teaming#reverse-engineering#blueteam+1
2014-09-26TalkVirusbulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiah, Anna Szalay#android-security#static-analysis#reverse-engineering
2014-09-25TalkVirusbulletin Optimized mal-ops. Hack the ad network like a boss Presentation Video Rahul Kashyap, Vadim Kotov#browser-security#web-security#malware-distribution+1
2014-09-24TalkBrucon OWASP: OWTF Source Code Video Bharadwaj Machiraju#security-assessment#application-pentesting#dynamic-analysis+2
2014-09-18TalkAppsecusa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#memory-forensics#incident-management
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babu#blueteam#network-monitoring#security-analytics+3
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Sood#botnet#red-teaming#blueteam+1
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexander#secure-coding#security-assessment#application-pentesting+4
2014-05-29TalkHitbsecconf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasi#red-teaming#iptv#reverse-engineering
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwate#reverse-engineering#security-assessment#security-testing
2014-02-15Tool demoNullcon DrupSnipe Ranjeet Sengar, Sukesh Pappu#drupal#security-assessment#application-pentesting+2
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon OWASP OWTF - The Offensive (Web) Testing Framework Source Code Bharadwaj Machiraju, Abraham Aranguren#security-assessment#application-pentesting#security-tools+3
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyagi#security-assessment#malware-detection#network-monitoring+2
2014-02-14TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Presentation Video Ankita Gupta, Lavakumar Kuppan#security-assessment#application-pentesting#security-development-lifecycle+3
2014-01-28TalkOwaspappseccalifornia Application Sandboxes: Know thy limits Video Rahul Kashyap#application-pentesting#reverse-engineering#exploit-development
2013-11-21TalkDeepsec Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy Video Parth Shukla#botnet#telnet#network-architecture+3
2013-11-07TalkGroundzerosummit IronWASP Source Code Lavakumar Kuppan#security-assessment#application-pentesting#security-tools+2
2013-11-07TalkGroundzerosummit Malware for Firefox Mobile OS Shantanu Gawde#mobile-malware#malware-detection#malware-research+2
2013-11-07TalkGroundzerosummit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavan#incident-management#social-engineering#phishing+1
2013-11-07TalkGroundzerosummit Understanding the anatomy of advanced targeted attacks – The Trend Micro approach Tarun Gupta#forensics#malware-research#attack-surface
2013-10-19TalkToorcon Static Malware Analysis with PyTriage Presentation Yashin Mehaboobe#malware-detection#static-analysis#malware-research+1
2013-10-17TalkHitbsecconf Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis Presentation Rahul Sasi#blueteam#static-analysis#automated-exploit-detection
2013-09-27TalkC0c0n Sandy - The Malicious Analysis Whitepaper Source Code Rahul Sasi#reverse-engineering#static-analysis#dynamic-analysis
2013-09-27TalkC0c0n Static analysis of malware with PyTriage Presentation Yashin Mehaboobe#secure-coding#static-analysis#dynamic-analysis+2
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakhar#reverse-engineering#binary-analysis#assembly-analysis+2
2013-08-02TalkDefcon Interactive Web Security Testing with IronWASP Lavakumar Kuppan#application-pentesting#dynamic-analysis#security-testing+3
2013-08-01Tool demoBlackhat XENOTIX xBOT Source Code Ajin Abraham#botnet#linux#windows+3
2013-08-01TalkBlackhat Hot knives through butter: Bypassing automated analysis systems Presentation Whitepaper Video Abhishek Singh, Zheng Bu#red-teaming#dynamic-analysis#malware-research+1
2013-03-22TalkInsomnihack Guns and Smoke to fight Mobile Malware Ruchna Nigam#android-security#malware-research#reverse-engineering+2
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyap, Rafal Wojtczuk#blueteam#application-pentesting#dynamic-analysis+3
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayak#csrf#blueteam#application-pentesting+4
2013-03-01TalkNullcon Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+3
2012-12-06TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2012-12-06TalkBlackhat Poking servers with Facebook(and other web applications) Presentation Whitepaper Source Code Riyaz Walikar#xspa#red-teaming#application-pentesting+2
2012-12-05TalkBlackhat Droid Exploitation Saga Presentation Whitepaper Source Code Aditya Gupta, Subho Halder#android#red-teaming#android-security+3
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+4
2012-12-01TalkClubhack FatCat Web Based SQL Injector Presentation Source Code Video Sandeep Kamble#sqli#red-teaming#input-validation+4
2012-12-01TalkClubhack HAWAS – Hybrid Analyzer for Web Application Security Presentation Video Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2012-12-01TalkClubhack XSSshell Presentation Video Vandan Joshi#xss#application-pentesting#code-review+4
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumar#android#red-teaming#malware-research+3
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhat#red-teaming#bypassing#exploit-delivery+3
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawde#windows-phone#red-teaming#mobile-device-management+3
2012-11-23TalkMalcon Surprise paper! Atul Alex#reverse-engineering#ios-security#mobile-hacking
2012-11-07Award Cross Site Port Attack (XSPA) Source Code Riyaz Walikar#application-pentesting#security-testing#dynamic-analysis+3
2012-10-26TalkAppsecusa XSS & CSRF with HTML5 - Attack, Exploit and Defense Video Shreeraj Shah#xss#csrf#dynamic-analysis+3
2012-10-25TalkAppsecusa Cracking the Code of Mobile Application Video Sreenarayan Ashokkumar#reverse-engineering#mobile-pentesting#android-security+2
2012-10-23TalkHacklu Buster: Android Security Buster Atul Alex#android-security#reverse-engineering#mobile-malware
2012-09-28TalkNullcon Alert(/xss/) - How to catch an XSS before someone exploits / reports it? Ahamed Nafeez#web-security#xss#secure-coding+2
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halder#android-security#reverse-engineering#security-assessment+1
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Sood, Dr. Richard J Enbody#red-teaming#botnet#dynamic-analysis+1
2012-09-26TalkNullcon Opening the kimono: Automating behavioral analysis for mobile apps Video Pradeep Kulkarni, Michael Sutton#application-pentesting#security-testing#dynamic-analysis+1
2012-09-26TalkNullcon The art of Passive Web Vul Analysis with IronWASP Video Lavakumar Kuppan#security-assessment#application-pentesting#security-testing+2
2012-08-29TalkOwaspappsecindia Find me if you can Smart fuzzing and discovery! Presentation Shreeraj Shah#fuzzing#application-pentesting#dynamic-analysis+3
2012-08-03TalkC0c0n Easy Money with UI-Redressing Amol Naik#bug-hunting#application-pentesting#dynamic-analysis+4
2012-08-03TalkC0c0n Evil JavaScript Bishan Singh#red-teaming#web-security#application-pentesting+4
2012-08-03TalkC0c0n WebApp Remote Code Execution using Server Side Scripting Engines Presentation Rahul Sasi#red-teaming#security-assessment#application-pentesting+4
2012-08-03TalkC0c0n Cracking the Mobile Application Source Code Presentation Sreenarayan Ashokkumar#android#ios#blackberry+2
2012-08-03TalkC0c0n I haz you and pwn your maal Presentation Harsimran Singh Walia#android#reverse-engineering#forensics
2012-07-28TalkDefcon Botnets Die Hard - Owned and Operated Presentation Video Aditya K Sood, Richard J Enbody#botnet#blueteam#malware-detection+2
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittal#post-exploitation#ethical-hacking#security-assessment+1
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Sood#botnet#web-security#reverse-engineering+1
2012-05-24TalkHitbsecconf CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants Presentation Video Rahul Sasi#security-assessment#ivr#application-pentesting+2
2012-03-21TalkTroopers More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard Presentation Source Code Nikhil Mittal#security-assessment#red-teaming#keylogging
2012-03-15TalkOwaspappsecindia The Magic of Passive Web Vulnerability Analysis Lavakumar Kuppan#application-pentesting#security-testing#static-analysis+2
2012-02-15TalkNullcon Binary God Presentation Video Atul Alex#red-teaming#emulator#assembler+2
2012-02-15TalkNullcon Sandboxing The deep truth Video Disha Agarwal, Manish Pali#fuzzing#sandbox#blueteam
2012-02-15TalkNullcon CAPTCHAs for fun and Profit Video Gursev Singh Kalra#red-teaming#application-pentesting#input-validation+2
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittal#hid#red-teaming#endpoint-protection+3
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soi#red-teaming#exploit-kit#malware-distribution+4
2011-12-04TalkClubhack DOM XSS – Encounters of the 3rd Kind Presentation Video Bishan Singh#xss#red-teaming#secure-coding+4
2011-12-04TalkClubhack Wi-Fi malware for Fun and Profit Vivek Ramachandran#wifi#malware-distribution#exploit-delivery
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soi#blueteam#exploit-kit#malware-detection+3
2011-11-25TalkMalcon Mareech : Look it’s a HID made up of gold Nikhil Mittal#hid#red-teaming#keylogging+2
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Presentation Jagadeesh Chandraiah#trojan#reverse-engineering#security-assessment
2011-11-04TalkHackfest Here are your keystrokes Nikhil Mittal#red-teaming#keylogging#security-assessment+1
2011-10-07TalkC0c0n Wi-Fi Malware for Fun and Profit Vivek Ramachandran#red-teaming#network-pentesting#malware-distribution+2
2011-10-07TalkC0c0n Automated Malware Analysis - Setting up the Environment Presentation K v Prashant, Pushkar Pashupat#security-assessment#dynamic-analysis#malware-research+1
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasi#purpleteam#application-pentesting#backdoor-detection+4
2011-10-07TalkVirusbulletin Browser exploit packs - exploitation paradigm Presentation Whitepaper Aditya K Sood, Richard J Enbody#exploit-kit#malware-research#browser-security+1
2011-09-19TalkBrucon Botnets and Browsers, Brothers in a Ghost Shell Presentation Aditya K Sood#botnet#red-teaming#dynamic-analysis+1
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandran#wifi#red-teaming#endpoint-protection+3
2011-09-07TalkSecuritybyte Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit Presentation Vivek Ramachandran#wifi#worm#botnet+1
2011-09-07TalkSecuritybyte IronWASP - A Web Application Security Testing Platform Presentation Source Code Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imran#blueteam#application-pentesting#secure-development+4
2011-09-06TalkSecuritybyte Botnets at Application+ layer Presentation Raj Shastrakar#bot#red-teaming#application-pentesting+4
2011-09-06TalkSecuritybyte Runtime thread injection and execution in Linux processes Presentation Aseem Jakhar#thread-injection#linux#process-injection+2
2011-08-03TalkBlackhat Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex Presentation Whitepaper Video Shreeraj Shah#reverse-engineering#ajax#web-security+1
2011-05-19TalkHitbsecconf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Sood#blueteam#botnet#endpoint-protection+4
2011-02-25TalkNullcon Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) Presentation Whitepaper Sunil Kumar#dynamic-binary-instrumentation#code-analysis#dynamic-analysis+3
2011-02-25TalkNullcon Fuzzing with complexities Presentation Whitepaper Video Vishwas Sharma#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon JSON Fuzzing: New approach to old problems Presentation Whitepaper K v Prashant, Tamaghna Basu#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakhar#linux#red-teaming#malware-research+2
2011-02-25TalkNullcon Reversing microsoft patches to reveal vulnerable code Presentation Whitepaper Harsimran Singh Walia#reverse-engineering#code-review#static-analysis+1
2011-02-15TalkNullcon Botnet Detection approach by DNS behavior and clustering analysis Presentation Nilesh Sharma, Pulkit Mehndiratta#botnet#dns#blueteam
2010-12-04TalkClubhack Firefox Security! Presentation Prasanna Kanagasabai#application-pentesting#secure-development#security-testing+4
2010-10-29TalkT2 Hacking Femtocells Presentation Ravishankar Borgaonkar, Kevin Redon#reverse-engineering#device-security#hardware-embedded+3
2010-08-01TalkC0c0n Dangers and dynamic Malware analysis Chandrasekar#forensics#dynamic-analysis#malware-detection+4
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Ramesh#botnet#reverse-engineering#security-assessment
2010-08-01TalkC0c0n Code Disclosure over HTTP Anant Kochhar#red-teaming#application-hardening#code-review+4
2010-07-29TalkBlackhat Hacking Browser’s DOM - Exploiting Ajax and RIA Presentation Whitepaper Shreeraj Shah#red-teaming#ajax#application-pentesting+4
2010-06-18TalkSyscan REVERSE ENGINEERING WEB 2.0 APPLICATIONS Shreeraj Shah#reverse-engineering#ajax#web-security+1
2010-03-02Award Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution Source Code Lavakumar Kuppan#clickjacking#application-hardening#security-testing+1
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patil#botnet#blueteam#malware-detection+4
2010-02-25TalkNullcon Software Fuzzing with Wireplay. Presentation Whitepaper Source Code Abhisek Datta#fuzzing#red-teaming#network-pentesting+3
2010-02-25TalkNullcon Penetration Testing versus Source Code Presentation Nikhil Wagholikar#security-assessment#code-analysis#application-pentesting+4
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2009-12-05TalkClubhack Mobile Application Security Testing Presentation Gursev Singh Kalra#security-assessment#mobile-pentesting#application-pentesting+4
2009-12-05TalkClubhack Revealing the Secrets: Source Code Disclosure, Techniques and Impacts Presentation Anant Kochhar#secure-development#secure-coding#code-review+2
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintala#blueteam#application-pentesting#secure-development+4
2009-11-18TalkSecuritybyte Rumbling Infections – Web Malware Ontology Presentation Aditya K Sood#dynamic-analysis#malware-research#sandbox+2
2009-08-01TalkDefcon The Making of the second SQL injection Worm Presentation Source Code Video Sumit Siddharth#sqli#red-teaming#worm
2009-04-22TalkTroopers SQL Injections: More Fun and Profit Presentation Sumit Siddharth#red-teaming#application-pentesting#code-review+4
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2009-02-19TalkBlackhat Blinded by Flash: Widespread Security Risks Flash Developers Don’t See Presentation Video Prajakta Jagdale#flash#blueteam#application-pentesting+2
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Varghese#red-teaming#reverse-engineering#exploit-development
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alex#secure-coding#reverse-engineering#red-teaming+2
2008-11-13TalkDeepsec Game of Web 2.0 Security - Attacking Next Generation Apps Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+2
2008-10-29TalkHitbsecconf Browser Exploits - A New Model for Browser Security Video Saumil Shah#red-teaming#application-pentesting#code-review+3
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Presentation Saumil Shah#red-teaming#application-hardening#browser-security+4
2008-08-20TalkOwaspappsecindia Application Security Trends & Challenges Presentation Kamlesh Bajaj#owasp#appsec#secure-development+4
2008-03-28TalkBlackhat Spam-Evolution Whitepaper Aseem Jakhar#social-engineering#malware-detection#anti-phishing
2007-12-19TalkClubhack Backdoor 2.0: Hacking Firefox to steal his web secrets Presentation Sunil Arora#red-teaming#application-pentesting#browser-security+2
2007-12-09TalkClubhack Analysis of Adversarial Code: The Role of Malware Kits! Presentation Rahul Mohandas#red-teaming#malware-research#dynamic-analysis+1
2007-12-09TalkClubhack Hacking Web 2.0 Art and Science of Vulnerability Detection Presentation Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2007-12-09TalkClubhack Subtle Security flaws: Why you must follow the basic principles of software security Presentation Varun Sharma#blueteam#software-security#secure-coding+4
2007-12-09TalkClubhack The future of automated web application testing Presentation Amish Shah, Umesh Nagori#security-assessment#application-pentesting#security-testing+3
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhalla#blueteam#purpleteam#application-pentesting+4
2006-11-29TalkPacsec Smashing Heap by Free Simulation Presentation Sandip Chaudhari#heap#red-teaming#exploit-delivery+4
2006-10-19TalkHacklu Smashing Heap by Free Simulation: Presentation Sandip Chaudhari#heap#red-teaming#exploit-development+2
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-09-21TalkHitbsecconf Finding Secrets in ISAPI Presentation Nish Bhalla#secure-coding#reverse-engineering#application-pentesting+4
2006-04-13TalkHitbsecconf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotia#secure-coding#blueteam#static-analysis+1
2005-10-18TalkBlackhat Adware/Spyware Presentation Saumil Shah, Dave Cole#blueteam#adware#spyware
2005-09-26TalkHitbsecconf Web hacking Kung-Fu and Art of Defense Presentation Shreeraj Shah#blueteam#application-pentesting#code-review+4
2005-04-12TalkHitbsecconf Web Application Kung-Fu, The Art of Defense Presentation Shreeraj Shah#blueteam#application-hardening#secure-coding+4
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookhey#blueteam#intrusion-detection#application-pentesting+3
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#application-pentesting+3
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
2001-04-26TalkBlackhat Web Hacking Presentation Saumil Shah#red-teaming#application-pentesting#security-testing+4
2001-02-14TalkBlackhat Web Hacking Presentation Video Saumil Shah#red-teaming#application-pentesting#dynamic-analysis+3