| 2025-08-06 | Talk | Blackhat |
The 5G Titanic
| Altaf Shaik | network-pentestingnetwork-architecturevulnerability-management+1 |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | network-architecturenetwork-hardeningnetwork-monitoring+2 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | network-pentestingvulnerability-managementindustrial-control-systems-security |
| 2024-11-16 | Talk | C0c0n |
Who is holding the Marauders map?
| Maya R Nair | network-pentestingnetwork-monitoringnetwork-traffic-analysis+1 |
| 2024-08-29 | Tool demo | Hitb Sec Conf |
eBPFShield
| Sagar Bhure | idsincident-responsenetwork-monitoring+1 |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | threat-huntingdigital-forensicsincident-response+1 |
| 2023-08-06 | Talk | C0c0n |
Expanding capability horizons : Homelabs and beyond
| Anant Shrivastava | pentestingnetwork-pentestingsecurity-architecture+1 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | threat-huntingdigital-forensicsnetwork-forensics+3 |
| 2022-09-24 | Talk | C0c0n |
Deep Learning to detect Network Attacks
| Varun Kohli | idsnetwork-monitoringthreat-detection+2 |
| 2022-09-24 | Talk | C0c0n |
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks
| Manesh Thankappan | idsnetwork-monitoringnetwork-pentesting+3 |
| 2022-09-24 | Talk | C0c0n |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | network-pentestingnetwork-traffic-analysiscan-bus+1 |
| 2021-11-13 | Talk | C0c0n |
Light Basin - Telecom roaming network attack case study
| Akib Sayyed | network-pentestingnetwork-traffic-analysisvulnerability-management |
| 2021-11-13 | Talk | C0c0n |
Zero Trust & Micro-segmentation
| Suresh Menon | segmentationzero-trustnetwork-architecture+1 |
| 2021-08-04 | Tool demo | Blackhat |
Attack Surface Framework
| Prajwal Panchmahalkar | network-defense |
| 2020-10-02 | Tool demo | Blackhat |
OWASP Nettacker
| Sri Harsha Gajavalli | pentestingvulnerability-assessmentnetwork-pentesting+3 |
| 2019-08-07 | Talk | Blackhat |
Defense Against Rapidly Morphing DDOS
| Mudit Tyagi | ddosblueteammachine-learning |
| 2019-05-09 | Talk | Hitb Sec Conf |
HAXPO: WiCy: Monitoring 802.11AC Networks at Scale
| Vivek Ramachandran | networkredteamwifi+1 |
| 2019-03-29 | Tool demo | Blackhat |
Halcyon IDE: Nmap Script Development IDE
| Sanoop Thomas | reconnaissanceredteamnmap |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli | network-pentestingvulnerability-assessmentfirewall+3 |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | voipwiresharknetwork-security+4 |
| 2018-08-11 | Talk | Defcon |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | vpn |
| 2018-08-11 | Tool demo | Defcon |
Halcyon IDE
| Sanoop Thomas | reconnaissanceredteamnmap+1 |
| 2018-08-08 | Talk | Blackhat |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | redteamvpnweb+2 |
| 2018-08-08 | Tool demo | Blackhat |
Halcyon IDE: For Nmap Script Developers
| Sanoop Thomas | reconnaissanceredteamnmap+1 |
| 2017-11-17 | Talk | Deepsec |
How Secure Are Your VoLTE And VoWiFi Calls?
| Sreepriya Chalakkal | voltenetworkvowifi+1 |
| 2017-10-19 | Talk | Hacklu |
Are your VoLTE and VoWiFi calls secure?
| Sreepriya Chalakkal | voltenetworkvowifi+1 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | vulnerability-assessmentbug-bountynetwork-pentesting+1 |
| 2017-06-23 | Talk | Hackinparis |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-05-23 | Talk | Phdays |
Injecting security into web apps in the runtime
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-03-30 | Tool demo | Blackhat |
DAMN VULNERABLE SS7 NETWORK
| Akib Sayyed | networkmobilepentest+1 |
| 2017-03-03 | Talk | Nullcon |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2016-11-04 | Talk | Blackhat |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk
| Siddharth Rao, Bhanu Kotte | dosredteamnetwork |
| 2016-09-23 | Talk | Rootcon |
Halcyon โ A Faster Way to Build Custom Scripts for Nmap Scans
| Sanoop Thomas | secure-codingreconnaissanceredteam+1 |
| 2016-04-01 | Tool demo | Blackhat |
Halcyon โ A Faster Way to Build Custom Scripts for Nmap Scans
| Sanoop Thomas | reconnaissanceredteamnmap |
| 2016-03-11 | Talk | Nullcon |
Privacy leaks on 4G-LTE networks
| Altaf Shaik | redteam4glte+2 |
| 2015-11-05 | Talk | Ground Zero Summit |
Western Air Command
| B S Singh Deo | network-defensenetwork-monitoringnetwork-pentesting+3 |
| 2015-11-05 | Talk | Ground Zero Summit |
chellam โ a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | wifinetworkfirewall |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | network-forensicspacket-analysisnetwork-monitoring+3 |
| 2015-08-07 | Talk | Defcon |
Chellam โ a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | wifinetworkfirewall |
| 2015-08-06 | Tool demo | Blackhat |
Chellam
| Vivek Ramachandran | wifinetworkfirewall+2 |
| 2015-03-15 | Talk | Hitb Sec Conf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | network-pentestingpacket-analysisnetwork-monitoring+2 |
| 2015-03-15 | Talk | Defcon |
TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER
| Anamika Singh | network-pentestingvulnerability-assessmentvulnerability-management+2 |
| 2015-02-06 | Talk | Nullcon |
Building custom scans for real world enterprise network
| Sanoop Thomas | pentestingnetwork-pentestingvulnerability-assessment+2 |
| 2015-02-06 | Talk | Nullcon |
Drone Attacks: How I hijacked a drone
| Rahul Sasi | redteamdronenetwork+5 |
| 2014-11-13 | Talk | Ground Zero Summit |
Network Time Protocol in Amplification Inferno
| Sriram Krishnan | network-pentestingnetwork-vulnerability-assessment |
| 2014-11-13 | Talk | Ground Zero Summit |
Detecting Fake Cell Phone Towers
| Vijay Mukhi | network-pentestingnetwork-forensicsmobile-security+2 |
| 2014-03-08 | Talk | Defcon |
WI-Hawk
| Anamika Singh | network-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3 |
| 2013-03-01 | Talk | Nullcon |
BYOD: How will it shape your wireless network security in future?
| Kiran Deshpande | networkwifimobile+5 |
| 2012-09-29 | Talk | Nullcon |
Next-gen Forensics
| K K Mookhey | forensicsdigital-forensicsincident-response+2 |
| 2011-08-03 | Talk | Blackhat |
Femtocells: A poisonous needle in the operator’s hay stack
| Ravishankar Borgaonkar | network-pentestingmobile-securityvulnerability-management |
| 2009-10-07 | Talk | Hitb Sec Conf |
How to Own the World โ One Desktop at a Time
| Saumil Shah | websocial-engineeringredteam+1 |
| 2009-05-19 | Talk | Syscan |
Securing Applications at Gateway with Web Application Firewalls
| Shreeraj Shah | blueteamwebfootprinting+3 |
| 2009-05-19 | Talk | Syscan |
Securing Enterprise Applications
| Shreeraj Shah | blueteamwebweb-application-security+13 |
| 2009-04-22 | Talk | Hitb Sec Conf |
Application Defense Tactics & Strategies - WAF at the Gateway
| Shreeraj Shah | blueteamwebfootprinting+3 |
| 2007-04-18 | Talk | Can Sec West |
Low-Rate Denial-of-Service attacks
| Anil Kumar | redteamdos |
| 2003-12-12 | Talk | Hitb Sec Conf |
Defending Web Applications: Strategies, methods and practices
| Shreeraj Shah | webblueteamsecure-coding+2 |
| 2001-11-21 | Talk | Blackhat |
One-Way SQL Hacking : Futility of Firewalls in Web Hacking
| Saumil Shah | sqlwebfirewall+1 |