πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🎯 Penetration Testing

Security testing and ethical hacking

494
Contributors
621
Talks
188
Tool Demos
16
Panels
4
Awards

Top Contributors

Saumil Shah(42) Nikhil Mittal(28) Shreeraj Shah(21) Rahul Sasi(18) Ajin Abraham(15)

Related Tags (53)

Show all 53 tags...

All Entries (829 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat IOCTL-hammer - Parameter-Centric IOCTL Fuzzer for Windows Drivers Source Code Mohit Kulamkolly, Mohanraj Ravichandran#fuzzing#windows#vulnerability-assessment+1
2025-12-11Tool demoBlackhat ReForge: Where Crashes Become Weapons Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Abinav Harsha, Danindu Gammanpilage#fuzzing#exploit-development#vulnerability-assessment+1
2025-12-11Tool demoBlackhat From Triage to Threat Modeling: Open-Source Security LLM in Action Source Code Dhruv Kedia, Sajana Weerawardhena#ai-security#threat-modeling#vulnerability-assessment+1
2025-12-11Tool demoBlackhat SupplyShield: Protecting Your Software Supply Chain Source Code Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar#supply-chain#sbom#software-composition-analysis+3
2025-12-11Tool demoBlackhat ThreatShield – The Intelligent Way of Threat Modelling Source Code Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi#threat-modeling#security-strategy#architecture+1
2025-12-10Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#penetration-testing-tools#docker#security-testing+1
2025-12-10Tool demoBlackhat KubeShadow - Advanced Offensive Kubernetes Red-Team Framework Source Code Aashita Pandey, Binayak Choudhury#kubernetes#red-teaming#cloud-pentesting+1
2025-12-10Tool demoBlackhat Breaking the Tunnel: Real-Time API Interception in MDM-Locked Mobile Apps with KnoxSpy Source Code Subho Halder#mobile-pentesting#vulnerability-assessment#android-security
2025-12-10Tool demoBlackhat SBOM Play Source Code Anant Shrivastava#sbom#supply-chain#vulnerability-assessment+1
2025-10-01Tool demoSector KubeShadow - Advanced Offensive Kubernetes Red-Team Framework Source Code Aashita Pandey, Binayak Choudhury#kubernetes#red-teaming#container-security
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjar#attack-surface#vulnerability-assessment#asset-management+2
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Subramanian#security-assessment#application-pentesting#vulnerability-assessment+1
2025-08-06Tool demoBlackhat ProcessInjection Source Code Chirag Savla#security-assessment#red-teaming#reverse-engineering+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashank, Bramwell Brizendine#reverse-engineering#exploitation#security-assessment+2
2025-08-06Tool demoBlackhat CloudLens Gaurav Joshi, Hare Krishna Rai, K v Prashant#aws#cloud-pentesting#red-teaming+2
2025-08-06Tool demoBlackhat RedInfraCraft : Automate Complex Red Team Infra Source Code Yash Bharadwaj, Manish Gupta#red-teaming#cloud-access-security-broker#cloud-compliance+4
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chaganti#web-security#secure-coding#security-assessment+2
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-06-27TalkLehack From HTML Injection to Full AWS Account Takeover: Discovering Critical Risks in PDF Generation Video Raunak Parmar#ssrf#aws#web-security+2
2025-06-02TalkConfidence Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures Video Himanshu Sharma, Rahul Vashista#phishing#red-teaming#mfa+1
2025-04-29TalkRsac XPIA Attacksβ€”Rethinking Defense in Depth for an AI-Powered World Video Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero#ai#ai-security#input-validation+3
2025-04-04Tool demoBlackhat KernelGoat Source Code Shivankar Madaan#stack-overflow#ctf
2025-04-04Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2025-04-03Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Anikait Panigrahi, Aparna Balaji#fuzzing#ics-security#industrial-control-systems+2
2025-04-03Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solanki, Bhavarth Karmarkar#docker#container-security#vulnerability-assessment
2025-03-13TalkInsomnihack Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation Video Priyank Nigam#post-exploitation#lateral-movement#identity-management
2025-03-02PanelNullcon How can organisations protect themselves against Advanced Cyber Threats Bithal Bhardwaj, Vishal Salvi#security-strategy#incident-management#phishing+1
2025-03-01PanelNullcon Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking Krishna Pandey#ai-security#ai#ml+1
2024-12-12Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#dynamic-analysis+2
2024-12-12Tool demoBlackhat MPT: Pentest In Action! Source Code Jyoti Raval#penetration-testing-tools#security-assessment#ethical-hacking
2024-12-12Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehri#genzai#iot-device-management#iot-pentesting+4
2024-12-12Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#cloud-workload-protection#security-testing+3
2024-12-12Tool demoBlackhat Halberd : Cloud Security Testing Tool Source Code Arpan Abani Sarkar#cloud-pentesting#red-teaming#azure+1
2024-12-12Tool demoBlackhat RedCloud OS : Cloud Adversary Simulation Operating System Source Code Yash Bharadwaj, Manish Gupta#cloud-pentesting#red-teaming#aws+1
2024-12-11Tool demoBlackhat findmytakeover - find dangling domains in a multi cloud environment Source Code Aniruddha Biyani#dns#cloud-pentesting#reconnaissance
2024-11-16TalkC0c0n Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape Dharani Sanjaiy#bug-hunting#exploit-delivery#security-strategy+1
2024-11-16TalkC0c0n Invisible Invaders: Bypassing Email Security with Legitimate Tools Dhruv Bisani#bypassing#phishing#social-engineering+2
2024-11-16TalkC0c0n Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides Rakesh Seal, Diptisha Samanta#exploitation#ethical-hacking#network-pentesting+1
2024-11-16TalkC0c0n Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac Ajay Sk#security-assessment#linux#macos
2024-11-15TalkC0c0n [Yodha] Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#security-assessment#container-security+3
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Video Kartik Lalan#automotive-cybersecurity#reverse-engineering#security-assessment+1
2024-10-23Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#exploit-delivery+4
2024-10-23Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Vishnu Dev, Vivek N J#fuzzing#ics-security#industrial-control-systems+1
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singh#automated-scanning#vulnerability-assessment#security-assessment+2
2024-10-02TalkVirusbulletin From code to crime: exploring threats in GitHub Codespaces Presentation Whitepaper Video Nitesh Surana, Jaromir Horejsi#cloud-pentesting#supply-chain-security#exploitation
2024-08-30TalkHitbsecconf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajput#web-security#security-assessment#exploitation+2
2024-08-29TalkHitbsecconf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasad, Joey Chen#reverse-engineering#security-assessment#incident-management
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#reverse-engineering#architecture#security-assessment
2024-08-10TalkDefcon Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming Presentation Whitepaper Video Shiva Shashank, Bramwell Brizendine#process-injection#dynamic-analysis#exploit-delivery+1
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Video Vivek Ramachandran, Shourya Pratap Singh#web-security#security-assessment#application-pentesting+4
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Video Nikhil Shrivastava, Charles Waterhouse#bug-hunting#bug-bounty#security-training+3
2024-08-09PanelDefcon Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors Abhijith B R, Nikhil Mittal, Adam Pennington, Ken Kato, Ashley Stryker#ransomware#apt#dfir+2
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikh#red-teaming#ai-security#nlp+2
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nain#ics-security#scada#plc-security+2
2024-08-07TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi#hacking#embedded-systems#ctf
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savla#red-teaming#malware-research#post-exploitation+2
2024-08-07Tool demoBlackhat BucketLoot - An Automated S3 Bucket Inspector Source Code Kunal Aggarwal, Umair Nehri#aws#cloud-pentesting#reconnaissance+1
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigam#security-assessment#api-security#secure-development
2024-05-27TalkConfidence Hacker’s Story from Reader to Global Admin in Azure Video Raunak Parmar#cloud-pentesting#azure#ethical-hacking+4
2024-05-24TalkAuscert Mastering the art of Attacking and Defending a Kubernetes Cluster Video Sanjeev Mahajan#kubernetes#cloud-pentesting#container-security+1
2024-05-08TalkRsac How to CTF Infra - Beyond the Challenges and Flags Presentation Jayesh Chauhan, Max Gartman#ctf#cloud-workload-protection#security-strategy+2
2024-04-19Tool demoBlackhat Monitoring and Detecting Leaks with GitAlerts Source Code Nikhil Mittal 1#osint#data-leak#reconnaissance+1
2024-04-19Tool demoBlackhat BucketLoot - An Automated S3 Bucket Inspector Source Code Umair Nehri#aws#cloud-pentesting#reconnaissance+1
2024-04-19Tool demoBlackhat AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs Source Code Asankhaya Sharma#static-analysis#ai#vulnerability-assessment+1
2024-04-18TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi#hacking#embedded-systems#ctf+1
2024-04-18Tool demoBlackhat R0fuzz Source Code Season Cherian, Vishnu Dev#fuzzing#ics-security#ics+2
2024-04-18Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehri#iot-security-testing#iot-pentesting#device-security+1
2024-04-18Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows Source Code Soumyanil Biswas#red-teaming#post-exploitation#windows
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2024-04-18Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE) - Unfold the risks for your Browser Supplements Source Code Abhinav Khanna#browser-security#web-security#vulnerability-assessment
2024-03-21TalkCansecwest Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Video Arif Hussain, George Hughey#security-assessment#architecture#incident-management
2024-03-11TalkNullcon Hacking Trains Presentation Jaden Furtado#hacking#ics-security#network-forensics+2
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jati#vulnerability-assessment#embedded-systems#firmware-analysis
2023-12-07Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Prateek Thakare, Bharath Kumar, Praveen Kanniah#red-teaming#asset-inventory#asset-management+2
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-12-06Tool demoBlackhat Docker Exploitation Framework Source Code Rohit Pitke, Emmanuel Law#exploitation#container-security#docker+4
2023-12-06Tool demoBlackhat BucketLoot - An Automated S3-compatible Bucket Inspector Source Code Owais Shaikh, Umair Nehri#aws#cloud-pentesting#reconnaissance+1
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben#vulnerability-assessment#honeypot#security-testing+2
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Presentation Shubham Dubey#reverse-engineering#exploitation#architecture
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#container-security#docker#threat-hunting+1
2023-09-28TalkRootcon Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation Video Raunak Parmar#azure#cloud-pentesting#mfa+4
2023-09-23TalkNullcon How I hacked your bank account: A detailed look at UPI Security Video Abhay Rana#hacking#application-hardening#input-validation+2
2023-08-25TalkHitbsecconf Hacking into iOS’s VOLTE implementation Presentation Video Hardik Mehta, Rajanish Pathak#ios#sip#exploit-delivery
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashank, Bramwell Brizendine#reverse-engineering#security-assessment#exploitation+2
2023-08-12PanelDefcon Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert Trupti Shiralkar, Kiran Shirali#appsec#alert-fatigue#vulnerability-assessment
2023-08-11TalkDefcon Getting a Migraine - uncovering a unique SIP bypass on macOS Presentation Video Anurag Bohra, Jonathan Bar Or, Michael Pearse#macos#endpoint-protection#bypassing+2
2023-08-11TalkDefcon Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications Video Ankur Chowdhary#web-security#xss#application-pentesting+3
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokar, Ali Ahmed, Brian Lee#bug-hunting#incident-management#security-strategy+4
2023-08-09Tool demoBlackhat BucketLoot - An Automated S3 Bucket Inspector Source Code Owais Shaikh, Umair Nehri#aws#cloud-pentesting#reconnaissance+1
2023-08-09Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-08-07TalkC0c0n Serverless Siege: AWS Lambda Pentesting Video Anjali Singh Shukla, Divyanshu Shukla#aws#serverless#cloud-pentesting+2
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogi#smart-contracts#phishing#secure-coding+1
2023-08-07PanelC0c0n Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair#security-strategy#threat-modeling#security-training+3
2023-08-07PanelC0c0n Frictionless Security…Experience Simplified. Video A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das#security-training#human-factor#behavior-change+3
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastava#security-assessment#network-pentesting#architecture
2023-08-06PanelC0c0n nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan#security-strategy#cybersecurity-framework#cyber-resilience+2
2023-06-05TalkConfidence Evading modern day security defenses in corporate environments Himanshu Sharma, Rahul Vashista#red-teaming#evasion#bypassing+4
2023-06-01TalkSecurityfest Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud Video Sriraam Natarajan, Venkatraman Kumar#red-teaming#azure#active-directory+2
2023-05-12TalkBlackhat Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators Video Sravan Akkaram, Nestori Syynimaa#azure#identity-governance#access-management+1
2023-05-11TalkBlackhat Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#hacking#bypassing#mobile-hacking+1
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-05-11Tool demoBlackhat Kubernetes Goat: Interactive Kubernetes Security Learning Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2023-04-20TalkHitbsecconf BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES Presentation Video Rohan Aggarwal#hacking#hardware-hacking#bypassing+3
2022-12-08Tool demoBlackhat Industrial Control Systems: Capture the Train! Dhruv Sharan, Arnaud SoulliΓ©#ctf#ics-security#plc-security+3
2022-12-08TalkBlackhat Exploring a New Class of Kernel Exploit Primitive Presentation Rohit Mothe, Andrew Ruddick#kernel#exploit-delivery#privilege-escalation
2022-12-08PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi#security-strategy#threat-modeling#cybersecurity-training+2
2022-12-07TalkBlackhat Cross-Contract Ricochet Attacks & Off-Chain-On-Chain Manipulation of Billion Dollar NFT Collections Presentation Nitesh Dhanjani#exploit#smart-contracts#solidity+4
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittal#red-teaming#active-directory#threat-detection
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kurien#social-engineering#security-assessment#security-training
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojan#embedded-security#firmware-analysis#security-assessment+1
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoor#social-engineering#security-training#threat-hunting+1
2022-09-23TalkC0c0n A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#security-assessment#cloud-pentesting#cloud-workload-protection+2
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanand#security-assessment#apt#exploit-kit+1
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwal#android-security#mobile-pentesting#reverse-engineering+2
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharma, Noushin Shabab#reverse-engineering#security-assessment#iot-pentesting
2022-09-23PanelC0c0n Cybersecurity Dissonance: Perception vs Reality Dinesh O Bareja, George Eapen, Jairam Ramesh, Rajesh Hemrajani, Suresh Sharma#cybersecurity-training#phishing#human-factor+1
2022-09-08TalkNullcon Raining CVEs On WordPress Plugins With Semgrep Presentation Video Shreya Pohekar, Syed Sheeraz Ali#static-analysis#code-review#secure-coding+3
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-09-07TalkNullcon Hack The Bridge Presentation Video Anto Joseph#smart-contracts#web3#cryptocurrency+1
2022-09-07TalkNullcon Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls Presentation Video Shyam Sundar Ramaswami, Rakesh Mahanthi#vulnerability-assessment#hmi#data-protection+1
2022-09-07TalkNullcon Hacking Android Foreground Services Escalation Of Privileges Presentation Video Rony Das#android#android-security#mobile-hacking+3
2022-09-07TalkNullcon ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron Video Mohan Sri Rama Krishna Pedhapati, Maxwell Garrett#red-teaming#application-pentesting#dynamic-analysis+4
2022-08-26TalkHitbsecconf CAN A FUZZER MATCH A HUMAN Presentation Bhargava Shastry#fuzzing#solidity#smart-contracts+4
2022-08-25TalkHitbsecconf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Video Rahul Sasi, Vishal Singh#social-engineering#security-assessment#botnet+1
2022-08-25TalkHitbsecconf MPT: Pentest In Action Presentation Video Jyoti Raval#security-assessment#application-pentesting#asset-management+2
2022-08-11TalkBlackhat ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron Presentation Mohan Sri Rama Krishna Pedhapati, Aaditya Purani, Max Garrett, William Bowling#red-teaming#application-pentesting#code-review+4
2022-08-11TalkBlackhat Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol Presentation Whitepaper Subhechha Subudhi, Clara Maine, Akke Toeter, Victoria Bosch#zero-day#smart-contracts#security-development-lifecycle+2
2022-08-10Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+3
2022-06-01TalkSecurityfest Exploitation and automated detection of threats to modern cloud infrastructure Video Krishnaa Srinivasa, Maithri Nadig#aws#vulnerability-assessment#cloud-monitoring+4
2022-05-12Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+4
2022-03-25TalkInsomnihack Hook, Line and Sinker - Pillaging API Webhooks Video Abhay Bhargav#web-security#api-security#ssrf+1
2022-03-24TalkInsomnihack Practical exploitation of zigbee-class networks with USB-based RF transceivers & open source software Video Nitin Lakshmanan, Sunil Kumar 1#iot-pentesting#wireless-security#hardware-hacking+3
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khan#red-teaming#ethical-hacking#threat-modeling+2
2021-11-13TalkC0c0n Light Basin - Telecom roaming network attack case study Video Akib Sayyed#network-pentesting#network-traffic-analysis#gtp+2
2021-11-13TalkC0c0n Case Study - Cyber Heist in a Bank and Recovery of Systems and Money Prashant Choudhary#incident-management#forensics#security-assessment
2021-11-13TalkC0c0n Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application Gayatri Nayak#web-security#authentication#authorization+2
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasi#incident-management#mobile-hacking#phishing+4
2021-11-13PanelC0c0n Human errors & system misconfigurations- We can handle it! Amit Dubey, Maninder Singh, Tulika Pandey, Tal Catran, Dunston Pereira, Angel Redoble#human-factor#security-training#phishing+1
2021-11-12TalkC0c0n β€œLet’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhail#social-engineering#security-assessment#security-training
2021-11-12PanelC0c0n Diversity and Inclusion Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma#security-training#behavior-change#cybersecurity-education+3
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatima#threat-modeling#security-training#human-factor+1
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singha#security-assessment#post-exploitation#privilege-escalation+2
2021-09-07TalkConfidence Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical Aman Sachdev, Himanshu Sharma#red-teaming#ethical-hacking#security-assessment+2
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishna#secure-coding#security-assessment#ethical-hacking+2
2021-08-07Tool demoDefcon Red Team Credentials Reconnaissance (OLD with a TWIST) Video Shantanu Khandelwal#reconnaissance#red-teaming#osint
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B R#red-teaming#ethical-hacking#vulnerability-assessment+2
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest#security-testing#incident-management#red-teaming+3
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Verma#security-assessment#vulnerability-assessment#application-pentesting+1
2021-08-04Tool demoBlackhat Automated Attack Path Planning and Validation (A2P2V) Source Code Subir Das, Fukutomo Nakanishi, Jason Youzwak, Michael Hylkema, Santoshi Aoki#ethical-hacking#exploitation#cyber-physical-systems
2021-08-04TalkBlackhat Siamese Neural Networks for Detecting Brand Impersonation Presentation Jugal Parikh, Nitin Kumar Goel, Justin Grana, Yuchao Dai#impersonation#ai-security#deep-learning+4
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekonda, Will Pearce#vulnerability-assessment#ai-security#machine-learning+2
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithane#windows#process-injection#blueteam+1
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiah#blueteam#red-teaming#purpleteam
2021-03-06TalkNullcon Bug hunter adventures Video Shreyas Dighe, Yuvraj Dighe#bug-hunting#application-pentesting#bug-bounty+3
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwari#blueteam#security-assessment#ci-cd
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Sood#blueteam#security-assessment#threat-intelligence-analysis
2020-11-21TalkAppsecindonesia Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory Abhi M Balakrishnan#web-security#owasp#application-pentesting+1
2020-11-11TalkPowerofcommunity Arbitrary code execution on RISC-V using fault injection Praveen Vadnala, Nils Wiersma#fault-injection#embedded-security#firmware-analysis+1
2020-11-11TalkPowerofcommunity My Hacking Adventures With Safari Reader Mode Presentation Nikhil Mittal 1#browser-security#ios-security#vulnerability-assessment+1
2020-10-09TalkShellcon How I Created My Clone Using AI - Next-Gen Social Engineering Video Tamaghna Basu#ai#social-engineering#ai-security+4
2020-10-07TalkRootcon ReconPal: Leveraging NLP for Infosec Source Code Video Nishant Sharma, Jeswin Mathai#reconnaissance#red-teaming#nlp+1
2020-10-07TalkRootcon Automating Threat Hunting on the Dark Web and other nitty-gritty thingso Presentation Video Apurv Singh Gautam#deep-web#red-teaming#threat-hunting+1
2020-10-07TalkRootcon How I Pwned the ICS data during my internship Presentation Shail Patel#ics#red-teaming#ics-security+1
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwad#red-teaming#security-assessment#reverse-engineering
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan#security-assessment#vulnerability-assessment#network-pentesting+3
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Raval#phishing#blueteam#social-engineering+3
2020-10-01Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jm, Akhil Mahendra#android#code-analysis#reverse-engineering+1
2020-10-01Tool demoBlackhat Mobexler: An All-in-One Mobile Pentest VM Source Code Abhinav Mishra#android#ios#security-assessment+2
2020-10-01Tool demoBlackhat OWASP Python Honeypot Source Code Sri Harsha Gajavalli, Ali Razmjoo#web-security#owasp#security-assessment+1
2020-10-01TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-education#social-engineering+1
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Gupta#security-assessment#vulnerability-assessment#devsecops
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giri#bug-hunting#bug-bounty#security-testing+3
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamath#red-teaming#ethical-hacking#exploit-delivery+3
2020-09-18TalkC0c0n How I created my clone using AI - next-gen Social Engineering Video Tamaghna Basu#ai#impersonation#ai-security+3
2020-09-18TalkC0c0n Offensive & Scope Based Recon Video Harsh Bothra#reconnaissance#network-architecture#security-strategy+1
2020-09-18TalkC0c0n Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment Source Code Video Madhu Akula#kubernetes#red-teaming#cloud-workload-protection+3
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwad#red-teaming#security-assessment#iot-device-management+4
2020-09-18TalkC0c0n Web Application hacking with WebZGround Video Parveen Yadav, Narendra Kumar#web-security#web-pentesting#security-assessment+3
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-09-16TalkAuscert Modern Browser Security - The First line of Defense Video Prateek Gianchandani#browser-security#exploit-development#fuzzing+1
2020-09-16TalkAuscert Software Zero-Day Discovery: A Journey from Main to Return Video Kushal Shah#fuzzing#exploit-development#vulnerability-research+1
2020-09-08TalkConfidence Software Zero-Day Discovery: A Journey from Main to Return Video Kushal Shah#zero-day#fuzzing#vulnerability-discovery+2
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-08-06Tool demoBlackhat FuzzCube Source Code Anto Joseph#fuzzing#kubernetes#zero-day
2020-08-06TalkBlackhat How I Created My Clone Using AI - Next-Gen Social Engineering Presentation Video Tamaghna Basu#ai#social-engineering#impersonation
2020-08-06TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-strategy#social-engineering
2020-08-05TalkBlackhat Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic Presentation Video Harini Kannan, Nick Gregory#machine-learning#exploit-detection#blueteam
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Rana#risk-analysis#blueteam#security-strategy+4
2020-07-26TalkHitbsecconf Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company Himanshu Sharma, Aman Sachdev#red-teaming#application-pentesting#incident-management+2
2020-04-25TalkHitbsecconf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#vulnerability-assessment#security-assessment#blueteam
2020-04-24TalkHitbsecconf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#scada#blueteam#security-assessment
2020-03-18TalkCansecwest The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shah#red-teaming#arm#firmware+4
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Gupta#red-teaming#security-assessment#network-architecture+2
2020-03-06TalkNullcon Cloud As an Attack vector Presentation Video Ashwin Vamshi, Rushikesh Vishwakarma#cloud-pentesting#exploitation#aws
2020-03-06Tool demoNullcon FuzzCube Source Code Anto Joseph#fuzzing#kubernetes#zero-day
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahan#linux#secure-coding#web-security+3
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2020-03-06Tool demoNullcon Callidus Source Code Chirag Savla#red-teaming#azure#application-pentesting+2
2020-03-06Tool demoNullcon FRISPY Source Code Tejas Girme, Parmanand Mishra#spyware#red-teaming#api-security+3
2020-03-06TalkNullcon Putting it all together: building an iOS jailbreak from scratch Presentation Video Umang Raghuvanshi#ios#jailbreak#red-teaming
2020-03-06Tool demoNullcon Mobexler Source Code Abhinav Mishra, Abhishek Jaiswal#android#ios#security-assessment+2
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2020-03-06PanelNullcon Complication in security practices Video Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta#security-training#human-factor#behavior-change+3
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Raval#phishing#blueteam#security-training+2
2020-03-06PanelNullcon Securing the Human Factor Video Rahul Neel Mani, Phoram Mehta, Burgess Cooper, Manish Tiwari, Venkatesh Subramaniam#human-factor#security-training#social-engineering+3
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Arya, Oliver Chang#fuzzing#red-teaming#blueteam+1
2019-12-04Tool demoBlackhat DumpTheGit Source Code Malkit Singh#reconnaissance#data-leak#data-protection+1
2019-11-28TalkDeepsec Mastering AWS Pentesting and Methodology Video Ankit Giri#aws#security-assessment#cloud-pentesting+1
2019-11-07TalkPowerofcommunity Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’?? Kushal Shah#vulnerability-assessment#fuzzing#reverse-engineering+2
2019-11-01TalkAppsecdayaustralia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#red-teaming#blueteam#purpleteam+1
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potluri#reverse-engineering#binary-analysis#exploitation+1
2019-10-16Tool demoHitbsecconf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shah#arm#linux#firmware-analysis+4
2019-10-14TalkHitbsecconf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishra#blueteam#red-teaming#purpleteam
2019-10-14TalkHitbsecconf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehta#wifi#red-teaming#blueteam+1
2019-10-12TalkTexascybersummit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshi#reverse-engineering#binary-analysis#executable-analysis+1
2019-09-28TalkC0c0n Vulnerability Prioritization with Threat Intelligence Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja#threat-intelligence-analysis#automated-scanning#security-assessment+3
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2019-09-27TalkC0c0n Hacking ICS devices for Fun Arun Mane#red-teaming#ics-security#exploit-delivery+1
2019-09-27TalkC0c0n Detection of TOR Sources using Artificial Intelligence Roshy John#tor#ai#red-teaming
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastava#security-assessment#red-teaming#secure-coding
2019-09-27TalkC0c0n Offensive Machine Learning for Pentesters and Red Teams Tamaghna Basu#machine-learning#security-assessment#red-teaming
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharma#secure-coding#security-assessment#serverless+4
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil Bogam#red-teaming#car-hacking#blueteam+1
2019-09-23TalkRootcon Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking Video Arun Mane#red-teaming#ics#ics-security+3
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhan#authentication#identity-management#vulnerability-assessment+3
2019-09-13TalkGlobalappsec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#purpleteam#cloud-workload-protection#serverless+3
2019-08-30TalkHitbsecconf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshi#secure-coding#red-teaming#blueteam+1
2019-08-29TalkHitbsecconf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singh#red-teaming#blueteam#purpleteam
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkar#ios-security#application-pentesting#security-assessment+3
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+3
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittal#active-directory#red-teaming#windows
2019-08-09Award Thrangrycat - Pwnie Award for Most Under-Hyped Research Source Code Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#firmware-analysis+2
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-09Tool demoDefcon PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Gupta#red-teaming#security-assessment#network-pentesting
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shah#cloud-pentesting#post-exploitation#architecture+1
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Mane#automotive-cybersecurity#can-bus#ics-security+2
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singh#phishing#api-security#web-security+2
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargava, Adam Podgorski#data-protection#security-assessment#tor+1
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwal#virtual-machine#blueteam#forensics+2
2019-08-07TalkBlackhat New Vulnerabilities in 5G Networks Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik#5g#red-teaming#4g+1
2019-08-07Tool demoBlackhat PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Gupta#red-teaming#security-assessment#network-pentesting
2019-08-07Tool demoBlackhat Medaudit: Auditing Medical Devices and Healthcare Infrastructure Source Code Anirudh Duggal#security-assessment#application-pentesting#network-architecture+1
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Presentation Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#application-hardening+4
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshi#red-teaming#machine-learning#api-security+3
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Magesh#red-teaming#embedded-systems#firmware-analysis+1
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Magesh#red-teaming#iot-pentesting#hardware-embedded+2
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2019-05-09TalkHitbsecconf GDALR: Duplicating Black Box Machine Learning Models Presentation Video Rewanth Tammana, Nikhil Joshi#machine-learning#red-teaming#api-security+2
2019-05-09TalkHitbsecconf HAXPO: WiCy: Monitoring 802.11AC Networks at Scale Presentation Video Vivek Ramachandran#red-teaming#wifi#802.11ac
2019-03-29Tool demoBlackhat Halcyon IDE: Nmap Script Development IDE Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#wireshark#network-defense+4
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhuni, Izar Tarandach#secure-coding#threat-modeling#red-teaming
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami#network-pentesting#vulnerability-assessment#firewall+3
2019-03-21TalkTroopers Evolution of kernel fuzzers in NetBSD Presentation Video Siddharth M#red-teaming#fuzzing#security-development-lifecycle
2019-03-01PanelNullcon Clash of the Titans; who will survive? Video Burgess Cooper, Durga Dube, Vasanthika Srinath, Jaya Baloo, Shan Lee#ethical-hacking#exploit-delivery#data-leak+1
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singh#red-teaming#blueteam#purpleteam
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjve#red-teaming#application-pentesting#network-architecture+2
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkar#ussd#red-teaming#social-engineering+3
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desai#secure-coding#security-assessment#dynamic-analysis+4
2019-02-28TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Video Lavakumar Kuppan, Ankit Gupta#security-assessment#application-pentesting#application-hardening+3
2018-12-06Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Sagar Popat, Harsh Grover#security-assessment#rest-api#ci-cd
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokan, Lachlan Gunn, Ricardo Vieitez Parra#red-teaming#encryption#threat-modeling+1
2018-11-29TalkDeepsec DNS Exfiltration and Out-of-Band Attacks Video Nitesh Shilpkar#dns#red-teaming#malware-detection
2018-11-27TalkHitbsecconf BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit Presentation Source Code Video Rewanth Tammana#red-teaming#application-pentesting#browser-security+2
2018-11-27TalkHitbsecconf COMMSEC: Taking Over Telecom Networks Presentation Video Hardik Mehta, Loay Hassan Abdelrazek#architecture#red-teaming#ss7+2
2018-11-27TalkHitbsecconf Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit Presentation Video Himanshu Mehta, Sachine Wagh#red-teaming
2018-11-08TalkDefcamp Backdooring DVR/NVR devices Video Arun Mane#hardware-reverse-engineering#embedded-security#security-assessment+2
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Harit#red-teaming#wearables#iot-device-management+4
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittal#windows#active-directory#red-teaming
2018-10-05TalkC0c0n OSINT : Indian Citizen Edition Anant Shrivastava#osint#data-governance#identity-theft+2
2018-10-05TalkC0c0n DNS Exfiltration and Out of Band Attacks Nitesh Shilpkar#red-teaming#dns#network-pentesting
2018-10-05TalkC0c0n Unconventional vulnerabilities in Google Cloud Platform Pranav Venkat#gcp#red-teaming#cloud-pentesting+3
2018-10-05TalkC0c0n Pentesting GraphQL Applications Presentation Source Code Neelu Tripathy#security-assessment#application-pentesting#dynamic-analysis+4
2018-10-05TalkC0c0n Artificial Intelligence and Social Media Analytics in Criminal Investigation Amit Dubey#ai#ai-security#nlp+3
2018-10-04TalkConfidence Hacking 50 Million users using 123456 Aman Sachdev, Himanshu Sharma#web-security#authentication#ethical-hacking+2
2018-09-27TalkRootcon Bug Bounty Hunting on Steroids Presentation Video Anshuman Bhartiya#bug-hunting#bug-bounty#security-tools+3
2018-09-27TalkRootcon Expl-iot: Hacking IoT like a boss Presentation Video Aseem Jakhar#red-teaming#iot-security-testing#firmware-analysis+2
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaan#aws#secure-coding#web-security+2
2018-09-12Talk44con Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#security-tools+3
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-30TalkHitbsecconf Exploiting Automation in LTE Mobile Networks Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik#4g#lte#red-teaming
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura#security-assessment#architecture#application-hardening+4
2018-08-12Tool demoDefcon Expl-iotβ€”IoT Security Testing and Exploitation framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Rao, Thanh Bui#encryption#authentication#ipc+1
2018-08-11Tool demoDefcon Sh00tβ€”An open platform for manual security testers & bug hunters Source Code Pavan Mohan#security-assessment#bug-hunting#secure-coding+1
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+4
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-11Tool demoDefcon PA Toolkitβ€”Wireshark plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#reconnaissance+4
2018-08-11Tool demoDefcon BLEMystiqueβ€”Affordable custom BLE target Source Code Nishant Sharma, Jeswin Mathai#ble#red-teaming#wearables+1
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-11Tool demoDefcon Archeryβ€”Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-09TalkBlackhat Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina Presentation Source Code Video Bhargava Shastry, Vincent Ulitzsch, Dominik Maier#security-assessment#blueteam#linux+1
2018-08-09TalkDefcon 4Gβ€”Who is paying your cellular phone bill? Presentation Video Isha Singh, Dr Silke Holtmanns#4g#ipx#red-teaming+2
2018-08-09Tool demoBlackhat OWASP Offensive Web Testing Framework Source Code Viyat Bhalodia#owasp#security-assessment#red-teaming
2018-08-09Tool demoBlackhat BLEMystique: Affordable Custom BLE Target Source Code Nishant Sharma, Jeswin Mathai#ble#wearables#security-assessment
2018-08-09Tool demoBlackhat Jackhammer: One Security Vulnerability Assessment/Management Tool Source Code Madhusudhan Konda, Rajagopal Vr, Shreyas Chidambara#azure#aws#gcp+3
2018-08-08Tool demoBlackhat DataSploit 2.0 Source Code Kunal Aggarwal, Shubham Mittal#osint#reconnaissance#data-governance+4
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeez#red-teaming#vpn#blueteam+1
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik#lte#4g#red-teaming+2
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan#virtual-machine#blueteam#forensics+2
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-08TalkBlackhat Back to the Future: A Radical Insecure Design of KVM on ARM Presentation Whitepaper Video Baibhav Singh, Rahul Kashyap#red-teaming#linux#virtual-machine+1
2018-08-08Tool demoBlackhat Damn Vulnerable iOS App: Swift Edition Source Code Prateek Gianchandani#ios#security-assessment#red-teaming
2018-08-08Tool demoBlackhat V2X Validation Tool Source Code Raashid Ansari, Jonathan Petit#security-assessment#automobile#red-teaming
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-08Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Ankur Bhargava, Prajal Kulkarni, Sagar Popat#security-assessment#rest-api#api-security+4
2018-08-08Tool demoBlackhat PA Toolkit: Wireshark Plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#network-architecture+2
2018-06-29TalkHackinparis Hunting PBX for Vulnerabilities Presentation Video Himanshu Mehta, Sachin Wagh#red-teaming
2018-06-04TalkConfidence From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days Himanshu Sharma, Aman Sachdev#red-teaming#ethical-hacking#security-assessment+2
2018-05-29Award Data Exfiltration via Formula Injection #Part1 Source Code Ajay Prashar, Balaji Gopal#data-leak#exploitation#web-security+1
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#red-teaming#blueteam+1
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsetty#security-assessment#red-teaming#blueteam+4
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharla#wearables#blueteam#red-teaming+1
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-03-02PanelNullcon Should all ciso promote hall of fame” within their organizations Video Shomiron Das Gupta, Hariprasad Chede, Keyur Desai, Subramanian Kumaraswamy#security-training#behavior-change#zero-day+1
2018-03-01TalkNullcon DARWIN (A parasite covert wireless network) Video Rushikesh D Nandedkar#wifi#red-teaming#network-architecture+1
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiry#android#fuzzing#red-teaming+3
2018-03-01TalkNullcon Abusing and Attacking Content Sharing Solutions Presentation Pratap Chandra Allena#red-teaming#wifi#bluetooth+2
2018-03-01TalkNullcon Breaking Into Container Orchestrators Presentation Nadeem Hussain#red-teaming#cloud-workload-protection#container-security+2
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyan#red-teaming#application-pentesting#api-security+4
2018-03-01TalkNullcon Software Supply Chain Cyberattack Presentation Samiran Ghatak#red-teaming#cyberattack#supply-chain-attack+1
2018-01-31TalkOwaspappseccalifornia Hunter – Optimize your Pentesters time Video Kiran Shirali#application-pentesting#security-assessment#devsecops
2017-12-07Tool demoBlackhat DataSploit - OSINT Framework Source Code Shubham Mittal#osint#reconnaissance#security-tools+2
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Harit#red-teaming#data-leak#identity-theft+1
2017-12-06TalkBlackhat DIFUZZING ANDROID KERNEL DRIVERS Presentation Whitepaper Video Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Jake Corina, Shuang Hao#android#red-teaming#linux+2
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shukla#red-teaming#blueteam#purpleteam
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Gupta#iot-pentesting#embedded-security#security-assessment+2
2017-10-19TalkHacklu Bug hunting using symbolic virtual machines! Video Anto Joseph#bug-hunting#binary-analysis#fuzzing+2
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shukla#red-teaming#blueteam#purpleteam
2017-10-19TalkHacklu Are your VoLTE and VoWiFi calls secure? Video Sreepriya Chalakkal#volte#vowifi#sip+2
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkar#vulnerability-assessment#security-assessment#secure-coding+1
2017-10-05TalkVirusbulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#security-assessment#firmware-analysis
2017-09-13Talk44con Red Team Revenge : Attacking Microsoft ATA Presentation Video Nikhil Mittal#windows#red-teaming#active-directory+4
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotra#red-teaming#malware-research#bypassing+2
2017-08-18TalkC0c0n The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ Rushikesh D Nandedkar#wifi#network-pentesting#security-tools+1
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Gupta#bluetooth#red-teaming#mobile-hacking+3
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakhar#exploitation#security-assessment#reverse-engineering
2017-08-18TalkC0c0n OSINT and Privacy Rohit Srivastwa#osint#data-leak#surveillance+4
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajguru#appsec#purpleteam#red-teaming+1
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Datta#red-teaming#blueteam#purpleteam
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharma#red-teaming#hardware-embedded#firmware-analysis+2
2017-08-18TalkC0c0n Hunting the Hunters – Fighting CyberCrime at the Source Valan Sivasubramanian#red-teaming#cybersecurity-strategy#cyber-crime+2
2017-08-18TalkC0c0n Androsia: A tool for securing in memory sensitive data Source Code Samit Anwer#secure-coding#android#security-assessment
2017-08-18TalkC0c0n CoAP versus MQTT: IoT Protocol Vulnerability analysis Rajiv Pandey#security-assessment#iot-pentesting#embedded-systems+1
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkar#ios#security-assessment#blueteam+1
2017-08-18TalkC0c0n Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis Furqan Khan, Siddharth Anbalahan#machine-learning#security-assessment#nlp+4
2017-08-18TalkC0c0n Phishing threats to customers and mitigation Bhavin Bhansali#phishing#anti-phishing#social-engineering+2
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftab, Betsy Broder#social-engineering#security-training#risk-management+1
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2017-07-29Tool demoDefcon Fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi, Srinivas Rao#fuzzing#rest-api#security-assessment
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-07-29Tool demoDefcon WiMonitor - an OpenWRT package for remote WiFi sniffing Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#openwrt#red-teaming#sniffing+1
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-28Tool demoDefcon GibberSense Source Code Ajit Hatti#encryption#red-teaming#security-assessment
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shah#encryption#security-assessment#audit+1
2017-07-27Tool demoBlackhat Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes Source Code Anshuman Bhartiya#security-assessment#bug-hunting#cloud-workload-protection+3
2017-07-27Tool demoBlackhat Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday Source Code Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Rao#fuzzing#rest-api#security-assessment+1
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hatti#secure-coding#reconnaissance#encryption+3
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#security-assessment+1
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Mane#ics-security#security-assessment#embedded-systems+4
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddi#vulnerability-assessment#bug-bounty#network-pentesting+1
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert#red-teaming#spying#3g+3
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thaware#machine-learning#red-teaming#ai-security+3
2017-06-26Tool demoBlackhat DiffDroid Source Code Anto Joseph#android#security-assessment#web-security
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays How we hacked distributed configuration management systems Presentation Bharadwaj Machiraju, Francis Alexander#red-teaming#fingerprinting#configuration-management
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Joseph, Clarence Chio#machine-learning#red-teaming#blueteam+1
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abraham#blueteam#secure-development#sqli+4
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#windows
2017-04-14TalkHitbsecconf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhar#red-teaming#iot-pentesting#hardware-embedded+2
2017-04-14TalkHitbsecconf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#data-protection+3
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K A#code-injection#red-teaming#malware-research+4
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Gupta, Marco Balduzzi, Lion Gu#red-teaming#social-engineering#phishing+2
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-30Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Shubham Mittal#osint#reconnaissance#security-tools+3
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-03-30Tool demoBlackhat DAMN VULNERABLE SS7 NETWORK Source Code Akib Sayyed#security-assessment#dos#ss7
2017-03-24TalkInsomnihack How we hacked Distributed Configuration Management Systems Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Bharadwaj Machiraju, Francis Alexander#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-15TalkCansecwest Inside Stegosploit Presentation Saumil Shah#steganography#red-teaming#exploit-delivery
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyed#ss7#security-assessment#blueteam+2
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2017-03-03TalkNullcon Hacking medical devices and infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#security-testing
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machiraju#ml#security-assessment#application-pentesting+4
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittal#blueteam#amsi#endpoint-protection+1
2016-11-06TalkGroundzerosummit Hacking The Droids Anto Joseph#android-security#reverse-engineering#security-assessment+2
2016-11-05TalkHackfest LockPicker: Leaking data from live LUKS partition Adhokshaj Mishra#linux#red-teaming#data-leak
2016-11-04TalkBlackhat Randomization Can’t Stop BPF JIT Spray Presentation Whitepaper Video N Asokan, Filippo Bonazzi, Elena Reshetova#linux#red-teaming#exploit-development
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns#dos#red-teaming#ss7+4
2016-11-04Tool demoBlackhat AppMon: Runtime Security Testing & Profiling Framework for Native Apps Source Code Nishant Das Patnaik#security-assessment#ios#macos+1
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Gupta#firmware#security-assessment#embedded-systems+3
2016-11-03Tool demoBlackhat DataSploit Presentation Source Code Shubham Mittal, Nutan Kumar Panda#osint#reconnaissance#security-tools+3
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-14TalkAppsecusa Automating API Penetration Testing using fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi#fuzzing#api-security#application-pentesting+4
2016-10-07TalkDeepsec Inside Stegosploit Presentation Video Saumil Shah#web-security#exploitation#security-assessment
2016-09-23TalkRootcon Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomas#secure-coding#reconnaissance#red-teaming+1
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikar#xss#red-teaming#code-injection+3
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratap#red-teaming#ethical-hacking#exploit-delivery+2
2016-08-19TalkC0c0n Abusing Digital Certificates : Malware Style Ajit Hatti#red-teaming#exploit-delivery#threat-modeling
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekar#purpleteam#red-teaming#blueteam
2016-08-19TalkC0c0n The Art of Social Hacking Gaurav Trivedi, Rugved Mehta#reconnaissance#social-engineering#phishing+4
2016-08-19TalkC0c0n Attacking and crashing IOT devices via Bluetooth LE Protocol Presentation Pratap Chandra Allena, Ajay Pratap Singh#bluetooth#red-teaming#iot-pentesting+2
2016-08-19TalkC0c0n Evading Corporate Security – You’re as secure as the weakest link Prajwal Panchmahalkar#red-teaming#employee-education#social-engineering+3
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen#automated-exploit-detection#reverse-engineering#vulnerability-assessment+1
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2016-08-06Tool demoDefcon Visual Network and File Forensics using Rudra Source Code Video Ankur Tyagi#blueteam#reconnaissance#forensics
2016-08-06Tool demoDefcon Android-InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-08-04TalkBlackhat DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes Presentation Whitepaper Video Rohit Mothe, Rodrigo Rubira Branco#security-assessment#application-pentesting#dynamic-analysis+3
2016-08-04Tool demoBlackhat Droid-FF: Android Fuzzing Framework Source Code Anto Joseph#android#fuzzing#secure-coding+1
2016-08-04Tool demoBlackhat AppMon Source Code Nishant Das Patnaik#ios#macos#android+1
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-08-03Tool demoBlackhat Android-InsecureBankv2 Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-08-03TalkBlackhat AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It Presentation Nikhil Mittal#windows#amsi#powershell+1
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda#security-assessment#threat-hunting#osint+1
2016-08-03Tool demoBlackhat Nishang: The Goodness of Offensive PowerShell Source Code Nikhil Mittal#windows#red-teaming#powershell
2016-07-01TalkHackinparis DIFFDroid - Dynamic Analysis Made Easier for Android Source Code Video Anto Joseph#android#security-assessment#web-security
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-05-26TalkHitbsecconf HITB Lab: Droid-FF: The First Android Fuzzing Framework Presentation Source Code Anto Joseph#android#fuzzing#red-teaming
2016-05-26TalkHitbsecconf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvi, Tony Trummer#android#ios#security-assessment+2
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-04-01Tool demoBlackhat Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap
2016-04-01Tool demoBlackhat Rudra: The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2016-04-01Tool demoBlackhat HackSys Extreme Vulnerable Driver Presentation Whitepaper Source Code Ashfaq Ansari#red-teaming#security-assessment#windows
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singh, Lea Paul#security-assessment#ethical-hacking#privilege-escalation+2
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggal#red-teaming#blueteam#application-pentesting+1
2016-03-11TalkNullcon Hitchhiker’s guide to hacking Industrial Control systems (ICS) Arun Mane#red-teaming#ics#hid
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2016-03-11TalkNullcon Privacy leaks on 4G-LTE networks Presentation Altaf Shaik#red-teaming#4g#lte+1
2016-03-11TalkNullcon Automated Mobile Application Security Assessment with MobSF Presentation Source Code Ajin Abraham#android#ios#security-assessment
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkar#security-assessment#reverse-engineering#hardware-hacking
2015-11-19TalkDeepsec Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. Video Nikhil Mittal#red-teaming#ci-cd#cicd-security+3
2015-11-13Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-11-13TalkBlackhat LTE & IMSI Catcher Myths Presentation Whitepaper Video Ravishankar Borgaonkar, N Asokan, Altaf Shaik, Valtteri Niemi, Jean Pierre Seifert#lte#red-teaming#imsi
2015-11-13TalkBlackhat Continuous Intrusion: Why CI tools are an Attacker’s Best Friends Presentation Video Nikhil Mittal#red-teaming#ci-cd#application-pentesting+4
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-11-12TalkBlackhat Stegosploit - Exploit Delivery with Steganography and Polyglots Presentation Source Code Video Saumil Shah#red-teaming#steganography#exploit-delivery
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2015-11-12Tool demoBlackhat Android InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2015-11-12Tool demoBlackhat Kautilya: Fastest shells you will ever get Source Code Nikhil Mittal#hid#red-teaming#windows
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittal#windows#red-teaming#endpoint-protection+1
2015-11-05TalkGroundzerosummit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Panda#osint#deep-web#data-leak+4
2015-11-05TalkGroundzerosummit Dissecting Android Malware Anto Joseph#android#application-pentesting#dynamic-analysis+3
2015-11-05TalkGroundzerosummit Browser based Malware attacks Harsh Daftary#red-teaming#keylogging#phishing
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-11-05TalkGroundzerosummit Thanks for the free cookies Anshul Saxena, Nishant Yadav#red-teaming#application-pentesting#security-testing
2015-11-05TalkGroundzerosummit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jain#incident-management#reverse-engineering#security-assessment
2015-10-25TalkToorcon PixelCAPTCHA – A Unicode Based CAPTCHA Scheme Gursev Singh Kalra#web-security#authentication#bypassing
2015-10-21TalkHacklu Stegosploit - Delivering Drive-By Exploits With Only Images Presentation Saumil Shah#red-teaming#steganography#application-pentesting+1
2015-09-11Talk44con Stegosploit – Drive-by Browser Exploits using only Images Presentation Source Code Video Saumil Shah#steganography#red-teaming#web-security+1
2015-08-28Tool demoBlackhat Damn Vulnerable iOS App (DVIA) Source Code Prateek Gianchandani#ios#security-assessment#red-teaming
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Sood#scada#hmi#security-assessment+4
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittal#security-assessment#red-teaming#exploitation+3
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvi, Tony Trummer#android#metasploit#red-teaming+3
2015-08-08Tool demoDefcon Rudra Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekar#security-assessment#ethical-hacking#vulnerability-assessment+2
2015-08-07TalkDefcon Chellam – a Wi-Fi IDS/Firewall for Windows Presentation Video Vivek Ramachandran#wifi#firewall#ids+4
2015-08-06Tool demoBlackhat Kautilya Source Code Nikhil Mittal#hid#red-teaming#windows
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalvi#android#red-teaming#security-assessment+2
2015-08-05Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddi#red-teaming#application-pentesting#attack-surface+2
2015-08-01TalkC0c0n Demystifying and Breaking BLE Yashin Mehaboobe#bluetooth#mobile-hacking#exploit-delivery+1
2015-08-01TalkC0c0n Hacking RFIDs under 2000 INR Jayesh Chauhan, Divya S John#rfid#hardware-embedded#embedded-systems+3
2015-08-01TalkC0c0n A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. Riyaz Walikar#windows#red-teaming#security-assessment
2015-08-01TalkC0c0n Automated Security Analysis of Android & iOS Applications with Mobile Security Framework Presentation Source Code Ajin Abraham#android#ios#security-assessment
2015-07-06TalkBlackhat DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS Presentation Video Ahamed Nafeez#red-teaming#xss#application-pentesting+2
2015-05-29TalkHitbsecconf PowerShell for Penetration Testers Presentation Nikhil Mittal#red-teaming#windows#powershell+1
2015-05-29TalkHitbsecconf Hacking Samsung’s Tizen: The OS of Everything Presentation Whitepaper Ajin Abraham#os#wearables#red-teaming
2015-05-28TalkHitbsecconf Stegosploit: Hacking With Pictures Presentation Saumil Shah#red-teaming#steganography#web-security
2015-05-28TalkHitbsecconf The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvi, Tony Trummer#ssl#security-assessment#mobile-application-management+1
2015-05-26TalkPhdays iOS Application Exploitation Presentation Prateek Gianchandani, Egor Tolstoy#ios#red-teaming#application-pentesting+4
2015-03-27TalkSyscan Stegosploit - Hacking with Pictures Presentation Video Saumil Shah#steganography#red-teaming#web-security+1
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanian#threat-intelligence-analysis#blueteam#red-teaming+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abraham#owasp#xss#blueteam+3
2015-03-26TalkBlackhat The underground Ecosystem of Credit Card frauds Presentation Whitepaper Video Abhinav Singh#red-teaming#data-leak#identity-theft+1
2015-03-26Tool demoBlackhat YSO Mobile Security Framework Source Code Ajin Abraham#android#ios#security-assessment
2015-03-15TalkDefcon TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS Lavakumar Kuppan#fuzzing#application-pentesting#dynamic-analysis+1
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwate#automated-scanning#vulnerability-assessment#risk-management+1
2015-02-06TalkNullcon Analyzing Chrome crash reports at scale Presentation Video Abhishek Arya#fuzzing#bug-hunting#blueteam
2015-02-06TalkNullcon Toliman, a Hadoop Pentesting Tool Source Code Jitendra Chauhan#security-assessment#security-tools#cloud-workload-protection+2
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomas#security-assessment#network-pentesting#vulnerability-assessment+1
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyed#red-teaming#blueteam#purpleteam+2
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwate#red-teaming#application-pentesting#data-protection+1
2015-02-06TalkNullcon Drone Attacks: How I hijacked a drone Presentation Video Rahul Sasi#red-teaming#drone#gps+2
2015-02-06TalkNullcon Hacking Tizen: The OS of Everything Presentation Video Ajin Abraham#os#wearables#red-teaming
2015-02-06TalkNullcon Pentesting a website with million lines of Javascript Presentation Lavakumar Kuppan, Ahamed Nafeez#web-security#security-assessment#application-pentesting+2
2014-11-13TalkGroundzerosummit How I won Browser Fuzzing Amol Naik#fuzzing#red-teaming#security-testing+4
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-11-13TalkGroundzerosummit Vulnerability Reproduction using Zest Deep Shah#red-teaming#exploit-delivery#automated-scanning
2014-11-13TalkGroundzerosummit Fuzzing Asynchronous Protocols built over Websockets Lavakumar Kuppan#fuzzing#red-teaming#application-pentesting+2
2014-11-13TalkGroundzerosummit Making and Breaking Embedded Security Presentation Yashin Mehaboobe#red-teaming#blueteam#purpleteam
2014-11-13TalkGroundzerosummit Security vulnerabilities in DVB-C networks: Hacking Cable TV network Rahul Sasi#red-teaming#dvb-c#network-pentesting
2014-11-13TalkGroundzerosummit Attacking Web-Proxies like never before Ahamed Nafeez#red-teaming#application-hardening#security-testing
2014-11-13TalkGroundzerosummit Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF Bhaumik Merchant#red-teaming#application-pentesting#security-testing+1
2014-11-13TalkGroundzerosummit Hacking consumer electronics for Fun Atul Alex#red-teaming#embedded-systems#firmware-analysis+1
2014-11-13TalkGroundzerosummit Identity theft and its impact on Cyber - Warfare Tarun Wig#identity-theft#phishing#social-engineering
2014-10-29TalkEkoparty Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 Presentation Video Rahul Sasi#red-teaming#dvb-c#firmware-analysis+1
2014-10-23TalkHacklu Hacking with Images - Evil Pictures Presentation Saumil Shah#red-teaming#steganography#application-pentesting+3
2014-10-23TalkHacklu WiHawk - Router Vulnerability Scanner Presentation Source Code Anamika Singh#wifi#red-teaming#csrf+1
2014-10-17TalkBlackhat Android Kernel and OS Security Assessment with Iron Crow Video Akhil Arora, Sumanth Naropanth#android#kernel#android-security+1
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Sood, Dr. Richard J Enbody#red-teaming#reverse-engineering#blueteam+1
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkar#imsi#red-teaming#android+4
2014-09-24TalkBrucon OWASP: OWTF Source Code Video Bharadwaj Machiraju#security-assessment#application-pentesting#dynamic-analysis+2
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-09-12Talk44con Pentesting NoSQL DB’s Using NoSQL Exploitation Framework Video Francis Alexander#exploitation#web-pentesting#penetration-testing-tools
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautam#bug-hunting#red-teaming#automated-scanning+3
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Gupta#purpleteam#mobile-application-management#mobile-hacking+4
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobe#purpleteam#red-teaming#blueteam
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2014-08-22TalkC0c0n Exploiting NoSQL Like Never Before Francis Alexander#red-teaming#application-pentesting#security-testing
2014-08-22TalkC0c0n Hacking Communication Akib Sayyed#red-teaming#network-architecture#social-engineering+1
2014-08-22TalkC0c0n Lesser Known Attack - XML Injection Amol Naik#red-teaming#application-pentesting#code-review+3
2014-08-21TalkUsenix The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhawe, Zhiwei Li, Warren He, Dawn Song#web-security#xss#csrf+2
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun#reconnaissance#social-engineering#blueteam
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Sood#red-teaming#security-assessment#ics-security+3
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Sood#botnet#red-teaming#blueteam+1
2014-08-06Tool demoBlackhat Flowinspect: Yet another network inspection tool Source Code Ankur Tyagi#security-assessment#network-monitoring#ids+2
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexander#secure-coding#security-assessment#application-pentesting+4
2014-05-29TalkHitbsecconf Exploiting NoSQL Like Never Before Presentation Francis Alexander#exploitation#web-pentesting#code-injection
2014-05-29TalkHitbsecconf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasi#red-teaming#iptv#reverse-engineering
2014-05-29TalkHitbsecconf LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit Presentation Rahul Kashyap, Rafal Wojtzcuk#red-teaming#windows#kernel
2014-05-21TalkPhdays Android Exploitation Video Aditya Gupta#android#red-teaming#security-assessment+1
2014-03-27TalkBlackhat JS Suicide: Using JavaScript Security Features to Kill JS Security Presentation Video Ahamed Nafeez#web-security#red-teaming#csrfguard+1
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwate#reverse-engineering#security-assessment#security-testing
2014-02-15Tool demoNullcon XMLChor Source Code Harshal Jamdade#exploitation#web-pentesting#security-tools
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abraham#owasp#xss#blueteam+3
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon DrupSnipe Ranjeet Sengar, Sukesh Pappu#drupal#security-assessment#application-pentesting+2
2014-02-15Tool demoNullcon OWASP OWTF - The Offensive (Web) Testing Framework Source Code Bharadwaj Machiraju, Abraham Aranguren#security-assessment#application-pentesting#security-tools+3
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#evil-twin-attack#phishing+1
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekar#glibc#red-teaming#blueteam+2
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandla#pdf#web-security#red-teaming+2
2014-02-14TalkNullcon Attacking WPA/WPA2 in the Cloud Presentation Video Vivek Ramachandran#wifi#wpa2#red-teaming
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeez#red-teaming#network-pentesting#endpoint-protection+1
2014-02-14TalkNullcon Hardware Attack Vectors Presentation Video Yashin Mehaboobe#red-teaming#hid#radio
2014-02-14TalkNullcon Wi-Hawk Password Auditing Tool Presentation Source Code Anamika Singh#wifi#red-teaming#network-architecture
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyagi#security-assessment#malware-detection#network-monitoring+2
2014-02-14TalkNullcon o’Dea Assertions - Untwining the Security of the SAML Protocol Video Achin Kulshrestha#authentication#saml#sso+2
2014-02-14TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Presentation Video Ankita Gupta, Lavakumar Kuppan#security-assessment#application-pentesting#security-development-lifecycle+3
2014-02-14TalkNullcon A security analysis of Browser Extensions Presentation Abhay Rana#browser-security#web-security#vulnerability-assessment
2014-01-28TalkOwaspappseccalifornia Application Sandboxes: Know thy limits Video Rahul Kashyap#application-pentesting#reverse-engineering#exploit-development
2013-11-07TalkGroundzerosummit How I built a pentest lab in under 70 USD Swaroop Yermalkar#security-assessment#ethical-hacking#bug-bounty+1
2013-11-07TalkGroundzerosummit Abusing Google Apps: Google is my command and control center Presentation Ajin Abraham#android#red-teaming#cloud-pentesting+4
2013-11-07TalkGroundzerosummit Setting the Data Center on fire Ajit Hatti#red-teaming#incident-management#security-training+1
2013-11-07TalkGroundzerosummit IronWASP Source Code Lavakumar Kuppan#security-assessment#application-pentesting#security-tools+2
2013-11-07TalkGroundzerosummit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavan#incident-management#social-engineering#phishing+1
2013-11-07TalkGroundzerosummit The seven sins of Wi-Fi security Vivek Ramachandran#wifi#network-architecture#phishing+1
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhan#red-teaming#secure-coding#ethical-hacking+1
2013-09-27TalkC0c0n Pwning WiFi Devices! Swaroop Yermalkar#wifi#red-teaming#network-pentesting+2
2013-09-27TalkC0c0n Blur Captcha Anirudh Duggal, Abhinav Mohanty#red-teaming#security-testing#application-pentesting+1
2013-09-27TalkC0c0n Lets Play - Applanting on new Grounds Ajit Hatti#android#red-teaming#csrf+1
2013-09-27TalkC0c0n SSRF / XSPA - Real World Attacks and Mitigations Riyaz Walikar#ssrf#xspa#red-teaming
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandran#devsecops#secure-development#security-assessment+2
2013-09-27TalkC0c0n Snake Bites Presentation Anant Shrivastava#secure-coding#security-assessment#xss
2013-09-13TalkRootcon My Experiments with truth: a different route to bug hunting Presentation Devesh Bhatt#bug-hunting#bug-bounty#security-testing+3
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkar#security-assessment#forensics#digital-forensics+1
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2013-08-03TalkDefcon PowerPreter: Post Exploitation Like a Boss Presentation Source Code Video Nikhil Mittal#red-teaming#powershell#windows
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-08-01TalkBlackhat Hot knives through butter: Bypassing automated analysis systems Presentation Whitepaper Video Abhishek Singh, Zheng Bu#red-teaming#dynamic-analysis#malware-research+1
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalra#security-assessment#red-teaming#blueteam+1
2013-07-31TalkBlackhat Clickjacking revisited: A perceptual view of UI security Presentation Video Devdatta Akhawe#clickjacking#blueteam#red-teaming
2013-05-28TalkConfidence My Experiments with truth: a different route to bug hunting Video Devesh Bhatt#security-assessment#vulnerability-assessment#secure-development+2
2013-03-15Tool demoBlackhat Prasadhak (And Offensive Powershell) Source Code Nikhil Mittal#powershell#windows#red-teaming
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-03-14TalkBlackhat Lets play - Applanting Presentation Whitepaper Video Ajit Hatti#red-teaming#csrf#clickjacking+1
2013-03-12TalkTroopers Dirty use of USSD Codes in Cellular Network Presentation Ravishankar Borgaonkar#red-teaming#android-security#ios-security
2013-03-07TalkCansecwest SMS to Meterpreter - Fuzzing USB Modems Presentation Whitepaper Rahul Sasi#red-teaming#fuzzing#hardware-embedded
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumar#android#arm#linux+4
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasi#red-teaming#fuzzing#network-pentesting+2
2013-03-01TalkNullcon BYOD: How will it shape your wireless network security in future? Video Kiran Deshpande#wifi#dos#mac-spoofing+2
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineni#ipv4#mitm#blueteam+2
2013-03-01TalkNullcon Vulnerability research anyone? Omair#red-teaming#blueteam#purpleteam
2013-03-01TalkNullcon Capturing Zero-Day Information Video Dinesh O Bareja, Sumit Sharma#zero-day#red-teaming#honeypot
2013-03-01TalkNullcon Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+3
2013-03-01TalkNullcon Automating JavaScript Static Analysis Lavakumar Kuppan#web-security#security-assessment#blueteam
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shah#code-analysis#secure-development#blueteam+4
2012-12-06TalkBlackhat Attacking ODATA Presentation Whitepaper Source Code Gursev Singh Kalra#red-teaming#api-security#application-pentesting+2
2012-12-06TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2012-12-06TalkBlackhat Poking servers with Facebook(and other web applications) Presentation Whitepaper Source Code Riyaz Walikar#xspa#red-teaming#application-pentesting+2
2012-12-06TalkBlackhat The art of exploiting logical flaws in web apps Presentation Whitepaper Sumit Siddharth, Richard Dean#red-teaming#secure-coding#application-pentesting+1
2012-12-05TalkBlackhat Droid Exploitation Saga Presentation Whitepaper Source Code Aditya Gupta, Subho Halder#android#red-teaming#android-security+3
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+4
2012-12-01TalkClubhack Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Halder#nfc#red-teaming#android-security+4
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisetty#red-teaming#blueteam#purpleteam+1
2012-12-01TalkClubhack Content-Type attack -Dark hole in the secure environment Presentation Video Raman Gupta#red-teaming#application-pentesting#pdf+3
2012-12-01TalkClubhack FatCat Web Based SQL Injector Presentation Source Code Video Sandeep Kamble#sqli#red-teaming#input-validation+4
2012-12-01TalkClubhack HAWAS – Hybrid Analyzer for Web Application Security Presentation Video Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2012-12-01TalkClubhack Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher Presentation Video Vishal Kalro#zero-day#application-pentesting#secure-development+1
2012-11-29TalkDeepsec Bad Things in Good Packages - Creative Exploit Delivery Presentation Saumil Shah#red-teaming#exploit-delivery#security-testing
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhat#red-teaming#bypassing#exploit-delivery+3
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumar#android#red-teaming#malware-research+3
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawde#windows-phone#red-teaming#mobile-device-management+3
2012-10-11TalkHitbsecconf XSS & CSRF strike back – Powered by HTML5 Presentation Shreeraj Shah#red-teaming#csrf#cors+1
2012-10-10TalkHitbsecconf Innovative Approaches to Exploit Delivery Video Saumil Shah#red-teaming#exploit-delivery#browser-security
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halder#android-security#reverse-engineering#security-assessment+1
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Sood, Dr. Richard J Enbody#red-teaming#botnet#dynamic-analysis+1
2012-09-26TalkNullcon Nullcon_delhi_2012 Presentation Source Code Prasanna Kanagasabai#ethical-hacking#social-engineering#security-training+1
2012-09-26TalkNullcon Highly Harmful Audio Waves aka DTMF Fuzzing Video Rahul Sasi#dtmf#red-teaming#fuzzing+3
2012-09-26TalkNullcon The art of Passive Web Vul Analysis with IronWASP Video Lavakumar Kuppan#security-assessment#application-pentesting#security-testing+2
2012-09-26TalkNullcon How secure is internet banking in India Video Ajit Hatti#web-security#authentication#financial-institutions+1
2012-09-20TalkEkoparty Fuzzing DTMF Input Processing Algorithms Source Code Rahul Sasi#fuzzing#red-teaming#dtmf
2012-09-20TalkEkoparty Dirty use of USSD Codes in Cellular Network Whitepaper Video Ravishankar Borgaonkar#red-teaming#android-security#endpoint-protection+1
2012-08-29TalkOwaspappsecindia Find me if you can Smart fuzzing and discovery! Presentation Shreeraj Shah#fuzzing#application-pentesting#dynamic-analysis+3
2012-08-03TalkC0c0n Easy Money with UI-Redressing Amol Naik#bug-hunting#application-pentesting#dynamic-analysis+4
2012-08-03TalkC0c0n WebApp Remote Code Execution using Server Side Scripting Engines Presentation Rahul Sasi#red-teaming#security-assessment#application-pentesting+4
2012-08-03TalkC0c0n Contemporary Transcription and Resource Parasitism Arpit Patel#exploitation#firewall#network-monitoring+1
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxena#security-assessment#exploitation#cyber-war+3
2012-08-03TalkC0c0n Evil JavaScript Bishan Singh#red-teaming#web-security#application-pentesting+4
2012-08-03TalkC0c0n Cracking the Mobile Application Source Code Presentation Sreenarayan Ashokkumar#android#ios#blackberry+2
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goel#social-engineering#security-assessment#security-training+1
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishra#blueteam#phishing#social-engineering+1
2012-07-26Tool demoBlackhat Bypassing Every CAPTCHA provider with clipcaptcha Source Code Gursev Singh Kalra#web-security#bypassing#security-tools
2012-07-26TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Video Shreeraj Shah#red-teaming#cors#csrf+3
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittal#post-exploitation#ethical-hacking#security-assessment+1
2012-05-24TalkHitbsecconf CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants Presentation Video Rahul Sasi#security-assessment#ivr#application-pentesting+2
2012-05-13TalkCarolinacon Attacking CAPTCHAs for Fun and Profit Gursev Singh Kalra#web-security#bypassing#exploitation
2012-03-21TalkTroopers More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard Presentation Source Code Nikhil Mittal#security-assessment#red-teaming#keylogging
2012-03-16TalkBlackhat The Pwnage Saga Continues Presentation Video Nikhil Mittal#hid#red-teaming#buffer-underflow+2
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasi#red-teaming#ivrs#network-pentesting+3
2012-03-15TalkNullcon An App(le) a day keeps the wallet away Antriksh Shah#security-assessment#web-security#api-security+1
2012-03-14TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Video Shreeraj Shah#red-teaming#cors#csrf+3
2012-03-14TalkBlackhat Hacking XPATH 2.0 Presentation Whitepaper Video Sumit Siddharth, Tom Forbes#red-teaming#application-pentesting#input-validation+1
2012-03-02Award CAPTCHA Re-Riding Attack Source Code Gursev Singh Kalra#web-security#bypassing#authentication
2012-02-15TalkNullcon Your phone is your phone but your calls are now my calls Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwal#red-teaming#gsm#exploit-delivery+1
2012-02-15TalkNullcon Sandboxing The deep truth Video Disha Agarwal, Manish Pali#fuzzing#sandbox#blueteam
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kamble#red-teaming#xss#web-security+2
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoy#red-teaming#blueteam#purpleteam
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singh#web-security#red-teaming#blueteam+1
2012-02-15TalkNullcon Attacking Backup Software Video Nibin Varghese#red-teaming#application-pentesting#security-testing
2012-02-15TalkNullcon Binary God Presentation Video Atul Alex#red-teaming#emulator#assembler+2
2012-02-15TalkNullcon CAPTCHAs for fun and Profit Video Gursev Singh Kalra#red-teaming#application-pentesting#input-validation+2
2012-02-15TalkNullcon Haxdroid: Empowering Android Handset Video Anant Shrivastava, Prashant Mahajan, Pardhasaradhi Ch#android#security-assessment#red-teaming
2012-02-15TalkNullcon IVR Security: Internal Network attacks via phone lines Video Rahul Sasi#ivrs#red-teaming#application-pentesting+1
2012-02-15TalkNullcon Javascript static analysis with IronWASP Presentation Video Lavakumar Kuppan#web-security#security-assessment#blueteam
2012-02-15TalkNullcon Ra.2 Blackbox DOM-based XSS scanner Presentation Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#xss#blueteam#security-assessment
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittal#hid#red-teaming#endpoint-protection+3
2011-12-04TalkClubhack Wi-Fi malware for Fun and Profit Vivek Ramachandran#wifi#malware-distribution#exploit-delivery
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2011-12-04TalkClubhack DOM XSS – Encounters of the 3rd Kind Presentation Video Bishan Singh#xss#red-teaming#secure-coding+4
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soi#red-teaming#exploit-kit#malware-distribution+4
2011-12-04TalkClubhack Hacking your Droid Presentation Aditya Gupta#red-teaming#android#mobile-hacking+4
2011-12-04TalkClubhack Handle Exploitation of Remote System From Email Account Presentation Bhaumik Merchant#red-teaming#phishing#social-engineering
2011-12-04TalkClubhack Mere paas Teensy hai Presentation Nikhil Mittal#hid#red-teaming#security-assessment
2011-12-04TalkClubhack One Link Facebook Presentation Anand Pandey#red-teaming#application-pentesting#phishing+1
2011-12-04TalkClubhack Pen testing Mobile Applications Presentation Prashant Verma#security-assessment#android#ios
2011-11-25TalkMalcon Mareech : Look it’s a HID made up of gold Nikhil Mittal#hid#red-teaming#keylogging+2
2011-11-25TalkMalcon Advanced Malware for Apple Products Atul Alex#red-teaming#macos#ios
2011-11-17Award CAPTCHA Hax With TesserCap Source Code Gursev Singh Kalra#web-security#bypassing#authentication
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Presentation Jagadeesh Chandraiah#trojan#reverse-engineering#security-assessment
2011-11-04TalkHackfest Here are your keystrokes Nikhil Mittal#red-teaming#keylogging#security-assessment+1
2011-10-13TalkHitbsecconf Web Wars 3 Saumil Shah#cyber-war#exploit-delivery#application-pentesting+1
2011-10-13TalkHitbsecconf Femtocells: A Poisonous Needle in the Operator’s Hay Stack Presentation Video Ravishankar Borgaonkar, Kevin Redon, Nico Golde#3g#red-teaming#application-pentesting
2011-10-07TalkC0c0n Pentesting iPhone Applications Presentation Satish Bommisetty#ios#security-assessment#application-pentesting+4
2011-10-07TalkC0c0n Runtime thread injection and execution in Linux processes Aseem Jakhar#linux#red-teaming#code-injection+1
2011-10-07TalkC0c0n Wi-Fi Malware for Fun and Profit Vivek Ramachandran#red-teaming#network-pentesting#malware-distribution+2
2011-10-07TalkVirusbulletin Browser exploit packs - exploitation paradigm Presentation Whitepaper Aditya K Sood, Richard J Enbody#exploit-kit#malware-research#browser-security+1
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasi#purpleteam#application-pentesting#backdoor-detection+4
2011-10-07TalkC0c0n Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications Riyaz Walikar#red-teaming#application-pentesting#application-hardening+1
2011-10-07TalkC0c0n Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution Presentation Ahamed Nafeez#red-teaming#network-pentesting#network-architecture
2011-10-07TalkC0c0n Automated Malware Analysis - Setting up the Environment Presentation K v Prashant, Pushkar Pashupat#security-assessment#dynamic-analysis#malware-research+1
2011-09-19TalkHacklu The travelling hacksmith Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandran#wifi#red-teaming#endpoint-protection+3
2011-09-19TalkBrucon Botnets and Browsers, Brothers in a Ghost Shell Presentation Aditya K Sood#botnet#red-teaming#dynamic-analysis+1
2011-09-19TalkHacklu Linux thread injection - The jugaad way Source Code Aseem Jakhar#linux#thread-injection#red-teaming
2011-09-07TalkSecuritybyte Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit Presentation Vivek Ramachandran#wifi#worm#botnet+1
2011-09-07TalkSecuritybyte IronWASP - A Web Application Security Testing Platform Presentation Source Code Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2011-09-06TalkSecuritybyte Runtime thread injection and execution in Linux processes Presentation Aseem Jakhar#thread-injection#linux#process-injection+2
2011-09-06TalkSecuritybyte Botnets at Application+ layer Presentation Raj Shastrakar#bot#red-teaming#application-pentesting+4
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Raman#social-engineering#web-security#security-training+1
2011-08-05TalkDefcon Jugaad – Linux Thread Injection Kit Presentation Source Code Video Aseem Jakhar#linux#thread-injection#red-teaming
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-05-20TalkHitbsecconf Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) Presentation Shreeraj Shah#red-teaming#cors#csrf+3
2011-03-30TalkTroopers Femtocell: Femtostep to the Holy Grail Presentation Ravishankar Borgaonkar, Kevin Redon#red-teaming#application-pentesting#mobile-hacking+1
2011-02-25TalkNullcon Buffer Under Run Exploits Presentation Saurabh Sharma, Chinmaya Kamal#buffer-underrun#buffer-underflow#red-teaming
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakhar#linux#red-teaming#malware-research+2
2011-02-25TalkNullcon Lessons Learned From 2010 Presentation Video Saumil Shah#red-teaming#exploit-delivery#social-engineering+2
2011-02-25TalkNullcon Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) Presentation Whitepaper Sunil Kumar#dynamic-binary-instrumentation#code-analysis#dynamic-analysis+3
2011-02-25TalkNullcon Fuzzing with complexities Presentation Whitepaper Video Vishwas Sharma#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon JSON Fuzzing: New approach to old problems Presentation Whitepaper K v Prashant, Tamaghna Basu#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddy#blueteam#red-teaming#purpleteam+1
2011-02-25TalkNullcon Hacking the Parliament – A classic Social Engineering attack Anurag Dhanda#social-engineering#reconnaissance#security-strategy+2
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2011-02-25TalkNullcon Penetration Testing a Biometric System Presentation Whitepaper Video Rahul Sasi#security-assessment#biometric#hid+1
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuru#evm#red-teaming#hardware-embedded+3
2011-02-25TalkNullcon SSLSmart – Smart SSL Cipher Enumeration Presentation Gursev Singh Kalra#encryption#ssl#security-assessment
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumar#xss#sqli#blueteam+1
2010-12-04TalkClubhack Attacking with HTML5 Presentation Lavakumar Kuppan#red-teaming#application-pentesting#security-testing
2010-12-04TalkClubhack Data theft in India Presentation K K Mookhey#data-leak#red-teaming#cyber-crime
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-10-27TalkHacklu Exploit Delivery - Tricks and Techniques Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+4
2010-10-14TalkHitbsecconf Exploit Delivery Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+2
2010-10-13TalkHitbsecconf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shah#red-teaming#web-security#ajax+3
2010-08-01TalkC0c0n VoIP Security Mukund Krishnamurthy#purpleteam#voip#sip+4
2010-08-01TalkC0c0n Client Side Exploits using PDF Presentation Ankur Bhargava, Tamaghna Basu#red-teaming#pdf#data-leak+2
2010-08-01TalkC0c0n Code Disclosure over HTTP Anant Kochhar#red-teaming#application-hardening#code-review+4
2010-08-01TalkC0c0n Wireless MITM Prashant Mahajan#red-teaming#network-pentesting#security-tools
2010-08-01TalkC0c0n Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle Praseed Pai#windows#red-teaming#secure-coding
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwa#security-assessment#security-training#risk-management
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Ramesh#botnet#reverse-engineering#security-assessment
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmad#wifi#red-teaming#blueteam+1
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharth#red-teaming#sql-injection#application-pentesting+3
2010-07-29TalkBlackhat Hacking Browser’s DOM - Exploiting Ajax and RIA Presentation Whitepaper Shreeraj Shah#red-teaming#ajax#application-pentesting+4
2010-07-01TalkHitbsecconf Top 10 Web 2.0 Attacks and Exploits Presentation Shreeraj Shah#red-teaming#cors#csrf+3
2010-07-01TalkHitbsecconf The Travelling Hacksmith 2009 – 2010 Saumil Shah#red-teaming#application-pentesting#phishing+2
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindane#secure-coding#red-teaming#security-assessment
2010-02-25TalkNullcon Software Fuzzing with Wireplay. Presentation Whitepaper Source Code Abhisek Datta#fuzzing#red-teaming#network-pentesting+3
2010-02-25TalkNullcon Intelligent debugging and in memory fuzzing. Presentation Vishwas Sharma, Amandeep Bharti#fuzzing#debugging#red-teaming
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppan#phishing#red-teaming#security-testing+1
2010-02-25TalkNullcon Steganography & Stegananalysis: A Technical & Psychological Perspective Presentation Prince Komal Boonlia, Reena Bhansali#steganography#steganalysis#red-teaming
2010-02-25TalkNullcon Penetration Testing versus Source Code Presentation Nikhil Wagholikar#security-assessment#code-analysis#application-pentesting+4
2010-02-03TalkBlackhat Beware of Serialized GUI Objects Bearing Data Presentation Rohini Sulatycki, David Byrne#apache-myfaces#sun-mojarra#red-teaming+1
2009-12-05TalkClubhack Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#red-teaming#phishing+1
2009-12-05TalkClubhack Mobile Application Security Testing Presentation Gursev Singh Kalra#security-assessment#mobile-pentesting#application-pentesting+4
2009-12-05TalkClubhack Risk Based Penetration Testing Presentation Nikhil Wagholikar, K K Mookhey#security-assessment#incident-management#cybersecurity-strategy+1
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desai#encryption#steganography#blueteam
2009-11-19TalkDeepsec Ownage 2.0 Presentation Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+1
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shah#secure-coding#devsecops#software-security+2
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookhey#security-assessment#risk-management#ethical-hacking+3
2009-11-18TalkSecuritybyte Cloud Hacking – Distributed Attack & Exploit Platform Shreeraj Shah#red-teaming#cloud-pentesting#cloud-workload-protection+1
2009-11-18TalkSecuritybyte Hacking Oracle From Web Presentation Sumit Siddharth#red-teaming#sql-injection#application-hardening+1
2009-11-17TalkSecuritybyte Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumar#windows#red-teaming#boot-sector+1
2009-11-17TalkSecuritybyte Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#phishing#social-engineering
2009-10-28TalkHacklu Ownage 2.0 Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2009-10-07TalkHitbsecconf How to Own the World – One Desktop at a Time Presentation Video Saumil Shah#social-engineering#red-teaming#firewall
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyani#wifi#honeypot#phishing+1
2009-08-01TalkDefcon The Making of the second SQL injection Worm Presentation Source Code Video Sumit Siddharth#sqli#red-teaming#worm
2009-07-31TalkDefcon Advancing Video Application Attacks with Video Interception, Recording, and Replay Presentation Video Arjun Sambamoorthy, Jason Ostrom#red-teaming#security-tools#application-hardening
2009-07-29TalkBlackhat Psychotronica: Exposure, Control, and Deceit Presentation Nitesh Dhanjani#red-teaming#reconnaissance#social-engineering+3
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkHitbsecconf Pwnage 2.0 Presentation Saumil Shah#hid#red-teaming#exploit-delivery
2009-04-22TalkHitbsecconf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkTroopers Browser Design Flaws – Hacking by Breaking in Architectures Presentation Aditya K Sood#red-teaming#application-pentesting#secure-development+1
2009-04-22TalkTroopers SQL Injections: More Fun and Profit Presentation Sumit Siddharth#red-teaming#application-pentesting#code-review+4
2009-04-22TalkHitbsecconf Vbootkit 2.0: Attacking Windows 7 via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumar#windows#red-teaming#boot-sector
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2008-12-06TalkClubhack Introduction to backtrack Presentation Kunal Sehgal#security-assessment#linux#ethical-hacking+1
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Varghese#red-teaming#reverse-engineering#exploit-development
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alex#secure-coding#reverse-engineering#red-teaming+2
2008-12-06TalkClubhack Hacking Client Side Insecurities Presentation Aditya K Sood#red-teaming#application-pentesting#input-validation+1
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohli#secure-development#secure-coding#blueteam+1
2008-12-06TalkClubhack AntiSpam - Understanding the good, the bad and the ugly Presentation Aseem Jakhar#blueteam#phishing#anti-phishing+1
2008-11-13TalkDeepsec Game of Web 2.0 Security - Attacking Next Generation Apps Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+2
2008-10-29TalkHitbsecconf Top 10 Web 2.0 Attacks Presentation Video Shreeraj Shah#web-security#ajax#xss+4
2008-10-29TalkHitbsecconf Browser Exploits - A New Model for Browser Security Video Saumil Shah#red-teaming#application-pentesting#code-review+3
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Presentation Saumil Shah#red-teaming#application-hardening#browser-security+4
2008-08-20TalkOwaspappsecindia Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2008-08-20TalkOwaspappsecindia Case Study: Testing 200+ applications in a $10 Billion Enterprise Presentation Roshen Chandran#security-assessment#application-pentesting#security-testing+4
2008-08-09TalkDefcon Autoimmunity Disorder in Wireless LAN Presentation Video Jvr Murthy, Amit Vartak, Md Sohail Ahmad#wifi#wireless-security#red-teaming
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Gupta#red-teaming#rdp#application-pentesting+1
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2008-04-16TalkHitbsecconf Securing Next Generation Applications Γ’β‚¬β€œ Scan, Detect and Mitigate Shreeraj Shah#web-security#ajax#xss+4
2008-03-28TalkBlackhat Spam-Evolution Whitepaper Aseem Jakhar#social-engineering#malware-detection#anti-phishing
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandra, Jacob West, Brian Chess, Sean Fay#ethical-hacking#secure-development#devsecops
2008-03-26TalkCansecwest Vulnerabilities Die Hard Kowsik Guruswamy#red-teaming#ethical-hacking#exploit-delivery+2
2008-02-20TalkBlackhat Hacking VoIP through IPSec Tunnels Whitepaper Sachin Joglekar, Sudeep Patwardhan#voip#red-teaming#gsm+2
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2007-12-19TalkClubhack Backdoor 2.0: Hacking Firefox to steal his web secrets Presentation Sunil Arora#red-teaming#application-pentesting#browser-security+2
2007-12-09TalkClubhack Legiment Techniques of IPS/IDS Evasion Presentation Ajit Hatti#red-teaming#network-monitoring#ids+2
2007-12-09TalkClubhack Analysis of Adversarial Code: The Role of Malware Kits! Presentation Rahul Mohandas#red-teaming#malware-research#dynamic-analysis+1
2007-12-09TalkClubhack Hacking Web 2.0 Art and Science of Vulnerability Detection Presentation Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2007-12-09TalkClubhack Vulnerabilities in VoIP Products and Services Whitepaper Gaurav Saha#voip#red-teaming#sip+3
2007-12-09TalkClubhack The future of automated web application testing Presentation Amish Shah, Umesh Nagori#security-assessment#application-pentesting#security-testing+3
2007-09-06TalkHitbsecconf Hacking Ajax and Web Services Γ’β‚¬β€œ Next Generation Web Attacks on the Rise Presentation Video Shreeraj Shah#red-teaming#ajax#web-security
2007-08-04TalkDefcon The Emperor Has No Cloak - WEP Cloaking Exposed Presentation Whitepaper Video Vivek Ramachandran#wifi#red-teaming#aircrack
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belani#social-engineering#phishing#threat-modeling+2
2007-08-01TalkBlackhat Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones Whitepaper Video Krishna Kurapati#wifi#voip#red-teaming
2007-04-18TalkCansecwest Low-Rate Denial-of-Service attacks Anil Kumar#red-teaming#dos#network-defense+2
2007-04-05TalkHitbsecconf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+2
2007-04-04TalkHitbsecconf Vboot Kit: Compromising Windows Vista Security Presentation Vipin Kumar, Nitin Kumar#windows#boot-sector#endpoint-protection+1
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhalla#blueteam#purpleteam#application-pentesting+4
2007-03-29TalkBlackhat Vboot Kit: Compromising Windows Vista Security Presentation Whitepaper Nitin Kumar, Vipin Kumar#windows#red-teaming#kernel
2007-03-15TalkBlackhat Exploit-Me Series – Free Firefox Application Penetration Testing Suite Launch Presentation Video Nish Bhalla, Rohit Sethi#web-security#xss#sql-injection+4
2006-11-29TalkPacsec Smashing Heap by Free Simulation Presentation Sandip Chaudhari#heap#red-teaming#exploit-delivery+4
2006-10-19TalkHacklu Smashing Heap by Free Simulation: Presentation Sandip Chaudhari#heap#red-teaming#exploit-development+2
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-09-21TalkHitbsecconf Smashing the Stack for Profit - Period Presentation Video Rohyt Belani#red-teaming#application-pentesting#code-review+3
2006-08-01TalkBlackhat Writing Metasploit Plugins - from Vulnerability to Exploit Video Saumil Shah#metasploit#exploit-development#secure-coding+2
2006-04-13TalkHitbsecconf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shah#metasploit#red-teaming#exploit-development+3
2005-09-29TalkHitbsecconf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4
2005-07-27TalkBlackhat iSCSI Security (Insecure SCSI) Presentation Himanshu Dwivedi#red-teaming#iscsi#network-storage
2005-04-10TalkHitbsecconf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singh#red-teaming#blueteam#purpleteam+1
2005-03-31TalkBlackhat Defeating Automated Web Assessment Tools Presentation Saumil Shah#red-teaming#security-testing#application-pentesting+1
2004-10-06TalkHitbsecconf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam
2004-07-28TalkBlackhat Defeating Automated Web Assessment Tools Video Saumil Shah#red-teaming#application-pentesting#application-hardening+2
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#automated-scanning+2
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#application-pentesting+3
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3
2003-12-12TalkHitbsecconf Threats to Wireless Networks - War Driving Video Anurana Saluja#wifi#network-architecture#threat-modeling+1
2003-12-12TalkHitbsecconf New Generation Frauds Video Yerra Ravi Kiran Raju#fraud#red-teaming#money-laundering
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shah#red-teaming#blueteam#purpleteam
2001-11-21TalkBlackhat One-Way SQL Hacking : Futility of Firewalls in Web Hacking Presentation Video Saumil Shah#firewall#red-teaming#sql-injection+2
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Popli#security-assessment#data-protection#blueteam
2001-04-26TalkBlackhat Web Hacking Presentation Saumil Shah#red-teaming#application-pentesting#security-testing+4
2001-02-14TalkBlackhat Web Hacking Presentation Video Saumil Shah#red-teaming#application-pentesting#dynamic-analysis+3