๐Ÿงช Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Penetration Testing

Security testing and ethical hacking

724
Total Entries
415
Contributors
315
Unique Tags
113
Related Tags

Top Contributors

Saumil Shah(39) Nikhil Mittal(26) Rahul Sasi(17) Shreeraj Shah(17) Ajin Abraham(15)

Related Tags (58)

Show all 58 tags...

All Entries (724 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjarattack-surfacevulnerability-assessmentasset-management+2
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Spentestingapplication-pentestingvulnerability-assessment+2
2025-08-07TalkBlackhat Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing Kanika Guptareverse-engineeringfirmware-analysismobile-security+2
2025-08-06Tool demoBlackhat CloudLens Gaurav Joshi, Hare Krishna Rai, Prashant Venkateshawscloud-pentestingred-teaming+2
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chagantiweb-securitysecure-codingpentesting+3
2025-08-06Tool demoBlackhat ProcessInjection Chirag Savlapentestingred-teamingreverse-engineering+1
2025-08-06Tool demoBlackhat Realtic Sohan Simha Prabhakar, Samarth Bhaskar Bhatpentestingvulnerability-assessmentstatic-analysis+3
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashankreverse-engineeringexploitationpentesting+3
2025-08-06Tool demoBlackhat RedInfraCraft : Automate Complex Red Team Infra Source Code Yash Bharadwaj, Manish Guptaredteam
2025-04-04Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Dasreconnaissance
2025-04-03Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Anikait Panigrahi, Aparna Balajifuzzing
2025-03-13TalkInsomnihack Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation Video Priyank Nigampost-exploitationlateral-movement
2024-12-12Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswasdarkwidow
2024-12-12Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehrigenzai
2024-12-12Tool demoBlackhat Halberd : Cloud Security Testing Tool Source Code Arpan Abani Sarkarhalberd
2024-12-11Tool demoBlackhat Agneyastra - Firebase Misconfiguration Detection Toolkit Source Code Bhavarth Karmarkar, Devang Solankiagneyastra
2024-12-11Tool demoBlackhat findmytakeover - find dangling domains in a multi cloud environment Source Code Aniruddha Biyanifindmytakeover
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-28TalkBlackhat A Tale of Pwning 500+ Vehicle Anti-theft Devices Umair Nehrimobile-securityvulnerability-assessmentiot-pentesting+1
2024-11-27Tool demoBlackhat Varunastra: Securing the Depths of Docker Source Code Kunal Aggarwalcontainer-securitydockerpentesting+3
2024-11-26TalkBlackhat Critical Exposures: Lessons from a Decade of Vulnerability Research Nikhil Shrivastavavulnerability-managementsql-injectionpentesting+2
2024-11-26Tool demoBlackhat Halberd: Multi-Cloud Security Testing Tool Source Code Arpan Abani Sarkarcloud-pentestingcloud-compliancepentesting+1
2024-11-16TalkC0c0n Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides Rakesh Seal, Diptisha Samantaexploitation
2024-11-16TalkC0c0n Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape Dharani Sanjaiybug-hunting
2024-11-16TalkC0c0n Invisible Invaders: Bypassing Email Security with Legitimate Tools Dhruv Bisanibypassing
2024-11-16TalkC0c0n Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac Ajay Skpenetration-testing
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Kartik Lalanautomotive-cybersecurityvulnerability-managementreverse-engineering+2
2024-11-15TalkC0c0n [Yodha] Nightingale: Docker for Pentesters Source Code Raja Nagoridockerpenetration-testing
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2024-10-23Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Soumyanil Biswasdarkwidow
2024-10-23Tool demoBlackhat R0fuzz: A Collaborative Fuzzer Source Code Season Cherian, Vishnu Dev, Vivek N Jfuzzing
2024-08-30TalkHitb Sec Conf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajputweb-securitypentestingexploitation+4
2024-08-29TalkHitb Sec Conf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasadreverse-engineeringpentestingincident-response
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayreverse-engineeringvulnerability-managementsecurity-architecture+1
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Vivek Ramachandran, Shourya Pratap Singhweb-securitypentestingvulnerability-management
2024-08-10TalkDefcon Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming Presentation Whitepaper Video Shiva Shashankprocess-injection
2024-08-09TalkDefcon Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways Nikhil Shrivastavabughunting
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nainics-securityscadaplc+3
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikhredteam
2024-08-07TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendranhacking
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savlaredteam
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket โ€“ Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigammobile-securitypentestingapi-security+2
2024-05-08TalkRsac How to CTF Infra - Beyond the Challenges and Flags Presentation Jayesh Chauhanctf
2024-04-18Tool demoBlackhat R0fuzz Source Code Season Cherian, Vishnu Devfuzzing
2024-04-18TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendranhacking
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Dasreconnaissance
2024-04-18Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows Source Code Soumyanil Biswasredteam
2024-03-21TalkCan Sec West Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Arif Hussainvulnerability-managementpentestingsecurity-architecture+1
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jativulnerability-assessment
2024-03-11TalkNullcon Hacking Trains Presentation Jaden Furtadohacking
2023-12-07Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Prateek Thakare, Bharath Kumar, Praveen Kanniahredteam
2023-12-06Tool demoBlackhat Docker Exploitation Framework Source Code Rohit Pitkeexploitation
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasavulnerability-assessment
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumarbug-hunting
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Dasreconnaissance
2023-11-17TalkDeepsec Nostalgic Memory โ€“ Remembering All the Wins and Losses for Protecting Memory Corruption Shubham Dubeyvulnerability-managementreverse-engineeringexploitation+1
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Suranacontainer-securitydockerthreat-hunting+1
2023-09-23TalkNullcon How I hacked your bank account: A detailed look at UPI Security Video Abhay Ranahacking
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashankreverse-engineeringpentestingexploitation+3
2023-08-11TalkDefcon Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications Ankur Chowdharyweb-securityxssapplication-pentesting+3
2023-08-10TalkBlackhat Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? Presentation Amit Deokarbug-hunting
2023-08-09Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Dasreconnaissance
2023-08-07TalkC0c0n Serverless Siege: AWS Lambda Pentesting Video Anjali Singh Shukla, Divyanshu Shuklaawsserverlesscloud-pentesting+2
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogismart-contractsblockchain-securityphishing+3
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvamredteam
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastavapentestingnetwork-pentestingsecurity-architecture+1
2023-05-11TalkBlackhat Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwalhacking
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Dasreconnaissance
2023-05-11Tool demoBlackhat reNgine: An Open-Source Automated Reconnaissance/Attack Surface Management tool Source Code Yogesh Ojhareconnaissance
2023-04-20TalkHitb Sec Conf BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES Presentation Video Rohan Aggarwalhacking
2022-12-08Tool demoBlackhat Industrial Control Systems: Capture the Train! Dhruv Sharanctf
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittalred-teamingactive-directorythreat-detection
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kuriensocial-engineeringpentestingsecurity-awareness+1
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojanembedded-securityfirmware-analysishardware-security+3
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-23TalkC0c0n A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Suranapentesting
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanandvulnerability-managementpentestingapt
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwalandroid-securitymobile-securitymobile-pentesting+3
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharmareverse-engineeringvulnerability-managementpentesting
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Ranavulnerability-assessment
2022-09-07TalkNullcon ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron Video Mohan Sri Rama Krishna Pedhapatiredteam
2022-08-26TalkHitb Sec Conf CAN A FUZZER MATCH A HUMAN Presentation Bhargava Shastryfuzzing
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicornโ€™s Twitter Handle Presentation Rahul Sasi, Vishal Singhsocial-engineeringpentestingmalware+2
2022-08-25TalkHitb Sec Conf MPT: Pentest In Action Presentation Video Jyoti Ravalpentest
2022-08-11TalkBlackhat ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron Presentation Mohan Sri Rama Krishna Pedhapatiredteam
2022-08-11TalkBlackhat Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol Presentation Whitepaper Subhechha Subudhizero-day
2022-08-10Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephenreconnaissance
2022-08-10Tool demoBlackhat What’s new in reNgine? Source Code Yogesh Ojhareconnaissance
2022-05-12Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephenreconnaissance
2021-11-13TalkC0c0n Case Study - Cyber Heist in a Bank and Recovery of Systems and Money Prashant Choudharyincident-responseforensicsrecovery+1
2021-11-13TalkC0c0n Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application Gayatri Nayakweb-securityauthenticationauthorization+2
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khanred-teamingethical-hackingthreat_modeling+2
2021-11-12TalkC0c0n โ€œLetโ€™s Go Phishingโ€: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhailsocial-engineeringpentestingsecurity-awareness
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatimathreat_modelingsecurity-awarenesshuman-factor+1
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singhapentestingpost-exploitationprivilege-escalation+2
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishnasecure-codingpentestingethical-hacking+2
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B Rred-teamingethical-hackingvulnerability-assessment+2
2021-08-05TalkDefcon The Bug Hunterโ€™s Recon Methodology Video Tushar Vermapentestingvulnerability-assessmentapplication-pentesting+1
2021-08-04Tool demoBlackhat Automated Attack Path Planning and Validation (A2P2V) Source Code Subir Dasethical-hackingexploitation
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekondavulnerability-assessment
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharmavulnerability-assessment
2021-08-04TalkBlackhat Siamese Neural Networks for Detecting Brand Impersonation Presentation Jugal Parikhimpersonation
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithanewindowsprocess-injectionblueteam+2
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiahblueteamredteampurpleteam+1
2021-03-06TalkNullcon Bug hunter adventures Video Shreyas Dighe, Yuvraj Dighebug-hunting
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharmapentestmachine-learning
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwariopensourceblueteampentest+3
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Soodcloudblueteampentest+1
2020-11-21TalkApp Sec Indonesia Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory Abhi M Balakrishnanweb-securityowaspapplication-pentesting+2
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwadiotredteampentest+1
2020-10-07TalkRootcon ReconPal: Leveraging NLP for Infosec Source Code Video Nishant Sharma, Jeswin Mathaireconredteamnlp+1
2020-10-07TalkRootcon Automating Threat Hunting on the Dark Web and other nitty-gritty thingso Presentation Video Apurv Singh GautamAutomationdeep-webredteam
2020-10-07TalkRootcon How I Pwned the ICS data during my internship Presentation Shail Patelicsredteam
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2020-10-01Tool demoBlackhat OWASP Python Honeypot Source Code Sri Harsha Gajavalliweb-securityowasppentesting+1
2020-10-01Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jm, Akhil Mahendraandroidcode-analysisreverse-engineering+2
2020-10-01Tool demoBlackhat Mobexler: An All-in-One Mobile Pentest VM Source Code Abhinav Mishramobileandroidios+4
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Guptapentestingvulnerability-assessmentAutomation+1
2020-09-18TalkC0c0n Web Application hacking with WebZGround Video Parveen Yadav, Narendra Kumarweb-securityweb-pentestingpentesting+3
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittalbug-huntingAutomation
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giribug-hunting
2020-09-18TalkC0c0n How I created my clone using AI - next-gen Social Engineering Video Tamaghna Basuaicloneimpersonation
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwadredteamiotpentest
2020-09-18TalkC0c0n Offensive & Scope Based Recon Video Harsh Bothrareconnaissance
2020-09-18TalkC0c0n Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment Source Code Video Madhu Akulakubernetesinfrastructureredteam
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamathredteam
2020-08-22TalkThe Diana Initiative Internal Red Team Operations Framework - Building your practical internal Red Team Abhijith B Rredteam
2020-08-06TalkBlackhat How I Created My Clone Using AI - Next-Gen Social Engineering Presentation Video Tamaghna Basuaiclonesocial-engineering+1
2020-08-06Tool demoBlackhat FuzzCube Source Code Anto Josephfuzzingkubernetescloud+1
2020-08-05TalkBlackhat Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic Presentation Video Harini Kannanmachine-learningexploit-detectionblueteam
2020-07-26TalkHitb Sec Conf Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company Himanshu Sharma, Aman Sachdevredteamhealthcare
2020-04-25TalkHitb Sec Conf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotvulnerability-assessmentpentestinfrastructure+1
2020-04-24TalkHitb Sec Conf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotscadablueteampentest+1
2020-03-18TalkCan Sec West The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shahredteamarmfirmware+5
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shreesecure-codingawsamazon-cognito+5
2020-03-06Tool demoNullcon FuzzCube Source Code Anto Josephfuzzingkubernetescloud+1
2020-03-06Tool demoNullcon Mobexler Source Code Abhinav Mishra, Abhishek Jaiswalmobileandroidios+4
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Guptaredteampentestnetwork
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandaripentestdevelopmentvirtual-machine+1
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahanlinuxsecure-codingweb-application-security+3
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rananetworkreconnaissanceblueteam
2020-03-06Tool demoNullcon Callidus Source Code Chirag Savlaredteamcloud
2020-03-06Tool demoNullcon FRISPY Source Code Tejas Girme, Parmanand Mishraspywareredteam
2020-03-06TalkNullcon Putting it all together: building an iOS jailbreak from scratch Presentation Video Umang Raghuvanshiiosmobilejailbreak+1
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Aryafuzzingredteamblueteam+1
2019-12-04Tool demoBlackhat DumpTheGit Source Code Malkit Singhgithubreconnaissance
2019-11-28TalkDeepsec Mastering AWS Pentesting and Methodology Video Ankit Giriawscloudpentest
2019-11-10TalkToor Con Hot Tub Island Jatin Katariaethical-hackingsecurity-awareness
2019-11-01TalkApp Sec Day Australia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavredteamblueteampurpleteam+1
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potlurireverse-engineeringbinary-analysisexploitation+1
2019-10-15TalkHitb Sec Conf Car Hacking: Practical Guide to Automotive Security Presentation Video Yogesh Ojharedteamcar-hacking
2019-10-14TalkHitb Sec Conf IoT Pentesting The Right Way Presentation Video Yogesh Ojhaiotpentest
2019-10-14TalkHitb Sec Conf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishrawebbrowserblueteam+2
2019-10-14TalkHitb Sec Conf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehtanetworkwifiredteam+2
2019-10-12TalkTexas Cyber Summit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshireverse-engineeringmalwarebinary-analysis+3
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shreesecure-codingawsamazon-cognito+5
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastavapentestredteamsecure-coding
2019-09-27TalkC0c0n Offensive Machine Learning for Pentesters and Red Teams Tamaghna Basumachine-learningpentestredteam
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharmasecure-codingpentest
2019-09-27TalkC0c0n Detection of TOR Sources using Artificial Intelligence Roshy Johntorairedteam
2019-09-27TalkC0c0n Hacking ICS devices for Fun Arun Maneredteam
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhanauthenticationidentity-managementvulnerability-assessment+3
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil BogamredteamAutomationcar-hacking+2
2019-09-23TalkRootcon Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking Video Arun Maneiotredteamics
2019-09-13TalkGlobal App Sec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavpurpleteam
2019-08-30TalkHitb Sec Conf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshisecure-codingredteamblueteam+1
2019-08-29TalkHitb Sec Conf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singhredteamblueteampurpleteam+1
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkarmobile-securityios-securityapplication-pentesting+4
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modireconnaissanceblueteamweb
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittalactive-directoryredteamwindows
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-09Tool demoDefcon PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Guptaredteampentestnetwork
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Maneautomotive-cybersecuritycan-busics-security+3
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singhphishingapi-securityweb-security+2
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargavamobile-securityprivacypentesting
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shahcloud-pentestingpost-exploitationcloud-architecture+1
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rananetworkreconnaissanceblueteam
2019-08-07Tool demoBlackhat Medaudit: Auditing Medical Devices and Healthcare Infrastructure Source Code Anirudh Duggalhealthcareinfrastructurepentest
2019-08-07Tool demoBlackhat PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Guptaredteampentestnetwork
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Rushikesh D Nandedkar, Lalit Bhandaripentestdevelopmentvirtual-machine+1
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwalvirtual-machineblueteamforensic+2
2019-08-07TalkBlackhat New Vulnerabilities in 5G Networks Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik5gredteam4g+3
2019-05-21TalkPhdays Fuzzing 101 Dhiraj Mishra, Zubin Devnanifuzzingredteamweb
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshiredteammachine-learning
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Mageshredteamhardware
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Mageshhardwareredteamiot
2019-05-10TalkHitb Sec Conf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawalnetworkrfiot+1
2019-05-09TalkHitb Sec Conf GDALR: Duplicating Black Box Machine Learning Models Presentation Video Rewanth Tammana, Nikhil Joshimachine-learningredteamcloud
2019-05-09TalkHitb Sec Conf HAXPO: WiCy: Monitoring 802.11AC Networks at Scale Presentation Video Vivek Ramachandrannetworkredteamwifi+1
2019-03-29Tool demoBlackhat Halcyon IDE: Nmap Script Development IDE Source Code Sanoop Thomasreconnaissanceredteamnmap
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavallinetwork-pentestingvulnerability-assessmentfirewall+3
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwaripentestinfrastructureblueteam+3
2019-03-28Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhanpentestblueteamcloud+4
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangalevoipwiresharknetwork-security+4
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhunisecure-codingthreat_modelingredteam
2019-03-21TalkTroopers Evolution of kernel fuzzers in NetBSD Presentation Video Siddharth Mredteamfuzzing
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desaisecure-codingpentest
2019-02-28TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Video Lavakumar Kuppan, Ankit GuptapentestAutomation
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singhhealthcareredteamblueteam+1
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjveredteaminfrastructure
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkarussdredteammobile
2018-12-06Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Sagar Popat, Harsh Groverapipentestrest-api+1
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokanredteamcryptography
2018-11-29TalkDeepsec DNS Exfiltration and Out-of-Band Attacks Video Nitesh Shilpkarnetworkdnsredteam
2018-11-27TalkHitb Sec Conf BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit Presentation Source Code Video Rewanth Tammanabrowserredteam
2018-11-27TalkHitb Sec Conf COMMSEC: Taking Over Telecom Networks Presentation Video Hardik Mehtanetworkarchitectureredteam+3
2018-11-27TalkHitb Sec Conf Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit Presentation Video Himanshu Mehta, Sachine Waghnetworkmobileredteam
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Harithealthcareredteamiot+1
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittalwindowsactive-directoryredteam
2018-10-05TalkC0c0n OSINT : Indian Citizen Edition Anant Shrivastavaosint
2018-10-05TalkC0c0n Pentesting GraphQL Applications Presentation Source Code Neelu Tripathypentest
2018-10-05TalkC0c0n DNS Exfiltration and Out of Band Attacks Nitesh Shilpkarredteamnetwork
2018-10-05TalkC0c0n Unconventional vulnerabilities in Google Cloud Platform Pranav Venkatcloudgcpredteam
2018-09-27TalkRootcon Bug Bounty Hunting on Steroids Presentation Video Anshuman Bhartiyabug-hunting
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaancloudawsinfrastructure+5
2018-09-27TalkRootcon Expl-iot: Hacking IoT like a boss Presentation Video Aseem Jakhariotredteam
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur TyagiblueteamAutomationpentest+1
2018-08-30TalkHitb Sec Conf Exploiting Automation in LTE Mobile Networks Presentation Whitepaper Video Ravishankar Borgaonkarmobilenework4g+3
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Raopentestingvulnerability-managementsecurity-architecture+1
2018-08-12Tool demoDefcon Expl-iotโ€”IoT Security Testing and Exploitation framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Raocryptographywebauthentication+2
2018-08-11Tool demoDefcon Sh00tโ€”An open platform for manual security testers & bug hunters Source Code Pavan Mohanpentestbug-huntingopensource+3
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur TyagiblueteamAutomationpentest+1
2018-08-11Tool demoDefcon Archeryโ€”Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestinfrastructureblueteam+3
2018-08-11Tool demoDefcon BLEMystiqueโ€”Affordable custom BLE target Source Code Nishant Sharma, Jeswin Mathainetworkbleredteam+2
2018-08-11Tool demoDefcon PA Toolkitโ€”Wireshark plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathaiwiresharkpentestreconnaissance+6
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modireconnaissanceblueteamweb
2018-08-09TalkBlackhat Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina Presentation Source Code Video Bhargava Shastrypentestblueteamdevelopment+2
2018-08-09TalkDefcon Backdooring DVR/NVR devices Arun Manehardware-reverse-engineeringembedded-securitypentesting+3
2018-08-09Tool demoBlackhat BLEMystique: Affordable Custom BLE Target Source Code Nishant Sharma, Jeswin Mathaiblewearablespentest
2018-08-09Tool demoBlackhat Jackhammer: One Security Vulnerability Assessment/Management Tool Source Code Madhusudhan Konda, Rajagopal Vr, Shreyas Chidambarawebanalysismobile+9
2018-08-09Tool demoBlackhat OWASP Offensive Web Testing Framework Source Code Viyat Bhalodiaowasppentestweb+1
2018-08-09TalkDefcon 4Gโ€”Who is paying your cellular phone bill? Presentation Video Isha Singh4gipxnetwork+3
2018-08-08Tool demoBlackhat DataSploit 2.0 Source Code Kunal Aggarwal, Shubham Mittalosintreconnaissance
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwaripentestinfrastructureblueteam+3
2018-08-08Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Ankur Bhargava, Prajal Kulkarni, Sagar Popatpentestapirest-api+2
2018-08-08Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit Source Code Divya S John, Jayesh Chauhan, Shivankar Madaanpentestblueteamcloud+4
2018-08-08Tool demoBlackhat Damn Vulnerable iOS App: Swift Edition Source Code Prateek Gianchandaniiosmobilepentest+1
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-08Tool demoBlackhat PA Toolkit: Wireshark Plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathaiwiresharkpentest
2018-08-08Tool demoBlackhat V2X Validation Tool Source Code Raashid Ansaripentestautomobileredteam
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeezredteamvpnweb+2
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf ShaikltenetworkAutomation+4
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhanvirtual-machineblueteamforensic+2
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-08TalkBlackhat Back to the Future: A Radical Insecure Design of KVM on ARM Presentation Whitepaper Video Baibhav Singh, Rahul Kashyapredteamlinuxvirtual-machine+1
2018-06-29TalkHackinparis Hunting PBX for Vulnerabilities Presentation Video Himanshu Mehta, Sachin Waghnetworkmobileredteam
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestinfrastructureredteam+2
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsettypentestredteamblueteam+9
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharlawearablesblueteamredteam+2
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiryandroidmobilefuzzing+4
2018-03-01TalkNullcon Abusing and Attacking Content Sharing Solutions Presentation Pratap Chandra Allenaredteammobilenetwork+4
2018-03-01TalkNullcon Breaking Into Container Orchestrators Presentation Nadeem Hussainredteam
2018-03-01TalkNullcon DARWIN (A parasite covert wireless network) Video Rushikesh D Nandedkarnetworkwifiredteam
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyanbankingredteam
2018-03-01TalkNullcon Software Supply Chain Cyberattack Presentation Samiran Ghatakredteamcyberattack
2018-01-31TalkOwasp App Sec California Hunter โ€“ Optimize your Pentesters time Video Kiran Shiraliapplication-pentestingpentestingvulnerability-management+2
2017-12-30Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS Security Audit Source Code Shivankar Madaan, Prajal Kulkarni, Jayesh Chauhanpentestblueteamcloud+4
2017-12-07Tool demoBlackhat DataSploit - OSINT Framework Source Code Shubham Mittalosintreconnaissance
2017-12-06TalkBlackhat DIFUZZING ANDROID KERNEL DRIVERS Presentation Whitepaper Video Aravind Machiryandroidredteammobile+3
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhariotpentestredteam+2
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Harithealthcareredteamiot
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shuklaredteamblueteampurpleteam
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Guptaiot-pentestingembedded-securitypentesting+3
2017-10-19TalkHacklu Bug hunting using symbolic virtual machines! Video Anto Josephbug-hunting
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shuklaredteamblueteampurpleteam
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkarvulnerability-assessmentpentestingsecure-coding+2
2017-10-05TalkVirus Bulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anandvulnerability-managementreverse-engineeringpentesting+1
2017-09-13Talk44 Con Red Team Revenge : Attacking Microsoft ATA Presentation Video Nikhil Mittalwindowsredteam
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakharexploitationpentestingreverse-engineering+1
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftabsocial-engineeringsecurity-awarenessrisk-management+1
2017-08-18TalkC0c0n Social Media and You Parry Aftabsecurity-awarenesssocial-engineeringhuman-factor+1
2017-08-18TalkC0c0n OSINT and Privacy Rohit Srivastwaosint
2017-08-18TalkC0c0n Androsia: A tool for securing in memory sensitive data Source Code Samit Anwersecure-codingandroidmobile+1
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhancloudawsinfrastructure+5
2017-08-18TalkC0c0n CoAP versus MQTT: IoT Protocol Vulnerability analysis Rajiv Pandeyiotpentest
2017-08-18TalkC0c0n iGoat โ€“ A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkariosmobilepentest+3
2017-08-18TalkC0c0n Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis Furqan Khan, Siddharth Anbalahanmachine-learningpentest
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajgurumobile-securityapplication-securitypurpleteam+2
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Dattaredteamblueteampurpleteam
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotraredteam
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Guptabluetoothnetworkredteam
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharmaiotredteam
2017-08-18TalkC0c0n Hunting the Hunters โ€“ Fighting CyberCrime at the Source Valan Sivasubramanianredteam
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+4
2017-07-29Tool demoDefcon Fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi, Srinivas Raofuzzingrest-apipentest+3
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifinetworkredteam+2
2017-07-29Tool demoDefcon WiMonitor - an OpenWRT package for remote WiFi sniffing Vivek Ramachandran, Nishant Sharma, Ashish Bhangaleopenwrtredteamsniffing+2
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shahcryptographypentestaudit+1
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-28Tool demoDefcon GibberSense Source Code Ajit Hattiopensourcecryptographyredteam+1
2017-07-27WorkshopDefcon Attacking and Defending 802.11ac Networks Vivek Ramachandrannetwork802.11wifi+3
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Maneics-securityindustrial-control-systems-securitypentesting+2
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2017-07-27Tool demoBlackhat Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes Source Code Anshuman Bhartiyapentestbug-huntingpentest
2017-07-27Tool demoBlackhat Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday Source Code Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Raofuzzingapirest-api+3
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteampentest+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hattisecure-codingreconnaissancecryptography+3
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhanosintreconnaissance
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaiknetworkredteamspying+5
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thawaremachine-learningredteam
2017-06-26Tool demoBlackhat DiffDroid Source Code Anto Josephandroidpentestweb-application-security+1
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-05-23TalkPhdays How we hacked distributed configuration management systems Presentation Bharadwaj Machiraju, Francis Alexanderredteaminfrastructurefingerprinting
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Josephmachine-learningapache-sparkredteam+2
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abrahamwebblueteamsecure-development+6
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteamwindows
2017-04-14TalkHitb Sec Conf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhariotredteam
2017-04-14TalkHitb Sec Conf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggalredteamhealthcare
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K Acode-injectionredteam
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Guptanetworkingredteam
2017-03-30Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Shubham Mittalosintreconnaissance
2017-03-30Tool demoBlackhat LAMMA 1.0 Ajit Hatticryptographypentest
2017-03-30Tool demoBlackhat DAMN VULNERABLE SS7 NETWORK Akib Sayyednetworkmobilepentest+1
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifinetworkredteam+2
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Bharadwaj Machirajupentestingapplication-pentestingvulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Francis Alexanderpentestingapplication-pentestingvulnerability-assessment+4
2017-03-15TalkCan Sec West Inside Stegosploit Presentation Saumil Shahsteganographyredteamexploit-delivery
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyedss7pentestblueteam+2
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machirajuwebmlpentest
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumarrfidredteaminfrastructure
2017-03-03TalkNullcon Hacking medical devices and infrastructure Presentation Video Anirudh Duggalhealthcareinfrastructureredteam
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2016-11-06TalkGround Zero Summit Hacking The Droids Anto Josephandroid-securitymobile-securityreverse-engineering+3
2016-11-05TalkHackfest LockPicker: Leaking data from live LUKS partition Adhokshaj Mishralinuxredteamhardware
2016-11-04Tool demoBlackhat AppMon: Runtime Security Testing & Profiling Framework for Native Apps Source Code Nishant Das Patnaikpentestiosmacos+2
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Guptafirmwareanalysisiot+1
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+4
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kottedosredteamnetwork
2016-11-04TalkBlackhat Randomization Can’t Stop BPF JIT Spray Presentation Whitepaper Video N Asokanlinuxredteam
2016-11-03Tool demoBlackhat DataSploit Presentation Source Code Shubham Mittal, Nutan Kumar Pandaosintreconnaissance
2016-10-14TalkApp Sec Usa Automating API Penetration Testing using fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith RallabhandiAutomationapifuzzing
2016-10-07TalkDeepsec Inside Stegosploit Presentation Video Saumil Shahweb-securityexploitationpentesting+1
2016-09-23TalkRootcon Halcyon โ€“ A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomassecure-codingreconnaissanceredteam+1
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekarpurpleteamredteamblueteam
2016-08-19TalkC0c0n The Art of Social Hacking Gaurav Trivedi, Rugved Mehtarecon
2016-08-19TalkC0c0n Abusing Digital Certificates : Malware Style Ajit Hattiredteamweb
2016-08-19TalkC0c0n Attacking and crashing IOT devices via Bluetooth LE Protocol Presentation Pratap Chandra Allena, Ajay Pratap Singhiotbluetoothnetwork+1
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratapredteam
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikarxssredteam
2016-08-19TalkC0c0n Evading Corporate Security โ€“ Youโ€™re as secure as the weakest link Prajwal Panchmahalkarinfrastructureredteam
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiryautomated-exploit-detectionreverse-engineeringvulnerability-assessment+1
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatticryptographypentestaudit+1
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittalosintreconnaissance
2016-08-06Tool demoDefcon Visual Network and File Forensics using Rudra Source Code Video Ankur Tyagianalysisblueteamnetwork+2
2016-08-06Tool demoDefcon Android-InsecureBank Source Code Dinesh Shettyandroidredteammobile
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatticryptographypentestaudit+1
2016-08-04Tool demoBlackhat Droid-FF: Android Fuzzing Framework Source Code Anto Josephandroidfuzzingsecure-coding+2
2016-08-04Tool demoBlackhat AppMon Source Code Nishant Das Patnaikmobileiosmacos+3
2016-08-04TalkBlackhat DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes Presentation Whitepaper Video Rohit Mothepentestanalysis
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-08-03Tool demoBlackhat Android-InsecureBankv2 Source Code Dinesh Shettyandroidredteammobile
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Pandapentestingvulnerability-managementthreat-hunting
2016-08-03TalkBlackhat AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It Presentation Nikhil Mittalwindowsamsipowershell+1
2016-08-03Tool demoBlackhat Nishang: The Goodness of Offensive PowerShell Source Code Nikhil Mittalwindowsredteampowershell
2016-07-01TalkHackinparis DIFFDroid - Dynamic Analysis Made Easier for Android Source Code Video Anto Josephandroidpentestweb-application-security+1
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-05-26TalkHitb Sec Conf HITB Lab: Droid-FF: The First Android Fuzzing Framework Presentation Source Code Anto Josephmobileandroidfuzzing+1
2016-05-26TalkHitb Sec Conf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvimobileandroidios+3
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggalhealthcareredteamfingerprinting
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-04-01Tool demoBlackhat HackSys Extreme Vulnerable Driver Presentation Whitepaper Source Code Ashfaq Ansariredteampentestwindows
2016-04-01Tool demoBlackhat Halcyon โ€“ A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Sanoop Thomasreconnaissanceredteamnmap
2016-04-01Tool demoBlackhat Rudra: The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singhpentestingethical-hackingprivilege-escalation+3
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkarpentestingreverse-engineeringvulnerability-management+1
2016-03-11TalkNullcon Automated Mobile Application Security Assessment with MobSF Presentation Source Code Ajin Abrahammobileandroidios+2
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind MachiryredteamAutomationopensource+2
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggalhealthcareinfrastructureredteam+1
2016-03-11TalkNullcon Hitchhiker’s guide to hacking Industrial Control systems (ICS) Arun Maneredteamicshid
2016-03-11TalkNullcon Privacy leaks on 4G-LTE networks Presentation Altaf Shaikredteam4glte+2
2015-11-19TalkDeepsec Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. Video Nikhil Mittalredteam
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K AlinuxAutomationpentest
2015-11-13Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-11-13TalkBlackhat LTE & IMSI Catcher Myths Presentation Whitepaper Video Ravishankar Borgaonkar, N Asokan, Altaf Shaiknetworklteredteam+1
2015-11-13TalkBlackhat Continuous Intrusion: Why CI tools are an Attacker’s Best Friends Presentation Video Nikhil Mittalredteamci
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2015-11-12Tool demoBlackhat Android InsecureBank Source Code Dinesh Shettyandroidredteammobile
2015-11-12Tool demoBlackhat Kautilya: Fastest shells you will ever get Source Code Nikhil Mittalhidredteamshell+1
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittalwindowsredteam
2015-11-12TalkBlackhat Stegosploit - Exploit Delivery with Steganography and Polyglots Presentation Source Code Video Saumil Shahredteamsteganographyweb
2015-11-05TalkGround Zero Summit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jainincident-responsereverse-engineeringpentesting
2015-11-05TalkGround Zero Summit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Pandaosintdeep-web
2015-11-05TalkGround Zero Summit Browser based Malware attacks Harsh Daftarymalwarewebredteam
2015-11-05TalkGround Zero Summit Hacking RFIDs under 2000INR Jayesh Chauhanrfidnetworkredteam
2015-11-05TalkGround Zero Summit Thanks for the free cookies Anshul Saxena, Nishant Yadavwebredteam
2015-10-21TalkHacklu Stegosploit - Delivering Drive-By Exploits With Only Images Presentation Saumil Shahredteam
2015-09-11Talk44 Con Stegosploit โ€“ Drive-by Browser Exploits using only Images Presentation Source Code Video Saumil Shahwebstrganographyredteam+2
2015-08-28Tool demoBlackhat Damn Vulnerable iOS App (DVIA) Source Code Prateek Gianchandaniiosmobilepentest+1
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittalpentestingred-teamingexploitation+3
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Soodscadainfrastructurehmi+6
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvimobileandroidmetasploit+4
2015-08-08Tool demoDefcon Rudra Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekarpentestingethical-hackingvulnerability-assessment+2
2015-08-06Tool demoBlackhat Kautilya Source Code Nikhil Mittalhidredteamshell+1
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalviandroidredteampentest+2
2015-08-05Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-08-01TalkC0c0n A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. Riyaz Walikarwindowsredteampentest
2015-08-01TalkC0c0n Automated Security Analysis of Android & iOS Applications with Mobile Security Framework Presentation Source Code Ajin Abrahammobileandroidios+2
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddiwebredteam
2015-07-06TalkBlackhat DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS Presentation Video Ahamed Nafeezdomwebredteam
2015-05-29TalkHitb Sec Conf PowerShell for Penetration Testers Presentation Nikhil Mittalredteamwindowspowershell+1
2015-05-29TalkHitb Sec Conf Hacking Samsungโ€™s Tizen: The OS of Everything Presentation Whitepaper Ajin Abrahamosmobiletv+2
2015-05-28TalkHitb Sec Conf The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvimobilenetworkssl+1
2015-05-28TalkHitb Sec Conf Stegosploit: Hacking With Pictures Presentation Saumil Shahredteamsteganographyweb+1
2015-05-26TalkPhdays iOS Application Exploitation Presentation Prateek Gianchandanimobileiosredteam
2015-03-27TalkSyscan Stegosploit - Hacking with Pictures Presentation Video Saumil Shahwebstrganographyredteam+2
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanianthreat-intelligenceblueteamredteam+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abrahamowaspxssblueteam+3
2015-03-26Tool demoBlackhat YSO Mobile Security Framework Source Code Ajin Abrahammobileandroidios+1
2015-03-26TalkBlackhat The underground Ecosystem of Credit Card frauds Presentation Whitepaper Video Abhinav Singhbankingredteam
2015-03-15TalkDefcon TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER Anamika Singhnetwork-pentestingvulnerability-assessmentvulnerability-management+2
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwatevulnerability-managementautomated-scanningvulnerability-assessment+2
2015-03-15TalkDefcon TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS Lavakumar Kuppanfuzzing
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomaspentestingnetwork-pentestingvulnerability-assessment+2
2015-02-06TalkNullcon Analyzing Chrome crash reports at scale Presentation Video Abhishek Aryawebbrowserclusterfuzz+3
2015-02-06TalkNullcon Pentesting a website with million lines of Javascript Presentation Lavakumar Kuppan, Ahamed Nafeezweb-application-securitypentestweb+1
2015-02-06TalkNullcon Toliman, a Hadoop Pentesting Tool Source Code Jitendra Chauhanpentesthadoop
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyedredteamblueteampurpleteam+3
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwateredteamanalysisbanking+1
2015-02-06TalkNullcon Drone Attacks: How I hijacked a drone Presentation Video Rahul Sasiredteamdronenetwork+5
2015-02-06TalkNullcon Hacking Tizen: The OS of Everything Presentation Video Ajin Abrahamosmobiletv+2
2014-11-13TalkGround Zero Summit Fuzzing Asynchronous Protocols built over Websockets Lavakumar Kuppanfuzzingredteam
2014-11-13TalkGround Zero Summit How I won Browser Fuzzing Amol Naikfuzzingredteamweb
2014-11-13TalkGround Zero Summit Making and Breaking Embedded Security Presentation Yashin Mehabooberedteamblueteampurpleteam
2014-11-13TalkGround Zero Summit Attacking Cryptography & PKI Implementations Ajit Hatticryptographyredteam
2014-11-13TalkGround Zero Summit Security vulnerabilities in DVB-C networks: Hacking Cable TV network Rahul Sasinetworkredteamdvb-c+1
2014-11-13TalkGround Zero Summit Attacking Web-Proxies like never before Ahamed Nafeezredteamweb
2014-11-13TalkGround Zero Summit Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF Bhaumik Merchantwebredteam
2014-11-13TalkGround Zero Summit Hacking consumer electronics for Fun Atul Alexredteam
2014-11-13TalkGround Zero Summit SCADA Exploitation through Firmware Ashish Saxenaredteam
2014-11-13TalkGround Zero Summit Vulnerability Reproduction using Zest Deep Shahredteam
2014-10-29TalkEkoparty Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 Presentation Video Rahul Sasinetworkredteamdvb-c+1
2014-10-23TalkHacklu Hacking with Images - Evil Pictures Presentation Saumil Shahredteamsteganographyweb
2014-10-23TalkHacklu WiHawk - Router Vulnerability Scanner Source Code Anamika Singhwifinetworkredteam
2014-10-17TalkBlackhat Android Kernel and OS Security Assessment with Iron Crow Video Akhil Arora, Sumanth Naropanthandroidkerneloem+1
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms โ€“ Insidious Analysis and Design Aditya K Soodredteamreverse-engineeringblueteam+1
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkarimsimobilenetwork+1
2014-09-24TalkBrucon OWASP: OWTF Source Code Bharadwaj MachirajuwebAutomationpentest
2014-09-16TalkDeepsec Advanced Powershell Threat โ€“ Lethal Client Side Attacks Presentation Video Nikhil Mittalpowershellredteam
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautambug-huntingredteam
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Guptamobilepurpleteam
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobepurpleteamredteamblueteam
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasiredteam
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishracryptographyredteam
2014-08-22TalkC0c0n Exploiting NoSQL Like Never Before Francis Alexandernosqlredteam
2014-08-22TalkC0c0n Hacking Communication Akib Sayyednetworkredteam
2014-08-22TalkC0c0n Lesser Known Attack - XML Injection Amol Naikxmlredteamweb
2014-08-21TalkUsenix The Emperorโ€™s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhaweweb-securityxsscsrf+3
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyaymobilereconnaissanceinfrastructure+2
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Soodredteampentestweb
2014-08-06Tool demoBlackhat Flowinspect: Yet another network inspection tool Source Code Ankur Tyaginetworkpentest
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Soodbotnetredteamblueteam+1
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexandernosqlsecure-codingpentest
2014-05-29TalkHitb Sec Conf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasinetworkredteamiptv+1
2014-05-29TalkHitb Sec Conf LOL (Layers On Layers) โ€“ Bypassing Endpoint Security for Fun and Profit Presentation Rahul Kashyapredteamwindowskernel
2014-05-21TalkPhdays Android Exploitation Video Aditya Guptamobileandroidredteam+3
2014-03-27TalkBlackhat JS Suicide: Using JavaScript Security Features to Kill JS Security Presentation Video Ahamed Nafeezweb-application-securityredteamcsrfguard+1
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwatereverse-engineeringpentestingvulnerability-management
2014-03-08TalkDefcon WI-Hawk Source Code Anamika Singhnetwork-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3
2014-02-15Tool demoNullcon DrupSnipe Ranjeet Sengar, Sukesh Pappuopensourcedrupalpentest+1
2014-02-15Tool demoNullcon OWASP OWTF - The Offensive (Web) Testing Framework Source Code Bharadwaj MachirajuwebAutomationpentest
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abrahamowaspxssblueteam+3
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexandernosqlredteam
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyernetworkwifievil-twin-attack+2
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyaginetworkpentest
2014-02-14TalkNullcon o’Dea Assertions - Untwining the Security of the SAML Protocol Video Achin Kulshresthaauthenticationwebbrowser+4
2014-02-14TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Presentation Video Ankita Gupta, Lavakumar KuppanpentestAutomation
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekarglibcredteamblueteam+2
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandlapdfanalysisweb-application-security+4
2014-02-14TalkNullcon Attacking WPA/WPA2 in the Cloud Presentation Video Vivek Ramachandrannetworkwifiwpa2+2
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeeznetworktvredteam
2014-02-14TalkNullcon Hardware Attack Vectors Presentation Video Yashin Mehaboobehardwareredteamhid+3
2014-02-14TalkNullcon Wi-Hawk Password Auditing Tool Presentation Source Code Anamika Singhwifinetworkredteam
2014-01-28TalkOwasp App Sec California Application Sandboxes: Know thy limits Video Rahul Kashyapapplication-pentestingreverse-engineeringvulnerability-management+1
2013-11-07TalkGround Zero Summit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavanincident-responsesocial-engineering
2013-11-07TalkGround Zero Summit How I built a pentest lab in under 70 USD Swaroop Yermalkarpentest
2013-11-07TalkGround Zero Summit IronWASP Source Code Lavakumar Kuppanwebpentest
2013-11-07TalkGround Zero Summit Abusing Google Apps: Google is my command and control center Presentation Ajin Abrahamandroidmobileredteam
2013-11-07TalkGround Zero Summit Setting the Data Center on fire Ajit Hattiredteam
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandrandevsecopssecure-developmentpentesting+2
2013-09-27TalkC0c0n Snake Bites Presentation Anant Shrivastavasecure-codingwebpentest+1
2013-09-27TalkC0c0n Blur Captcha Anirudh Duggal, Abhinav Mohantyredteamcaptcha
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil P Kulkarniredteam
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhanredteamsecure-coding
2013-09-27TalkC0c0n Lets Play - Applanting on new Grounds Ajit Hattiandroidredteamcsrf+1
2013-09-27TalkC0c0n Pwning WiFi Devices! Swaroop Yermalkarnetworkwifiredteam
2013-09-27TalkC0c0n SSRF / XSPA - Real World Attacks and Mitigations Riyaz Walikarssrfxsparedteam
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkarpentestingforensicsdigital-forensics+2
2013-09-13TalkRootcon My Experiments with truth: a different route to bug hunting Devesh Bhattbug-hunting
2013-09-12TalkGrrcon The Droid Exploitation Saga โ€“ All Over Again! Aditya Gupta, Subho Haldermobileandroidredteam
2013-08-03TalkDefcon PowerPreter: Post Exploitation Like a Boss Presentation Source Code Video Nikhil Mittalredteampowershellwindows+1
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-08-01TalkBlackhat Hot knives through butter: Bypassing automated analysis systems Presentation Whitepaper Video Abhishek Singhredteamweb
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalrapentestredteamblueteam+1
2013-07-31TalkBlackhat Clickjacking revisited: A perceptual view of UI security Presentation Video Devdatta Akhaweclickjackinguiblueteam+1
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-03-15Tool demoBlackhat Prasadhak (And Offensive Powershell) Source Code Nikhil Mittalpowershellwindowsredteam
2013-03-14TalkBlackhat Lets play - Applanting Presentation Whitepaper Video Ajit Hattimobileredteamcsrf+2
2013-03-12TalkTroopers Dirty use of USSD Codes in Cellular Network Presentation Ravishankar Borgaonkarnetworkredteam
2013-03-07TalkCan Sec West SMS to Meterpreter - Fuzzing USB Modems Presentation Whitepaper Rahul Sasinetworkredteamfuzzing
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumarandroidmobilearm+8
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naikbughunting
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasinetworkredteamfuzzing
2013-03-01TalkNullcon BYOD: How will it shape your wireless network security in future? Video Kiran Deshpandenetworkwifimobile+5
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineninetworkipv4mitm+3
2013-03-01TalkNullcon Automating JavaScript Static Analysis Lavakumar Kuppanweb-application-securitywebpentest+1
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shahmobilecode-analysissecure-development+5
2013-03-01TalkNullcon Vulnerability research anyone? Omairinfrastructureredteamblueteam+1
2013-03-01TalkNullcon Capturing Zero-Day Information Video Dinesh O Bareja, Sumit Sharmazero-dayredteam
2013-03-01TalkNullcon Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework Presentation Video Ajin Abrahamxssredteamweb
2012-12-06TalkBlackhat Attacking ODATA Presentation Whitepaper Source Code Gursev Singh Kalraredteamodata
2012-12-06TalkBlackhat HTML5 top 10 threats โ€“ Stealth Attack and Silent Exploits Presentation Whitepaper Shreeraj Shahwebredteam
2012-12-06TalkBlackhat Poking servers with Facebook(and other web applications) Presentation Whitepaper Source Code Riyaz Walikarxsparedteam
2012-12-06TalkBlackhat The art of exploiting logical flaws in web apps Presentation Whitepaper Sumit Siddharthwebredteamsecure-coding
2012-12-05TalkBlackhat Droid Exploitation Saga Presentation Whitepaper Source Code Aditya Gupta, Subho Haldermobileandroidredteam
2012-12-01TalkClubhack HAWAS โ€“ Hybrid Analyzer for Web Application Security Presentation Video Lavakumar Kuppanpentestweb
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisettyredteamblueteampurpleteam+2
2012-12-01TalkClubhack Content-Type attack -Dark hole in the secure environment Presentation Video Raman Guptaredteam
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abrahamxssredteamweb
2012-12-01TalkClubhack FatCat Web Based SQL Injector Presentation Source Code Video Sandeep Kamblewebsqliredteam
2012-12-01TalkClubhack Stand Close to Me, & Youโ€™re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Haldermobilenfcnetwork+1
2012-12-01TalkClubhack Anatomy of a Responsible Disclosure โ€“ Zero Day Vulnerability in Oracle BI Publisher Presentation Video Vishal Kalrozero-day
2012-11-29TalkDeepsec Bad Things in Good Packages - Creative Exploit Delivery Presentation Saumil Shahredteam
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumarmalwareandroidmobile+1
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhatredteam
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawdewindows-phoneredteammalware
2012-10-11TalkHitb Sec Conf XSS & CSRF strike back โ€“ Powered by HTML5 Presentation Shreeraj Shahredteamcsrfweb+5
2012-10-10TalkHitb Sec Conf Innovative Approaches to Exploit Delivery Video Saumil Shahredteamexploit-delivery
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halderandroid-securitymobile-securityreverse-engineering+2
2012-09-27TalkGrrcon Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! Bharat Jogipentestredteamblueteam+2
2012-09-27TalkGrrcon Isnโ€™t it all just SMS-sending trojans?: Real advances in Android Malware Presentation Video Jimmy Shahmobileandroidredteam
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Soodredteambotnetweb+1
2012-09-26TalkNullcon Nullcon_delhi_2012 Presentation Source Code Prasanna Kanagasabaiethical-hacking
2012-09-26TalkNullcon The art of Passive Web Vul Analysis with IronWASP Video Lavakumar Kuppanwebanalysispentest
2012-09-26TalkNullcon Highly Harmful Audio Waves aka DTMF Fuzzing Video Rahul Sasidtmfredteam
2012-09-20TalkEkoparty Fuzzing DTMF Input Processing Algorithms Source Code Rahul Sasifuzzingredteamdtmf+2
2012-09-20TalkEkoparty Dirty use of USSD Codes in Cellular Network Whitepaper Video Ravishankar Borgaonkarnetworkredteam
2012-08-29TalkOwasp App Sec India Find me if you can Smart fuzzing and discovery! Presentation Shreeraj Shahfuzzing
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxenapentestingexploitationmalware+1
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goelsocial-engineeringpentestingsecurity-awareness+1
2012-08-03TalkC0c0n Easy Money with UI-Redressing Amol Naikbug-hunting
2012-08-03TalkC0c0n Cracking the Mobile Application Source Code Presentation Sreenarayan Ashokkumarmobileandroidios+3
2012-08-03TalkC0c0n WebApp Remote Code Execution using Server Side Scripting Engines Presentation Rahul Sasiwebredteampentest
2012-08-03TalkC0c0n Evil JavaScript Bishan Singhredteamweb-application-security
2012-07-26TalkBlackhat HTML5 top 10 threats โ€“ Stealth Attack and Silent Exploits Presentation Whitepaper Video Shreeraj Shahwebredteamcors+6
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittalpost-exploitationethical-hackingpentesting+2
2012-05-24TalkHitb Sec Conf CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants Presentation Video Rahul Sasipentestivrnetwork+3
2012-03-21TalkTroopers More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, Itโ€™s a Keyboard Presentation Source Code Nikhil Mittalpentestredteam
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasinetworkredteamivrs
2012-03-16TalkBlackhat The Pwnage Saga Continues Presentation Video Nikhil Mittalhidredteamshell
2012-03-15TalkNullcon An App(le) a day keeps the wallet away Antriksh Shahpentestingweb-securityapi-security+1
2012-03-14TalkBlackhat HTML5 top 10 threats โ€“ Stealth Attack and Silent Exploits Presentation Whitepaper Video Shreeraj Shahwebredteamcors+6
2012-03-14TalkBlackhat Hacking XPATH 2.0 Presentation Whitepaper Video Sumit Siddharthredteamxmlweb
2012-02-15TalkNullcon Sandboxing The deep truth Video Disha Agarwal, Manish Palifuzzingsandboxblueteam
2012-02-15TalkNullcon Haxdroid: Empowering Android Handset Video Anant Shrivastava, Prashant Mahajan, Pardhasaradhi Chandroidmobilepentest+1
2012-02-15TalkNullcon Javascript static analysis with IronWASP Presentation Video Lavakumar Kuppanweb-application-securitywebpentest+1
2012-02-15TalkNullcon Ra.2 Blackbox DOM-based XSS scanner Presentation Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahooxsswebblueteam+1
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kambleredteamwebxss+3
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoyredteamblueteampurpleteam
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singhweb-application-securityredteamblueteam+1
2012-02-15TalkNullcon Attacking Backup Software Video Nibin Vargheseredteam
2012-02-15TalkNullcon Binary God Presentation Video Atul Alexredteamemulatorassembler+2
2012-02-15TalkNullcon CAPTCHAs for fun and Profit Video Gursev Singh Kalracaptchawebredteam
2012-02-15TalkNullcon IVR Security: Internal Network attacks via phone lines Video Rahul Sasinetworkivrsredteam
2012-02-15TalkNullcon Your phone is your phone but your calls are now my calls Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwalmobileredteam
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittalhidredteamshell
2011-12-04TalkClubhack Pen testing Mobile Applications Presentation Prashant Vermamobilepentestandroid+1
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2011-12-04TalkClubhack Mere paas Teensy hai Presentation Nikhil Mittalhidredteamshell+1
2011-12-04TalkClubhack DOM XSS โ€“ Encounters of the 3rd Kind Presentation Video Bishan Singhxssdomredteam+1
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soiredteamnetworkexploit-kit
2011-12-04TalkClubhack Hacking your Droid Presentation Aditya Guptaredteamandroidmobile
2011-12-04TalkClubhack Handle Exploitation of Remote System From Email Account Presentation Bhaumik Merchantredteam
2011-12-04TalkClubhack One Link Facebook Presentation Anand Pandeyredteamweb
2011-11-25TalkMalcon Advanced Malware for Apple Products Atul Alexmalwareredteamapple+2
2011-11-25TalkMalcon Mareech : Look itโ€™s a HID made up of gold Nikhil Mittalhidredteammalware
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Jagadeesh Chandraiahmalwaretrojanreverse-engineering+1
2011-11-04TalkHackfest Here are your keystrokes Nikhil Mittalredteamkeyloggingpentest+2
2011-10-13TalkHitb Sec Conf Web Wars 3 Saumil Shahwebcyber-warexploit-delivery
2011-10-13TalkHitb Sec Conf Femtocells: A Poisonous Needle in the Operatorโ€™s Hay Stack Presentation Video Ravishankar Borgaonkarnetwork3gredteam
2011-10-07TalkC0c0n Automated Malware Analysis - Setting up the Environment Presentation K v Prashant, Pushkar PashupatAutomationpentest
2011-10-07TalkC0c0n Pentesting iPhone Applications Presentation Satish Bommisettymobileiospentest
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasiwebpurpleteam
2011-10-07TalkC0c0n Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications Riyaz Walikarwebredteam
2011-10-07TalkC0c0n Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution Presentation Ahamed Nafeezredteam
2011-10-07TalkC0c0n Runtime thread injection and execution in Linux processes Aseem Jakharlinuxredteam
2011-10-07TalkC0c0n Wi-Fi Malware for Fun and Profit Vivek Ramachandranredteam
2011-09-19TalkBrucon Botnets and Browsers, Brothers in a Ghost Shell Presentation Aditya K Soodbotnetwebredteam
2011-09-19TalkHacklu Linux thread injection - The jugaad way Source Code Aseem Jakharlinuxthread-injectionredteam
2011-09-19TalkHacklu The travelling hacksmith Saumil Shahcase-studyredteam
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandrannetworkwifiredteam
2011-09-16TalkGrrcon Mobile App Moolah: Profit taking with Mobile Malware Presentation Video Jimmy Shahmobileredteam
2011-09-07TalkSecuritybyte IronWASP - A Web Application Security Testing Platform Presentation Source Code Lavakumar Kuppanwebpentest
2011-09-07TalkSecuritybyte Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit Presentation Vivek Ramachandranwifiwormbotnet+1
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Ramansocial-engineeringweb-securitysecurity-awareness+2
2011-09-06TalkSecuritybyte Botnets at Application+ layer Presentation Raj Shastrakarbotredteamweb
2011-09-06TalkSecuritybyte Runtime thread injection and execution in Linux processes Presentation Aseem Jakharthread-injectionlinux
2011-08-05TalkDefcon Jugaad โ€“ Linux Thread Injection Kit Presentation Source Code Video Aseem Jakharlinuxthread-injectionredteam
2011-05-20TalkHitb Sec Conf Next Generation Web Attacks โ€“ HTML 5, DOM(L3) and XHR(L2) Presentation Shreeraj Shahwebredteamcors+6
2011-03-30TalkTroopers Femtocell: Femtostep to the Holy Grail Presentation Ravishankar Borgaonkarnetworkredteam
2011-02-25TalkNullcon Hacking the Parliament โ€“ A classic Social Engineering attack Anurag Dhandasocial-engineeringreconnaissance
2011-02-25TalkNullcon Buffer Under Run Exploits Presentation Saurabh Sharma, Chinmaya Kamalbuffer-underrunbuffer-underflowredteam
2011-02-25TalkNullcon Lessons Learned From 2010 Presentation Video Saumil Shahredteamexploit-deliveryweb
2011-02-25TalkNullcon Fuzzing with complexities Presentation Whitepaper Video Vishwas Sharmafuzzingredteam
2011-02-25TalkNullcon JSON Fuzzing: New approach to old problems Presentation Whitepaper K v Prashant, Tamaghna Basujsonfuzzingredteam
2011-02-25TalkNullcon Penetration Testing a Biometric System Presentation Whitepaper Video Rahul Sasipentestbiometrichid+1
2011-02-25TalkNullcon SSLSmart โ€“ Smart SSL Cipher Enumeration Presentation Gursev Singh Kalracryptographysslweb+2
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddyblueteamredteampurpleteam+1
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekarnetworksurveillanceredteam
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakharlinuxmalwareredteam
2011-02-25TalkNullcon Security Analysis of Indiaโ€™s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuruanalysisevmredteam
2011-02-25TalkNullcon (secure) SiteHoster โ€“ Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumarxsssqliblueteam+2
2010-12-04TalkClubhack Ultimate Pen Test โ€“ Compromising a highly secure environment Presentation Nikhil Mittalpentest
2010-12-04TalkClubhack Attacking with HTML5 Presentation Lavakumar Kuppanredteamweb
2010-12-04TalkClubhack Data theft in India Presentation K K Mookheydata-leakredteamcyber-crime
2010-10-27TalkHacklu Exploit Delivery - Tricks and Techniques Presentation Saumil Shahredteamexploit
2010-10-14TalkHitb Sec Conf Exploit Delivery Presentation Saumil Shahredteamexploit
2010-10-13TalkHitb Sec Conf Hacking a Browserโ€™s DOM โ€“ Exploiting Ajax and RIA Presentation Video Shreeraj Shahwebredteamweb-application-security+5
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwapentestingsecurity-awarenessrisk-management+1
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Rameshmalwarebotnetreverse-engineering+1
2010-08-01TalkC0c0n VoIP Security Mukund Krishnamurthypurpleteamvoip
2010-08-01TalkC0c0n Client Side Exploits using PDF Presentation Ankur Bhargava, Tamaghna Basuredteam
2010-08-01TalkC0c0n Code Disclosure over HTTP Anant Kochharwebredteam
2010-08-01TalkC0c0n Wireless MITM Prashant Mahajaninfrastructureredteam
2010-08-01TalkC0c0n Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle Praseed Paishellwindowsredteam
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmadnetworkwifiredteam+2
2010-07-29TalkBlackhat Hacking Browser’s DOM - Exploiting Ajax and RIA Presentation Whitepaper Shreeraj Shahredteamwebdom+2
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharthredteamwebsql
2010-07-01TalkHitb Sec Conf Top 10 Web 2.0 Attacks and Exploits Presentation Shreeraj Shahwebredteamcors+6
2010-07-01TalkHitb Sec Conf The Travelling Hacksmith 2009 โ€“ 2010 Saumil Shahcase-studyredteam
2010-04-21TalkHitb Sec Conf Web Security โ€“ Going Nowhere? Presentation Saumil Shahwebredteambrowser
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindanesecure-codingredteamnetwork+1
2010-02-25TalkNullcon Software Fuzzing with Wireplay. Presentation Whitepaper Source Code Abhisek Dattafuzzingredteam
2010-02-25TalkNullcon Intelligent debugging and in memory fuzzing. Presentation Vishwas Sharma, Amandeep Bhartifuzzingdebuggingredteam
2010-02-25TalkNullcon Penetration Testing versus Source Code Presentation Nikhil Wagholikarpentestcode-analysis
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppanwebphishingredteam
2010-02-25TalkNullcon Steganography & Stegananalysis: A Technical & Psychological Perspective Presentation Prince Komal Boonlia, Reena Bhansalisteganographysteganalysisredteam
2010-02-03TalkBlackhat Beware of Serialized GUI Objects Bearing Data Presentation Rohini Sulatyckiapache-myfacessun-mojarraredteam+1
2009-12-05TalkClubhack Mobile Application Security Testing Presentation Gursev Singh Kalramobilepentestsymbian
2009-12-05TalkClubhack Risk Based Penetration Testing Presentation Nikhil Wagholikar, K K Mookheypentest
2009-12-05TalkClubhack Lust 2.0 โ€“ Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppannetworkwifiredteam
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desaiopensourcecryptographysteganography+1
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shahsecure-codingdevsecopsvulnerability-management+3
2009-11-19TalkDeepsec Ownage 2.0 Presentation Saumil Shahredteam
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookheypentest
2009-11-18TalkSecuritybyte Cloud Hacking โ€“ Distributed Attack & Exploit Platform Shreeraj Shahcloudredteam
2009-11-18TalkSecuritybyte Hacking Oracle From Web Presentation Sumit Siddharthsqlredteam
2009-11-17TalkSecuritybyte Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumarwindowsredteam
2009-10-28TalkHacklu Ownage 2.0 Saumil Shahredteam
2009-10-07TalkHitb Sec Conf How to Own the World โ€“ One Desktop at a Time Presentation Video Saumil Shahwebsocial-engineeringredteam+1
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyaninetworkwifiinfrastructure+3
2009-08-01TalkDefcon The Making of the second SQL injection Worm Presentation Source Code Video Sumit Siddharthsqlsqliweb+2
2009-07-31TalkDefcon Advancing Video Application Attacks with Video Interception, Recording, and Replay Presentation Video Arjun Sambamoorthyredteamweb
2009-07-29TalkBlackhat Psychotronica: Exposure, Control, and Deceit Presentation Nitesh Dhanjaniredteamreconnaissance
2009-04-22TalkTroopers Browser Design Flaws โ€“ Hacking by Breaking in Architectures Presentation Aditya K Soodredteamweb
2009-04-22TalkHitb Sec Conf Pwnage 2.0 Presentation Saumil Shahhidredteamshell
2009-04-22TalkTroopers SQL Injections: More Fun and Profit Presentation Sumit Siddharthsqlredteam
2009-04-22TalkHitb Sec Conf Vbootkit 2.0: Attacking Windows 7 via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumarwindowsredteamboot-sector
2009-03-16TalkCan Sec West On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil BhalodepentestblueteamAutomation
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Vargheseredteamreverse-engineeringexploit-development
2008-12-06TalkClubhack Introduction to backtrack Presentation Kunal Sehgalpentestlinux
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2008-12-06TalkClubhack Hacking Client Side Insecurities Presentation Aditya K Soodredteam
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohlisecure-developmentsecure-codingblueteam+2
2008-11-13TalkDeepsec Game of Web 2.0 Security - Attacking Next Generation Apps Shreeraj Shahwebredteam
2008-10-29TalkHitb Sec Conf Browser Exploits - A New Model for Browser Security Video Saumil Shahwebredteam
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Saumil Shahwebredteam
2008-08-20TalkOwasp App Sec India Case Study: Testing 200+ applications in a $10 Billion Enterprise Presentation Roshen Chandrancase-studypentestAutomation
2008-08-20TalkOwasp App Sec India Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shahredteamblueteampurpleteam+4
2008-08-09TalkDefcon Autoimmunity Disorder in Wireless LAN Presentation Video Jvr Murthy, Amit Vartak, Md Sohail Ahmadnetworkwifilan+1
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Guptaredteamrdp
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandraethical-hackingsecure-developmentdevsecops
2008-03-26TalkCan Sec West Vulnerabilities Die Hard Kowsik Guruswamyredteam
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shahredteamblueteampurpleteam+4
2008-02-20TalkBlackhat Hacking VoIP through IPSec Tunnels Whitepaper Sachin Joglekar, Sudeep Patwardhanvoipnetworkredteam
2007-12-19TalkClubhack Backdoor 2.0: Hacking Firefox to steal his web secrets Presentation Sunil Arorawebbrowserredteam
2007-12-09TalkClubhack The future of automated web application testing Presentation Amish Shah, Umesh NagoriAutomationwebpentest
2007-12-09TalkClubhack Analysis of Adversarial Code: The Role of Malware Kits! Presentation Rahul Mohandasanalysisredteam
2007-12-09TalkClubhack Hacking Web 2.0 Art and Science of Vulnerability Detection Presentation Shreeraj Shahredteamweb
2007-12-09TalkClubhack Legiment Techniques of IPS/IDS Evasion Presentation Ajit Hattinetworkredteam
2007-12-09TalkClubhack Vulnerabilities in VoIP Products and Services Whitepaper Gaurav Sahavoipnetworkredteam
2007-09-06TalkHitb Sec Conf Hacking Ajax and Web Services รขโ‚ฌโ€œ Next Generation Web Attacks on the Rise Presentation Video Shreeraj Shahwebredteamajax+1
2007-08-04TalkDefcon The Emperor Has No Cloak - WEP Cloaking Exposed Presentation Whitepaper Video Vivek Ramachandrannetworkwifiredteam+1
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belanisocial-engineeringphishingthreat_modeling+2
2007-08-02TalkBlackhat Breaking C++ Applications Whitepaper Neel Mehtaredteamsecure-codingapi
2007-08-01TalkBlackhat Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones Whitepaper Krishna Kurapatiwifinetworkvoip+2
2007-04-18TalkCan Sec West Low-Rate Denial-of-Service attacks Anil Kumarredteamdos
2007-04-05TalkHitb Sec Conf WEB 2.0 Hacking โ€“ Defending Ajax and Web Services Presentation Shreeraj Shahwebredteamblueteam+3
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhallawebblueteampurpleteam
2007-03-29TalkBlackhat Vboot Kit: Compromising Windows Vista Security Presentation Whitepaper Nitin Kumar, Vipin Kumarwindowsredteamkernel
2007-03-15TalkBlackhat Exploit-Me Series โ€“ Free Firefox Application Penetration Testing Suite Launch Presentation Video Nish Bhalla, Rohit Sethiweb-securityxsssql-injection+4
2006-11-29TalkPac Sec Smashing Heap by Free Simulation Presentation Sandip Chaudhariheapredteam
2006-10-19TalkHacklu Smashing Heap by Free Simulation: Sandip Chaudhariheapredteam
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shahmetasploitredteam
2006-09-21TalkHitb Sec Conf Smashing the Stack for Profit - Period Presentation Video Rohyt Belaniredteamcase-study
2006-08-01TalkBlackhat Writing Metasploit Plugins - from Vulnerability to Exploit Saumil Shahmetasploit
2006-04-13TalkHitb Sec Conf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shahmetasploitredteam
2005-09-29TalkHitb Sec Conf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belaniredteam
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwalthreat_modelingredteam
2005-07-27TalkBlackhat iSCSI Security (Insecure SCSI) Presentation Himanshu Dwivediredteamiscsinetwork-storage+1
2005-04-10TalkHitb Sec Conf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singhnetworkredteamblueteam+2
2005-03-31TalkBlackhat Defeating Automated Web Assessment Tools Presentation Saumil Shahredteamweb
2004-10-06TalkHitb Sec Conf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shahwebredteamblueteam+1
2004-07-28TalkBlackhat Defeating Automated Web Assessment Tools Video Saumil Shahredteamweb
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2003-12-12TalkHitb Sec Conf New Generation Frauds Yerra Ravi Kiran Rajufraudbankingcredit-card+3
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shahwebfingerprintingblueteam
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shahwebfingerprintingblueteam
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shahwebfingerprintingblueteam
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shahwebredteamblueteam+1
2001-11-21TalkBlackhat One-Way SQL Hacking : Futility of Firewalls in Web Hacking Presentation Video Saumil Shahsqlwebfirewall+1
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Poplipentestprivacyblueteam
2001-04-26TalkBlackhat Web Hacking Presentation Saumil Shahwebredteam
2001-02-14TalkBlackhat Web Hacking Presentation Video Saumil Shahwebredteam