| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | web-securitymalware-detectionbrowser-security+2 |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | network-architecturenetwork-hardeningnetwork-monitoring+2 |
| 2024-11-28 | Talk | Blackhat |
Harnessing Language Models for Detection of Evasive Malicious Email Attachments
| Abhishek Singh, Kalpesh Mantri | security-architecturesecurity-information-event-management |
| 2024-11-16 | Talk | C0c0n |
Who is holding the Marauders map?
| Maya R Nair | network-pentestingnetwork-monitoringnetwork-traffic-analysis+1 |
| 2024-08-29 | Tool demo | Hitb Sec Conf |
eBPFShield
| Sagar Bhure | idsincident-responsenetwork-monitoring+1 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | asset-inventoryvulnerability-managementsecurity-architecture+3 |
| 2023-09-23 | Talk | Nullcon |
Journey in setting up OT SOC
| Ramandeep Singh Walia | socics-securityindustrial-control-systems-security+3 |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | incident-responsethreat-huntingsecurity-monitoring+1 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | threat-huntingsecurity-monitoringthreat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management
| Kumar Ritesh | threat-landscapethreat_modelingthreat-hunting+2 |
| 2022-09-29 | Talk | Brucon |
0wn-premises: Bypassing Microsoft Defender for Identity
| Nikhil Mittal | red-teamingactive-directorythreat-detection |
| 2022-09-24 | Talk | C0c0n |
Deep Learning to detect Network Attacks
| Varun Kohli | idsnetwork-monitoringthreat-detection+2 |
| 2022-09-24 | Talk | C0c0n |
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks
| Manesh Thankappan | idsnetwork-monitoringnetwork-pentesting+3 |
| 2022-09-24 | Talk | C0c0n |
Need for Advanced SOC
| Vijayakumar K M | socsecurity-monitoringsecurity-analytics+3 |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | devsecopssecurity-architecturethreat-detection+3 |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | threat-detectionthreat-huntingmalware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Introducing Free & Open Elastic Limitless XDR
| Ravindra Ramnani | threat-detectionsecurity-monitoringvulnerability-management+1 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | threat-huntingthreat-detectionthreat_modeling+2 |
| 2021-11-04 | Talk | Ekoparty |
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system
| Saransh Rana, Divyanshu Mehta, Harsh Varagiya | awssecurity-monitoringiam+2 |
| 2020-10-02 | Tool demo | Blackhat |
OWASP Nettacker
| Sri Harsha Gajavalli | pentestingvulnerability-assessmentnetwork-pentesting+3 |
| 2020-03-06 | Talk | Nullcon |
Automated Classification of Web-Application Attacks for Intrusion Detection
| Aneet Kumar Dutta | webAutomationintrusion-detection |
| 2019-09-13 | Talk | Global App Sec |
Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center
| Amol Sarwate | vulnerability-managementawssecurity-information-event-management+1 |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli | network-pentestingvulnerability-assessmentfirewall+3 |
| 2018-08-16 | Talk | Usenix |
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
| Vijay Balasubramaniyan | threat-detectionsecurity-architecture |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | security-analyticsthreat-hunting |
| 2018-08-08 | Tool demo | Blackhat |
ANWI (All New Wireless IDS): The $5 WIDS
| Rishikesh Bhide, Sanket Karpe | networkintrusion-detectionblueteam+2 |
| 2017-12-06 | Tool demo | Blackhat |
ANWI (All New Wireless IDS) - The £5 WIDS
| Sanket Karpe | networkintrusion-detectionblueteam+2 |
| 2015-11-05 | Talk | Ground Zero Summit |
Western Air Command
| B S Singh Deo | network-defensenetwork-monitoringnetwork-pentesting+3 |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | network-forensicspacket-analysisnetwork-monitoring+3 |
| 2015-08-08 | Talk | Defcon |
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics
| Vivek Ramachandran | networkwifiintrusion-detection+2 |
| 2015-03-15 | Talk | Hitb Sec Conf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | network-pentestingpacket-analysisnetwork-monitoring+2 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe | web-securitysecurity-awarenesssecurity-architecture+3 |
| 2004-07-29 | Talk | Blackhat |
Evasion and Detection of Web Application Attacks
| K K Mookhey | webblueteamintrusion-detection+1 |