🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🛡️ Security Operations & Defense

Blue team operations, SOC, SIEM, detection engineering, and defensive security

287
Contributors
261
Talks
99
Tool Demos
1
Workshops
2
Keynotes

Top Contributors

Saumil Shah(14) Shreeraj Shah(14) Ajin Abraham(9) Ankur Tyagi(9) Jayesh Chauhan(9)

Related Tags (18)

Show all 18 tags...

All Entries (363 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Harsha Koushik, Anand Tiwaricloud-pentestingrisk-managementedr
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishraweb-securitymalware-detectionbrowser-security+2
2025-03-02TalkNullcon Securing the chains: Building defensive layers for software supply chains Yadhu Krishna M, Akhil Mahendra, Hritik Vijayblueteam
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallamnetwork-architecturenetwork-hardeningnetwork-monitoring+2
2024-12-11TalkBlackhat The CVSS Deception: How We’ve Been Misled on Vulnerability Severity Presentation Ankur Sandblueteam
2024-11-28TalkBlackhat Hardened Cyber Defense for Tactical & Contested Environment Manu Nayarblueteam
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-16TalkC0c0n Who is holding the Marauders map? Maya R Nairnetwork-pentestingnetwork-monitoringnetwork-traffic-analysis+1
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B Rthreat-hunting
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhureblueteam
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjitblueteam
2024-08-29Tool demoHitb Sec Conf eBPFShield Source Code Sagar Bhureidsincident-responsenetwork-monitoring+1
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Shobhit Mehtaprivacydata-protectionsecurity-operations-center+2
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhureblueteam
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeranblueteam
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+2
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Suranacontainer-securitydockerthreat-hunting+1
2023-09-23TalkNullcon Secure Your Angular App Using JWT And GraphQL Presentation Ankit Sharmablueteam
2023-09-23TalkNullcon The Curious Case Of The Rogue SOAR Presentation Video Mukesh Sai Kumar, Jaden Furtadoblueteam
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanandaptincident-responsethreat-hunting
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubeythreat-huntingdigital-forensicsincident-response+1
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregangeics-securityindustrial-control-systems-securityoperational-technology+2
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Riteshthreat-landscapethreat_modelingthreat-hunting+2
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhandethreat-huntingdigital-forensicsnetwork-forensics+3
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansarithreat-hunting
2022-12-07Tool demoBlackhat h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. Source Code Subhash Popurihoneypot
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittalred-teamingactive-directorythreat-detection
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohliidsnetwork-monitoringthreat-detection+2
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappanidsnetwork-monitoringnetwork-pentesting+3
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K Msocsecurity-monitoringsecurity-analytics+2
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+2
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan Mapi-securitythreat-landscapethreat-hunting+1
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyanthreat-huntingincident-response
2022-09-08TalkNullcon Handling A Bug Bounty program From A Blue Team Perspective Presentation Video Ashwath Kumar, Ankit Anuragblueteam
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Korannethreat-hunting
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnanithreat-detectionsecurity-monitoringvulnerability-management+1
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharmaindustrial-control-systems-securitycritical-infrastructurethreat-hunting+1
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadossmalwaredefense
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasamalwaredefense
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiyaawssecurity-monitoringiam+2
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singhapentestingpost-exploitationprivilege-escalation+2
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkarnetwork-defense
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dashkubernetescloudaudit+2
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithanewindowsprocess-injectionblueteam+1
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiahblueteamredteampurpleteam
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwariblueteampentestcicd
2020-12-09Tool demoBlackhat HosTaGe: mobile honeypots for rapid deployment Source Code Shreyas Srinivasahoneypotblueteam
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Soodcloudblueteampentest+1
2020-11-21TalkApp Sec Indonesia Threat Defense: Defending the ATT&CK with TTP’s Avkash Kathiriyablueteam
2020-10-07TalkRootcon Blockchain Based OT Monitoring Solution (BBOTMS) Presentation Video Asif Hameed Khan, Gagan Jattanaicsblockchainblueteam
2020-10-02Tool demoBlackhat MalViz.ai Source Code Vasu Sethia, Shivam Katariablueteam
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Ravalphishingblueteam
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2020-10-01Tool demoBlackhat Wi-Fi Access Point Rootkits Nishant Sharma, Jeswin Mathaiwifiblueteamiot
2020-09-18TalkC0c0n Deep Learning for Intrusion Attempt Detection Varun Kohlideep-learningmachine-learningblueteam
2020-08-22TalkThe Diana Initiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautamthreat-hunting
2020-08-05TalkBlackhat Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic Presentation Video Harini Kannanmachine-learningexploit-detectionblueteam
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Ranarisk-analysisblueteam
2020-07-05Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abrahammobileblueteamios+2
2020-04-25TalkHitb Sec Conf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotvulnerability-assessmentpentestblueteam
2020-04-24TalkHitb Sec Conf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotscadablueteampentest
2020-03-06Tool demoNullcon F.R.I.D.A.Y Source Code Shyam Sundar Ramaswamiblueteam
2020-03-06Tool demoNullcon Hachi Source Code Parmanand Mishraatt&ckblueteamrest-api+1
2020-03-06TalkNullcon InfoSec Deep Learning in Action Presentation Video Satnam Singhmldeep-learningblueteam
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Ranareconnaissanceblueteam
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Ravalphishingblueteam
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shahincident-responselinuxmacos+2
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahanlinuxsecure-codingweb-application-security+3
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Duttaintrusion-detection
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamyblueteamsmartcard
2019-12-04Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit Source Code Jayesh Chauhancloudawsgcp+1
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Aryafuzzingredteamblueteam+1
2019-12-04Tool demoBlackhat RTTM: Real Time Threat Monitoring Tool Source Code Naveen Rudrappa, Murali Krishna Segublueteam
2019-11-01TalkApp Sec Day Australia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavredteamblueteampurpleteam+1
2019-11-01TalkApp Sec Day Australia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandranblueteam
2019-10-14TalkHitb Sec Conf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishrablueteamredteampurpleteam
2019-10-14TalkHitb Sec Conf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehtawifiredteamblueteam+1
2019-10-12TalkTexas Cyber Summit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Sudheendra Bhatincident-responsethreat-huntingioc+3
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoorblueteam
2019-09-27TalkC0c0n Block Chain for Secured Automation Sanat Bhatblockchainblueteam
2019-09-27TalkC0c0n Building a cloud security monitoring and auditing framework Nirali Shah, Prasoon Dwivedicloudblueteam
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharmaembedded-systemsblueteam
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singhblueteam
2019-09-27TalkC0c0n Doing SecOps for the Cloud using Cloud Native Services Akash Mahajancloudblueteam
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagarblueteam
2019-09-23TalkRootcon Hunting Threats with Wireshark Plugins Presentation Video Nishant Sharma, Jeswin Mathai, Shivam Bathlablueteam
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil Bogamredteamcar-hackingblueteam+1
2019-09-13Talk44 Con The CISO’s Dilemma Presentation Video Saumil Shahblueteam
2019-09-13TalkGlobal App Sec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavpurpleteam
2019-08-30TalkHitb Sec Conf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshisecure-codingredteamblueteam+1
2019-08-29KeynoteHitb Sec Conf The CISO’s Dilemma Presentation Video Saumil Shahblueteam
2019-08-29TalkHitb Sec Conf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singhredteamblueteampurpleteam
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modireconnaissanceblueteam
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-08Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhancloudawsgcp+1
2019-08-08Tool demoBlackhat CSF: Container Security Framework Source Code Vaibhav Guptablueteam
2019-08-08TalkBlackhat Death to the IOC: What’s Next in Threat Intelligence Presentation Video Bhavna Somanthreat-intelligencemachine-learningblueteam
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-08Tool demoDefcon Hachi: An Intelligent threat mapper Source Code Parmanand Mishraatt&ckblueteamrest-api+1
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Ranareconnaissanceblueteam
2019-08-08Tool demoDefcon PcapXray Source Code Srinivas Piskala Ganesh Babuforensicwiresharkblueteam
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashantiotblueteam
2019-08-07TalkBlackhat Defense Against Rapidly Morphing DDOS Presentation Video Mudit Tyagiddosblueteammachine-learning
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwalvirtual-machineblueteamforensic+2
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hattiincident-responsethreat-hunting
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjveblueteamhoneypot
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwaripentestblueteamcicd
2019-03-28Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhanpentestblueteamcloud+4
2019-03-28TalkBlackhat Investigating Malware Using Memory Forensics - A Practical Approach Presentation Video Monnappa K Aforensicblueteam
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargavasecure-codingblueteam
2019-03-28Tool demoBlackhat MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research Source Code Nilaksh Dascloudmachine-learningblueteam
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappablueteam
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangalevoipwiresharknetwork-security+4
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavallinetwork-pentestingvulnerability-assessmentfirewall+3
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singhredteamblueteampurpleteam
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharamaniotblueteamsecure-development
2018-12-06TalkBlackhat AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace Presentation Whitepaper Video Vijay Thaware, Niranjan Agnihotriaiblueteamdeepfake
2018-12-06Tool demoBlackhat Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit Source Code Jayesh Chauhancloudawsgcp+1
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepallisecure-codingblueteam
2018-11-27TalkHitb Sec Conf COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding Presentation Video Vikash Yadavdeep-learningblueteam
2018-11-02TalkHitb Sec Conf Defending The Enterprise in 2018 Saumil Shahblueteam
2018-10-19TalkApp Sec Day Australia Continuous Integration and Delivery with Docker Containers Video Vasant Kumardockerblueteam
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharmablueteam
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basumachine-learningblueteam
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wigblueteam
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharmablueteam
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishramalwarereverse-engineeringdynamic-analysis+2
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyarthreat-landscapethreat-huntingrisk-management+1
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaancloudawssecure-coding+3
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagiblueteammachine-learning
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur Tyagiblueteampentestforensic
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyanthreat-detectionsecurity-architecture
2018-08-12Tool demoDefcon Expl-iot—IoT Security Testing and Exploitation framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur Tyagiblueteampentestforensic
2018-08-11Tool demoDefcon Archery—Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestblueteamcicd
2018-08-11Tool demoDefcon Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit Source Code Jayesh Chauhancloudawsgcp+1
2018-08-11Tool demoDefcon DejaVU—An Open Source Deception Framework Source Code Harish Ramadoss, Bhadreshkumar Patelblueteam
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modireconnaissanceblueteam
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akulasecurity-analyticsthreat-hunting
2018-08-09TalkBlackhat Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina Presentation Source Code Video Bhargava Shastrypentestblueteamlinux+1
2018-08-09TalkDefcon 4G—Who is paying your cellular phone bill? Presentation Video Isha Singh4gipxredteam+2
2018-08-09TalkBlackhat Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks Presentation Video Jugal Parikhblueteam
2018-08-08Tool demoBlackhat ANWI (All New Wireless IDS): The $5 WIDS Source Code Rishikesh Bhide, Sanket Karpeintrusion-detectionblueteamwifi
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwaripentestblueteamcicd
2018-08-08Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit Source Code Divya S John, Jayesh Chauhan, Shivankar Madaanpentestblueteamcloud+4
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeezredteamvpnblueteam+1
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadossblueteam
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaiklte4gredteam+2
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhanvirtual-machineblueteamforensic+2
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hattiblueteamsecure-coding
2018-05-13TalkDefcon Androsia: Securing ‘Data in Process’ for your Android Apps Presentation Whitepaper Video Samit Anwerandroidmobileblueteam
2018-03-23Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit Source Code Jayesh Chauhan, Shivankar Madaancloudawsgcp+1
2018-03-22Tool demoBlackhat Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data Source Code Samit Anwerandroidmobileblueteam
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestredteamblueteam+1
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsettypentestredteamblueteam+6
2018-03-22Tool demoBlackhat Mobile Security Framework - MobSF Presentation Source Code Ajin Abrahammobileblueteamios+2
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharlawearablesblueteamredteam+2
2018-03-22TalkBlackhat XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Presentation Video Ravi Sahitablueteam
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatiablueteamwindows
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singhaiblueteam
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajanphishingblueteam
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiryandroidmobilefuzzing+4
2017-12-30Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS Security Audit Source Code Shivankar Madaan, Prajal Kulkarni, Jayesh Chauhanpentestblueteamcloud+4
2017-12-06Tool demoBlackhat ANWI (All New Wireless IDS) - The £5 WIDS Source Code Sanket Karpeintrusion-detectionblueteamwifi
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhariotpentestredteam+2
2017-11-20TalkHackfest How my SV Machine nailed your Malware Nikhil P Kulkarnimobileandroidmachine-learning+1
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shuklaredteamblueteampurpleteam
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shuklaredteamblueteampurpleteam
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Guptabotnetblueteam
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjvehoneypotblueteam
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhancloudawssecure-coding+3
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankalblueteam
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkariosmobilepentest+2
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajgurumobile-securityapplication-securitypurpleteam+2
2017-08-18TalkC0c0n Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure Manas Pratim Sarmablueteam
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Dattaredteamblueteampurpleteam
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michaeliotblueteam
2017-08-18TalkC0c0n Yarafying Android Malware: A Missing Step Before Malware Analysis Shivang Desaiandroidmobileblueteam
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawtherthreat-huntingthreat_modelingioc+3
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+3
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifiredteamblueteam+1
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-27WorkshopDefcon Attacking and Defending 802.11ac Networks Vivek Ramachandran802.11wifiredteam+2
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hattisecure-codingreconnaissancecryptography+3
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaikredteamspyingmobile+4
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamblueteamsecure-developmentsqli+5
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abrahamblueteamsecure-developmentsqli+5
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Josephmachine-learningredteamblueteam+1
2017-04-13KeynoteHitb Sec Conf Redefining Defense Presentation Video Saumil Shahblueteam
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shahblueteam
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifiredteamblueteam+1
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Swamy Shivaganga Nagarajuwindowsblueteam
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyedss7pentestblueteam+2
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamblueteamsecure-developmentsqli+5
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittalblueteam
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+3
2016-09-14Talk44 Con 2016: The Infosec Crossroads Presentation Video Saumil Shahblueteam
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekarpurpleteamredteamblueteam
2016-08-06Tool demoDefcon Visual Network and File Forensics using Rudra Source Code Video Ankur Tyagiblueteamreconnaissanceforensic
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagiblueteamforensic
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Pandapentestingvulnerability-managementthreat-hunting
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul Sasiaiblueteam
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-04-01Tool demoBlackhat Rudra: The Destroyer of Evil Source Code Ankur Tyagiblueteamreconnaissanceforensic
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggalredteamblueteam
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul Sasiblueteammlcloud
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawantsecure-developmentblueteam
2015-11-13Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagiblueteamreconnaissanceforensic
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2015-11-05TalkGround Zero Summit Wolves Among Sheep: Defeating Targeted Attacks With Deception Sahir Hidayatullah, Raviraj Doshiblueteam
2015-11-05TalkGround Zero Summit Western Air Command B S Singh Deonetwork-defensenetwork-monitoringnetwork-pentesting+3
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandrannetwork-forensicspacket-analysisnetwork-monitoring+3
2015-08-08TalkDefcon Chigula — a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandranwifiintrusion-detectionforensic+1
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Soodscadahmipentest+4
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvimobileandroidmetasploit+4
2015-08-08Tool demoDefcon Rudra Source Code Ankur Tyagiblueteamreconnaissanceforensic
2015-08-06Tool demoBlackhat Chellam Vivek Ramachandranwififirewallblueteam+1
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notanicloudblueteam
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalviandroidredteampentest+2
2015-08-05Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagiblueteamreconnaissanceforensic
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastavaowaspblueteam
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohantyblueteam
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanianthreat-intelligenceblueteamredteam+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abrahamowaspxssblueteam+3
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanianblueteam
2015-03-15TalkHitb Sec Conf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobenetwork-pentestingpacket-analysisnetwork-monitoring+2
2015-02-06TalkNullcon Analyzing Chrome crash reports at scale Presentation Video Abhishek Aryaclusterfuzzfuzzingbug-hunting+1
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyedredteamblueteampurpleteam+2
2015-02-06TalkNullcon Generic Executable Unpacking using Dynamic Binary Instrumentation Presentation Shubham Bansalblueteam
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K Aforensicblueteam
2014-11-13TalkGround Zero Summit APT protection for the Enterprise Deepak Singlablueteam
2014-11-13TalkGround Zero Summit Making and Breaking Embedded Security Presentation Yashin Mehabooberedteamblueteampurpleteam
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Soodredteamreverse-engineeringblueteam+1
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobepurpleteamredteamblueteam
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babublueteam
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Guptamobilepurpleteam
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyaymobilereconnaissancesocial-engineering+1
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Soodbotnetredteamblueteam+1
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abrahamowaspxssblueteam+3
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwatescadablueteam
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekarglibcredteamblueteam+2
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalaniblueteam
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyerwifievil-twin-attackphishing+1
2014-02-14TalkNullcon Multi-value W-Fi What the Heck is it Video Abhijeet Ghoshwifiblueteam
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandlapdfweb-application-securityredteam+2
2014-02-14TalkNullcon The Security Challenge Presentation Video Shantanu Ghoshblueteam
2013-11-07TalkGround Zero Summit Advanced security for advanced threats Kartik Shahaniblueteam
2013-10-17TalkHitb Sec Conf Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis Presentation Rahul Sasiblueteam
2013-09-27TalkC0c0n The Art and Science of Anamoly based Vulnerability Detection Lavakumar Kuppanblueteam
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Soodsecure-codingauditblueteam
2013-07-31TalkBlackhat Clickjacking revisited: A perceptual view of UI security Presentation Video Devdatta Akhaweclickjackingblueteamredteam
2013-07-31TalkBlackhat Javascript static security analysis made easy with JSPrime Presentation Whitepaper Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahooweb-application-securityblueteam
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalrapentestredteamblueteam+1
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyapblueteam
2013-03-01TalkNullcon Automating JavaScript Static Analysis Lavakumar Kuppanweb-application-securitypentestblueteam
2013-03-01TalkNullcon BYOD: How will it shape your wireless network security in future? Video Kiran Deshpandewifimobiledos+3
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayakcsrfblueteam
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shahmobilecode-analysissecure-development+5
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumarandroidmobilearm+8
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineniipv4mitmblueteam+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaramanblueteam
2013-03-01TalkNullcon Vulnerability research anyone? Omairredteamblueteampurpleteam
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisettyredteamblueteampurpleteam+2
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremathblueteam
2012-12-01TalkClubhack Smart Grid Security Presentation Video Falgun Rathodblueteam
2012-09-27TalkGrrcon Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! Bharat Jogipentestredteamblueteam+2
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunteforensicblueteam
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkeyblueteam
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilyablueteam
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishrablueteam
2012-07-28TalkDefcon Botnets Die Hard - Owned and Operated Presentation Video Aditya K Soodbotnetblueteam
2012-02-15TalkNullcon Application security cost management Video Ketan Vyasblueteam
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwalblueteamthreat_modelingsecure-development
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kambleredteamxssweb-application-security+2
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoyredteamblueteampurpleteam
2012-02-15TalkNullcon Javascript static analysis with IronWASP Presentation Video Lavakumar Kuppanweb-application-securitypentestblueteam
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singhweb-application-securityredteamblueteam+1
2012-02-15TalkNullcon Ra.2 Blackbox DOM-based XSS scanner Presentation Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahooxssblueteampentest
2012-02-15TalkNullcon Sandboxing The deep truth Video Disha Agarwal, Manish Palifuzzingsandboxblueteam
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soiblueteam
2011-10-08TalkC0c0n Stratagemizing Security Against Perpetrators In Cloud Infrastructure K S Abhirajblueteamcloud
2011-10-07TalkC0c0n Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network Bala Kumar S, Mohamed Emraanullahblueteam
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasipurpleteam
2011-09-07TalkSecuritybyte Data Protection Dipankar Royblueteam
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imranblueteam
2011-08-07TalkDefcon VDLDS — All Your Voice Are Belong To Us Presentation Video Ganesh Devarajanblueteamdata-leakcyber-crime
2011-05-19TalkHitb Sec Conf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Soodmalwareblueteam
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumarxsssqliblueteam+1
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Routdata-leakblueteam
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddyblueteamredteampurpleteam+1
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Guptadata-leakblueteam
2011-02-15TalkNullcon Botnet Detection approach by DNS behavior and clustering analysis Presentation Nilesh Sharma, Pulkit Mehndirattabotnetdnsblueteam
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnanblueteam
2010-10-13TalkHitb Sec Conf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shahredteamweb-application-securityajax+3
2010-08-01TalkC0c0n End-point Security Laxi Eshwariblueteam
2010-08-01TalkC0c0n Last line of defense - Host Intrusion Prevention and Secure application development. Avinash Shenoiblueteam
2010-08-01TalkC0c0n VoIP Security Mukund Krishnamurthypurpleteamvoip
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmadwifiredteamblueteam+1
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patilbotnetblueteam
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochharmalwareblueteam
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desaicryptographysteganographyblueteam
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintalablueteam
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharmathreat_modelingblueteam
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbaraoblueteam
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dindeblueteam
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VCblueteam
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyaniwifihoneypotphishing+1
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shahblueteamfootprintingfirewall+1
2009-05-19TalkSyscan Securing Enterprise Applications Shreeraj Shahblueteamweb-application-securityajax+8
2009-04-22TalkHitb Sec Conf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shahblueteamfootprintingfirewall+1
2009-03-16TalkCan Sec West On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalodepentestblueteam
2009-02-19TalkBlackhat Blinded by Flash: Widespread Security Risks Flash Developers Don’t See Presentation Video Prajakta Jagdaleflashblueteam
2008-12-06TalkClubhack AntiSpam - Understanding the good, the bad and the ugly Presentation Aseem Jakharblueteam
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hattiblueteam
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohlisecure-developmentsecure-codingblueteam+1
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2008-10-29TalkHitb Sec Conf Top 10 Web 2.0 Attacks Presentation Video Shreeraj Shahblueteamweb-application-securityajax+5
2008-08-21TalkOwasp App Sec India AppSec For Managers Nish Bhallaappsecowaspblueteam
2008-08-20TalkOwasp App Sec India Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shahredteamblueteampurpleteam+3
2008-08-20TalkOwasp App Sec India Web Application Security: Too Costly To Ignore Presentation Rajesh Nayakappsecblueteam
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani, Billy Riosphishingblueteam
2008-04-16TalkHitb Sec Conf Securing Next Generation Applications – Scan, Detect and Mitigate Shreeraj Shahblueteamweb-application-securityajax+5
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shahredteamblueteampurpleteam+3
2007-12-09TalkClubhack Subtle Security flaws: Why you must follow the basic principles of software security Presentation Varun Sharmablueteam
2007-11-20TalkDeepsec Web 2.0 Application Kung-Fu - Securing Ajax & Web Services Presentation Video Shreeraj Shahajaxweb-application-securityblueteam
2007-08-01TalkBlackhat PISA: Protocol Identification via Statistical Analysis Presentation Whitepaper Rohit Dhamankarblueteam
2007-04-05TalkHitb Sec Conf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shahredteamblueteampurpleteam+2
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhallablueteampurpleteam
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotiasecure-codingblueteam
2005-10-18TalkBlackhat Adware/Spyware Presentation Saumil Shahblueteamadwarespyware
2005-09-29TalkHitb Sec Conf Analyzing Code for Security Defects Presentation Nish Bhallacode-analysisblueteamsecure-coding
2005-09-26TalkHitb Sec Conf Web hacking Kung-Fu and Art of Defense Presentation Shreeraj Shahblueteam
2005-04-12TalkHitb Sec Conf Web Application Kung-Fu, The Art of Defense Presentation Shreeraj Shahblueteam
2005-04-10TalkHitb Sec Conf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singhredteamblueteampurpleteam+1
2004-10-06TalkHitb Sec Conf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shahredteamblueteampurpleteam
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookheyblueteamintrusion-detection
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shahfingerprintingblueteam
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shahfingerprintingblueteam
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shahfingerprintingblueteam
2003-12-12TalkHitb Sec Conf Defending Web Applications: Strategies, methods and practices Shreeraj Shahblueteamsecure-codingfirewall+1
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shahfingerprintingblueteam
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shahfingerprintingblueteam
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shahfingerprintingblueteam
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shahredteamblueteampurpleteam
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Poplipentestprivacyblueteam