| 2025-08-07 | Tool demo | Blackhat |
Cloud Offensive Breach and Risk Assessment (COBRA)
| Harsha Koushik, Anand Tiwari | #cloud-pentesting#risk-management#edr |
| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | #web-security#malware-detection#browser-security+2 |
| 2025-06-02 | Talk | Confidence |
Local LLMs in Action: Automating CTI to Connect the Dots
| Kai Iyer | #threat-intelligence-analysis#machine-learning#threat-detection+1 |
| 2025-04-15 | Talk | Stackx Cybersecurity |
AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates
| Pawan Kinger | #ai-security#threat-detection#security-operations-center |
| 2025-04-04 | Tool demo | Blackhat |
Decoy Mutex
| Madhukar Raina | #ransomware#endpoint-protection#malware-prevention+3 |
| 2025-04-04 | Tool demo | Blackhat |
SHIVA Spampot: Actionable Spam and Phishing Intelligence
| Rahul Binjve, Viren Kapadia | #honeypot#network-monitoring#incident-management+1 |
| 2025-04-03 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Hitesh Thakur, Praveen Kanniah, Prateek Thakare | #asset-inventory#cloud-workload-protection#security-tools+4 |
| 2025-03-14 | Talk | Insomnihack |
The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques)
| Dhiraj Mishra | #endpoint-protection#security-testing#malware-distribution |
| 2025-03-02 | Talk | Nullcon |
Securing the chains: Building defensive layers for software supply chains
| Yadhu Krishna M, Akhil Mahendra, Hritik Vijay | #blueteam#container-security#sbom+3 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2025-03-02 | Panel | Nullcon |
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
| Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur | #security-monitoring#network-defense#threat-modeling+3 |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | #network-architecture#network-hardening#network-monitoring+2 |
| 2025-03-01 | Talk | Nullcon |
MacOS Lockdown Mode: A Forensic Deep Dive
| Bhargav Rathod | #macos#digital-forensics#endpoint-protection+3 |
| 2025-03-01 | Panel | Nullcon |
AI in SecOps: Enhancing Incident Response with Intelligence
| Mrudul Uchil, Parag Deodhar, Felix Mohan | #ai-security#ai#machine-learning+3 |
| 2024-12-11 | Talk | Blackhat |
The CVSS Deception: How We’ve Been Misled on Vulnerability Severity
| Ankur Sand | #blueteam#security-strategy#threat-modeling+1 |
| 2024-11-16 | Talk | C0c0n |
Who is holding the Marauders map?
| Maya R Nair | #network-pentesting#network-monitoring#network-traffic-analysis+1 |
| 2024-11-16 | Talk | C0c0n |
Breach of the borderless: Cyber threat actors targeting India’s cyberspace
| Abhijith B R | #threat-hunting#cybersecurity-strategy#cyber-war+2 |
| 2024-11-15 | Talk | C0c0n |
Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques
| Adrip Mukherjee, Vinay Kumar | #machine-learning#endpoint-protection#edr+1 |
| 2024-11-15 | Talk | C0c0n |
Know your Enemies: Deep Dive into Ransomware Threat Groups
| Niranjan Jayanand | #ransomware#endpoint-protection#dynamic-analysis |
| 2024-11-06 | Talk | Blackalps |
IDAT Loader: The Malware’s Camouflaged Weapon
| Niranjan Jayanand | #endpoint-protection#dynamic-analysis#security-testing |
| 2024-10-23 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#endpoint-protection+2 |
| 2024-10-23 | Talk | Blackhat |
Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks
| Shruti Ranjit, Mangatas Tondang | #blueteam#oauth#application-pentesting+4 |
| 2024-08-29 | Tool demo | Hitbsecconf |
eBPFShield
| Sagar Bhure | #ids#incident-management#network-monitoring+1 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-05-27 | Talk | Confidence |
Beyond the Kernel: eBPF’s Trailblazing Role in Reinventing Cloud Security Dynamics
| Rohit Sehgal | #cloud-monitoring#ebpf#linux+4 |
| 2024-05-06 | Talk | Rsac |
Headspace’s Privacy Operations Center and Vault
| Shobhit Mehta, Puneet Thapliyal | #data-protection#security-operations-center#security-compliance+1 |
| 2024-04-19 | Tool demo | Blackhat |
Malware clustering using unsupervised ML : CalMal
| Himanshu Anand | #machine-learning#ai-security#malware-detection+3 |
| 2024-04-18 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#security-analytics+3 |
| 2024-04-18 | Tool demo | Blackhat |
Secure Local Vault - Git Based Secret Manager
| Sriram Krishnan, Shibly Meeran | #blueteam#application-hardening#secure-coding+2 |
| 2024-04-18 | Tool demo | Blackhat |
Catching adversaries on Azure - Deception on Cloud
| Subhash Popuri | #azure#cloud-workload-protection#cloud-pentesting+4 |
| 2024-04-18 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Ankur Bhargava, Prateek Thakare, Saddam Hussain | #asset-inventory#architecture#devsecops+1 |
| 2023-12-06 | Tool demo | Blackhat |
Honeyscanner: a vulnerability analyzer for Honeypots
| Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben | #vulnerability-assessment#honeypot#security-testing+2 |
| 2023-09-29 | Talk | Hackinparis |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | #container-security#docker#threat-hunting+1 |
| 2023-09-24 | Panel | Nullcon |
INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI
| Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock | #threat-hunting#ai-security#blueteam |
| 2023-09-24 | Panel | Nullcon |
ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT
| Shomiron Das Gupta, Yogi Kapur, Manish Tiwari | #incident-management#incident-detection#forensics+3 |
| 2023-09-23 | Talk | Nullcon |
Secure Your Angular App Using JWT And GraphQL
| Ankit Sharma | #blueteam#api-security#secure-development+1 |
| 2023-09-23 | Talk | Nullcon |
The Curious Case Of The Rogue SOAR
| Mukesh Sai Kumar, Jaden Furtado | #blueteam#application-pentesting#dynamic-analysis+3 |
| 2023-09-23 | Talk | Nullcon |
The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis
| Nikhil Ashok Hegde | #malware-detection#linux#dynamic-analysis+2 |
| 2023-09-23 | Talk | Nullcon |
Journey in setting up OT SOC
| Ramandeep Singh Walia | #soc#ics-security#threat-detection+1 |
| 2023-08-12 | Panel | Defcon |
Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert
| Trupti Shiralkar, Kiran Shirali | #appsec#alert-fatigue#vulnerability-assessment |
| 2023-08-11 | Talk | Defcon |
Getting a Migraine - uncovering a unique SIP bypass on macOS
| Anurag Bohra, Jonathan Bar Or, Michael Pearse | #macos#endpoint-protection#bypassing+2 |
| 2023-08-10 | Tool demo | Blackhat |
MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments
| Aditya K Sood | #ransomware#malware-detection#security-tools |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-08-07 | Talk | C0c0n |
Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux
| Pranav Sivvam | #red-teaming#linux#memory-forensics+2 |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | #incident-management#threat-hunting#security-monitoring+1 |
| 2023-08-07 | Talk | C0c0n |
Chinese APT against Government officials using G7 summit lure
| Niranjan Jayanand | #apt#incident-management#threat-hunting |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | #threat-hunting#digital-forensics#incident-management+1 |
| 2023-08-07 | Talk | C0c0n |
Exploring Threats in Operational Technology
| Manjunath Hiregange | #ics-security#operational-technology#threat-hunting+1 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | #security-training#risk-management#threat-hunting |
| 2023-08-06 | Talk | C0c0n |
Cybersecurity in the Era of AI
| Suvin Mullaseril | #ai#ai-security#deep-learning+4 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | #threat-hunting#security-monitoring#threat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management
| Kumar Ritesh | #threat-landscape#threat-modeling#threat-hunting+2 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | #threat-hunting#digital-forensics#network-forensics+3 |
| 2023-06-05 | Talk | Confidence |
Evading modern day security defenses in corporate environments
| Himanshu Sharma, Rahul Vashista | #red-teaming#evasion#bypassing+4 |
| 2023-06-01 | Talk | Securityfest |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #reverse-engineering#appsec#endpoint-protection+4 |
| 2023-05-12 | Tool demo | Blackhat |
eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF
| Sagar Bhure | #dns#machine-learning#network-monitoring+2 |
| 2023-05-11 | Talk | Blackhat |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #hacking#bypassing#mobile-hacking+1 |
| 2023-05-11 | Tool demo | Blackhat |
ThreatSeeker - Threat Hunting via Windows Event Logs
| Ashish Bhangale, G Khartheesvar, Arafat Ansari | #threat-hunting#windows#security-tools |
| 2023-05-10 | Talk | Auscert |
Decentralised, multi-stakeholder and non-linear cyber incident response with the Incident Command System
| Pukhraj Singh | #incident-management#soc#threat-intelligence-analysis |
| 2023-05-10 | Talk | Auscert |
Staying ahead of evolving threats from the get-go with proactive intelligence
| Tara Dharnikota | #threat-intelligence-analysis#threat-hunting#threat-detection |
| 2023-04-20 | Talk | Hitbsecconf |
BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES
| Rohan Aggarwal | #hacking#hardware-hacking#bypassing+3 |
| 2022-12-07 | Tool demo | Blackhat |
h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot.
| Subhash Popuri | #honeypot#ids#ips+3 |
| 2022-09-29 | Talk | Brucon |
0wn-premises: Bypassing Microsoft Defender for Identity
| Nikhil Mittal | #red-teaming#active-directory#threat-detection |
| 2022-09-24 | Talk | C0c0n |
Deep Learning to detect Network Attacks
| Varun Kohli | #ids#network-monitoring#threat-detection+2 |
| 2022-09-24 | Talk | C0c0n |
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks
| Manesh Thankappan | #ids#network-monitoring#network-pentesting+3 |
| 2022-09-24 | Talk | C0c0n |
Need for Advanced SOC
| Vijayakumar K M | #soc#security-monitoring#security-analytics+2 |
| 2022-09-24 | Talk | C0c0n |
OSINT Tools and Techniques
| Brijesh Singh | #threat-hunting#intelligence-sharing#security-training |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | #social-engineering#security-training#threat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Bridging the gap between Security and Operations
| Sujay Rajashekar Gundagatti | #devsecops#architecture#threat-detection+2 |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | #api-security#threat-landscape#threat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Tracking the Bad guys. An interesting story of how the criminal underground operates
| Aarushi Koolwal, Anjana Sathyan | #threat-hunting#incident-management#cyber-crime+4 |
| 2022-09-08 | Talk | Nullcon |
Handling A Bug Bounty program From A Blue Team Perspective
| Ashwath Kumar, Ankit Anurag | #blueteam#cloud-monitoring#cloud-pentesting+4 |
| 2022-09-08 | Talk | Nullcon |
Automate Your Whatsapp Chats
| Aditi Bhatnagar | #android#application-pentesting#ai-security+2 |
| 2022-09-08 | Talk | Nullcon |
The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple
| Amit Malik, Pratik Jeware | #macos#malware-detection#endpoint-protection |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | #vulnerability-assessment#security-development-lifecycle#risk-management+3 |
| 2022-09-06 | Panel | Nullcon |
Does your SOC sucks?
| Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur | #security-training#incident-management#alert-fatigue+3 |
| 2022-08-10 | Talk | Blackhat |
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
| Sameer Koranne, John Dwyer, Neil Wyler | #threat-hunting#security-strategy#threat-modeling |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | #threat-detection#threat-hunting#malware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Introducing Free & Open Elastic Limitless XDR
| Ravindra Ramnani | #threat-detection#security-monitoring#architecture |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | #threat-hunting#threat-detection#threat-modeling+2 |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma, Kurt Baumgartner | #ics-security#critical-infrastructure#threat-hunting+1 |
| 2021-11-12 | Panel | C0c0n |
Stopping Breaches with CrowdStrike
| Sandeep Rao | #endpoint-protection#incident-management#security-monitoring+2 |
| 2021-11-11 | Tool demo | Blackhat |
DejaVu ++
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#cloud-access-security-broker#cloud-compliance+4 |
| 2021-11-10 | Tool demo | Blackhat |
RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot
| Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis | #blueteam#honeypot#network-defense+1 |
| 2021-11-04 | Talk | Ekoparty |
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system
| Saransh Rana, Divyanshu Mehta, Harsh Varagiya | #aws#security-monitoring#iam+1 |
| 2021-10-13 | Tool demo | Rootcon |
Buzzard : Crafting your post exploitation framework against odds
| Aravindha Hariharan, Subhajeet Singha | #security-assessment#post-exploitation#privilege-escalation+2 |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | #threat-hunting#threat-modeling#architecture+1 |
| 2021-08-06 | Panel | Defcon |
Adversary simulation, emulation or purple teaming - How would you define it?
| Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest | #security-testing#incident-management#red-teaming+3 |
| 2021-08-05 | Talk | Blackhat |
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors
| Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen | #hardware-embedded#endpoint-protection#incident-management+1 |
| 2021-08-04 | Tool demo | Blackhat |
Attack Surface Framework
| Prajwal Panchmahalkar, Mauricio Espinosa | #network-defense#application-pentesting#attack-surface+1 |
| 2021-05-06 | Tool demo | Blackhat |
Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way
| Vasant Kumar, Rupali Dash | #kubernetes#audit#secure-coding+1 |
| 2021-05-06 | Tool demo | Blackhat |
FalconEye: Windows Process Injection Techniques - Catch Them All
| Rajiv Kulkarni, Sushant Paithane | #windows#process-injection#blueteam+1 |
| 2021-05-06 | Talk | Blackhat |
Threat Hunting in Active Directory Environment
| Anurag Khanna, Thirumalai Natarajan Muthiah | #blueteam#red-teaming#purpleteam |
| 2021-03-06 | Talk | Nullcon |
Bug hunter adventures
| Shreyas Dighe, Yuvraj Dighe | #bug-hunting#application-pentesting#bug-bounty+3 |
| 2020-12-09 | Tool demo | Blackhat |
ArcherySec 2.0 - Open Source Vulnerability Assessment and Management
| Anand Tiwari | #blueteam#security-assessment#ci-cd |
| 2020-12-09 | Tool demo | Blackhat |
HosTaGe: mobile honeypots for rapid deployment
| Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou | #honeypot#blueteam#endpoint-protection+2 |
| 2020-12-09 | Tool demo | Blackhat |
Strafer: A Tool to Detect Infections in Elasticsearch Instances
| Rohit Bansal, Aditya K Sood | #blueteam#security-assessment#threat-intelligence-analysis |
| 2020-11-21 | Talk | Appsecindonesia |
Threat Defense: Defending the ATT&CK with TTP’s
| Avkash Kathiriya | #blueteam#threat-hunting#security-analytics |
| 2020-11-20 | Talk | Deepsec |
What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis
| Shyam Sundar Ramaswami | #malware-detection#sandbox#static-analysis+1 |
| 2020-10-07 | Talk | Rootcon |
Blockchain Based OT Monitoring Solution (BBOTMS)
| Asif Hameed Khan, Gagan Jattana | #ics#blueteam#decentralized-systems+4 |
| 2020-10-07 | Talk | Rootcon |
Automating Threat Hunting on the Dark Web and other nitty-gritty thingso
| Apurv Singh Gautam | #deep-web#red-teaming#threat-hunting+1 |
| 2020-10-02 | Tool demo | Blackhat |
MalViz.ai
| Vasu Sethia, Shivam Kataria | #blueteam#machine-learning#deep-learning+3 |
| 2020-10-02 | Tool demo | Blackhat |
Phishing Simulation Assessment
| Jyoti Raval | #phishing#blueteam#social-engineering+3 |
| 2020-10-02 | Tool demo | Blackhat |
OWASP Nettacker
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan | #security-assessment#vulnerability-assessment#network-pentesting+3 |
| 2020-10-01 | Tool demo | Blackhat |
Wi-Fi Access Point Rootkits
| Nishant Sharma, Jeswin Mathai | #wifi#blueteam#iot-pentesting+1 |
| 2020-09-18 | Talk | C0c0n |
Deep Learning for Intrusion Attempt Detection
| Varun Kohli | #deep-learning#machine-learning#blueteam |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-08-22 | Talk | Thedianainitiative |
Hacking into Android Ecosystem
| Aditi Bhatnagar | #android#android-security#application-pentesting+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Automating Threat Hunting on the Dark Web and other nitty-gritty things
| Apurv Singh Gautam | #threat-hunting#nlp#machine-learning+1 |
| 2020-08-05 | Talk | Blackhat |
Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic
| Harini Kannan, Nick Gregory | #machine-learning#exploit-detection#blueteam |
| 2020-08-05 | Tool demo | Blackhat |
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…)
| Pramod Rana | #risk-analysis#blueteam#security-strategy+4 |
| 2020-07-05 | Tool demo | Blackhat |
Mobile Security Framework - MobSF
| Ajin Abraham | #blueteam#ios#android+1 |
| 2020-04-25 | Talk | Hitbsecconf |
THE STATE OF ICS SECURITY: THEN AND NOW
| Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot | #vulnerability-assessment#security-assessment#blueteam |
| 2020-04-24 | Talk | Hitbsecconf |
COMMSEC: The State of ICS Security : Then and Now
| Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot | #scada#blueteam#security-assessment |
| 2020-03-06 | Tool demo | Nullcon |
F.R.I.D.A.Y
| Shyam Sundar Ramaswami | #blueteam#dynamic-analysis#sandbox+2 |
| 2020-03-06 | Tool demo | Nullcon |
Hachi
| Parmanand Mishra | #att&ck#blueteam#rest-api+1 |
| 2020-03-06 | Talk | Nullcon |
InfoSec Deep Learning in Action
| Satnam Singh | #ml#deep-learning#blueteam |
| 2020-03-06 | Tool demo | Nullcon |
Omniscient
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2020-03-06 | Tool demo | Nullcon |
Phishing Simulation
| Jyoti Raval | #phishing#blueteam#security-training+2 |
| 2020-03-06 | Tool demo | Nullcon |
Providence
| Swapnil Kumbhar, Akshay Shah | #incident-management#linux#macos+2 |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | #linux#secure-coding#web-security+3 |
| 2020-03-06 | Talk | Nullcon |
Automated Classification of Web-Application Attacks for Intrusion Detection
| Aneet Kumar Dutta | #intrusion-detection#machine-learning#application-pentesting+3 |
| 2019-12-04 | Tool demo | Blackhat |
RTTM: Real Time Threat Monitoring Tool
| Naveen Rudrappa, Murali Krishna Segu | #blueteam#network-monitoring#security-analytics+2 |
| 2019-12-04 | Talk | Blackhat |
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing
| Karthik Ramasamy, Eric Hampshire | #blueteam#smartcard#mfa+4 |
| 2019-12-04 | Tool demo | Blackhat |
Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit
| Jayesh Chauhan | #aws#gcp#blueteam |
| 2019-12-04 | Talk | Blackhat |
ClusterFuzz: Fuzzing at Google Scale
| Abhishek Arya, Oliver Chang | #fuzzing#red-teaming#blueteam+1 |
| 2019-11-01 | Talk | Appsecdayaustralia |
A Purple Team View of Serverless and GraphQL Applications
| Abhay Bhargav | #red-teaming#blueteam#purpleteam+1 |
| 2019-11-01 | Talk | Appsecdayaustralia |
Protecting the Damned: Deploying Insecure Applications at Scale
| Vivek Ramachandran | #blueteam#container-security#docker+3 |
| 2019-10-14 | Talk | Hitbsecconf |
CALL OF DUTY: MODERN BROWSER WARFARE
| Dhiraj Mishra | #blueteam#red-teaming#purpleteam |
| 2019-10-14 | Talk | Hitbsecconf |
ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES
| Harshit Agrawal, Himanshu Mehta | #wifi#red-teaming#blueteam+1 |
| 2019-10-12 | Talk | Texascybersummit |
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+3 |
| 2019-10-10 | Talk | Brucon |
Security transition from 4G to 5G: are we secure enough?
| Altaf Shaik, Ravishankar Borgaonkar | #5g#4g#network-architecture+3 |
| 2019-09-27 | Talk | C0c0n |
Advanced Persistent Threat and counter measures
| A a Gafoor | #blueteam#apt#network-defense+4 |
| 2019-09-27 | Talk | C0c0n |
Block Chain for Secured Automation
| Sanat Bhat | #blueteam#smart-contracts#decentralised-security+1 |
| 2019-09-27 | Talk | C0c0n |
Building a cloud security monitoring and auditing framework
| Nirali Shah, Prasoon Dwivedi | #blueteam#cloud-monitoring#cloud-pentesting+4 |
| 2019-09-27 | Talk | C0c0n |
Defense in Depth for Embedded Systems
| Jiggyasu Sharma | #embedded-systems#blueteam#hardware-embedded+4 |
| 2019-09-27 | Talk | C0c0n |
Demystifying HealthCare Security
| Ajay Pratap Singh | #blueteam#data-protection#identity-theft+4 |
| 2019-09-27 | Talk | C0c0n |
Doing SecOps for the Cloud using Cloud Native Services
| Akash Mahajan | #blueteam#cloud-workload-protection#container-security+3 |
| 2019-09-27 | Talk | C0c0n |
Securing Payment Data with PCI Security Standards and Programs
| Nitin Bhatnagar | #blueteam#data-protection#secure-development+3 |
| 2019-09-23 | Talk | Rootcon |
Hunting Threats with Wireshark Plugins
| Nishant Sharma, Jeswin Mathai, Shivam Bathla | #blueteam#network-monitoring#security-analytics+2 |
| 2019-09-23 | Talk | Rootcon |
Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking)
| Arun Mane, Nikhil Bogam | #red-teaming#car-hacking#blueteam+1 |
| 2019-09-23 | Talk | Rootcon |
APAD: An EDR Grade Agent for Wi-Fi Access Points
| Vivek Ramachandran | #wifi#edr#linux |
| 2019-09-13 | Talk | 44con |
The CISO’s Dilemma
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2019-09-13 | Talk | Globalappsec |
A Purple Team View of Serverless and GraphQL Applications
| Abhay Bhargav | #purpleteam#cloud-workload-protection#serverless+3 |
| 2019-09-13 | Talk | Globalappsec |
Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center
| Amol Sarwate | #aws#siem#devsecops |
| 2019-08-30 | Talk | Hitbsecconf |
COMMSEC: PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | #secure-coding#red-teaming#blueteam+1 |
| 2019-08-29 | Keynote | Hitbsecconf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2019-08-29 | Talk | Hitbsecconf |
Understanding, Attacking & Securing Medical Devices
| Ajay Pratap Singh | #red-teaming#blueteam#purpleteam |
| 2019-08-10 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+3 |
| 2019-08-09 | Tool demo | Defcon |
EXPLIoT - IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | #security-assessment#red-teaming#blueteam+1 |
| 2019-08-08 | Tool demo | Blackhat |
Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit
| Jayesh Chauhan | #aws#gcp#blueteam |
| 2019-08-08 | Tool demo | Blackhat |
CSF: Container Security Framework
| Vaibhav Gupta | #blueteam#container-security#docker+2 |
| 2019-08-08 | Talk | Blackhat |
Death to the IOC: What’s Next in Threat Intelligence
| Bhavna Soman | #threat-intelligence-analysis#machine-learning#blueteam |
| 2019-08-08 | Tool demo | Blackhat |
EXPLIoT: IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | #security-assessment#red-teaming#blueteam+1 |
| 2019-08-08 | Tool demo | Defcon |
Hachi: An Intelligent threat mapper
| Parmanand Mishra | #att&ck#blueteam#rest-api+1 |
| 2019-08-08 | Tool demo | Defcon |
Let’s Map Your Network
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-08-08 | Tool demo | Defcon |
PcapXray
| Srinivas Piskala Ganesh Babu | #forensics#wireshark#blueteam |
| 2019-08-08 | Tool demo | Blackhat |
RWDD: Remote Web Deface Detection Tool
| K v Prashant, Ade Yoseman Putra | #blueteam#application-pentesting#security-monitoring+1 |
| 2019-08-08 | Talk | Defcon |
YOUR PHONE IS USING TOR AND LEAKING YOUR PII
| Milind Bhargava, Adam Podgorski | #data-protection#security-assessment#tor+1 |
| 2019-08-07 | Talk | Blackhat |
Defense Against Rapidly Morphing DDOS
| Mudit Tyagi, Mikhail Fedorov | #ddos#blueteam#machine-learning |
| 2019-08-07 | Tool demo | Blackhat |
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan, Kunal Aggarwal | #virtual-machine#blueteam#forensics+2 |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | #incident-management#threat-hunting#ssl+1 |
| 2019-05-21 | Talk | Phdays |
Active defense using Honeypots v2
| Rahul Binjve | #blueteam#honeypot#network-defense+4 |
| 2019-03-28 | Tool demo | Blackhat |
RTS: Real Time Scrapper
| Naveen Rudrappa | #blueteam#application-pentesting#security-monitoring+4 |
| 2019-03-28 | Tool demo | Blackhat |
Archery - Open Source Vulnerability Assessment and Management- 2.0
| Anand Tiwari | #security-assessment#blueteam#ci-cd |
| 2019-03-28 | Tool demo | Blackhat |
Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit
| Jayesh Chauhan | #aws#azure#gcp+1 |
| 2019-03-28 | Talk | Blackhat |
Investigating Malware Using Memory Forensics - A Practical Approach
| Monnappa K A | #forensics#blueteam#malware-detection+1 |
| 2019-03-28 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli, Ankur Bhargava | #secure-coding#blueteam#application-pentesting+4 |
| 2019-03-28 | Tool demo | Blackhat |
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research
| Nilaksh Das, Evan Yang, Li Chen | #machine-learning#blueteam#ai-security+4 |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#wireshark#network-defense+4 |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami | #network-pentesting#vulnerability-assessment#firewall+3 |
| 2019-03-02 | Panel | Nullcon |
Actionable Intelligence and Cyber Security
| Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White | #data-analytics#incident-management#security-analytics+4 |
| 2019-02-28 | Talk | Nullcon |
Attacking & Securing HealthCare Standards & hospital secured systems
| Ajay Pratap Singh | #red-teaming#blueteam#purpleteam |
| 2019-02-28 | Talk | Nullcon |
Building Hardened IoT Implementations with LangSec
| Prashant Anantharaman | #blueteam#secure-development#input-validation+4 |
| 2018-12-06 | Talk | Blackhat |
AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace
| Vijay Thaware, Niranjan Agnihotri | #ai#blueteam#deepfake |
| 2018-12-06 | Tool demo | Blackhat |
Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit
| Jayesh Chauhan | #aws#gcp#blueteam |
| 2018-12-05 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli | #secure-coding#blueteam#application-hardening+4 |
| 2018-11-29 | Talk | Deepsec |
DNS Exfiltration and Out-of-Band Attacks
| Nitesh Shilpkar | #dns#red-teaming#malware-detection |
| 2018-11-27 | Talk | Hitbsecconf |
COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding
| Vikash Yadav | #deep-learning#blueteam#ai-security+3 |
| 2018-11-02 | Talk | Hitbsecconf |
Defending The Enterprise in 2018
| Saumil Shah | #blueteam#security-strategy#threat-modeling+3 |
| 2018-10-19 | Talk | Appsecdayaustralia |
Continuous Integration and Delivery with Docker Containers
| Vasant Kumar | #docker#blueteam#container-security+4 |
| 2018-10-05 | Talk | C0c0n |
Defending cloud Infrastructures with Cloud Security Suite
| Jayesh Chauhan, Shivankar Madaan | #aws#gcp#azure+1 |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | #machine-learning#blueteam#ai-security+4 |
| 2018-10-05 | Talk | C0c0n |
Predictive policing using Big Data analytics.
| Tarun Wig | #blueteam#data-analytics#data-protection+3 |
| 2018-10-05 | Talk | C0c0n |
Privacy And Data Protection: Stakeholders’ Perspectives
| Rahul Sharma | #blueteam#data-protection#gdpr+4 |
| 2018-10-05 | Talk | C0c0n |
SCANDA: To Unbosom Malware Behavior
| Rajesh Nikam, Parmanand Mishra | #reverse-engineering#dynamic-analysis#malware-research+1 |
| 2018-10-05 | Talk | C0c0n |
Dealing with Changing Threat Landscape
| Vijendra Katiyar | #threat-landscape#threat-hunting#risk-management |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | #malware-detection#static-analysis#dynamic-analysis+3 |
| 2018-09-27 | Talk | Rootcon |
Defending cloud Infrastructures with Cloud Security Suite
| Shivankar Madaan | #aws#secure-coding#web-security+2 |
| 2018-09-06 | Talk | Grrcon |
Analyzing Multi-Dimensional Malware Dataset
| Ankur Tyagi | #blueteam#machine-learning#dynamic-analysis+1 |
| 2018-09-06 | Talk | Grrcon |
Angad: A Malware Detection Framework using Multi-Dimensional Visualization
| Ankur Tyagi | #blueteam#security-assessment#forensics |
| 2018-09-06 | Talk | Grrcon |
Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI
| Pranshu Bajpai, Richard Enbody | #encryption#ransomware#dynamic-analysis+1 |
| 2018-08-16 | Talk | Usenix |
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
| Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura | #security-assessment#architecture#application-hardening+4 |
| 2018-08-16 | Talk | Usenix |
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
| Vijay Balasubramaniyan | #threat-detection#architecture#machine-learning+1 |
| 2018-08-12 | Tool demo | Defcon |
Expl-iot—IoT Security Testing and Exploitation framework
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2018-08-11 | Tool demo | Defcon |
Angad: A Malware Detection Framework using Multi-Dimensional Visualization
| Ankur Tyagi | #blueteam#security-assessment#forensics |
| 2018-08-11 | Tool demo | Defcon |
Archery—Open Source Vulnerability Assessment and Management
| Anand Tiwari | #security-assessment#blueteam#ci-cd |
| 2018-08-11 | Tool demo | Defcon |
Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit
| Jayesh Chauhan | #aws#gcp#blueteam |
| 2018-08-11 | Tool demo | Defcon |
DejaVU—An Open Source Deception Framework
| Harish Ramadoss, Bhadreshkumar Patel | #blueteam#network-defense#honeypot+4 |
| 2018-08-11 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+4 |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | #security-analytics#threat-hunting#osint+3 |
| 2018-08-09 | Talk | Blackhat |
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
| Bhargava Shastry, Vincent Ulitzsch, Dominik Maier | #security-assessment#blueteam#linux+1 |
| 2018-08-09 | Talk | Defcon |
4G—Who is paying your cellular phone bill?
| Isha Singh, Dr Silke Holtmanns | #4g#ipx#red-teaming+2 |
| 2018-08-09 | Talk | Blackhat |
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
| Jugal Parikh, Randy Treit, Holly Stewart | #blueteam#ai-security#machine-learning+4 |
| 2018-08-08 | Tool demo | Blackhat |
ANWI (All New Wireless IDS): The $5 WIDS
| Rishikesh Bhide, Sanket Karpe | #intrusion-detection#blueteam#wifi |
| 2018-08-08 | Tool demo | Blackhat |
Archerysec Tool Demo
| Anand Tiwari | #security-assessment#blueteam#ci-cd |
| 2018-08-08 | Tool demo | Blackhat |
Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit
| Divya S John, Jayesh Chauhan, Shivankar Madaan | #aws#azure#gcp+1 |
| 2018-08-08 | Talk | Blackhat |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #red-teaming#vpn#blueteam+1 |
| 2018-08-08 | Tool demo | Blackhat |
DejaVu: An Open Source Deception Framework
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#network-defense#honeypot+4 |
| 2018-08-08 | Tool demo | Blackhat |
Expl-iot: IoT Security Testing and Exploitation Framework
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2018-08-08 | Talk | Blackhat |
LTE Network Automation Under Threat
| Ravishankar Borgaonkar, Altaf Shaik | #lte#4g#red-teaming+2 |
| 2018-08-08 | Tool demo | Blackhat |
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan | #virtual-machine#blueteam#forensics+2 |
| 2018-08-08 | Tool demo | Blackhat |
SCoDA: Smart COntract Defender and Analyzer
| Ajit Hatti | #blueteam#secure-coding#smart-contracts+4 |
| 2018-08-08 | Tool demo | Blackhat |
PA Toolkit: Wireshark Plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | #wireshark#security-assessment#network-architecture+2 |
| 2018-05-13 | Talk | Defcon |
Androsia: Securing ‘Data in Process’ for your Android Apps
| Samit Anwer | #android#blueteam#android-security+4 |
| 2018-03-23 | Tool demo | Blackhat |
Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit
| Jayesh Chauhan, Shivankar Madaan | #aws#gcp#blueteam |
| 2018-03-22 | Tool demo | Blackhat |
Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data
| Samit Anwer | #android#blueteam#application-hardening+4 |
| 2018-03-22 | Tool demo | Blackhat |
Archery - Open Source Vulnerability Assessment and Management
| Anand Tiwari | #security-assessment#red-teaming#blueteam+1 |
| 2018-03-22 | Tool demo | Blackhat |
Jackhammer - One Security Vulnerability Assessment/Management Tool
| Rajagopal Vr, Krishna Chaitanya Yarramsetty | #security-assessment#red-teaming#blueteam+4 |
| 2018-03-22 | Tool demo | Blackhat |
Mobile Security Framework - MobSF
| Ajin Abraham | #blueteam#ios#android+1 |
| 2018-03-22 | Talk | Blackhat |
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables
| Sumanth Naropanth, Kavya Racharla | #wearables#blueteam#red-teaming+1 |
| 2018-03-22 | Talk | Blackhat |
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot
| Ravi Sahita, Daiping Liu, Mingwei Zhang | #blueteam#application-hardening#code-review+4 |
| 2018-03-15 | Talk | Troopers |
Defending Microsoft Environments at Scale
| Vineet Bhatia | #blueteam#windows#azure+4 |
| 2018-03-03 | Panel | Nullcon |
Next generation cyber SOC
| K K Mookhey, Mathan Babu Kasilingam, Hidayath Khan, Shivkumar Pandey, Michael Smith | #security-analytics#security-monitoring#cloud-workload-protection+4 |
| 2018-03-03 | Panel | Nullcon |
Managing Cyber Risk in the Connected Environment
| Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani | #security-strategy#threat-modeling#network-monitoring+1 |
| 2018-03-01 | Talk | Nullcon |
A Game between Adversary and AI Scientist
| Satnam Singh | #ai#blueteam#ai-security+3 |
| 2018-03-01 | Talk | Nullcon |
SpotPhish: Zero-Hour Phishing Protection
| Ganesh Varadarajan | #phishing#blueteam#anti-phishing+1 |
| 2018-03-01 | Talk | Nullcon |
Unleashing D* on Android Kernel Drivers
| Aravind Machiry | #android#fuzzing#red-teaming+3 |
| 2017-12-30 | Tool demo | Blackhat |
Cloud Security Suite - One Stop Tool for AWS Security Audit
| Shivankar Madaan, Prajal Kulkarni, Jayesh Chauhan | #aws#azure#gcp+1 |
| 2017-12-06 | Tool demo | Blackhat |
ANWI (All New Wireless IDS) - The £5 WIDS
| Sanket Karpe | #intrusion-detection#blueteam#wifi |
| 2017-12-06 | Tool demo | Blackhat |
EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2017-11-20 | Talk | Hackfest |
How my SV Machine nailed your Malware
| Nikhil Prabhakar | #android-security#machine-learning#malware-detection |
| 2017-11-17 | Talk | Deepsec |
Intel AMT: Using & Abusing The Ghost In The Machine
| Parth Shukla | #red-teaming#blueteam#purpleteam |
| 2017-10-19 | Talk | Hacklu |
Intel AMT: Using & Abusing the Ghost in the Machine
| Parth Shukla | #red-teaming#blueteam#purpleteam |
| 2017-08-18 | Talk | C0c0n |
Hunting Botnets with Analytics
| Shomiron Das Gupta | #botnet#blueteam#security-analytics+2 |
| 2017-08-18 | Talk | C0c0n |
10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work
| Rahul Binjve | #honeypot#blueteam#network-monitoring+3 |
| 2017-08-18 | Talk | C0c0n |
Cloud_Security Suite - One stop tool for auditing cloud infrastructure
| Shivankar Madaan, Jayesh Chauhan | #aws#blueteam#cloud-monitoring+4 |
| 2017-08-18 | Talk | C0c0n |
Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them!
| Illyas Kooliyankal | #blueteam#cyber-crime#intelligence-sharing+3 |
| 2017-08-18 | Talk | C0c0n |
iGoat – A Self Learning Tool for iOS App Pentesting and Security
| Swaroop Yermalkar | #ios#security-assessment#blueteam+1 |
| 2017-08-18 | Talk | C0c0n |
Mobile Banking (In)Security
| Sneha Rajguru | #appsec#purpleteam#red-teaming+1 |
| 2017-08-18 | Talk | C0c0n |
Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure
| Manas Pratim Sarma | #blueteam#critical-infrastructure#cybersecurity-strategy+2 |
| 2017-08-18 | Talk | C0c0n |
The card hack - Lessons from the Hitachi Payments Breach
| Saikat Datta | #red-teaming#blueteam#purpleteam |
| 2017-08-18 | Talk | C0c0n |
The Internet Of Things: Essentials of Secur(IOT)y
| Arpit Bajpai, Ronald Michael | #blueteam#iot-device-management#iot-pentesting+4 |
| 2017-08-18 | Talk | C0c0n |
Yarafying Android Malware: A Missing Step Before Malware Analysis
| Shivang Desai | #android#blueteam#android-security+3 |
| 2017-08-18 | Talk | C0c0n |
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!
| Abhinav Biswas | #tor#network-monitoring#incident-detection+1 |
| 2017-08-18 | Talk | C0c0n |
Cyber Threat Intelligence - Are We There , Yet…?
| A Shiju Rawther | #threat-hunting#threat-modeling#ioc+3 |
| 2017-07-30 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | #secure-coding#red-teaming#blueteam+3 |
| 2017-07-29 | Tool demo | Defcon |
WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #wifi#red-teaming#blueteam+1 |
| 2017-07-28 | Tool demo | Defcon |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2017-07-27 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2017-07-27 | Tool demo | Blackhat |
Gibber Sense
| Ajit Hatti | #secure-coding#reconnaissance#encryption+3 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | #vulnerability-assessment#bug-bounty#network-pentesting+1 |
| 2017-07-26 | Talk | Blackhat |
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
| Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert | #red-teaming#spying#3g+3 |
| 2017-06-24 | Talk | Lehack |
How my SV Machine nailed your Malware
| Nikhil Prabhakar | #android-security#machine-learning#malware-detection |
| 2017-06-23 | Talk | Hackinparis |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2017-05-23 | Talk | Phdays |
Injecting security into web apps in the runtime
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2017-05-23 | Talk | Phdays |
Practical machine learning in infosecurity
| Anto Joseph, Clarence Chio | #machine-learning#red-teaming#blueteam+1 |
| 2017-04-13 | Keynote | Hitbsecconf |
Redefining Defense
| Saumil Shah | #blueteam#security-strategy#incident-management+2 |
| 2017-03-31 | Talk | Blackhat |
The Seven Axioms of Security
| Saumil Shah | #blueteam#security-strategy#threat-modeling+2 |
| 2017-03-31 | Talk | Blackhat |
Mobile-Telephony Threats in Asia
| Payas Gupta, Marco Balduzzi, Lion Gu | #red-teaming#social-engineering#phishing+2 |
| 2017-03-30 | Tool demo | Blackhat |
WiDy: WiFi 0wnage in Under $5
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #wifi#red-teaming#blueteam+1 |
| 2017-03-03 | Talk | Nullcon |
Agility with security mitigations in Windows 10
| Swamy Shivaganga Nagaraju | #windows#blueteam#security-development-lifecycle+2 |
| 2017-03-03 | Talk | Nullcon |
Case study of SS7/Sigtran assessment
| Akib Sayyed | #ss7#security-assessment#blueteam+2 |
| 2017-03-03 | Talk | Nullcon |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2016-11-11 | Talk | Deepsec |
AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That
| Nikhil Mittal | #blueteam#amsi#endpoint-protection+1 |
| 2016-11-04 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | #secure-coding#red-teaming#blueteam+3 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | #reverse-engineering#evil-twin-attack#network-monitoring+3 |
| 2016-10-19 | Talk | Hacklu |
2016: The Infosec Crossroads
| Saumil Shah | #philosophy#security-strategy#incident-management+3 |
| 2016-10-05 | Talk | Virusbulletin |
One-Click Fileless Infection
| Himanshu Anand, Chastine Menrige | #reverse-engineering#incident-management#endpoint-protection+3 |
| 2016-09-14 | Talk | 44con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2016-08-19 | Talk | C0c0n |
Backdooring my Enemies with a Proxy for Threat Intelligence
| Jovin Lobo, Aditya Vasekar | #purpleteam#red-teaming#blueteam |
| 2016-08-06 | Tool demo | Defcon |
Visual Network and File Forensics using Rudra
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2016-08-04 | Tool demo | Blackhat |
Maltese (Malware Traffic Emulating Software)
| Sasi Siddharth | #dns#secure-coding#malware-detection+2 |
| 2016-08-04 | Tool demo | Blackhat |
rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+1 |
| 2016-08-03 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2016-08-03 | Tool demo | Blackhat |
Visual Network and File Forensics Using Rudra
| Ankur Tyagi | #blueteam#forensics#network-forensics+2 |
| 2016-08-03 | Tool demo | Blackhat |
DataSploit
| Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda | #security-assessment#threat-hunting#osint+1 |
| 2016-05-17 | Talk | Phdays |
Security Automation Based on Artificial Intelligence
| Rahul Sasi | #ai#blueteam#ai-security+4 |
| 2016-04-01 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2016-04-01 | Tool demo | Blackhat |
Rudra: The Destroyer of Evil
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2016-03-11 | Talk | Nullcon |
Attacking and defending healthcare - EMR solutions
| Anirudh Duggal | #red-teaming#blueteam#application-pentesting+1 |
| 2016-03-11 | Talk | Nullcon |
Making Machines think about security for fun and profit
| Rahul Sasi | #blueteam#ml#application-pentesting+4 |
| 2016-03-11 | Talk | Nullcon |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day
| Pallav Jakhotiya, Vipul Sawant | #secure-development#blueteam#data-analytics+3 |
| 2015-11-13 | Tool demo | Blackhat |
Rudra - The Destroyer of Evil
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2015-11-13 | Talk | Blackhat |
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX
| Monnappa K A | #linux#security-assessment#malware-research+4 |
| 2015-11-12 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2015-11-12 | Tool demo | Blackhat |
Nishang - Tracking A Windows User
| Nikhil Mittal | #windows#red-teaming#endpoint-protection+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Wolves Among Sheep: Defeating Targeted Attacks With Deception
| Sahir Hidayatullah, Raviraj Doshi | #blueteam#incident-detection#honeypot+2 |
| 2015-11-05 | Talk | Groundzerosummit |
chellam – a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | #wifi#firewall#ids+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Western Air Command
| B S Singh Deo | #network-defense#network-monitoring#network-pentesting+3 |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | #network-forensics#packet-analysis#network-monitoring+3 |
| 2015-08-08 | Talk | Defcon |
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics
| Vivek Ramachandran | #wifi#intrusion-detection#forensics+1 |
| 2015-08-08 | Talk | Defcon |
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
| Aditya K Sood | #scada#hmi#security-assessment+4 |
| 2015-08-08 | Talk | Defcon |
QARK: Android App Exploit and SCA Tool
| Tushar Dalvi, Tony Trummer | #android#metasploit#red-teaming+3 |
| 2015-08-08 | Tool demo | Defcon |
Rudra
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2015-08-07 | Talk | Defcon |
Chellam – a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | #wifi#firewall#ids+4 |
| 2015-08-06 | Tool demo | Blackhat |
Chellam
| Vivek Ramachandran | #wifi#firewall#blueteam+1 |
| 2015-08-06 | Talk | Blackhat |
Harnessing Intelligence from Malware Repositories
| Arun Lakhotia, Vivek Notani | #blueteam#security-analytics#malware-research+2 |
| 2015-08-05 | Tool demo | Blackhat |
QARK - Android Application SCA and Exploit Tool
| Tushar Dalvi | #android#red-teaming#security-assessment+2 |
| 2015-08-05 | Tool demo | Blackhat |
Rudra - The Destroyer of Evil
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2015-08-01 | Talk | C0c0n |
Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities
| Anant Shrivastava | #owasp#blueteam#security-testing+4 |
| 2015-05-26 | Talk | Phdays |
Invisible Backdoors In Your Code
| Debasis Mohanty | #blueteam#code-review#secure-coding+4 |
| 2015-03-27 | Talk | Blackhat |
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
| Preeti Subramanian | #threat-intelligence-analysis#blueteam#red-teaming+1 |
| 2015-03-26 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2015-03-26 | Tool demo | Blackhat |
SecPod Saner
| Preeti Subramanian | #blueteam#security-tools#automated-scanning+2 |
| 2015-03-15 | Talk | Hitbsecconf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | #network-pentesting#packet-analysis#network-monitoring+2 |
| 2015-02-06 | Talk | Nullcon |
Analyzing Chrome crash reports at scale
| Abhishek Arya | #fuzzing#bug-hunting#blueteam |
| 2015-02-06 | Talk | Nullcon |
Attack and Defence in Radio and Communication Warfare
| Akib Sayyed | #red-teaming#blueteam#purpleteam+2 |
| 2015-02-06 | Panel | Nullcon |
Defender’s Diary: Who’s attacking? What are my options?
| Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla | #blueteam#threat-hunting#cybersecurity-strategy |
| 2015-02-06 | Talk | Nullcon |
Generic Executable Unpacking using Dynamic Binary Instrumentation
| Shubham Bansal | #blueteam#dynamic-binary-instrumentation#executable-analysis+1 |
| 2015-02-06 | Talk | Nullcon |
Hunting and Decrypting Ghost communications using Memory Forensics
| Monnappa K A | #forensics#blueteam#memory-forensics+2 |
| 2015-02-06 | Talk | Nullcon |
Anatomy of a credit card stealing POS malware
| Amol Sarwate | #red-teaming#application-pentesting#data-protection+1 |
| 2014-11-13 | Talk | Groundzerosummit |
APT protection for the Enterprise
| Deepak Singla | #blueteam#apt#security-strategy |
| 2014-11-13 | Talk | Groundzerosummit |
Making and Breaking Embedded Security
| Yashin Mehaboobe | #red-teaming#blueteam#purpleteam |
| 2014-10-23 | Talk | T2 |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #android#endpoint-protection#android-security+2 |
| 2014-10-16 | Talk | Grrcon |
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#reverse-engineering#blueteam+1 |
| 2014-09-16 | Talk | Deepsec |
Advanced Powershell Threat – Lethal Client Side Attacks
| Nikhil Mittal | #powershell#red-teaming#endpoint-protection+4 |
| 2014-09-11 | Talk | 44con |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #imsi#endpoint-protection#security-tools |
| 2014-08-22 | Talk | C0c0n |
Making and breaking security in embedded devices
| Yashin Mehaboobe | #purpleteam#red-teaming#blueteam |
| 2014-08-22 | Talk | C0c0n |
Piracy Tracker
| Vargheese Babu | #blueteam#network-monitoring#security-analytics+3 |
| 2014-08-22 | Talk | C0c0n |
Idle Machines doing Bounty Hunting (Behind your Back)
| Mrityunjay Gautam | #bug-hunting#red-teaming#automated-scanning+3 |
| 2014-08-22 | Talk | C0c0n |
Breaking and Securing Mobile Apps - Automagically
| Aditya Gupta | #purpleteam#mobile-application-management#mobile-hacking+4 |
| 2014-08-07 | Talk | Blackhat |
Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies
| Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun | #reconnaissance#social-engineering#blueteam |
| 2014-08-06 | Talk | Blackhat |
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels!
| Aditya K Sood | #botnet#red-teaming#blueteam+1 |
| 2014-08-06 | Tool demo | Blackhat |
Flowinspect: Yet another network inspection tool
| Ankur Tyagi | #security-assessment#network-monitoring#ids+2 |
| 2014-02-15 | Tool demo | Nullcon |
OWASP Xenotix XSS Exploit Framerwork
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2014-02-14 | Talk | Nullcon |
2014 The year in which we cannot ignore SCADA
| Amol Sarwate | #scada#blueteam#ics-security+4 |
| 2014-02-14 | Talk | Nullcon |
Attack of the setuid bit - pt_chown and pwning root terminals
| Siddhesh Poyarekar | #glibc#red-teaming#blueteam+2 |
| 2014-02-14 | Talk | Nullcon |
Chrome - OS Security 2014: New and future hotness
| Sumit Gwalani | #blueteam#application-hardening#application-pentesting+4 |
| 2014-02-14 | Talk | Nullcon |
In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective}
| Rushikesh D Nandedkar, Amrita C Iyer | #wifi#evil-twin-attack#phishing+1 |
| 2014-02-14 | Talk | Nullcon |
Multi-value W-Fi What the Heck is it
| Abhijeet Ghosh | #wifi#blueteam#network-defense+1 |
| 2014-02-14 | Talk | Nullcon |
phoneypdf: A Virtual PDF Analysis Framework
| Kiran Bandla | #pdf#web-security#red-teaming+2 |
| 2014-02-14 | Talk | Nullcon |
The Security Challenge
| Shantanu Ghosh | #blueteam |
| 2014-02-14 | Talk | Nullcon |
Hacking YOu’r Cable TV Network.
| Rahul Sasi, Ahamed Nafeez | #red-teaming#network-pentesting#endpoint-protection+1 |
| 2014-02-14 | Talk | Nullcon |
Flowinspect - A Network Inspection Tool
| Ankur Tyagi | #security-assessment#malware-detection#network-monitoring+2 |
| 2013-11-07 | Talk | Groundzerosummit |
Advanced security for advanced threats
| Kartik Shahani | #blueteam#security-strategy#threat-modeling+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Malware for Firefox Mobile OS
| Shantanu Gawde | #mobile-malware#malware-detection#malware-research+2 |
| 2013-10-19 | Talk | Toorcon |
Static Malware Analysis with PyTriage
| Yashin Mehaboobe | #malware-detection#static-analysis#malware-research+1 |
| 2013-10-17 | Talk | Hitbsecconf |
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis
| Rahul Sasi | #blueteam#static-analysis#automated-exploit-detection |
| 2013-09-27 | Talk | C0c0n |
The Art and Science of Anamoly based Vulnerability Detection
| Lavakumar Kuppan | #blueteam#security-analytics#automated-scanning+2 |
| 2013-09-12 | Talk | Grrcon |
The Droid Exploitation Saga – All Over Again!
| Aditya Gupta, Subho Halder | #android#red-teaming#android-security+4 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe, Adrienne Felt | #web-security#security-training#architecture+2 |
| 2013-08-01 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2013-08-01 | Tool demo | Blackhat |
Sparty
| Aditya K Sood | #secure-coding#audit#blueteam |
| 2013-07-31 | Talk | Blackhat |
Clickjacking revisited: A perceptual view of UI security
| Devdatta Akhawe | #clickjacking#blueteam#red-teaming |
| 2013-07-31 | Talk | Blackhat |
Javascript static security analysis made easy with JSPrime
| Nishant Das Patnaik, Sarathi Sabyasachi Sahoo | #web-security#blueteam#application-hardening+4 |
| 2013-07-31 | Tool demo | Blackhat |
JMSDigger
| Gursev Singh Kalra | #security-assessment#red-teaming#blueteam+1 |
| 2013-03-15 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2013-03-15 | Talk | Blackhat |
The Sandbox Roulette- Are you ready for the gamble?
| Rahul Kashyap, Rafal Wojtczuk | #blueteam#application-pentesting#dynamic-analysis+3 |
| 2013-03-01 | Talk | Nullcon |
Automating JavaScript Static Analysis
| Lavakumar Kuppan | #web-security#security-assessment#blueteam |
| 2013-03-01 | Talk | Nullcon |
BYOD: How will it shape your wireless network security in future?
| Kiran Deshpande | #wifi#dos#mac-spoofing+2 |
| 2013-03-01 | Talk | Nullcon |
CSRF Finder as a Mozilla Addon
| Piyush Pattanayak | #csrf#blueteam#application-pentesting+4 |
| 2013-03-01 | Talk | Nullcon |
Mobile Code mining for discovery and exploits
| Hemil Shah | #code-analysis#secure-development#blueteam+4 |
| 2013-03-01 | Talk | Nullcon |
Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks
| Naga Rohit Samineni | #ipv4#mitm#blueteam+2 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2013-03-01 | Talk | Nullcon |
Vulnerability research anyone?
| Omair | #red-teaming#blueteam#purpleteam |
| 2013-03-01 | Talk | Nullcon |
SMS to Meterpreter - Fuzzing USB Modems
| Rahul Sasi | #red-teaming#fuzzing#network-pentesting+2 |
| 2013-03-01 | Talk | Nullcon |
Capturing Zero-Day Information
| Dinesh O Bareja, Sumit Sharma | #zero-day#red-teaming#honeypot |
| 2012-12-01 | Talk | Clubhack |
Hacking and Securing iOS applications
| Satish Bommisetty | #red-teaming#blueteam#purpleteam+1 |
| 2012-12-01 | Talk | Clubhack |
Infrastructure Security
| Sivamurthy Hiremath | #blueteam#security-strategy#threat-modeling+1 |
| 2012-12-01 | Talk | Clubhack |
Smart Grid Security
| Falgun Rathod | #blueteam#critical-infrastructure#cyber-physical-systems+2 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-09-26 | Talk | Nullcon |
Forensics Timeline Analysis
| Aashish Kunte | #forensics#blueteam#digital-forensics+3 |
| 2012-09-20 | Talk | Ekoparty |
Dirty use of USSD Codes in Cellular Network
| Ravishankar Borgaonkar | #red-teaming#android-security#endpoint-protection+1 |
| 2012-08-03 | Talk | C0c0n |
Building Security Incident Detection & Handling Capabilities in Enterprises
| Sunil Varkey | #blueteam#incident-detection#security-strategy+4 |
| 2012-08-03 | Talk | C0c0n |
Enterprise server security
| Raghav Shandilya | #blueteam#security-tools#network-monitoring+2 |
| 2012-08-03 | Talk | C0c0n |
Security Incidents – Avoiding the Apocalypse in 2012
| Ashish Chandra Mishra | #blueteam#phishing#social-engineering+1 |
| 2012-08-03 | Talk | C0c0n |
Contemporary Transcription and Resource Parasitism
| Arpit Patel | #exploitation#firewall#network-monitoring+1 |
| 2012-07-28 | Talk | Defcon |
Botnets Die Hard - Owned and Operated
| Aditya K Sood, Richard J Enbody | #botnet#blueteam#malware-detection+2 |
| 2012-03-15 | Talk | C0c0n |
Integrated Dial 100 System for Law Enforcement
| Nandkumar Saravade, R Srikumar | #security-governance#compliance-governance#security-operations-center |
| 2012-02-15 | Talk | Nullcon |
Application security cost management
| Ketan Vyas | #blueteam#application-pentesting#secure-development+2 |
| 2012-02-15 | Talk | Nullcon |
Best practices to improve the security grading of your project
| Hemant Khandelwal | #blueteam#threat-modeling#secure-development |
| 2012-02-15 | Talk | Nullcon |
Content sniffing Algorithm bypassing techniques and possible attack vectors
| Anil Aphale, Chaitany Kamble | #red-teaming#xss#web-security+2 |
| 2012-02-15 | Talk | Nullcon |
Friction in the machine
| Dinesh Shenoy | #red-teaming#blueteam#purpleteam |
| 2012-02-15 | Talk | Nullcon |
Javascript static analysis with IronWASP
| Lavakumar Kuppan | #web-security#security-assessment#blueteam |
| 2012-02-15 | Talk | Nullcon |
Node.js: The good, bad and ugly
| Bishan Singh | #web-security#red-teaming#blueteam+1 |
| 2012-02-15 | Talk | Nullcon |
Ra.2 Blackbox DOM-based XSS scanner
| Nishant Das Patnaik, Sarathi Sabyasachi Sahoo | #xss#blueteam#security-assessment |
| 2012-02-15 | Talk | Nullcon |
Sandboxing The deep truth
| Disha Agarwal, Manish Pali | #fuzzing#sandbox#blueteam |
| 2011-12-15 | Talk | Blackhat |
Kautilya: Teensy Beyond Shell
| Nikhil Mittal | #hid#red-teaming#endpoint-protection+3 |
| 2011-12-04 | Talk | Clubhack |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2011-12-04 | Talk | Clubhack |
Android Forensics
| Manish Chasta | #android#forensics#android-security+4 |
| 2011-11-25 | Talk | Malcon |
Exploit the Exploit kits
| Dhruv Soi | #blueteam#exploit-kit#malware-detection+3 |
| 2011-10-08 | Talk | C0c0n |
Stratagemizing Security Against Perpetrators In Cloud Infrastructure
| K S Abhiraj | #blueteam#cloud-security-posture-management#cloud-pentesting+4 |
| 2011-10-07 | Talk | C0c0n |
Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network
| Bala Kumar S, Mohamed Emraanullah | #blueteam#intrusion-detection#ids+3 |
| 2011-10-07 | Talk | C0c0n |
Security Threats in Custom ROM’s (Android)
| Anant Shrivastava | #android#android-security#application-pentesting+3 |
| 2011-10-07 | Talk | C0c0n |
Web Application Backdoor Attack,Evasion and Detection
| Rahul Sasi | #purpleteam#application-pentesting#backdoor-detection+4 |
| 2011-09-19 | Talk | Brucon |
Wifi malware for fun and profit
| Vivek Ramachandran | #wifi#red-teaming#endpoint-protection+3 |
| 2011-09-07 | Talk | Securitybyte |
Data Protection
| Dipankar Roy | #blueteam#data-loss-prevention#data-protection+1 |
| 2011-09-07 | Talk | Securitybyte |
Web Application Defender
| K v Prashant, Mohammed Imran | #blueteam#application-pentesting#secure-development+4 |
| 2011-09-07 | Talk | Securitybyte |
Mobile Devices – Boon or Curse?
| Kishor Sonawane, Oliver Ng | #mobile-device-management#mobile-application-management#application-hardening+4 |
| 2011-09-06 | Talk | Securitybyte |
Private Internet Circuits - Towards A Next Generation Internet
| Sanjay Deshpande | #network-architecture#encryption#network-defense |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | #incident-management#data-analytics#security-analytics+3 |
| 2011-08-07 | Talk | Defcon |
VDLDS — All Your Voice Are Belong To Us
| Ganesh Devarajan, Don Le Bert | #blueteam#data-leak#cyber-crime |
| 2011-08-03 | Talk | Blackhat |
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
| Jatin Kataria, Ang Cui, Salvatore Stolfo | #cisco-ios#hardware-embedded#firmware-analysis+4 |
| 2011-05-19 | Talk | Hitbsecconf |
Spying on SpyEye – What Lies Beneath?
| Aditya K Sood | #blueteam#botnet#endpoint-protection+4 |
| 2011-02-25 | Talk | Nullcon |
(secure) SiteHoster – Disable XSS & SQL Injection
| Abhishek Kumar | #xss#sqli#blueteam+1 |
| 2011-02-25 | Talk | Nullcon |
Enterprise Paradigm for Controlling Data Leakage
| Deepak Rout | #data-leak#blueteam#data-loss-prevention+3 |
| 2011-02-25 | Talk | Nullcon |
Future of cyber crimes: Limitations and Challenges
| Pratap Reddy | #blueteam#red-teaming#purpleteam+1 |
| 2011-02-25 | Talk | Nullcon |
Protect infrastructure or protect information – Lessons from Wikileaks
| Vishal Gupta | #data-leak#blueteam#data-protection+2 |
| 2011-02-25 | Talk | Nullcon |
Chupa Rustam
| Abhijeet Hatekar | #surveillance#red-teaming#application-pentesting+2 |
| 2011-02-15 | Talk | Nullcon |
Botnet Detection approach by DNS behavior and clustering analysis
| Nilesh Sharma, Pulkit Mehndiratta | #botnet#dns#blueteam |
| 2010-12-04 | Talk | Clubhack |
Mantra – Free and Open Source security framework based on browser platform
| Abhi M Balakrishnan | #blueteam#endpoint-protection#application-pentesting+3 |
| 2010-12-04 | Talk | Clubhack |
Windows Memory Forensic Analysis
| Aashish Kunte | #windows#forensics#memory-forensics+3 |
| 2010-10-14 | Talk | Hitbsecconf |
Exploit Delivery
| Saumil Shah | #red-teaming#exploit#exploit-delivery+2 |
| 2010-10-13 | Talk | Hitbsecconf |
Hacking a Browser’s DOM – Exploiting Ajax and RIA
| Shreeraj Shah | #red-teaming#web-security#ajax+3 |
| 2010-08-01 | Talk | C0c0n |
End-point Security
| Laxi Eshwari | #blueteam#endpoint-protection#endpoint-hardening+3 |
| 2010-08-01 | Talk | C0c0n |
Last line of defense - Host Intrusion Prevention and Secure application development.
| Avinash Shenoi | #blueteam#application-hardening#secure-coding+3 |
| 2010-08-01 | Talk | C0c0n |
VoIP Security
| Mukund Krishnamurthy | #purpleteam#voip#sip+4 |
| 2010-08-01 | Talk | C0c0n |
Dangers and dynamic Malware analysis
| Chandrasekar | #forensics#dynamic-analysis#malware-detection+4 |
| 2010-07-31 | Talk | Defcon |
WPA Too!
| Md Sohail Ahmad | #wifi#red-teaming#blueteam+1 |
| 2010-02-25 | Talk | Nullcon |
Botnet mitigation, monitoring and management.
| Harshad Patil | #botnet#blueteam#malware-detection+4 |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | #blueteam#malware-detection#application-pentesting+3 |
| 2009-12-05 | Talk | Clubhack |
Open source for securing data with advanced Crypto-Steganography technology
| Suhas Desai | #encryption#steganography#blueteam |
| 2009-11-18 | Talk | Securitybyte |
Introduction to Web Protection Library
| Anil Chintala | #blueteam#application-pentesting#secure-development+4 |
| 2009-11-17 | Talk | Securitybyte |
Threat Modeling
| Varun Sharma | #threat-modeling#blueteam#security-strategy+4 |
| 2009-08-06 | Talk | C0c0n |
Know Your Enemy, and Yourself: Demystifying Threat Modelin
| Meera Subbarao | #blueteam#security-strategy#threat-modeling+4 |
| 2009-08-06 | Talk | C0c0n |
Management & Security of Large Scale Storage Devices
| Prashant Dinde | #blueteam#data-protection#security-strategy+2 |
| 2009-08-06 | Talk | C0c0n |
Microsoft Security Strategies
| Binoy VC | #blueteam#security-strategy#azure+4 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |
| 2009-08-02 | Talk | Defcon |
Wi-Fish Finder: Who Will Bite the Bait
| Md Sohail Ahmad, Prabhash Dhyani | #wifi#honeypot#phishing+1 |
| 2009-05-19 | Talk | Syscan |
Securing Applications at Gateway with Web Application Firewalls
| Shreeraj Shah | #blueteam#footprinting#firewall+1 |
| 2009-04-22 | Talk | Hitbsecconf |
Application Defense Tactics & Strategies - WAF at the Gateway
| Shreeraj Shah | #blueteam#footprinting#firewall+1 |
| 2009-03-16 | Talk | Cansecwest |
On Approaches and Tools for Automated Vulnerability Analysis
| Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert | #security-assessment#blueteam#automated-scanning+4 |
| 2009-02-19 | Talk | Blackhat |
Blinded by Flash: Widespread Security Risks Flash Developers Don’t See
| Prajakta Jagdale | #flash#blueteam#application-pentesting+2 |
| 2008-12-06 | Talk | Clubhack |
AntiSpam - Understanding the good, the bad and the ugly
| Aseem Jakhar | #blueteam#phishing#anti-phishing+1 |
| 2008-12-06 | Talk | Clubhack |
Immune IT: Moving from Security to Immunity
| Ajit Hatti | #blueteam#security-strategy#security-monitoring+4 |
| 2008-12-06 | Talk | Clubhack |
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching
| Karmendra Kohli | #secure-development#secure-coding#blueteam+1 |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | #secure-coding#reverse-engineering#red-teaming+2 |
| 2008-08-21 | Talk | Owaspappsecindia |
AppSec For Managers
| Nish Bhalla | #appsec#owasp#blueteam |
| 2008-08-20 | Talk | Owaspappsecindia |
Web 2.0 Attacks - Next Generation Threats on the Rise
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+3 |
| 2008-08-20 | Talk | Owaspappsecindia |
Web Application Security: Too Costly To Ignore
| Rajesh Nayak | #appsec#blueteam#application-hardening+4 |
| 2008-08-06 | Talk | Blackhat |
Bad Sushi: Beating Phishers at Their Own Game
| Nitesh Dhanjani | #phishing#blueteam#network-forensics+2 |
| 2008-03-28 | Talk | Blackhat |
Spam-Evolution
| Aseem Jakhar | #social-engineering#malware-detection#anti-phishing |
| 2008-02-20 | Talk | Blackhat |
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+3 |
| 2007-12-09 | Talk | Clubhack |
Subtle Security flaws: Why you must follow the basic principles of software security
| Varun Sharma | #blueteam#software-security#secure-coding+4 |
| 2007-12-09 | Talk | Clubhack |
Legiment Techniques of IPS/IDS Evasion
| Ajit Hatti | #red-teaming#network-monitoring#ids+2 |
| 2007-11-20 | Talk | Deepsec |
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
| Shreeraj Shah | #ajax#web-security#blueteam |
| 2007-08-01 | Talk | Blackhat |
PISA: Protocol Identification via Statistical Analysis
| Rohit Dhamankar, Rob King | #blueteam#network-defense#intrusion-detection |
| 2007-04-18 | Talk | Cansecwest |
Low-Rate Denial-of-Service attacks
| Anil Kumar | #red-teaming#dos#network-defense+2 |
| 2007-04-05 | Talk | Hitbsecconf |
WEB 2.0 Hacking – Defending Ajax and Web Services
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+2 |
| 2007-04-04 | Talk | Hitbsecconf |
Vboot Kit: Compromising Windows Vista Security
| Vipin Kumar, Nitin Kumar | #windows#boot-sector#endpoint-protection+1 |
| 2007-03-30 | Talk | Blackhat |
Web Service Vulnerabilities
| Nish Bhalla | #blueteam#purpleteam#application-pentesting+4 |
| 2006-01-26 | Talk | Blackhat |
Analysis of Adversarial Code: Problem, Challenges, Results
| Arun Lakhotia | #secure-coding#blueteam#static-analysis+1 |
| 2005-10-18 | Talk | Blackhat |
Adware/Spyware
| Saumil Shah, Dave Cole | #blueteam#adware#spyware |
| 2005-09-29 | Talk | Hitbsecconf |
Analyzing Code for Security Defects
| Nish Bhalla | #code-analysis#blueteam#secure-coding |
| 2005-09-26 | Talk | Hitbsecconf |
Web hacking Kung-Fu and Art of Defense
| Shreeraj Shah | #blueteam#application-pentesting#code-review+4 |
| 2005-04-12 | Talk | Hitbsecconf |
Web Application Kung-Fu, The Art of Defense
| Shreeraj Shah | #blueteam#application-hardening#secure-coding+4 |
| 2005-04-10 | Talk | Hitbsecconf |
Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection
| Pukhraj Singh | #red-teaming#blueteam#purpleteam+1 |
| 2004-10-06 | Talk | Hitbsecconf |
Web Services - Attacks and Defense Strategies, Methods and Tools
| Shreeraj Shah | #red-teaming#blueteam#purpleteam |
| 2004-07-29 | Talk | Blackhat |
Evasion and Detection of Web Application Attacks
| K K Mookhey | #blueteam#intrusion-detection#application-pentesting+3 |
| 2004-05-19 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#automated-scanning+2 |
| 2004-01-29 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+3 |
| 2003-12-16 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#network-defense+3 |
| 2003-12-12 | Talk | Hitbsecconf |
Defending Web Applications: Strategies, methods and practices
| Shreeraj Shah | #blueteam#secure-coding#firewall+1 |
| 2003-10-01 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+2 |
| 2003-07-31 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+2 |
| 2003-02-26 | Talk | Blackhat |
HTTP: Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+4 |
| 2002-10-03 | Talk | Blackhat |
Top Ten Web Attacks
| Saumil Shah | #red-teaming#blueteam#purpleteam |
| 2001-07-13 | Talk | Defcon |
Security & Privacy are Critically Important Issues in Todays Digitally Connected Age
| Sharad Popli | #security-assessment#data-protection#blueteam |