🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🛡️ Security Operations & Defense

Blue team operations, SOC, SIEM, detection engineering, and defensive security

362
Contributors
331
Talks
115
Tool Demos
12
Panels
2
Keynotes

Top Contributors

Saumil Shah(16) Ankur Tyagi(12) Shreeraj Shah(11) Jayesh Chauhan(10) Vivek Ramachandran(10)

Related Tags (22)

Show all 22 tags...

All Entries (460 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#risk-management#edr
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishra#web-security#malware-detection#browser-security+2
2025-06-02TalkConfidence Local LLMs in Action: Automating CTI to Connect the Dots Video Kai Iyer#threat-intelligence-analysis#machine-learning#threat-detection+1
2025-04-15TalkStackx Cybersecurity AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates Video Pawan Kinger#ai-security#threat-detection#security-operations-center
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-04-04Tool demoBlackhat SHIVA Spampot: Actionable Spam and Phishing Intelligence Source Code Rahul Binjve, Viren Kapadia#honeypot#network-monitoring#incident-management+1
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-03-14TalkInsomnihack The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) Dhiraj Mishra#endpoint-protection#security-testing#malware-distribution
2025-03-02TalkNullcon Securing the chains: Building defensive layers for software supply chains Video Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#blueteam#container-security#sbom+3
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2025-03-02PanelNullcon Cyber Fusion Center: The Command Center for Integrated Cyber Defense Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur#security-monitoring#network-defense#threat-modeling+3
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallam#network-architecture#network-hardening#network-monitoring+2
2025-03-01TalkNullcon MacOS Lockdown Mode: A Forensic Deep Dive Video Bhargav Rathod#macos#digital-forensics#endpoint-protection+3
2025-03-01PanelNullcon AI in SecOps: Enhancing Incident Response with Intelligence Mrudul Uchil, Parag Deodhar, Felix Mohan#ai-security#ai#machine-learning+3
2024-12-11TalkBlackhat The CVSS Deception: How We’ve Been Misled on Vulnerability Severity Presentation Ankur Sand#blueteam#security-strategy#threat-modeling+1
2024-11-16TalkC0c0n Who is holding the Marauders map? Maya R Nair#network-pentesting#network-monitoring#network-traffic-analysis+1
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B R#threat-hunting#cybersecurity-strategy#cyber-war+2
2024-11-15TalkC0c0n Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques Adrip Mukherjee, Vinay Kumar#machine-learning#endpoint-protection#edr+1
2024-11-15TalkC0c0n Know your Enemies: Deep Dive into Ransomware Threat Groups Video Niranjan Jayanand#ransomware#endpoint-protection#dynamic-analysis
2024-11-06TalkBlackalps IDAT Loader: The Malware’s Camouflaged Weapon Niranjan Jayanand#endpoint-protection#dynamic-analysis#security-testing
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#endpoint-protection+2
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjit, Mangatas Tondang#blueteam#oauth#application-pentesting+4
2024-08-29Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#ids#incident-management#network-monitoring+1
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-05-27TalkConfidence Beyond the Kernel: eBPF’s Trailblazing Role in Reinventing Cloud Security Dynamics Video Rohit Sehgal#cloud-monitoring#ebpf#linux+4
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Video Shobhit Mehta, Puneet Thapliyal#data-protection#security-operations-center#security-compliance+1
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#security-analytics+3
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeran#blueteam#application-hardening#secure-coding+2
2024-04-18Tool demoBlackhat Catching adversaries on Azure - Deception on Cloud Source Code Subhash Popuri#azure#cloud-workload-protection#cloud-pentesting+4
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussain#asset-inventory#architecture#devsecops+1
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben#vulnerability-assessment#honeypot#security-testing+2
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#container-security#docker#threat-hunting+1
2023-09-24PanelNullcon INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock#threat-hunting#ai-security#blueteam
2023-09-24PanelNullcon ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT Shomiron Das Gupta, Yogi Kapur, Manish Tiwari#incident-management#incident-detection#forensics+3
2023-09-23TalkNullcon Secure Your Angular App Using JWT And GraphQL Presentation Ankit Sharma#blueteam#api-security#secure-development+1
2023-09-23TalkNullcon The Curious Case Of The Rogue SOAR Presentation Video Mukesh Sai Kumar, Jaden Furtado#blueteam#application-pentesting#dynamic-analysis+3
2023-09-23TalkNullcon The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis Presentation Video Nikhil Ashok Hegde#malware-detection#linux#dynamic-analysis+2
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Walia#soc#ics-security#threat-detection+1
2023-08-12PanelDefcon Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert Trupti Shiralkar, Kiran Shirali#appsec#alert-fatigue#vulnerability-assessment
2023-08-11TalkDefcon Getting a Migraine - uncovering a unique SIP bypass on macOS Presentation Video Anurag Bohra, Jonathan Bar Or, Michael Pearse#macos#endpoint-protection#bypassing+2
2023-08-10Tool demoBlackhat MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments Source Code Aditya K Sood#ransomware#malware-detection#security-tools
2023-08-09Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. Source Code Sagar Bhure#kernel#machine-learning#forensics+4
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K M#incident-management#threat-hunting#security-monitoring+1
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanand#apt#incident-management#threat-hunting
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubey#threat-hunting#digital-forensics#incident-management+1
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregange#ics-security#operational-technology#threat-hunting+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singh#security-training#risk-management#threat-hunting
2023-08-06TalkC0c0n Cybersecurity in the Era of AI Video Suvin Mullaseril#ai#ai-security#deep-learning+4
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Ritesh#threat-landscape#threat-modeling#threat-hunting+2
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhande#threat-hunting#digital-forensics#network-forensics+3
2023-06-05TalkConfidence Evading modern day security defenses in corporate environments Himanshu Sharma, Rahul Vashista#red-teaming#evasion#bypassing+4
2023-06-01TalkSecurityfest Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#reverse-engineering#appsec#endpoint-protection+4
2023-05-12Tool demoBlackhat eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF Source Code Sagar Bhure#dns#machine-learning#network-monitoring+2
2023-05-11TalkBlackhat Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#hacking#bypassing#mobile-hacking+1
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansari#threat-hunting#windows#security-tools
2023-05-10TalkAuscert Decentralised, multi-stakeholder and non-linear cyber incident response with the Incident Command System Presentation Video Pukhraj Singh#incident-management#soc#threat-intelligence-analysis
2023-05-10TalkAuscert Staying ahead of evolving threats from the get-go with proactive intelligence Video Tara Dharnikota#threat-intelligence-analysis#threat-hunting#threat-detection
2023-04-20TalkHitbsecconf BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES Presentation Video Rohan Aggarwal#hacking#hardware-hacking#bypassing+3
2022-12-07Tool demoBlackhat h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. Source Code Subhash Popuri#honeypot#ids#ips+3
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittal#red-teaming#active-directory#threat-detection
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohli#ids#network-monitoring#threat-detection+2
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappan#ids#network-monitoring#network-pentesting+3
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K M#soc#security-monitoring#security-analytics+2
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singh#threat-hunting#intelligence-sharing#security-training
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoor#social-engineering#security-training#threat-hunting+1
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagatti#devsecops#architecture#threat-detection+2
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan M#api-security#threat-landscape#threat-hunting+1
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyan#threat-hunting#incident-management#cyber-crime+4
2022-09-08TalkNullcon Handling A Bug Bounty program From A Blue Team Perspective Presentation Video Ashwath Kumar, Ankit Anurag#blueteam#cloud-monitoring#cloud-pentesting+4
2022-09-08TalkNullcon Automate Your Whatsapp Chats Presentation Video Aditi Bhatnagar#android#application-pentesting#ai-security+2
2022-09-08TalkNullcon The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple Video Amit Malik, Pratik Jeware#macos#malware-detection#endpoint-protection
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-09-06PanelNullcon Does your SOC sucks? Video Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur#security-training#incident-management#alert-fatigue+3
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Koranne, John Dwyer, Neil Wyler#threat-hunting#security-strategy#threat-modeling
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohli#threat-detection#threat-hunting#malware-detection+2
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnani#threat-detection#security-monitoring#architecture
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyani#threat-hunting#threat-detection#threat-modeling+2
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharma, Kurt Baumgartner#ics-security#critical-infrastructure#threat-hunting+1
2021-11-12PanelC0c0n Stopping Breaches with CrowdStrike Sandeep Rao#endpoint-protection#incident-management#security-monitoring+2
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#cloud-access-security-broker#cloud-compliance+4
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis#blueteam#honeypot#network-defense+1
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiya#aws#security-monitoring#iam+1
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singha#security-assessment#post-exploitation#privilege-escalation+2
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgal#threat-hunting#threat-modeling#architecture+1
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest#security-testing#incident-management#red-teaming+3
2021-08-05TalkBlackhat PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors Presentation Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen#hardware-embedded#endpoint-protection#incident-management+1
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkar, Mauricio Espinosa#network-defense#application-pentesting#attack-surface+1
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dash#kubernetes#audit#secure-coding+1
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithane#windows#process-injection#blueteam+1
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiah#blueteam#red-teaming#purpleteam
2021-03-06TalkNullcon Bug hunter adventures Video Shreyas Dighe, Yuvraj Dighe#bug-hunting#application-pentesting#bug-bounty+3
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwari#blueteam#security-assessment#ci-cd
2020-12-09Tool demoBlackhat HosTaGe: mobile honeypots for rapid deployment Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou#honeypot#blueteam#endpoint-protection+2
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Sood#blueteam#security-assessment#threat-intelligence-analysis
2020-11-21TalkAppsecindonesia Threat Defense: Defending the ATT&CK with TTP’s Avkash Kathiriya#blueteam#threat-hunting#security-analytics
2020-11-20TalkDeepsec What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Presentation Shyam Sundar Ramaswami#malware-detection#sandbox#static-analysis+1
2020-10-07TalkRootcon Blockchain Based OT Monitoring Solution (BBOTMS) Presentation Video Asif Hameed Khan, Gagan Jattana#ics#blueteam#decentralized-systems+4
2020-10-07TalkRootcon Automating Threat Hunting on the Dark Web and other nitty-gritty thingso Presentation Video Apurv Singh Gautam#deep-web#red-teaming#threat-hunting+1
2020-10-02Tool demoBlackhat MalViz.ai Source Code Vasu Sethia, Shivam Kataria#blueteam#machine-learning#deep-learning+3
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Raval#phishing#blueteam#social-engineering+3
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan#security-assessment#vulnerability-assessment#network-pentesting+3
2020-10-01Tool demoBlackhat Wi-Fi Access Point Rootkits Nishant Sharma, Jeswin Mathai#wifi#blueteam#iot-pentesting+1
2020-09-18TalkC0c0n Deep Learning for Intrusion Attempt Detection Varun Kohli#deep-learning#machine-learning#blueteam
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-08-22TalkThedianainitiative Hacking into Android Ecosystem Video Aditi Bhatnagar#android#android-security#application-pentesting+3
2020-08-22TalkThedianainitiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautam#threat-hunting#nlp#machine-learning+1
2020-08-05TalkBlackhat Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic Presentation Video Harini Kannan, Nick Gregory#machine-learning#exploit-detection#blueteam
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Rana#risk-analysis#blueteam#security-strategy+4
2020-07-05Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abraham#blueteam#ios#android+1
2020-04-25TalkHitbsecconf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#vulnerability-assessment#security-assessment#blueteam
2020-04-24TalkHitbsecconf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#scada#blueteam#security-assessment
2020-03-06Tool demoNullcon F.R.I.D.A.Y Source Code Shyam Sundar Ramaswami#blueteam#dynamic-analysis#sandbox+2
2020-03-06Tool demoNullcon Hachi Source Code Parmanand Mishra#att&ck#blueteam#rest-api+1
2020-03-06TalkNullcon InfoSec Deep Learning in Action Presentation Video Satnam Singh#ml#deep-learning#blueteam
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Raval#phishing#blueteam#security-training+2
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shah#incident-management#linux#macos+2
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahan#linux#secure-coding#web-security+3
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Dutta#intrusion-detection#machine-learning#application-pentesting+3
2019-12-04Tool demoBlackhat RTTM: Real Time Threat Monitoring Tool Source Code Naveen Rudrappa, Murali Krishna Segu#blueteam#network-monitoring#security-analytics+2
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2019-12-04Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit Source Code Jayesh Chauhan#aws#gcp#blueteam
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Arya, Oliver Chang#fuzzing#red-teaming#blueteam+1
2019-11-01TalkAppsecdayaustralia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#red-teaming#blueteam#purpleteam+1
2019-11-01TalkAppsecdayaustralia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-10-14TalkHitbsecconf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishra#blueteam#red-teaming#purpleteam
2019-10-14TalkHitbsecconf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehta#wifi#red-teaming#blueteam+1
2019-10-12TalkTexascybersummit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+3
2019-10-10TalkBrucon Security transition from 4G to 5G: are we secure enough? Presentation Video Altaf Shaik, Ravishankar Borgaonkar#5g#4g#network-architecture+3
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-09-27TalkC0c0n Block Chain for Secured Automation Sanat Bhat#blueteam#smart-contracts#decentralised-security+1
2019-09-27TalkC0c0n Building a cloud security monitoring and auditing framework Nirali Shah, Prasoon Dwivedi#blueteam#cloud-monitoring#cloud-pentesting+4
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singh#blueteam#data-protection#identity-theft+4
2019-09-27TalkC0c0n Doing SecOps for the Cloud using Cloud Native Services Akash Mahajan#blueteam#cloud-workload-protection#container-security+3
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2019-09-23TalkRootcon Hunting Threats with Wireshark Plugins Presentation Video Nishant Sharma, Jeswin Mathai, Shivam Bathla#blueteam#network-monitoring#security-analytics+2
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil Bogam#red-teaming#car-hacking#blueteam+1
2019-09-23TalkRootcon APAD: An EDR Grade Agent for Wi-Fi Access Points Presentation Video Vivek Ramachandran#wifi#edr#linux
2019-09-13Talk44con The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2019-09-13TalkGlobalappsec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#purpleteam#cloud-workload-protection#serverless+3
2019-09-13TalkGlobalappsec Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center Amol Sarwate#aws#siem#devsecops
2019-08-30TalkHitbsecconf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshi#secure-coding#red-teaming#blueteam+1
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-29TalkHitbsecconf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singh#red-teaming#blueteam#purpleteam
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+3
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-08Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhan#aws#gcp#blueteam
2019-08-08Tool demoBlackhat CSF: Container Security Framework Source Code Vaibhav Gupta#blueteam#container-security#docker+2
2019-08-08TalkBlackhat Death to the IOC: What’s Next in Threat Intelligence Presentation Video Bhavna Soman#threat-intelligence-analysis#machine-learning#blueteam
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-08Tool demoDefcon Hachi: An Intelligent threat mapper Source Code Parmanand Mishra#att&ck#blueteam#rest-api+1
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-08-08Tool demoDefcon PcapXray Source Code Srinivas Piskala Ganesh Babu#forensics#wireshark#blueteam
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashant, Ade Yoseman Putra#blueteam#application-pentesting#security-monitoring+1
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargava, Adam Podgorski#data-protection#security-assessment#tor+1
2019-08-07TalkBlackhat Defense Against Rapidly Morphing DDOS Presentation Video Mudit Tyagi, Mikhail Fedorov#ddos#blueteam#machine-learning
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwal#virtual-machine#blueteam#forensics+2
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hatti#incident-management#threat-hunting#ssl+1
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjve#blueteam#honeypot#network-defense+4
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappa#blueteam#application-pentesting#security-monitoring+4
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2019-03-28Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhan#aws#azure#gcp+1
2019-03-28TalkBlackhat Investigating Malware Using Memory Forensics - A Practical Approach Presentation Video Monnappa K A#forensics#blueteam#malware-detection+1
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargava#secure-coding#blueteam#application-pentesting+4
2019-03-28Tool demoBlackhat MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research Source Code Nilaksh Das, Evan Yang, Li Chen#machine-learning#blueteam#ai-security+4
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#wireshark#network-defense+4
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami#network-pentesting#vulnerability-assessment#firewall+3
2019-03-02PanelNullcon Actionable Intelligence and Cyber Security Video Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White#data-analytics#incident-management#security-analytics+4
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singh#red-teaming#blueteam#purpleteam
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharaman#blueteam#secure-development#input-validation+4
2018-12-06TalkBlackhat AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace Presentation Whitepaper Video Vijay Thaware, Niranjan Agnihotri#ai#blueteam#deepfake
2018-12-06Tool demoBlackhat Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit Source Code Jayesh Chauhan#aws#gcp#blueteam
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli#secure-coding#blueteam#application-hardening+4
2018-11-29TalkDeepsec DNS Exfiltration and Out-of-Band Attacks Video Nitesh Shilpkar#dns#red-teaming#malware-detection
2018-11-27TalkHitbsecconf COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding Presentation Video Vikash Yadav#deep-learning#blueteam#ai-security+3
2018-11-02TalkHitbsecconf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-19TalkAppsecdayaustralia Continuous Integration and Delivery with Docker Containers Video Vasant Kumar#docker#blueteam#container-security+4
2018-10-05TalkC0c0n Defending cloud Infrastructures with Cloud Security Suite Source Code Jayesh Chauhan, Shivankar Madaan#aws#gcp#azure+1
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basu#machine-learning#blueteam#ai-security+4
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wig#blueteam#data-analytics#data-protection+3
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharma#blueteam#data-protection#gdpr+4
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishra#reverse-engineering#dynamic-analysis#malware-research+1
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyar#threat-landscape#threat-hunting#risk-management
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagi#malware-detection#static-analysis#dynamic-analysis+3
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaan#aws#secure-coding#web-security+2
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagi#blueteam#machine-learning#dynamic-analysis+1
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur Tyagi#blueteam#security-assessment#forensics
2018-09-06TalkGrrcon Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI Presentation Video Pranshu Bajpai, Richard Enbody#encryption#ransomware#dynamic-analysis+1
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura#security-assessment#architecture#application-hardening+4
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyan#threat-detection#architecture#machine-learning+1
2018-08-12Tool demoDefcon Expl-iot—IoT Security Testing and Exploitation framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-11Tool demoDefcon Archery—Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-11Tool demoDefcon Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit Source Code Jayesh Chauhan#aws#gcp#blueteam
2018-08-11Tool demoDefcon DejaVU—An Open Source Deception Framework Source Code Harish Ramadoss, Bhadreshkumar Patel#blueteam#network-defense#honeypot+4
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+4
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-09TalkBlackhat Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina Presentation Source Code Video Bhargava Shastry, Vincent Ulitzsch, Dominik Maier#security-assessment#blueteam#linux+1
2018-08-09TalkDefcon 4G—Who is paying your cellular phone bill? Presentation Video Isha Singh, Dr Silke Holtmanns#4g#ipx#red-teaming+2
2018-08-09TalkBlackhat Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks Presentation Video Jugal Parikh, Randy Treit, Holly Stewart#blueteam#ai-security#machine-learning+4
2018-08-08Tool demoBlackhat ANWI (All New Wireless IDS): The $5 WIDS Source Code Rishikesh Bhide, Sanket Karpe#intrusion-detection#blueteam#wifi
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-08Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit Source Code Divya S John, Jayesh Chauhan, Shivankar Madaan#aws#azure#gcp+1
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeez#red-teaming#vpn#blueteam+1
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#network-defense#honeypot+4
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik#lte#4g#red-teaming+2
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan#virtual-machine#blueteam#forensics+2
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hatti#blueteam#secure-coding#smart-contracts+4
2018-08-08Tool demoBlackhat PA Toolkit: Wireshark Plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#network-architecture+2
2018-05-13TalkDefcon Androsia: Securing ‘Data in Process’ for your Android Apps Presentation Whitepaper Video Samit Anwer#android#blueteam#android-security+4
2018-03-23Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit Source Code Jayesh Chauhan, Shivankar Madaan#aws#gcp#blueteam
2018-03-22Tool demoBlackhat Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data Source Code Samit Anwer#android#blueteam#application-hardening+4
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#red-teaming#blueteam+1
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsetty#security-assessment#red-teaming#blueteam+4
2018-03-22Tool demoBlackhat Mobile Security Framework - MobSF Presentation Source Code Ajin Abraham#blueteam#ios#android+1
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharla#wearables#blueteam#red-teaming+1
2018-03-22TalkBlackhat XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Presentation Video Ravi Sahita, Daiping Liu, Mingwei Zhang#blueteam#application-hardening#code-review+4
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatia#blueteam#windows#azure+4
2018-03-03PanelNullcon Next generation cyber SOC Video K K Mookhey, Mathan Babu Kasilingam, Hidayath Khan, Shivkumar Pandey, Michael Smith#security-analytics#security-monitoring#cloud-workload-protection+4
2018-03-03PanelNullcon Managing Cyber Risk in the Connected Environment Video Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani#security-strategy#threat-modeling#network-monitoring+1
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singh#ai#blueteam#ai-security+3
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajan#phishing#blueteam#anti-phishing+1
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiry#android#fuzzing#red-teaming+3
2017-12-30Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS Security Audit Source Code Shivankar Madaan, Prajal Kulkarni, Jayesh Chauhan#aws#azure#gcp+1
2017-12-06Tool demoBlackhat ANWI (All New Wireless IDS) - The £5 WIDS Source Code Sanket Karpe#intrusion-detection#blueteam#wifi
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2017-11-20TalkHackfest How my SV Machine nailed your Malware Nikhil Prabhakar#android-security#machine-learning#malware-detection
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shukla#red-teaming#blueteam#purpleteam
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shukla#red-teaming#blueteam#purpleteam
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Gupta#botnet#blueteam#security-analytics+2
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjve#honeypot#blueteam#network-monitoring+3
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhan#aws#blueteam#cloud-monitoring+4
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankal#blueteam#cyber-crime#intelligence-sharing+3
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkar#ios#security-assessment#blueteam+1
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajguru#appsec#purpleteam#red-teaming+1
2017-08-18TalkC0c0n Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure Manas Pratim Sarma#blueteam#critical-infrastructure#cybersecurity-strategy+2
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Datta#red-teaming#blueteam#purpleteam
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michael#blueteam#iot-device-management#iot-pentesting+4
2017-08-18TalkC0c0n Yarafying Android Malware: A Missing Step Before Malware Analysis Shivang Desai#android#blueteam#android-security+3
2017-08-18TalkC0c0n Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! Presentation Abhinav Biswas#tor#network-monitoring#incident-detection+1
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawther#threat-hunting#threat-modeling#ioc+3
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hatti#secure-coding#reconnaissance#encryption+3
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddi#vulnerability-assessment#bug-bounty#network-pentesting+1
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert#red-teaming#spying#3g+3
2017-06-24TalkLehack How my SV Machine nailed your Malware Video Nikhil Prabhakar#android-security#machine-learning#malware-detection
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Joseph, Clarence Chio#machine-learning#red-teaming#blueteam+1
2017-04-13KeynoteHitbsecconf Redefining Defense Presentation Video Saumil Shah#blueteam#security-strategy#incident-management+2
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Gupta, Marco Balduzzi, Lion Gu#red-teaming#social-engineering#phishing+2
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Presentation Swamy Shivaganga Nagaraju#windows#blueteam#security-development-lifecycle+2
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyed#ss7#security-assessment#blueteam+2
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittal#blueteam#amsi#endpoint-protection+1
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-19TalkHacklu 2016: The Infosec Crossroads Presentation Saumil Shah#philosophy#security-strategy#incident-management+3
2016-10-05TalkVirusbulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#incident-management#endpoint-protection+3
2016-09-14Talk44con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekar#purpleteam#red-teaming#blueteam
2016-08-06Tool demoDefcon Visual Network and File Forensics using Rudra Source Code Video Ankur Tyagi#blueteam#reconnaissance#forensics
2016-08-04Tool demoBlackhat Maltese (Malware Traffic Emulating Software) Source Code Sasi Siddharth#dns#secure-coding#malware-detection+2
2016-08-04Tool demoBlackhat rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+1
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagi#blueteam#forensics#network-forensics+2
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda#security-assessment#threat-hunting#osint+1
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul Sasi#ai#blueteam#ai-security+4
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-04-01Tool demoBlackhat Rudra: The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggal#red-teaming#blueteam#application-pentesting+1
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul Sasi#blueteam#ml#application-pentesting+4
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2015-11-13Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittal#windows#red-teaming#endpoint-protection+1
2015-11-05TalkGroundzerosummit Wolves Among Sheep: Defeating Targeted Attacks With Deception Sahir Hidayatullah, Raviraj Doshi#blueteam#incident-detection#honeypot+2
2015-11-05TalkGroundzerosummit chellam – a Wi-Fi IDS/Firewall for Windows Vivek Ramachandran#wifi#firewall#ids+3
2015-11-05TalkGroundzerosummit Western Air Command B S Singh Deo#network-defense#network-monitoring#network-pentesting+3
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandran#network-forensics#packet-analysis#network-monitoring+3
2015-08-08TalkDefcon Chigula — a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandran#wifi#intrusion-detection#forensics+1
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Sood#scada#hmi#security-assessment+4
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvi, Tony Trummer#android#metasploit#red-teaming+3
2015-08-08Tool demoDefcon Rudra Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-08-07TalkDefcon Chellam – a Wi-Fi IDS/Firewall for Windows Presentation Video Vivek Ramachandran#wifi#firewall#ids+4
2015-08-06Tool demoBlackhat Chellam Vivek Ramachandran#wifi#firewall#blueteam+1
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notani#blueteam#security-analytics#malware-research+2
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalvi#android#red-teaming#security-assessment+2
2015-08-05Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastava#owasp#blueteam#security-testing+4
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohanty#blueteam#code-review#secure-coding+4
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanian#threat-intelligence-analysis#blueteam#red-teaming+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abraham#owasp#xss#blueteam+3
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanian#blueteam#security-tools#automated-scanning+2
2015-03-15TalkHitbsecconf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobe#network-pentesting#packet-analysis#network-monitoring+2
2015-02-06TalkNullcon Analyzing Chrome crash reports at scale Presentation Video Abhishek Arya#fuzzing#bug-hunting#blueteam
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyed#red-teaming#blueteam#purpleteam+2
2015-02-06PanelNullcon Defender’s Diary: Who’s attacking? What are my options? Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla#blueteam#threat-hunting#cybersecurity-strategy
2015-02-06TalkNullcon Generic Executable Unpacking using Dynamic Binary Instrumentation Presentation Shubham Bansal#blueteam#dynamic-binary-instrumentation#executable-analysis+1
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K A#forensics#blueteam#memory-forensics+2
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwate#red-teaming#application-pentesting#data-protection+1
2014-11-13TalkGroundzerosummit APT protection for the Enterprise Deepak Singla#blueteam#apt#security-strategy
2014-11-13TalkGroundzerosummit Making and Breaking Embedded Security Presentation Yashin Mehaboobe#red-teaming#blueteam#purpleteam
2014-10-23TalkT2 Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#android#endpoint-protection#android-security+2
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Sood, Dr. Richard J Enbody#red-teaming#reverse-engineering#blueteam+1
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-09-11Talk44con Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#imsi#endpoint-protection#security-tools
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobe#purpleteam#red-teaming#blueteam
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babu#blueteam#network-monitoring#security-analytics+3
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautam#bug-hunting#red-teaming#automated-scanning+3
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Gupta#purpleteam#mobile-application-management#mobile-hacking+4
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun#reconnaissance#social-engineering#blueteam
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Sood#botnet#red-teaming#blueteam+1
2014-08-06Tool demoBlackhat Flowinspect: Yet another network inspection tool Source Code Ankur Tyagi#security-assessment#network-monitoring#ids+2
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abraham#owasp#xss#blueteam+3
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwate#scada#blueteam#ics-security+4
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekar#glibc#red-teaming#blueteam+2
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalani#blueteam#application-hardening#application-pentesting+4
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#evil-twin-attack#phishing+1
2014-02-14TalkNullcon Multi-value W-Fi What the Heck is it Video Abhijeet Ghosh#wifi#blueteam#network-defense+1
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandla#pdf#web-security#red-teaming+2
2014-02-14TalkNullcon The Security Challenge Presentation Video Shantanu Ghosh#blueteam
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeez#red-teaming#network-pentesting#endpoint-protection+1
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyagi#security-assessment#malware-detection#network-monitoring+2
2013-11-07TalkGroundzerosummit Advanced security for advanced threats Kartik Shahani#blueteam#security-strategy#threat-modeling+4
2013-11-07TalkGroundzerosummit Malware for Firefox Mobile OS Shantanu Gawde#mobile-malware#malware-detection#malware-research+2
2013-10-19TalkToorcon Static Malware Analysis with PyTriage Presentation Yashin Mehaboobe#malware-detection#static-analysis#malware-research+1
2013-10-17TalkHitbsecconf Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis Presentation Rahul Sasi#blueteam#static-analysis#automated-exploit-detection
2013-09-27TalkC0c0n The Art and Science of Anamoly based Vulnerability Detection Lavakumar Kuppan#blueteam#security-analytics#automated-scanning+2
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe, Adrienne Felt#web-security#security-training#architecture+2
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Sood#secure-coding#audit#blueteam
2013-07-31TalkBlackhat Clickjacking revisited: A perceptual view of UI security Presentation Video Devdatta Akhawe#clickjacking#blueteam#red-teaming
2013-07-31TalkBlackhat Javascript static security analysis made easy with JSPrime Presentation Whitepaper Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#web-security#blueteam#application-hardening+4
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalra#security-assessment#red-teaming#blueteam+1
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyap, Rafal Wojtczuk#blueteam#application-pentesting#dynamic-analysis+3
2013-03-01TalkNullcon Automating JavaScript Static Analysis Lavakumar Kuppan#web-security#security-assessment#blueteam
2013-03-01TalkNullcon BYOD: How will it shape your wireless network security in future? Video Kiran Deshpande#wifi#dos#mac-spoofing+2
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayak#csrf#blueteam#application-pentesting+4
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shah#code-analysis#secure-development#blueteam+4
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineni#ipv4#mitm#blueteam+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2013-03-01TalkNullcon Vulnerability research anyone? Omair#red-teaming#blueteam#purpleteam
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasi#red-teaming#fuzzing#network-pentesting+2
2013-03-01TalkNullcon Capturing Zero-Day Information Video Dinesh O Bareja, Sumit Sharma#zero-day#red-teaming#honeypot
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisetty#red-teaming#blueteam#purpleteam+1
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremath#blueteam#security-strategy#threat-modeling+1
2012-12-01TalkClubhack Smart Grid Security Presentation Video Falgun Rathod#blueteam#critical-infrastructure#cyber-physical-systems+2
2012-12-01TalkClubhack Real Time Event Recording System, the tool for Digital Forensics Investigation Presentation Video Madhav Limaye#digital-forensics#endpoint-protection#endpoint-hardening+4
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunte#forensics#blueteam#digital-forensics+3
2012-09-20TalkEkoparty Dirty use of USSD Codes in Cellular Network Whitepaper Video Ravishankar Borgaonkar#red-teaming#android-security#endpoint-protection+1
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishra#blueteam#phishing#social-engineering+1
2012-08-03TalkC0c0n Contemporary Transcription and Resource Parasitism Arpit Patel#exploitation#firewall#network-monitoring+1
2012-07-28TalkDefcon Botnets Die Hard - Owned and Operated Presentation Video Aditya K Sood, Richard J Enbody#botnet#blueteam#malware-detection+2
2012-03-15TalkC0c0n Integrated Dial 100 System for Law Enforcement Nandkumar Saravade, R Srikumar#security-governance#compliance-governance#security-operations-center
2012-02-15TalkNullcon Application security cost management Video Ketan Vyas#blueteam#application-pentesting#secure-development+2
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwal#blueteam#threat-modeling#secure-development
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kamble#red-teaming#xss#web-security+2
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoy#red-teaming#blueteam#purpleteam
2012-02-15TalkNullcon Javascript static analysis with IronWASP Presentation Video Lavakumar Kuppan#web-security#security-assessment#blueteam
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singh#web-security#red-teaming#blueteam+1
2012-02-15TalkNullcon Ra.2 Blackbox DOM-based XSS scanner Presentation Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#xss#blueteam#security-assessment
2012-02-15TalkNullcon Sandboxing The deep truth Video Disha Agarwal, Manish Pali#fuzzing#sandbox#blueteam
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittal#hid#red-teaming#endpoint-protection+3
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2011-12-04TalkClubhack Android Forensics Presentation Manish Chasta#android#forensics#android-security+4
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soi#blueteam#exploit-kit#malware-detection+3
2011-10-08TalkC0c0n Stratagemizing Security Against Perpetrators In Cloud Infrastructure K S Abhiraj#blueteam#cloud-security-posture-management#cloud-pentesting+4
2011-10-07TalkC0c0n Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network Bala Kumar S, Mohamed Emraanullah#blueteam#intrusion-detection#ids+3
2011-10-07TalkC0c0n Security Threats in Custom ROM’s (Android) Presentation Whitepaper Anant Shrivastava#android#android-security#application-pentesting+3
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasi#purpleteam#application-pentesting#backdoor-detection+4
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandran#wifi#red-teaming#endpoint-protection+3
2011-09-07TalkSecuritybyte Data Protection Dipankar Roy#blueteam#data-loss-prevention#data-protection+1
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imran#blueteam#application-pentesting#secure-development+4
2011-09-07TalkSecuritybyte Mobile Devices – Boon or Curse? Presentation Kishor Sonawane, Oliver Ng#mobile-device-management#mobile-application-management#application-hardening+4
2011-09-06TalkSecuritybyte Private Internet Circuits - Towards A Next Generation Internet Presentation Sanjay Deshpande#network-architecture#encryption#network-defense
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikar#incident-management#data-analytics#security-analytics+3
2011-08-07TalkDefcon VDLDS — All Your Voice Are Belong To Us Presentation Video Ganesh Devarajan, Don Le Bert#blueteam#data-leak#cyber-crime
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-05-19TalkHitbsecconf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Sood#blueteam#botnet#endpoint-protection+4
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumar#xss#sqli#blueteam+1
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Rout#data-leak#blueteam#data-loss-prevention+3
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddy#blueteam#red-teaming#purpleteam+1
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2011-02-15TalkNullcon Botnet Detection approach by DNS behavior and clustering analysis Presentation Nilesh Sharma, Pulkit Mehndiratta#botnet#dns#blueteam
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-12-04TalkClubhack Windows Memory Forensic Analysis Presentation Aashish Kunte#windows#forensics#memory-forensics+3
2010-10-14TalkHitbsecconf Exploit Delivery Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+2
2010-10-13TalkHitbsecconf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shah#red-teaming#web-security#ajax+3
2010-08-01TalkC0c0n End-point Security Laxi Eshwari#blueteam#endpoint-protection#endpoint-hardening+3
2010-08-01TalkC0c0n Last line of defense - Host Intrusion Prevention and Secure application development. Avinash Shenoi#blueteam#application-hardening#secure-coding+3
2010-08-01TalkC0c0n VoIP Security Mukund Krishnamurthy#purpleteam#voip#sip+4
2010-08-01TalkC0c0n Dangers and dynamic Malware analysis Chandrasekar#forensics#dynamic-analysis#malware-detection+4
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmad#wifi#red-teaming#blueteam+1
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patil#botnet#blueteam#malware-detection+4
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desai#encryption#steganography#blueteam
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintala#blueteam#application-pentesting#secure-development+4
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbarao#blueteam#security-strategy#threat-modeling+4
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dinde#blueteam#data-protection#security-strategy+2
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VC#blueteam#security-strategy#azure+4
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyani#wifi#honeypot#phishing+1
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkHitbsecconf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shah#blueteam#footprinting#firewall+1
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2009-02-19TalkBlackhat Blinded by Flash: Widespread Security Risks Flash Developers Don’t See Presentation Video Prajakta Jagdale#flash#blueteam#application-pentesting+2
2008-12-06TalkClubhack AntiSpam - Understanding the good, the bad and the ugly Presentation Aseem Jakhar#blueteam#phishing#anti-phishing+1
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohli#secure-development#secure-coding#blueteam+1
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alex#secure-coding#reverse-engineering#red-teaming+2
2008-08-21TalkOwaspappsecindia AppSec For Managers Nish Bhalla#appsec#owasp#blueteam
2008-08-20TalkOwaspappsecindia Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2008-08-20TalkOwaspappsecindia Web Application Security: Too Costly To Ignore Presentation Rajesh Nayak#appsec#blueteam#application-hardening+4
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2008-03-28TalkBlackhat Spam-Evolution Whitepaper Aseem Jakhar#social-engineering#malware-detection#anti-phishing
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2007-12-09TalkClubhack Subtle Security flaws: Why you must follow the basic principles of software security Presentation Varun Sharma#blueteam#software-security#secure-coding+4
2007-12-09TalkClubhack Legiment Techniques of IPS/IDS Evasion Presentation Ajit Hatti#red-teaming#network-monitoring#ids+2
2007-11-20TalkDeepsec Web 2.0 Application Kung-Fu - Securing Ajax & Web Services Presentation Video Shreeraj Shah#ajax#web-security#blueteam
2007-08-01TalkBlackhat PISA: Protocol Identification via Statistical Analysis Presentation Whitepaper Rohit Dhamankar, Rob King#blueteam#network-defense#intrusion-detection
2007-04-18TalkCansecwest Low-Rate Denial-of-Service attacks Anil Kumar#red-teaming#dos#network-defense+2
2007-04-05TalkHitbsecconf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+2
2007-04-04TalkHitbsecconf Vboot Kit: Compromising Windows Vista Security Presentation Vipin Kumar, Nitin Kumar#windows#boot-sector#endpoint-protection+1
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhalla#blueteam#purpleteam#application-pentesting+4
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotia#secure-coding#blueteam#static-analysis+1
2005-10-18TalkBlackhat Adware/Spyware Presentation Saumil Shah, Dave Cole#blueteam#adware#spyware
2005-09-29TalkHitbsecconf Analyzing Code for Security Defects Presentation Nish Bhalla#code-analysis#blueteam#secure-coding
2005-09-26TalkHitbsecconf Web hacking Kung-Fu and Art of Defense Presentation Shreeraj Shah#blueteam#application-pentesting#code-review+4
2005-04-12TalkHitbsecconf Web Application Kung-Fu, The Art of Defense Presentation Shreeraj Shah#blueteam#application-hardening#secure-coding+4
2005-04-10TalkHitbsecconf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singh#red-teaming#blueteam#purpleteam+1
2004-10-06TalkHitbsecconf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookhey#blueteam#intrusion-detection#application-pentesting+3
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#automated-scanning+2
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#application-pentesting+3
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3
2003-12-12TalkHitbsecconf Defending Web Applications: Strategies, methods and practices Video Shreeraj Shah#blueteam#secure-coding#firewall+1
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shah#red-teaming#blueteam#purpleteam
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Popli#security-assessment#data-protection#blueteam