| 2025-12-11 | Tool demo | Blackhat |
DepConfuse: Shielding Your Packages from Dependency Confusion Attacks
| Akhil Mahendra, Harsh Varagiya, Sourav Kumar, Akshansh Jaiswal | #supply-chain#dependency-management#package-security+2 |
| 2025-12-11 | Tool demo | Blackhat |
SupplyShield: Protecting Your Software Supply Chain
| Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar | #supply-chain#sbom#software-composition-analysis+3 |
| 2025-12-10 | Tool demo | Blackhat |
EKSi-lite: Simple & Lightweight EKS Cluster Listing & Security Tool
| Divyanshu Shukla, Anjali Singh Shukla | #aws#kubernetes#cloud-security-posture-management+4 |
| 2025-12-10 | Tool demo | Blackhat |
Kubernetes Goat – A Hands-on Interactive Kubernetes Security Playground
| Madhu Akula | #kubernetes#container-security#cloud-pentesting+1 |
| 2025-12-10 | Tool demo | Blackhat |
KubeShadow - Advanced Offensive Kubernetes Red-Team Framework
| Aashita Pandey, Binayak Choudhury | #kubernetes#red-teaming#cloud-pentesting+1 |
| 2025-12-10 | Tool demo | Blackhat |
OWASP EKS Goat - Hands-on AWS EKS Security
| Divyanshu Shukla, Anjali Singh Shukla | #aws#kubernetes#container-security |
| 2025-12-10 | Tool demo | Blackhat |
Spotter – Universal Kubernetes Security Engine
| Madhu Akula | #kubernetes#container-security#cloud-security-posture-management+1 |
| 2025-12-10 | Tool demo | Blackhat |
SBOM Play
| Anant Shrivastava | #sbom#supply-chain#vulnerability-assessment+1 |
| 2025-12-10 | Tool demo | Blackhat |
Catch the Flow: Securing CI/CD Workflows with Flowlyt
| Hare Krishna Rai, K v Prashant, Nandan Gupta | #ci-cd#supply-chain#devsecops+1 |
| 2025-12-10 | Tool demo | Blackhat |
Securing Secrets from Dev Machine to Deployments Using SLV
| Shibly Meeran, Sriram Krishnan, Keshav Kandasamy | #devsecops#cicd-security#supply-chain |
| 2025-10-10 | Talk | C0c0n |
Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits
| Suchith Narayan | #supply-chain#supply-chain-attack#devsecops+1 |
| 2025-10-01 | Tool demo | Sector |
KubeShadow - Advanced Offensive Kubernetes Red-Team Framework
| Aashita Pandey, Binayak Choudhury | #kubernetes#red-teaming#container-security |
| 2025-08-07 | Tool demo | Blackhat |
Kubernetes Goat - A Hands-on Interactive Kubernetes Security Playground
| Madhu Akula | #kubernetes#cloud-workload-protection#container-security+3 |
| 2025-08-07 | Tool demo | Blackhat |
Kubernetes Security Scanner
| Krishna Priya | #kubernetes#cloud-workload-protection#container-security+4 |
| 2025-08-07 | Tool demo | Blackhat |
Spotter – Universal Kubernetes Security Scanner & Policy Enforcer
| Madhu Akula | #kubernetes#cloud-workload-protection#container-security+4 |
| 2025-08-06 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker V2
| Devang Solanki | #container-security#docker#static-analysis+3 |
| 2025-08-06 | Talk | Blackhat |
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach
| Varun Sharma, Ashish Kurmi | #ci-cd#incident-management#devsecops+2 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora, Richard Tonry | #secure-development#devsecops#risk-management+4 |
| 2025-04-04 | Tool demo | Blackhat |
Kubernetes Goat: A Hands-on Interactive Kubernetes Security Playground
| Madhu Akula | #kubernetes#cloud-workload-protection#container-security+4 |
| 2025-04-03 | Tool demo | Blackhat |
KubeSF V1.2 - Kubernetes Security Posture Audit Suite
| Abhishek S, Ajith Prabhu | #kubernetes#cloud-workload-protection#container-security+4 |
| 2025-04-03 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker V2
| Devang Solanki, Bhavarth Karmarkar | #docker#container-security#vulnerability-assessment |
| 2025-04-03 | Tool demo | Blackhat |
SupplyShield: Protecting your software supply chain
| Yadhu Krishna M, Akhil Mahendra, Hritik Vijay | #supply-chain#sbom#sca+2 |
| 2025-04-03 | Talk | Blackhat |
Determining Exploitability of Vulnerabilities with SBOM and VEX
| Anusha Penumacha, Srinija Kammari | #sbom#supply-chain#sca+1 |
| 2025-04-03 | Tool demo | Blackhat |
SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application
| Hare Krishna Rai, Gaurav Joshi, K v Prashant | #supply-chain#supply-chain-attack#sca+1 |
| 2025-03-02 | Talk | Nullcon |
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell
| Alla Vamsi Krishna, Kandi Abhishek Reddy | #kernel#azure#container-security+2 |
| 2025-03-02 | Talk | Nullcon |
Securing the chains: Building defensive layers for software supply chains
| Yadhu Krishna M, Akhil Mahendra, Hritik Vijay | #blueteam#container-security#sbom+3 |
| 2025-03-02 | Panel | Nullcon |
Enterprise Readiness for Supply Chain Attacks
| Sanjay Bahl, Cassie Crossley | #supply-chain-security#supply-chain-attack#third-party-risk-management+4 |
| 2025-03-02 | Panel | Nullcon |
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
| Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni | #security-strategy#threat-modeling#zero-trust+3 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2024-12-12 | Tool demo | Blackhat |
GoatPen: Hack, Hone, Harden
| Nishant Sharma, Shantanu Kale | #aws#cloud-access-security-broker#cloud-compliance+4 |
| 2024-12-11 | Tool demo | Blackhat |
SCAGoat - Exploiting Damn Vulnerable SCA Application
| Hare Krishna Rai, Gaurav Joshi, K v Prashant | #supply-chain#sca#software-composition-analysis |
| 2024-11-21 | Talk | Securityfest |
Breaking Container Boundary Using Side Channel Attack
| Adhokshaj Mishra | #container-security#docker#security-testing+1 |
| 2024-11-16 | Talk | C0c0n |
We got the Shiny SBoM; what next?
| Anant Shrivastava | #sbom#supply-chain#supply-chain-security |
| 2024-11-16 | Talk | C0c0n |
Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers
| Nihar Sawant, Jaydev Joshi | #ransomware#phishing#supply-chain-security |
| 2024-11-15 | Talk | C0c0n |
[Yodha] Nightingale: Docker for Pentesters
| Raja Nagori | #docker#security-assessment#container-security+3 |
| 2024-11-15 | Talk | C0c0n |
[Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool
| Gaurav Joshi, Hare Krishna Rai | #supply-chain#sca#software-composition-analysis |
| 2024-10-02 | Talk | Virusbulletin |
From code to crime: exploring threats in GitHub Codespaces
| Nitesh Surana, Jaromir Horejsi | #cloud-pentesting#supply-chain-security#exploitation |
| 2024-08-07 | Tool demo | Blackhat |
RedCloud OS : Cloud Adversary Simulation Operating System
| Manish Gupta, Yash Bharadwaj | #os#cloud-pentesting#aws+4 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-05-24 | Talk | Auscert |
Mastering the art of Attacking and Defending a Kubernetes Cluster
| Sanjeev Mahajan | #kubernetes#cloud-pentesting#container-security+1 |
| 2024-04-19 | Tool demo | Blackhat |
vet: Policy Driven vetting of Open Source Software Components
| Abhisek Datta | #supply-chain-security#open-source-security#dependency-management+1 |
| 2024-04-18 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #docker#application-pentesting#cloud-pentesting+3 |
| 2023-12-06 | Tool demo | Blackhat |
Docker Exploitation Framework
| Rohit Pitke, Emmanuel Law | #exploitation#container-security#docker+4 |
| 2023-12-06 | Tool demo | Blackhat |
SupplyShield: Protecting your software supply chain
| Akhil Mahendra, Hritik Vijay | #aws#supply-chain#sbom+2 |
| 2023-09-29 | Talk | Hackinparis |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | #container-security#docker#threat-hunting+1 |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-security#devsecops#architecture+4 |
| 2023-09-23 | Talk | Nullcon |
The Curious Case Of The Rogue SOAR
| Mukesh Sai Kumar, Jaden Furtado | #blueteam#application-pentesting#dynamic-analysis+3 |
| 2023-09-23 | Talk | Nullcon |
Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities
| Nitesh Surana | #azure#cloud-pentesting#application-hardening+4 |
| 2023-08-10 | Talk | Defcon |
Attacking Vehicle Fleet Management Systems
| Yashin Mehaboobe | #automotive-cybersecurity#ics-security#embedded-systems+4 |
| 2023-08-09 | Tool demo | Blackhat |
CASPR - Code Trust Auditing Framework
| Ajit Hatti | #secure-coding#code-review#secure-development+1 |
| 2023-08-07 | Panel | C0c0n |
CII Protection: How can the c0c0n community contribute ?
| Navin Kumar Singh | #security-strategy#open-source-security#threat-modeling |
| 2023-08-06 | Talk | C0c0n |
Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector
| Anshu Kumar, Pavan Sorab | #devsecops#ci-cd#cicd-pipeline+2 |
| 2023-08-06 | Talk | C0c0n |
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G
| Altaf Shaik | #zero-trust#supply-chain-security#attack-surface+4 |
| 2023-05-11 | Tool demo | Blackhat |
Kubernetes Goat: Interactive Kubernetes Security Learning Playground
| Madhu Akula | #kubernetes#cloud-workload-protection#container-security+4 |
| 2023-05-11 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #docker#application-pentesting#container-security+4 |
| 2023-03-23 | Talk | Insomnihack |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #ci-cd#devsecops#supply-chain-security+3 |
| 2022-12-07 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#asset-inventory+1 |
| 2022-09-23 | Talk | C0c0n |
Common Misconfigurations in your Kubernetes Cluster and What can you do about it?
| Kumar Ashwin | #kubernetes#cloud-workload-protection#container-security+4 |
| 2022-09-08 | Talk | Nullcon |
Hack the Source: Securing Open Source Software – One bug at a time
| Sandeep Singh, Laurie Mercer | #open-source-security#supply-chain#code-review+4 |
| 2022-09-07 | Talk | Nullcon |
Scale hacking to secure your cloud and beyond
| Anand Prakash | #cloud-pentesting#cloud-security-posture-management#container-security+4 |
| 2022-09-07 | Talk | Nullcon |
Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj
| Devdutt Patnaik, Ashish Bijlani | #open-source-security#supply-chain#supply-chain-attack+3 |
| 2022-09-06 | Panel | Nullcon |
IoT Supply Chain Blues and the way forward
| Aseem Jakhar, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha, Sudarshan Rajagopal, Sachin Jain | #iot-device-management#iot-pentesting#supply-chain-security+3 |
| 2022-08-11 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#asset-inventory+4 |
| 2022-08-10 | Tool demo | Blackhat |
AzureGoat : A Damn Vulnerable Azure Infrastructure
| Jeswin Mathai, Nishant Sharma, Rachna Umaraniya | #azure#cloud-pentesting#cloud-workload-protection+3 |
| 2022-08-10 | Tool demo | Blackhat |
CASPR - Code Trust Audit Framework
| Ajit Hatti | #secure-coding#secure-development#security-tools+3 |
| 2022-05-12 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #docker#application-pentesting#container-security+4 |
| 2022-05-12 | Tool demo | Blackhat |
Mitigating Open Source Software Supply Chain Attacks
| Ajinkya Rajput, Ashish Bijlani | #open-source-security#supply-chain#supply-chain-attack+3 |
| 2022-05-12 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#secure-development+1 |
| 2022-04-08 | Talk | Nullcon |
Bheem OS - A next-generation reasonably secure OS using Rust MicroVM
| Akram Ansari, Subash Sn | #os#virtual-machine#container-security+3 |
| 2021-11-13 | Talk | C0c0n |
Third Party Risk Management
| Mahesh Kalyanaraman | #risk-management#compliance-governance#supply-chain+2 |
| 2021-11-12 | Talk | C0c0n |
2021 Supply Chain Attacks Analysis
| Ajit Hatti | #incident-management#risk-management#supply-chain+1 |
| 2021-11-11 | Tool demo | Blackhat |
Kubernetes Goat: Interactive Kubernetes Security Learning Playground
| Madhu Akula | #kubernetes#cloud-workload-protection#container-security+4 |
| 2021-11-10 | Tool demo | Blackhat |
Kubestriker: A Blazing Fast Security Auditing Tool
| Vasant Kumar | #kubernetes#cloud-workload-protection#container-security+3 |
| 2021-08-04 | Tool demo | Blackhat |
Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool
| Pralhad Chaskar, Vasant Kumar | #kubernetes#cloud-workload-protection#container-security+4 |
| 2020-12-10 | Talk | Blackhat |
Effective Vulnerability Discovery with Machine Learning
| Asankhaya Sharma, Ming Yi Ang | #security-assessment#machine-learning#software-composition-analysis+4 |
| 2020-10-02 | Tool demo | Blackhat |
Phishing Simulation Assessment
| Jyoti Raval | #phishing#blueteam#social-engineering+3 |
| 2020-09-18 | Talk | C0c0n |
Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment
| Madhu Akula | #kubernetes#red-teaming#cloud-workload-protection+3 |
| 2020-03-07 | Panel | Nullcon |
Supply Chain Security In Critical Infrastructure Systems
| Manish Tiwari, Suchit Mishra, Faruk Kazi, Cristofaro Mune | #supply-chain-attack#supply-chain-security#critical-infrastructure+3 |
| 2019-11-01 | Talk | Appsecdayaustralia |
Protecting the Damned: Deploying Insecure Applications at Scale
| Vivek Ramachandran | #blueteam#container-security#docker+3 |
| 2019-09-27 | Talk | C0c0n |
Doing SecOps for the Cloud using Cloud Native Services
| Akash Mahajan | #blueteam#cloud-workload-protection#container-security+3 |
| 2019-09-27 | Talk | C0c0n |
Security @scale for startups
| Shivanath Somanathan | #devsecops#secure-development#software-security+2 |
| 2019-08-10 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+3 |
| 2019-08-08 | Tool demo | Blackhat |
CSF: Container Security Framework
| Vaibhav Gupta | #blueteam#container-security#docker+2 |
| 2019-03-28 | Tool demo | Blackhat |
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research
| Nilaksh Das, Evan Yang, Li Chen | #machine-learning#blueteam#ai-security+4 |
| 2018-10-19 | Talk | Appsecdayaustralia |
Continuous Integration and Delivery with Docker Containers
| Vasant Kumar | #docker#blueteam#container-security+4 |
| 2018-09-27 | Talk | Rootcon |
Bug Bounty Hunting on Steroids
| Anshuman Bhartiya | #bug-hunting#bug-bounty#security-tools+3 |
| 2018-08-11 | Tool demo | Defcon |
HealthyPi—Connected Health
| Ashwin Whitchurch | #raspberry-pi#hardware-embedded#embedded-systems+4 |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | #security-analytics#threat-hunting#osint+3 |
| 2018-08-10 | Talk | Defcon |
AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION
| Lokesh Pidawekar | #third-party-risk-management#supply-chain#vendor-security |
| 2018-03-03 | Panel | Nullcon |
Forensic Challenges and Road Ahead
| Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov | #data-leak#data-protection#forensics+4 |
| 2018-03-01 | Talk | Nullcon |
Breaking Into Container Orchestrators
| Nadeem Hussain | #red-teaming#cloud-workload-protection#container-security+2 |
| 2018-03-01 | Talk | Nullcon |
Software Supply Chain Cyberattack
| Samiran Ghatak | #red-teaming#cyberattack#supply-chain-attack+1 |
| 2017-03-04 | Panel | Nullcon |
Challenges in securing the cloud
| Vinayak Hegde, Manish Tiwari, Subramanian Kumar, David Lenoe, Lucas Moody | #cloud-access-security-broker#cloud-compliance#cloud-monitoring+4 |
| 2016-08-19 | Talk | C0c0n |
App Sec in the Time of Docker Containers
| Akash Mahajan | #docker#application-pentesting#container-security+4 |
| 2015-09-24 | Talk | Appsecusa |
QARK: Android App Exploit and SCA Tool
| Tushar Dalvi, Tony Trummer | #android-security#sca#software-composition-analysis |
| 2015-02-07 | Panel | Nullcon |
Startup panel – Make in India
| Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan | #security-strategy#cybersecurity-framework#business-resilience+4 |
| 2013-08-16 | Talk | Usenix |
Building Securable Infrastructure: Open-Source Private Clouds
| Pravir Chandra | #cloud-pentesting#architecture#open-source-security |
| 2012-02-15 | Talk | Nullcon |
Open source revolution :Need Hardware - Software marriage
| Venkatesh | #embedded-systems#hardware-embedded#open-source-security |
| 2011-10-08 | Talk | C0c0n |
Stratagemizing Security Against Perpetrators In Cloud Infrastructure
| K S Abhiraj | #blueteam#cloud-security-posture-management#cloud-pentesting+4 |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test – Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2009-12-05 | Talk | Clubhack |
Indian IT Act 2000 vs 2009
| Rohas Nagpal | #cyber-law#embedded-systems#firmware-analysis+4 |