| 2025-08-07 | Tool demo | Blackhat |
Frogy 2.0 - Automated external attack surface analysis toolkit
| Chintan Gurjar | attack-surfacevulnerability-assessmentasset-management+2 |
| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | incident-responseweb-securityvulnerability-management+2 |
| 2025-08-06 | Tool demo | Blackhat |
Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements
| Abhinav Khanna, Krishna Chaganti | web-securitysecure-codingpentesting+3 |
| 2025-08-06 | Tool demo | Blackhat |
Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs
| Satinder Khasriya | api-securityweb-securityowasp+1 |
| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | web-securitymalware-detectionbrowser-security+2 |
| 2024-11-26 | Talk | Blackhat |
Critical Exposures: Lessons from a Decade of Vulnerability Research
| Nikhil Shrivastava | vulnerability-managementsql-injectionpentesting+2 |
| 2024-11-15 | Talk | C0c0n |
PCI 4.0, Javascript Security for product security teams
| Anand Kumar Ganesan, Mohammad Arif | web-application-security |
| 2024-08-30 | Talk | Hitb Sec Conf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | web-securitypentestingexploitation+4 |
| 2024-08-10 | Talk | Defcon |
Sneaky Extensions: The MV3 Escape Artists
| Vivek Ramachandran, Shourya Pratap Singh | web-securitypentestingvulnerability-management |
| 2024-06-27 | Talk | Troopers |
The Hidden Dangers Lurking in Your Pocket β Pwning Apple Wallet ecosystem and its apps
| Priyank Nigam | mobile-securitypentestingapi-security+2 |
| 2023-08-12 | Tool demo | Defcon |
Open Source API Security for devsecops
| Ankush Jain, Ankita Gupta 1 | api-securitydevsecopsci-cd+3 |
| 2023-08-11 | Talk | Defcon |
Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications
| Ankur Chowdhary | web-securityxssapplication-pentesting+3 |
| 2023-08-11 | Tool demo | Defcon |
vAPI : Vulnerable Adversely Programmed Interface
| Tushar Kulkarni | api-securityowaspauthorization+1 |
| 2023-08-06 | Talk | C0c0n |
Mitigating SSRF at scale the right way with IMDSv2!
| Ayush Priya | web-securityapi-securityaws+3 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | authenticationprivacyembedded-security+1 |
| 2023-05-11 | Tool demo | Blackhat |
APKHunt | OWASP MASVS Static Analyzer
| Mrunal Chawda, Sumit Kalaria | owasp |
| 2022-09-24 | Talk | C0c0n |
Raining CVEs on Wordpress plugins with Semgrep
| Shreya Pohekar, Syed Sheeraz Ali | web-securitystatic-analysissast+2 |
| 2022-09-24 | Talk | C0c0n |
Web3 Security - Security in MetaVerse, and the new world of web3
| Rohit Srivastwa | blockchain-securityweb3decentralized-systems+3 |
| 2022-09-23 | Talk | C0c0n |
Securing your APIs for a cloud native future
| Navendu Pottekkat | api-securitysecure-developmentdevsecops |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | api-securitythreat-landscapethreat-hunting+1 |
| 2022-09-08 | Tool demo | Nullcon |
ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs
| Rohit Sehgal, Varun Kakumani | owasp |
| 2022-08-12 | Talk | Defcon |
Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years
| Vivek Ponnada | secure-codingvulnerability-managementdevsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application
| Gayatri Nayak | web-securityauthenticationauthorization+2 |
| 2021-11-13 | Talk | C0c0n |
Server-side javascript Injection
| Kavisha Sheth | web-securitysecure-codingweb-pentesting |
| 2021-11-13 | Talk | C0c0n |
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics
| Kiran Kumar Pg | authenticationmfasecurity-architecture |
| 2021-08-05 | Tool demo | Blackhat |
reNgine: An Automated Reconnaissance Framework
| Yogesh Ojha | web-app-sec |
| 2020-12-10 | Tool demo | Blackhat |
reNgine: an automated reconnaissance Framework
| Yogesh Ojha | web-appsec |
| 2020-11-21 | Talk | App Sec Indonesia |
Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory
| Abhi M Balakrishnan | web-securityowaspapplication-pentesting+2 |
| 2020-10-01 | Tool demo | Blackhat |
OWASP Python Honeypot
| Sri Harsha Gajavalli | web-securityowasppentesting+1 |
| 2020-09-18 | Talk | C0c0n |
Web Application hacking with WebZGround
| Parveen Yadav, Narendra Kumar | web-securityweb-pentestingpentesting+3 |
| 2020-08-09 | Talk | Defcon |
Running an appsec program with open source projects
| Vandana Verma Sehgal | owaspsecure-developmentdevsecops+3 |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | linuxsecure-codingweb-application-security+3 |
| 2020-03-06 | Tool demo | Nullcon |
Hachi
| Parmanand Mishra | att&ckblueteamrest-api+1 |
| 2019-09-27 | Talk | C0c0n |
Stepping into Password Less Economy
| Ajit Hatti | authenticationidentity-managementsecure-development+1 |
| 2019-09-23 | Talk | Rootcon |
Identity crisis: war stories from authentication failures
| Vishal Chauhan | authenticationidentity-managementvulnerability-assessment+3 |
| 2019-08-11 | Talk | Defcon |
Exploiting and Securing iOS Apps using OWASP iGoat
| Swaroop Yermalkar | mobile-securityios-securityapplication-pentesting+4 |
| 2019-08-08 | Talk | Defcon |
Phishing in the cloud era
| Ashwin Vamshi, Abhinav Singh | phishingapi-securityweb-security+2 |
| 2019-08-08 | Tool demo | Defcon |
Hachi: An Intelligent threat mapper
| Parmanand Mishra | att&ckblueteamrest-api+1 |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli | network-pentestingvulnerability-assessmentfirewall+3 |
| 2018-12-06 | Tool demo | Blackhat |
Astra: Automated Security Testing For REST APIs
| Sagar Popat, Harsh Grover | apipentestrest-api+1 |
| 2018-10-05 | Talk | C0c0n |
DomGoat - the DOM Security Playground
| Lavakumar Kuppan | xssweb-application-security |
| 2018-09-27 | Talk | Rootcon |
Defending cloud Infrastructures with Cloud Security Suite
| Shivankar Madaan | cloudawsinfrastructure+5 |
| 2018-08-12 | Talk | Defcon |
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
| Siddharth Rao | cryptographywebauthentication+2 |
| 2018-08-11 | Tool demo | Defcon |
Sh00tβAn open platform for manual security testers & bug hunters
| Pavan Mohan | pentestbug-huntingopensource+3 |
| 2018-08-09 | Tool demo | Blackhat |
OWASP Offensive Web Testing Framework
| Viyat Bhalodia | owasppentestweb+1 |
| 2018-08-09 | Tool demo | Blackhat |
rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | opensourceincident-responserest-api+1 |
| 2018-08-08 | Tool demo | Blackhat |
Astra: Automated Security Testing For REST APIs
| Ankur Bhargava, Prajal Kulkarni, Sagar Popat | pentestapirest-api+2 |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | identity-managementauthenticationrisk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Cloud_Security Suite - One stop tool for auditing cloud infrastructure
| Shivankar Madaan, Jayesh Chauhan | cloudawsinfrastructure+5 |
| 2017-07-29 | Tool demo | Defcon |
Fuzzapi
| Abhijeth Dugginapeddi, Lalith Rallabhandi, Srinivas Rao | fuzzingrest-apipentest+3 |
| 2017-07-27 | Tool demo | Blackhat |
Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday
| Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Rao | fuzzingapirest-api+3 |
| 2017-06-26 | Tool demo | Blackhat |
DiffDroid
| Anto Joseph | androidpentestweb-application-security+1 |
| 2017-06-23 | Talk | Hackinparis |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-05-23 | Talk | Phdays |
Injecting security into web apps in the runtime
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-03-03 | Talk | Nullcon |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | webblueteamsecure-development+6 |
| 2017-01-25 | Talk | Owasp App Sec California |
DASTProxy: Donβt let your automated security testing program stall on crawlInstead focus on business context
| Kiran Shirali | dynamic-analysisdastdevsecops+3 |
| 2017-01-25 | Talk | Owasp App Sec California |
OCSP Stapling in the Wild
| Devdatta Akhawe | web-securityvulnerability-managementsecurity-architecture+1 |
| 2016-10-07 | Talk | Deepsec |
Inside Stegosploit
| Saumil Shah | web-securityexploitationpentesting+1 |
| 2016-08-19 | Talk | C0c0n |
Esoteric XSS Payloads
| Riyaz Walikar | xssredteam |
| 2016-08-19 | Talk | C0c0n |
Kill the password - A new era of authentication
| Tamaghna Basu | authenticationiamsecurity-architecture+1 |
| 2016-07-01 | Talk | Hackinparis |
DIFFDroid - Dynamic Analysis Made Easier for Android
| Anto Joseph | androidpentestweb-application-security+1 |
| 2016-03-15 | Talk | Groundzerosummit |
Web App Security
| Harpreet Singh, Himanshu Sharma, Nipun Jaswal | web-securityapi-securitysecure-coding+3 |
| 2015-11-05 | Talk | Ground Zero Summit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | ics-securityweb-securityvulnerability-management+3 |
| 2015-11-05 | Talk | Ground Zero Summit |
XSS - The art of evading web application filters!
| Anirudh Anand | xssweb |
| 2015-09-11 | Talk | 44 Con |
Stegosploit β Drive-by Browser Exploits using only Images
| Saumil Shah | webstrganographyredteam+2 |
| 2015-08-07 | Talk | Defcon |
Hacker’s Practice Ground
| Lokesh Pidawekar | pentestingethical-hackingvulnerability-assessment+2 |
| 2015-08-01 | Talk | C0c0n |
Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities
| Anant Shrivastava | webowaspblueteam |
| 2015-05-28 | Talk | Hitb Sec Conf |
Stegosploit: Hacking With Pictures
| Saumil Shah | redteamsteganographyweb+1 |
| 2015-03-27 | Talk | Syscan |
Stegosploit - Hacking with Pictures
| Saumil Shah | webstrganographyredteam+2 |
| 2015-03-26 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | owaspxssblueteam+3 |
| 2015-02-06 | Talk | Nullcon |
Pentesting a website with million lines of Javascript
| Lavakumar Kuppan, Ahamed Nafeez | web-application-securitypentestweb+1 |
| 2015-01-27 | Talk | Owasp App Sec California |
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | web-securityxsscsrf+3 |
| 2014-08-21 | Talk | Usenix |
The Emperorβs New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | web-securityxsscsrf+3 |
| 2014-03-27 | Talk | Blackhat |
JS Suicide: Using JavaScript Security Features to Kill JS Security
| Ahamed Nafeez | web-application-securityredteamcsrfguard+1 |
| 2014-03-15 | Talk | Hitb Sec Conf |
JS Suicide: Using Javascript Security Features to Kill Itself
| Ahamed Nafeez | web-application-security |
| 2014-02-15 | Tool demo | Nullcon |
OWASP Xenotix XSS Exploit Framerwork
| Ajin Abraham | owaspxssblueteam+3 |
| 2014-02-14 | Talk | Nullcon |
o’Dea Assertions - Untwining the Security of the SAML Protocol
| Achin Kulshrestha | authenticationwebbrowser+4 |
| 2014-02-14 | Talk | Nullcon |
phoneypdf: A Virtual PDF Analysis Framework
| Kiran Bandla | pdfanalysisweb-application-security+4 |
| 2013-11-21 | Talk | Appsec Usa |
Wassup MOM? Owning the Message Oriented Middleware
| Gursev Singh Kalra | api-securityvulnerability-managementsecure-coding+1 |
| 2013-11-07 | Talk | Ground Zero Summit |
Malware for Firefox Mobile OS
| Shantanu Gawde | firefox-osmobile |
| 2013-09-27 | Talk | C0c0n |
Lets Play - Applanting on new Grounds
| Ajit Hatti | androidredteamcsrf+1 |
| 2013-09-27 | Talk | C0c0n |
Snake Bites
| Anant Shrivastava | secure-codingwebpentest+1 |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe | web-securitysecurity-awarenesssecurity-architecture+3 |
| 2013-08-01 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | owaspxssblueteam+3 |
| 2013-07-31 | Talk | Blackhat |
Clickjacking revisited: A perceptual view of UI security
| Devdatta Akhawe | clickjackinguiblueteam+1 |
| 2013-07-31 | Talk | Blackhat |
Javascript static security analysis made easy with JSPrime
| Nishant Das Patnaik, Sarathi Sabyasachi Sahoo | web-application-securityanalysisblueteam |
| 2013-03-15 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | owaspxssblueteam+3 |
| 2013-03-14 | Talk | Blackhat |
Lets play - Applanting
| Ajit Hatti | mobileredteamcsrf+2 |
| 2013-03-01 | Talk | Nullcon |
Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework
| Ajin Abraham | xssredteamweb |
| 2013-03-01 | Talk | Nullcon |
CSRF Finder as a Mozilla Addon
| Piyush Pattanayak | csrfwebblueteam |
| 2013-03-01 | Talk | Nullcon |
Inception of graphical passwords
| Rishi Narang | infrastructureauthentication |
| 2013-03-01 | Talk | Nullcon |
Automating JavaScript Static Analysis
| Lavakumar Kuppan | web-application-securitywebpentest+1 |
| 2012-12-01 | Talk | Clubhack |
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
| Ajin Abraham | xssredteamweb |
| 2012-12-01 | Talk | Clubhack |
XSSshell
| Vandan Joshi | xsswebshell |
| 2012-10-26 | Talk | App Sec Usa |
XSS & CSRF with HTML5 - Attack, Exploit and Defense
| Shreeraj Shah | xsscsrf |
| 2012-10-25 | Talk | App Sec Usa |
Cross Site Port Scanning
| Riyaz Walikar | web-securityvulnerability-managementowasp+1 |
| 2012-10-11 | Talk | Hitb Sec Conf |
XSS & CSRF strike back β Powered by HTML5
| Shreeraj Shah | redteamcsrfweb+5 |
| 2012-09-28 | Talk | Nullcon |
Alert(/xss/) - How to catch an XSS before someone exploits / reports it?
| Ahamed Nafeez | web-securityxsssecure-coding+2 |
| 2012-08-03 | Talk | C0c0n |
Evil JavaScript
| Bishan Singh | redteamweb-application-security |
| 2012-07-26 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | webredteamcors+6 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | malwarebotnetweb-security+2 |
| 2012-03-15 | Talk | Nullcon |
An App(le) a day keeps the wallet away
| Antriksh Shah | pentestingweb-securityapi-security+1 |
| 2012-03-14 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | webredteamcors+6 |
| 2012-02-15 | Talk | Nullcon |
Content sniffing Algorithm bypassing techniques and possible attack vectors
| Anil Aphale, Chaitany Kamble | redteamwebxss+3 |
| 2012-02-15 | Talk | Nullcon |
Ra.2 Blackbox DOM-based XSS scanner
| Nishant Das Patnaik, Sarathi Sabyasachi Sahoo | xsswebblueteam+1 |
| 2012-02-15 | Talk | Nullcon |
Javascript static analysis with IronWASP
| Lavakumar Kuppan | web-application-securitywebpentest+1 |
| 2012-02-15 | Talk | Nullcon |
Node.js: The good, bad and ugly
| Bishan Singh | web-application-securityredteamblueteam+1 |
| 2011-12-04 | Talk | Clubhack |
DOM XSS β Encounters of the 3rd Kind
| Bishan Singh | xssdomredteam+1 |
| 2011-10-07 | Talk | C0c0n |
Password Less Authentication, Authorization
| Srikar Sagi | authenticationauthorizationiam |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | software-securitysecure-developmentdevsecops+4 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy β An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | privacydata-protectionapi-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | secure-codingsecure-developmentweb-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Enabling Un-trusted Mashups
| Bishan Singh | web-securityxsscsrf+4 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | social-engineeringweb-securitysecurity-awareness+2 |
| 2011-08-03 | Talk | Blackhat |
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex
| Shreeraj Shah | reverse-engineeringwebajax+6 |
| 2011-05-20 | Talk | Hitb Sec Conf |
Next Generation Web Attacks β HTML 5, DOM(L3) and XHR(L2)
| Shreeraj Shah | webredteamcors+6 |
| 2011-02-25 | Talk | Nullcon |
(secure) SiteHoster β Disable XSS & SQL Injection
| Abhishek Kumar | xsssqliblueteam+2 |
| 2010-11-11 | Talk | Blackhat |
Attacking with HTML5
| Lavakumar Kuppan | web-securityxssweb-pentesting+1 |
| 2010-10-13 | Talk | Hitb Sec Conf |
Hacking a Browserβs DOM β Exploiting Ajax and RIA
| Shreeraj Shah | webredteamweb-application-security+5 |
| 2010-07-29 | Talk | Blackhat |
Hacking Browser’s DOM - Exploiting Ajax and RIA
| Shreeraj Shah | redteamwebdom+2 |
| 2010-07-01 | Talk | Hitb Sec Conf |
Top 10 Web 2.0 Attacks and Exploits
| Shreeraj Shah | webredteamcors+6 |
| 2010-06-18 | Talk | Syscan |
REVERSE ENGINEERING WEB 2.0 APPLICATIONS
| Shreeraj Shah | reverse-engineeringwebajax+6 |
| 2010-03-15 | Talk | Blackhat |
400 Apps in 40 Days
| Nish Bhalla | vulnerability-managementrisk-managementapplication-pentesting+2 |
| 2009-05-19 | Talk | Syscan |
Securing Enterprise Applications
| Shreeraj Shah | blueteamwebweb-application-security+13 |
| 2008-10-29 | Talk | Hitb Sec Conf |
Top 10 Web 2.0 Attacks
| Shreeraj Shah | blueteamweb-application-securityajax+8 |
| 2008-08-21 | Talk | Owasp App Sec India |
AppSec For Managers
| Nish Bhalla | appsecowaspweb+1 |
| 2008-08-20 | Talk | Owasp App Sec India |
Application Security Trends & Challenges
| Kamlesh Bajaj | webowaspappsec |
| 2008-08-20 | Talk | Owasp App Sec India |
Web 2.0 Attacks - Next Generation Threats on the Rise
| Shreeraj Shah | redteamblueteampurpleteam+4 |
| 2008-08-20 | Talk | Owasp App Sec India |
Building Enterprise AppSec Program
| Nish Bhalla | webappseccase-study |
| 2008-08-20 | Talk | Owasp App Sec India |
Web Application Security: Too Costly To Ignore
| Rajesh Nayak | appsecwebblueteam |
| 2008-04-16 | Talk | Hitb Sec Conf |
Securing Next Generation Applications Γ’β¬β Scan, Detect and Mitigate
| Shreeraj Shah | blueteamweb-application-securityajax+8 |
| 2008-02-20 | Talk | Blackhat |
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
| Shreeraj Shah | redteamblueteampurpleteam+4 |
| 2007-11-20 | Talk | Deepsec |
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
| Shreeraj Shah | webajaxweb-application-security+1 |
| 2007-09-06 | Talk | Hitb Sec Conf |
Hacking Ajax and Web Services Γ’β¬β Next Generation Web Attacks on the Rise
| Shreeraj Shah | webredteamajax+1 |
| 2007-04-05 | Talk | Hitb Sec Conf |
WEB 2.0 Hacking β Defending Ajax and Web Services
| Shreeraj Shah | webredteamblueteam+3 |
| 2007-03-15 | Talk | Blackhat |
Exploit-Me Series β Free Firefox Application Penetration Testing Suite Launch
| Nish Bhalla, Rohit Sethi | web-securityxsssql-injection+4 |
| 2006-08-02 | Talk | Blackhat |
SQL Injections by Truncation
| Bala Neerumalla | web-securitysql-injectionsecure-coding+1 |