| 2025-08-07 | Tool demo | Blackhat |
Frogy 2.0 - Automated external attack surface analysis toolkit
| Chintan Gurjar | #attack-surface#vulnerability-assessment#asset-management+2 |
| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | #incident-management#web-security#architecture+1 |
| 2025-08-06 | Tool demo | Blackhat |
Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs
| Satinder Khasriya | #api-security#web-security#owasp+1 |
| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | #web-security#malware-detection#browser-security+2 |
| 2025-08-06 | Tool demo | Blackhat |
Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements
| Abhinav Khanna, Krishna Chaganti | #web-security#secure-coding#security-assessment+2 |
| 2025-06-27 | Talk | Lehack |
From HTML Injection to Full AWS Account Takeover: Discovering Critical Risks in PDF Generation
| Raunak Parmar | #ssrf#aws#web-security+2 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2024-12-12 | Tool demo | Blackhat |
Damn Vulnerable Browser Extension (DVBE) - Knowing the risks of your Browser Supplements
| Abhinav Khanna, Krishna Chaganti | #browser-security#web-security#web-pentesting |
| 2024-11-21 | Talk | Securityfest |
UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities
| Priyank Nigam | #web-security#appsec#iam |
| 2024-11-15 | Talk | C0c0n |
PCI 4.0, Javascript Security for product security teams
| Anand Kumar Ganesan, Mohammad Arif | #web-security#secure-coding#application-pentesting+2 |
| 2024-09-20 | Talk | 44con |
Unveiling the ghosts of mobile networks: When will old bugs die?
| Altaf Shaik | #5g#authentication#encryption+3 |
| 2024-08-30 | Talk | Hitbsecconf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | #web-security#security-assessment#exploitation+2 |
| 2024-08-10 | Talk | Defcon |
Sneaky Extensions: The MV3 Escape Artists
| Vivek Ramachandran, Shourya Pratap Singh | #web-security#security-assessment#application-pentesting+4 |
| 2024-06-27 | Talk | Troopers |
The Hidden Dangers Lurking in Your Pocket β Pwning Apple Wallet ecosystem and its apps
| Priyank Nigam | #security-assessment#api-security#secure-development |
| 2024-04-18 | Tool demo | Blackhat |
BinderAPI Scanner & BASS
| Krishnaprasad Subramaniam, Jeffrey Gaor, Valen Sai, Eric Tee Hock Nian | #api-security#application-pentesting#dynamic-analysis+3 |
| 2024-04-18 | Talk | Blackhat |
Breaking Managed Identity Barriers In Azure Services
| Nitesh Surana, David Fiser | #azure#cloud-pentesting#access-management+3 |
| 2024-04-18 | Tool demo | Blackhat |
Damn Vulnerable Browser Extension (DVBE) - Unfold the risks for your Browser Supplements
| Abhinav Khanna | #browser-security#web-security#vulnerability-assessment |
| 2024-03-12 | Talk | Nullcon |
Secure Web Gateways are dead. Whatβs next?
| Vivek Ramachandran | #browser-security#application-hardening#security-strategy+2 |
| 2023-12-07 | Tool demo | Blackhat |
Akto - Open Source API Security Tool
| Ankush Jain | #api-security#secure-development#security-testing+3 |
| 2023-09-23 | Talk | Nullcon |
Secure Your Angular App Using JWT And GraphQL
| Ankit Sharma | #blueteam#api-security#secure-development+1 |
| 2023-09-23 | Talk | Nullcon |
Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities
| Nitesh Surana | #azure#cloud-pentesting#application-hardening+4 |
| 2023-08-12 | Tool demo | Defcon |
Open Source API Security for devsecops
| Ankush Jain, Ankita Gupta 1 | #api-security#devsecops#ci-cd+2 |
| 2023-08-12 | Panel | Defcon |
Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert
| Trupti Shiralkar, Kiran Shirali | #appsec#alert-fatigue#vulnerability-assessment |
| 2023-08-11 | Tool demo | Defcon |
vAPI : Vulnerable Adversely Programmed Interface
| Tushar Kulkarni | #api-security#owasp#authorization |
| 2023-08-11 | Talk | Defcon |
Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications
| Ankur Chowdhary | #web-security#xss#application-pentesting+3 |
| 2023-08-10 | Tool demo | Blackhat |
vAPI: Vulnerable Adversely Programmed Interface
| Tushar Kulkarni | #api-security#authorization#security-testing+3 |
| 2023-08-09 | Tool demo | Blackhat |
Akto - Open Source API Security Tool
| Ankush Jain, Ankita Gupta 1 | #api-security#application-pentesting#security-testing+3 |
| 2023-08-06 | Talk | C0c0n |
Mitigating SSRF at scale the right way with IMDSv2!
| Ayush Priya | #web-security#api-security#aws+2 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | #authentication#data-protection#embedded-security |
| 2023-06-01 | Talk | Securityfest |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #reverse-engineering#appsec#endpoint-protection+4 |
| 2023-05-12 | Talk | Blackhat |
Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines
| Rohit Sehgal | #digital-learning#security-training#cybersecurity-education+1 |
| 2023-05-11 | Tool demo | Blackhat |
APKHunt | OWASP MASVS Static Analyzer
| Mrunal Chawda, Sumit Kalaria | #owasp#application-pentesting#code-review+4 |
| 2023-03-23 | Talk | Insomnihack |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #ci-cd#devsecops#supply-chain-security+3 |
| 2022-12-07 | Tool demo | Blackhat |
vAPI: Vulnerable Adversely Programmed Interface
| Tushar Kulkarni | #api-security#application-pentesting#secure-development+4 |
| 2022-09-24 | Talk | C0c0n |
Raining CVEs on Wordpress plugins with Semgrep
| Shreya Pohekar, Syed Sheeraz Ali | #web-security#static-analysis#sast+1 |
| 2022-09-24 | Talk | C0c0n |
Web3 Security - Security in MetaVerse, and the new world of web3
| Rohit Srivastwa | #web3#decentralized-systems#smart-contracts+2 |
| 2022-09-23 | Talk | C0c0n |
Securing your APIs for a cloud native future
| Navendu Pottekkat | #api-security#secure-development#devsecops |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | #api-security#threat-landscape#threat-hunting+1 |
| 2022-09-08 | Tool demo | Nullcon |
ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs
| Rohit Sehgal, Varun Kakumani | #owasp#api-security#cloud-workload-protection+3 |
| 2022-09-08 | Talk | Nullcon |
Raining CVEs On WordPress Plugins With Semgrep
| Shreya Pohekar, Syed Sheeraz Ali | #static-analysis#code-review#secure-coding+3 |
| 2022-09-07 | Talk | Nullcon |
Hacking 5G Is No Rocket Science
| Altaf Shaik, Matteo Strada | #api-security#application-pentesting#security-testing |
| 2022-09-06 | Panel | Nullcon |
PAM Maturity From Zero Trust To Least Privilege
| Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan | #security-strategy#zero-trust#access-management+2 |
| 2022-08-12 | Talk | Defcon |
Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years
| Vivek Ponnada | #secure-coding#devsecops#owasp |
| 2022-08-10 | Talk | Blackhat |
Attacks From a New Front Door in 4G & 5G Mobile Networks
| Altaf Shaik, Shinjo Park, Matteo Strada | #api-security#access-management#identity-theft+4 |
| 2022-04-08 | Talk | Nullcon |
Attack Surfaces for 5G Networks
| Altaf Shaik | #application-pentesting#security-development-lifecycle#api-security |
| 2022-04-08 | Panel | Nullcon |
Digital Identity In The Age Of Fintech
| Sheetal Joseph, Alessandro Avagliano, Guido Reismueller, Benoit Flippen, Travis Carelock | #identity-management#access-management#authentication+4 |
| 2022-03-25 | Talk | Insomnihack |
Hook, Line and Sinker - Pillaging API Webhooks
| Abhay Bhargav | #web-security#api-security#ssrf+1 |
| 2021-11-13 | Talk | C0c0n |
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics
| Kiran Kumar Pg | #authentication#mfa#architecture |
| 2021-11-13 | Talk | C0c0n |
Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application
| Gayatri Nayak | #web-security#authentication#authorization+2 |
| 2021-11-13 | Talk | C0c0n |
Server-side javascript Injection
| Kavisha Sheth | #web-security#secure-coding#web-pentesting |
| 2021-11-11 | Tool demo | Blackhat |
vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10)
| Tushar Kulkarni | #api-security#application-pentesting#security-testing+4 |
| 2020-11-21 | Talk | Appsecindonesia |
Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory
| Abhi M Balakrishnan | #web-security#owasp#application-pentesting+1 |
| 2020-11-11 | Talk | Powerofcommunity |
My Hacking Adventures With Safari Reader Mode
| Nikhil Mittal 1 | #browser-security#ios-security#vulnerability-assessment+1 |
| 2020-10-01 | Tool demo | Blackhat |
OWASP Python Honeypot
| Sri Harsha Gajavalli, Ali Razmjoo | #web-security#owasp#security-assessment+1 |
| 2020-09-18 | Talk | C0c0n |
Introducing SniperPhish: A Web-Email Spear Phishing Toolkit
| Sreehari Haridas, Gem George | #phishing#application-pentesting#security-development-lifecycle+4 |
| 2020-09-18 | Talk | C0c0n |
Broken Cryptography & Account Takeover
| Harsh Bothra | #encryption#ssl#security-testing+2 |
| 2020-09-18 | Talk | C0c0n |
Web Application hacking with WebZGround
| Parveen Yadav, Narendra Kumar | #web-security#web-pentesting#security-assessment+3 |
| 2020-09-16 | Talk | Auscert |
Modern Browser Security - The First line of Defense
| Prateek Gianchandani | #browser-security#exploit-development#fuzzing+1 |
| 2020-08-09 | Talk | Defcon |
Running an appsec program with open source projects
| Vandana Verma Sehgal | #owasp#secure-development#devsecops+3 |
| 2020-03-06 | Tool demo | Nullcon |
FRISPY
| Tejas Girme, Parmanand Mishra | #spyware#red-teaming#api-security+3 |
| 2020-03-06 | Tool demo | Nullcon |
Hachi
| Parmanand Mishra | #att&ck#blueteam#rest-api+1 |
| 2020-03-06 | Tool demo | Nullcon |
spike2kill
| Manish Singh | #web-scraping#ai-security#nlp+4 |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | #linux#secure-coding#web-security+3 |
| 2019-10-11 | Talk | Texascybersummit |
Exploit The State of Embedded Web Security in IoT Devices !
| Aditya K Sood | #iot-security-testing#web-security#embedded-security |
| 2019-09-28 | Talk | Romhack |
Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it
| Samit Anwer | #oauth#phishing#csrf+2 |
| 2019-09-27 | Talk | C0c0n |
Stepping into Password Less Economy
| Ajit Hatti | #authentication#identity-management#secure-development+1 |
| 2019-09-23 | Talk | Rootcon |
Identity crisis: war stories from authentication failures
| Vishal Chauhan | #authentication#identity-management#vulnerability-assessment+3 |
| 2019-08-11 | Talk | Defcon |
Exploiting and Securing iOS Apps using OWASP iGoat
| Swaroop Yermalkar | #ios-security#application-pentesting#security-assessment+3 |
| 2019-08-08 | Talk | Defcon |
Phishing in the cloud era
| Ashwin Vamshi, Abhinav Singh | #phishing#api-security#web-security+2 |
| 2019-08-08 | Talk | Blackhat |
Preventing Authentication Bypass: A Tale of Two Researchers
| Ravi Jaiswal, Terry Zhang, Ron Chan | #security-development-lifecycle#identity-management#authentication+4 |
| 2019-08-08 | Tool demo | Defcon |
Hachi: An Intelligent threat mapper
| Parmanand Mishra | #att&ck#blueteam#rest-api+1 |
| 2019-05-28 | Talk | Securityfest |
Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it
| Samit Anwer | #web-security#iam#appsec |
| 2019-05-21 | Talk | Phdays |
GDALR: an efficient model duplication attack on black-box machine learning models
| Rewanth Tammana, Nikhil Joshi | #red-teaming#machine-learning#api-security+3 |
| 2019-05-09 | Talk | Hitbsecconf |
GDALR: Duplicating Black Box Machine Learning Models
| Rewanth Tammana, Nikhil Joshi | #machine-learning#red-teaming#api-security+2 |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami | #network-pentesting#vulnerability-assessment#firewall+3 |
| 2018-12-06 | Tool demo | Blackhat |
Astra: Automated Security Testing For REST APIs
| Sagar Popat, Harsh Grover | #security-assessment#rest-api#ci-cd |
| 2018-11-27 | Talk | Hitbsecconf |
BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit
| Rewanth Tammana | #red-teaming#application-pentesting#browser-security+2 |
| 2018-10-05 | Talk | C0c0n |
Pentesting GraphQL Applications
| Neelu Tripathy | #security-assessment#application-pentesting#dynamic-analysis+4 |
| 2018-10-05 | Talk | C0c0n |
DomGoat - the DOM Security Playground
| Lavakumar Kuppan | #xss#web-security#input-validation+4 |
| 2018-10-04 | Talk | Confidence |
Hacking 50 Million users using 123456
| Aman Sachdev, Himanshu Sharma | #web-security#authentication#ethical-hacking+2 |
| 2018-09-27 | Talk | Rootcon |
Defending cloud Infrastructures with Cloud Security Suite
| Shivankar Madaan | #aws#secure-coding#web-security+2 |
| 2018-08-12 | Talk | Defcon |
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
| Siddharth Rao, Thanh Bui | #encryption#authentication#ipc+1 |
| 2018-08-11 | Tool demo | Defcon |
Sh00tβAn open platform for manual security testers & bug hunters
| Pavan Mohan | #security-assessment#bug-hunting#secure-coding+1 |
| 2018-08-09 | Tool demo | Blackhat |
OWASP Offensive Web Testing Framework
| Viyat Bhalodia | #owasp#security-assessment#red-teaming |
| 2018-08-09 | Tool demo | Blackhat |
rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat, Ismael Valenzuela | #incident-management#rest-api#forensics |
| 2018-08-08 | Tool demo | Blackhat |
Astra: Automated Security Testing For REST APIs
| Ankur Bhargava, Prajal Kulkarni, Sagar Popat | #security-assessment#rest-api#api-security+4 |
| 2018-06-04 | Talk | Confidence |
From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days
| Himanshu Sharma, Aman Sachdev | #red-teaming#ethical-hacking#security-assessment+2 |
| 2018-05-30 | Talk | Auscert |
How to Bypass Authentication & Authorization
| Sarwar Jahan | #authentication#authorization#web-security+1 |
| 2018-05-29 | Award | |
Data Exfiltration via Formula Injection #Part1
| Ajay Prashar, Balaji Gopal | #data-leak#exploitation#web-security+1 |
| 2018-03-01 | Talk | Nullcon |
Looting your bank savings using Digital India
| Indrajeet Bhuyan | #red-teaming#application-pentesting#api-security+4 |
| 2017-09-13 | Talk | 44con |
Red Team Revenge : Attacking Microsoft ATA
| Nikhil Mittal | #windows#red-teaming#active-directory+4 |
| 2017-08-19 | Talk | C0c0n |
Trust, the foundation of Digital Mastery
| Sunil Varkey | #identity-management#authentication#risk-management+2 |
| 2017-08-18 | Talk | C0c0n |
Case study: Security of Digital Wallet apps in India
| Ashwath Kumar, Sandesh Mysore Anand | #appsec#mobile-pentesting#application-hardening+4 |
| 2017-08-18 | Talk | C0c0n |
Mobile Banking (In)Security
| Sneha Rajguru | #appsec#purpleteam#red-teaming+1 |
| 2017-07-30 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | #secure-coding#red-teaming#blueteam+3 |
| 2017-07-29 | Tool demo | Defcon |
Fuzzapi
| Abhijeth Dugginapeddi, Lalith Rallabhandi, Srinivas Rao | #fuzzing#rest-api#security-assessment |
| 2017-07-27 | Tool demo | Blackhat |
Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday
| Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Rao | #fuzzing#rest-api#security-assessment+1 |
| 2017-06-26 | Tool demo | Blackhat |
DiffDroid
| Anto Joseph | #android#security-assessment#web-security |
| 2017-06-23 | Talk | Hackinparis |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2017-05-23 | Talk | Phdays |
Injecting security into web apps in the runtime
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2017-03-03 | Talk | Nullcon |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2017-01-25 | Talk | Owaspappseccalifornia |
DASTProxy: Donβt let your automated security testing program stall on crawlInstead focus on business context
| Kiran Shirali, Srinivasa Rao Chirathanagandla | #dynamic-analysis#dast#devsecops+2 |
| 2017-01-25 | Talk | Owaspappseccalifornia |
OCSP Stapling in the Wild
| Devdatta Akhawe, Emily Stark | #web-security#architecture#devsecops |
| 2016-11-04 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | #secure-coding#red-teaming#blueteam+3 |
| 2016-10-14 | Talk | Appsecusa |
Automating API Penetration Testing using fuzzapi
| Abhijeth Dugginapeddi, Lalith Rallabhandi | #fuzzing#api-security#application-pentesting+4 |
| 2016-10-07 | Talk | Deepsec |
Inside Stegosploit
| Saumil Shah | #web-security#exploitation#security-assessment |
| 2016-08-19 | Talk | C0c0n |
Kill the password - A new era of authentication
| Tamaghna Basu | #authentication#iam#architecture+1 |
| 2016-08-19 | Talk | C0c0n |
Esoteric XSS Payloads
| Riyaz Walikar | #xss#red-teaming#code-injection+3 |
| 2016-07-01 | Talk | Hackinparis |
DIFFDroid - Dynamic Analysis Made Easier for Android
| Anto Joseph | #android#security-assessment#web-security |
| 2016-03-15 | Talk | Groundzerosummit |
Web App Security
| Harpreet Singh, Himanshu Sharma, Nipun Jaswal | #web-security#api-security#secure-coding+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Authentication flaw in Automatic Bank Passbook printing machine.
| Indrajeet Bhuyan | #authentication#identity-management#application-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
| Aditya K Sood | #ics-security#web-security#firmware-analysis+2 |
| 2015-11-05 | Talk | Groundzerosummit |
XSS - The art of evading web application filters!
| Anirudh Anand | #xss#application-pentesting#input-validation+2 |
| 2015-10-25 | Talk | Toorcon |
PixelCAPTCHA β A Unicode Based CAPTCHA Scheme
| Gursev Singh Kalra | #web-security#authentication#bypassing |
| 2015-09-25 | Talk | Appsecusa |
The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)!
| Aditya K Sood | #scada#hmi#web-security+1 |
| 2015-09-11 | Talk | 44con |
Stegosploit β Drive-by Browser Exploits using only Images
| Saumil Shah | #steganography#red-teaming#web-security+1 |
| 2015-08-07 | Talk | Defcon |
Hacker’s Practice Ground
| Lokesh Pidawekar | #security-assessment#ethical-hacking#vulnerability-assessment+2 |
| 2015-08-01 | Talk | C0c0n |
Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities
| Anant Shrivastava | #owasp#blueteam#security-testing+4 |
| 2015-07-06 | Talk | Blackhat |
DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS
| Ahamed Nafeez | #red-teaming#xss#application-pentesting+2 |
| 2015-05-28 | Talk | Hitbsecconf |
Stegosploit: Hacking With Pictures
| Saumil Shah | #red-teaming#steganography#web-security |
| 2015-03-27 | Talk | Syscan |
Stegosploit - Hacking with Pictures
| Saumil Shah | #steganography#red-teaming#web-security+1 |
| 2015-03-26 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2015-02-06 | Talk | Nullcon |
Pentesting a website with million lines of Javascript
| Lavakumar Kuppan, Ahamed Nafeez | #web-security#security-assessment#application-pentesting+2 |
| 2015-01-27 | Talk | Owaspappseccalifornia |
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe | #web-security#xss#csrf+2 |
| 2014-10-23 | Talk | Hacklu |
Hacking with Images - Evil Pictures
| Saumil Shah | #red-teaming#steganography#application-pentesting+3 |
| 2014-10-23 | Talk | Hacklu |
WiHawk - Router Vulnerability Scanner
| Anamika Singh | #wifi#red-teaming#csrf+1 |
| 2014-09-25 | Talk | Virusbulletin |
Optimized mal-ops. Hack the ad network like a boss
| Rahul Kashyap, Vadim Kotov | #browser-security#web-security#malware-distribution+1 |
| 2014-09-24 | Talk | Brucon |
OWASP: OWTF
| Bharadwaj Machiraju | #security-assessment#application-pentesting#dynamic-analysis+2 |
| 2014-09-12 | Talk | 44con |
Pentesting NoSQL DB’s Using NoSQL Exploitation Framework
| Francis Alexander | #exploitation#web-pentesting#penetration-testing-tools |
| 2014-08-21 | Talk | Usenix |
The Emperorβs New Password Manager: Security Analysis of Web-based Password Managers
| Devdatta Akhawe, Zhiwei Li, Warren He, Dawn Song | #web-security#xss#csrf+2 |
| 2014-06-23 | Talk | Hackinparis |
Pentesting NoSQL DB’s with NoSQL Exploitation Framework
| Francis Alexander | #secure-coding#security-assessment#application-pentesting+4 |
| 2014-05-29 | Talk | Hitbsecconf |
Exploiting NoSQL Like Never Before
| Francis Alexander | #exploitation#web-pentesting#code-injection |
| 2014-03-27 | Talk | Blackhat |
JS Suicide: Using JavaScript Security Features to Kill JS Security
| Ahamed Nafeez | #web-security#red-teaming#csrfguard+1 |
| 2014-03-15 | Talk | Hitbsecconf |
JS Suicide: Using Javascript Security Features to Kill Itself
| Ahamed Nafeez | #web-security#application-pentesting#code-review+3 |
| 2014-02-15 | Tool demo | Nullcon |
DrupSnipe
| Ranjeet Sengar, Sukesh Pappu | #drupal#security-assessment#application-pentesting+2 |
| 2014-02-15 | Tool demo | Nullcon |
OWASP OWTF - The Offensive (Web) Testing Framework
| Bharadwaj Machiraju, Abraham Aranguren | #security-assessment#application-pentesting#security-tools+3 |
| 2014-02-15 | Tool demo | Nullcon |
OWASP Xenotix XSS Exploit Framerwork
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2014-02-15 | Tool demo | Nullcon |
XMLChor
| Harshal Jamdade | #exploitation#web-pentesting#security-tools |
| 2014-02-14 | Talk | Nullcon |
o’Dea Assertions - Untwining the Security of the SAML Protocol
| Achin Kulshrestha | #authentication#saml#sso+2 |
| 2014-02-14 | Talk | Nullcon |
A security analysis of Browser Extensions
| Abhay Rana | #browser-security#web-security#vulnerability-assessment |
| 2014-02-14 | Talk | Nullcon |
phoneypdf: A Virtual PDF Analysis Framework
| Kiran Bandla | #pdf#web-security#red-teaming+2 |
| 2013-11-21 | Talk | Appsecusa |
Wassup MOM? Owning the Message Oriented Middleware
| Gursev Singh Kalra | #api-security#secure-coding#application-pentesting |
| 2013-11-20 | Panel | Appsecusa |
Aim-Ready-Fire
| Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather | #appsec#secure-development#security-strategy |
| 2013-09-27 | Talk | C0c0n |
Lets Play - Applanting on new Grounds
| Ajit Hatti | #android#red-teaming#csrf+1 |
| 2013-09-27 | Talk | C0c0n |
SSRF / XSPA - Real World Attacks and Mitigations
| Riyaz Walikar | #ssrf#xspa#red-teaming |
| 2013-09-27 | Talk | C0c0n |
Snake Bites
| Anant Shrivastava | #secure-coding#security-assessment#xss |
| 2013-08-15 | Talk | Usenix |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
| Devdatta Akhawe, Adrienne Felt | #web-security#security-training#architecture+2 |
| 2013-08-01 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2013-07-31 | Talk | Blackhat |
Clickjacking revisited: A perceptual view of UI security
| Devdatta Akhawe | #clickjacking#blueteam#red-teaming |
| 2013-07-31 | Talk | Blackhat |
Javascript static security analysis made easy with JSPrime
| Nishant Das Patnaik, Sarathi Sabyasachi Sahoo | #web-security#blueteam#application-hardening+4 |
| 2013-03-15 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2013-03-14 | Talk | Blackhat |
Lets play - Applanting
| Ajit Hatti | #red-teaming#csrf#clickjacking+1 |
| 2013-03-01 | Talk | Nullcon |
Inception of graphical passwords
| Rishi Narang | #authentication#application-pentesting#secure-development+3 |
| 2013-03-01 | Talk | Nullcon |
CSRF Finder as a Mozilla Addon
| Piyush Pattanayak | #csrf#blueteam#application-pentesting+4 |
| 2013-03-01 | Talk | Nullcon |
Automating JavaScript Static Analysis
| Lavakumar Kuppan | #web-security#security-assessment#blueteam |
| 2013-03-01 | Talk | Nullcon |
Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework
| Ajin Abraham | #xss#red-teaming#application-pentesting+3 |
| 2012-12-06 | Talk | Blackhat |
Attacking ODATA
| Gursev Singh Kalra | #red-teaming#api-security#application-pentesting+2 |
| 2012-12-01 | Talk | Clubhack |
FatCat Web Based SQL Injector
| Sandeep Kamble | #sqli#red-teaming#input-validation+4 |
| 2012-12-01 | Talk | Clubhack |
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
| Ajin Abraham | #xss#red-teaming#application-pentesting+4 |
| 2012-12-01 | Talk | Clubhack |
XSSshell
| Vandan Joshi | #xss#application-pentesting#code-review+4 |
| 2012-10-26 | Talk | Appsecusa |
XSS & CSRF with HTML5 - Attack, Exploit and Defense
| Shreeraj Shah | #xss#csrf#dynamic-analysis+3 |
| 2012-10-25 | Talk | Appsecusa |
Cross Site Port Scanning
| Riyaz Walikar | #web-security#owasp#api-security |
| 2012-10-11 | Talk | Hitbsecconf |
XSS & CSRF strike back β Powered by HTML5
| Shreeraj Shah | #red-teaming#csrf#cors+1 |
| 2012-10-10 | Talk | Hitbsecconf |
Innovative Approaches to Exploit Delivery
| Saumil Shah | #red-teaming#exploit-delivery#browser-security |
| 2012-09-28 | Talk | Nullcon |
Alert(/xss/) - How to catch an XSS before someone exploits / reports it?
| Ahamed Nafeez | #web-security#xss#secure-coding+2 |
| 2012-09-26 | Talk | Nullcon |
How secure is internet banking in India
| Ajit Hatti | #web-security#authentication#financial-institutions+1 |
| 2012-08-15 | Award | |
Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select)
| Gursev Singh Kalra | #api-security#web-pentesting#security-tools |
| 2012-08-03 | Talk | C0c0n |
Evil JavaScript
| Bishan Singh | #red-teaming#web-security#application-pentesting+4 |
| 2012-07-26 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | #red-teaming#cors#csrf+3 |
| 2012-07-26 | Tool demo | Blackhat |
Bypassing Every CAPTCHA provider with clipcaptcha
| Gursev Singh Kalra | #web-security#bypassing#security-tools |
| 2012-07-25 | Tool demo | Blackhat |
Oyedata for OData Assessments
| Gursev Singh Kalra | #api-security#web-pentesting#security-tools |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | #botnet#web-security#reverse-engineering+1 |
| 2012-05-13 | Talk | Carolinacon |
Attacking CAPTCHAs for Fun and Profit
| Gursev Singh Kalra | #web-security#bypassing#exploitation |
| 2012-03-15 | Talk | Nullcon |
An App(le) a day keeps the wallet away
| Antriksh Shah | #security-assessment#web-security#api-security+1 |
| 2012-03-15 | Talk | Grrcon |
SCADA Security: Why is it so hard?
| Amol Sarwate | #scada#ics-security#authentication+2 |
| 2012-03-14 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | #red-teaming#cors#csrf+3 |
| 2012-03-02 | Award | |
CAPTCHA Re-Riding Attack
| Gursev Singh Kalra | #web-security#bypassing#authentication |
| 2012-02-15 | Talk | Nullcon |
Content sniffing Algorithm bypassing techniques and possible attack vectors
| Anil Aphale, Chaitany Kamble | #red-teaming#xss#web-security+2 |
| 2012-02-15 | Talk | Nullcon |
Javascript static analysis with IronWASP
| Lavakumar Kuppan | #web-security#security-assessment#blueteam |
| 2012-02-15 | Talk | Nullcon |
Node.js: The good, bad and ugly
| Bishan Singh | #web-security#red-teaming#blueteam+1 |
| 2012-02-15 | Talk | Nullcon |
Ra.2 Blackbox DOM-based XSS scanner
| Nishant Das Patnaik, Sarathi Sabyasachi Sahoo | #xss#blueteam#security-assessment |
| 2011-12-04 | Talk | Clubhack |
DOM XSS β Encounters of the 3rd Kind
| Bishan Singh | #xss#red-teaming#secure-coding+4 |
| 2011-11-17 | Award | |
CAPTCHA Hax With TesserCap
| Gursev Singh Kalra | #web-security#bypassing#authentication |
| 2011-10-07 | Talk | C0c0n |
Password Less Authentication, Authorization
| Srikar Sagi | #authentication#authorization#iam |
| 2011-10-07 | Talk | Virusbulletin |
Browser exploit packs - exploitation paradigm
| Aditya K Sood, Richard J Enbody | #exploit-kit#malware-research#browser-security+1 |
| 2011-09-19 | Talk | Brucon |
Step-by-Step for Software Security (that anyone can follow)
| Pravir Chandra | #software-security#secure-development#devsecops+4 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy β An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2011-09-06 | Talk | Securitybyte |
Application Security Strategies
| K K Mookhey | #secure-coding#secure-development#web-security+3 |
| 2011-09-06 | Talk | Securitybyte |
Enabling Un-trusted Mashups
| Bishan Singh | #web-security#xss#csrf+4 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | #social-engineering#web-security#security-training+1 |
| 2011-08-03 | Talk | Blackhat |
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex
| Shreeraj Shah | #reverse-engineering#ajax#web-security+1 |
| 2011-05-20 | Talk | Hitbsecconf |
Next Generation Web Attacks β HTML 5, DOM(L3) and XHR(L2)
| Shreeraj Shah | #red-teaming#cors#csrf+3 |
| 2011-02-25 | Talk | Nullcon |
Lessons Learned From 2010
| Saumil Shah | #red-teaming#exploit-delivery#social-engineering+2 |
| 2011-02-25 | Talk | Nullcon |
(secure) SiteHoster β Disable XSS & SQL Injection
| Abhishek Kumar | #xss#sqli#blueteam+1 |
| 2010-11-11 | Talk | Blackhat |
Attacking with HTML5
| Lavakumar Kuppan | #web-security#xss#web-pentesting+1 |
| 2010-10-13 | Talk | Hitbsecconf |
Hacking a Browserβs DOM β Exploiting Ajax and RIA
| Shreeraj Shah | #red-teaming#web-security#ajax+3 |
| 2010-07-30 | Talk | Defcon |
Hacking Oracle From Web Apps
| Sumit Siddharth | #sql-injection#application-pentesting#security-testing+2 |
| 2010-07-29 | Talk | Blackhat |
Hacking Browser’s DOM - Exploiting Ajax and RIA
| Shreeraj Shah | #red-teaming#ajax#application-pentesting+4 |
| 2010-07-29 | Talk | Blackhat |
Hacking Oracle From Web Apps
| Sumit Siddharth | #red-teaming#sql-injection#application-pentesting+3 |
| 2010-07-01 | Talk | Hitbsecconf |
Top 10 Web 2.0 Attacks and Exploits
| Shreeraj Shah | #red-teaming#cors#csrf+3 |
| 2010-06-18 | Talk | Syscan |
REVERSE ENGINEERING WEB 2.0 APPLICATIONS
| Shreeraj Shah | #reverse-engineering#ajax#web-security+1 |
| 2010-03-15 | Talk | Blackhat |
400 Apps in 40 Days
| Nish Bhalla, Sahba Kazerooni | #risk-management#application-pentesting#attack-surface+1 |
| 2010-03-02 | Award | |
Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution
| Lavakumar Kuppan | #clickjacking#application-hardening#security-testing+1 |
| 2010-02-03 | Talk | Blackhat |
Beware of Serialized GUI Objects Bearing Data
| Rohini Sulatycki, David Byrne | #apache-myfaces#sun-mojarra#red-teaming+1 |
| 2009-12-05 | Talk | Clubhack |
Lust 2.0 β Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#red-teaming#phishing+1 |
| 2009-12-05 | Talk | Clubhack |
Incident Handling and Log Analysis for Web Based Incidents
| Manindra Kishore | #incident-management#forensics#application-pentesting+2 |
| 2009-11-18 | Talk | Securitybyte |
Hacking Oracle From Web
| Sumit Siddharth | #red-teaming#sql-injection#application-hardening+1 |
| 2009-05-19 | Talk | Syscan |
Securing Enterprise Applications
| Shreeraj Shah | #web-security#ajax#xss+4 |
| 2008-10-29 | Talk | Hitbsecconf |
Top 10 Web 2.0 Attacks
| Shreeraj Shah | #web-security#ajax#xss+4 |
| 2008-10-22 | Talk | Hacklu |
Browser Exploits - A new model for Browser security
| Saumil Shah | #red-teaming#application-hardening#browser-security+4 |
| 2008-08-21 | Talk | Owaspappsecindia |
AppSec For Managers
| Nish Bhalla | #appsec#owasp#blueteam |
| 2008-08-20 | Talk | Owaspappsecindia |
Web 2.0 Attacks - Next Generation Threats on the Rise
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+3 |
| 2008-08-20 | Talk | Owaspappsecindia |
Application Security Trends & Challenges
| Kamlesh Bajaj | #owasp#appsec#secure-development+4 |
| 2008-08-20 | Talk | Owaspappsecindia |
Building Enterprise AppSec Program
| Nish Bhalla | #appsec#secure-development#security-testing+4 |
| 2008-08-20 | Talk | Owaspappsecindia |
Web Application Security: Too Costly To Ignore
| Rajesh Nayak | #appsec#blueteam#application-hardening+4 |
| 2008-04-16 | Talk | Hitbsecconf |
Securing Next Generation Applications Γ’β¬β Scan, Detect and Mitigate
| Shreeraj Shah | #web-security#ajax#xss+4 |
| 2008-02-20 | Talk | Blackhat |
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+3 |
| 2007-12-19 | Talk | Clubhack |
Backdoor 2.0: Hacking Firefox to steal his web secrets
| Sunil Arora | #red-teaming#application-pentesting#browser-security+2 |
| 2007-11-20 | Talk | Deepsec |
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
| Shreeraj Shah | #ajax#web-security#blueteam |
| 2007-09-06 | Talk | Hitbsecconf |
Hacking Ajax and Web Services Γ’β¬β Next Generation Web Attacks on the Rise
| Shreeraj Shah | #red-teaming#ajax#web-security |
| 2007-04-05 | Talk | Hitbsecconf |
WEB 2.0 Hacking β Defending Ajax and Web Services
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+2 |
| 2007-03-15 | Talk | Blackhat |
Exploit-Me Series β Free Firefox Application Penetration Testing Suite Launch
| Nish Bhalla, Rohit Sethi | #web-security#xss#sql-injection+4 |
| 2006-08-02 | Talk | Blackhat |
SQL Injections by Truncation
| Bala Neerumalla | #web-security#sql-injection#secure-coding |
| 2005-09-26 | Talk | Hitbsecconf |
Web hacking Kung-Fu and Art of Defense
| Shreeraj Shah | #blueteam#application-pentesting#code-review+4 |
| 2005-06-10 | Talk | Syscan |
.Net Web Security-Attack And Defense
| Shreeraj Shah | #.net#web-security#web-pentesting |
| 2001-11-21 | Talk | Blackhat |
One-Way SQL Hacking : Futility of Firewalls in Web Hacking
| Saumil Shah | #firewall#red-teaming#sql-injection+2 |