| S.No |
Name of Entry |
What is missing |
| 1 |
2025/10/10 : C0c0n : Talk : Ghosts in Your Git Hub Actions and Ai's Hunt for Hidden Exploits
|
presentation, Video |
| 2 |
2025/08/07 : Blackhat : Talk : Weaponizing Apple Ai for Offensive Operations
|
presentation, Video |
| 3 |
2025/04/29 : Rsac : Talk : It’s Always Risky in It Frontline Stories and Strategic Insights
|
presentation, Video |
| 4 |
2025/04/29 : Rsac : Talk : Rag Narok What Poorly Built Rags Can Do to Data Security
|
presentation, Video |
| 5 |
2025/04/03 : Blackhat : Talk : Cloud Security Building Connections in the Cloud
|
presentation, Video |
| 6 |
2025/03/14 : Insomnihack : Talk : The Art of Malware Smuggling ( Unmasking Svg Based Attack Techniques)
|
presentation, Video |
| 7 |
2025/03/02 : Nullcon : Talk : Cyber Security From Telco Lens
|
presentation, Video |
| 8 |
2025/03/01 : Nullcon : Talk : Drawing Parallels Between I Os and MAC Os Pentesting With Dvma
|
presentation, Video |
| 9 |
2024/11/21 : Deepsec : Talk : Hacking With Physics V2.0
|
presentation, Video |
| 10 |
2024/11/16 : C0c0n : Talk : Invisible Invaders Bypassing Email Security With Legitimate Tools
|
presentation, Video |
| 11 |
2024/11/16 : C0c0n : Talk : Access for Sale Inside the World of Ransomware Affiliates and Initial Access Brokers
|
presentation, Video |
| 12 |
2024/11/16 : C0c0n : Talk : Active Directory Deception Strategies
|
presentation, Video |
| 13 |
2024/11/16 : C0c0n : Talk : Breach of the Borderless Cyber Threat Actors Targeting India's Cyberspace
|
presentation, Video |
| 14 |
2024/11/16 : C0c0n : Talk : Hacking the Non Windows Frontier Thick Client Pentesting on Linux & MAC
|
presentation, Video |
| 15 |
2024/11/16 : C0c0n : Talk : Key Note
|
presentation, Video |
| 16 |
2024/11/16 : C0c0n : Talk : Old Bugs, New Tricks How N Day Vulnerabilities Are Fueling Today's Threat Landscape
|
presentation, Video |
| 17 |
2024/11/16 : C0c0n : Talk : Ride on the House Exploiting Public Transport Ticketing Systems for Free Rides
|
presentation, Video |
| 18 |
2024/11/16 : C0c0n : Talk : Serverless Phishing Factory Automate, Attack, Adapt
|
presentation, Video |
| 19 |
2024/11/16 : C0c0n : Talk : The Stealth Code Conspiracy Unmasking Hidden Threats in Ci Cd Pipelines
|
presentation, Video |
| 20 |
2024/11/16 : C0c0n : Talk : The Subtle Art of Checkmating Cisos
|
presentation, Video |
| 21 |
2024/11/16 : C0c0n : Talk : Who Is Holding the Marauders Map?
|
presentation, Video |
| 22 |
2024/11/15 : C0c0n : Talk : [ Yodha] Nightingale Docker for Pentesters
|
presentation, Video |
| 23 |
2024/11/15 : C0c0n : Talk : [ Yodha] Red Cloud a Multi Cloud Hacking Os
|
presentation, Video |
| 24 |
2024/11/15 : C0c0n : Talk : [ Yodha] Scagoat Software Composition Analysis ( Sca) Vulnerability Exploration Tool
|
presentation, Video |
| 25 |
2024/11/15 : C0c0n : Talk : Automated Security Engineer Co Pilot Leveraging Large Language Models for Enhanced Code Security
|
presentation, Video |
| 26 |
2024/11/15 : C0c0n : Talk : Breaking the Defences in Depth Analysis of Edr and Av Tampering Techniques
|
presentation, Video |
| 27 |
2024/11/15 : C0c0n : Talk : Ciso's Take on Byoai
|
presentation, Video |
| 28 |
2024/11/15 : C0c0n : Talk : Gen Ai and Autonomous Security in the Age of Zero Trust
|
presentation, Video |
| 29 |
2024/11/15 : C0c0n : Talk : Hackers Highway Uncovering Vulnerabilities Hidden Behind Every Car's License Plate
|
presentation, Video |
| 30 |
2024/11/15 : C0c0n : Talk : Know Your Enemies Deep Dive Into Ransomware Threat Groups
|
presentation, Video |
| 31 |
2024/11/15 : C0c0n : Talk : PC I 4.0, Javascript Security for Product Security Teams
|
presentation, Video |
| 32 |
2024/11/15 : C0c0n : Talk : Remote Whispers of Mobile Sim
|
presentation, Video |
| 33 |
2024/11/06 : Blackalps : Talk : ID at Loader the Malware’s Camouflaged Weapon
|
presentation, Video |
| 34 |
2024/09/20 : 44 Con : Talk : Unveiling the Ghosts of Mobile Networks When Will Old Bugs Die?
|
presentation, Video |
| 35 |
2024/08/10 : Defcon : Talk : Sneaky Extensions the Mv3 Escape Artists
|
presentation, Video |
| 36 |
2024/08/09 : Defcon : Talk : Breaking Secure Web Gateways ( Swg) for Fun and Profit
|
presentation, Video |
| 37 |
2024/05/06 : Rsac : Talk : Headspace's Privacy Operations Center and Vault
|
presentation, Video |
| 38 |
2024/03/21 : Can Sec West : Talk : Rolling in the Dough How Microsoft Identified and Remidiated a Baker's Dozen of Security Threats in the Windows DNS Server
|
presentation, Video |
| 39 |
2024/03/12 : Nullcon : Talk : Secure Web Gateways Are Dead. What’s Next?
|
presentation, Video |
| 40 |
2023/11/17 : Deepsec : Talk : Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption
|
presentation, Video |
| 41 |
2023/09/29 : Hackinparis : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor
|
presentation, Video |
| 42 |
2023/09/28 : Hackinparis : Talk : How to Have Visibility and Security of Cicd Ecosystem
|
presentation, Video |
| 43 |
2023/08/12 : Defcon : Talk : Getting More Bang for Your Buck Appsec on a Limited Budget
|
presentation, Video |
| 44 |
2023/08/11 : Defcon : Talk : Generative Adversarial Network ( Gan) Based Autonomous Penetration Testing for Web Applications
|
presentation, Video |
| 45 |
2023/08/07 : C0c0n : Talk : Cellibrite Premium Mobile Forensic Tool I Phone Analysis
|
presentation, Video |
| 46 |
2023/08/07 : C0c0n : Talk : Citizen Mobile Security Responsibilities, Accountability, and Impacts
|
presentation, Video |
| 47 |
2023/08/07 : C0c0n : Talk : Darkweb Investigations
|
presentation, Video |
| 48 |
2023/08/07 : C0c0n : Talk : Esoc Trinetra Project
|
presentation, Video |
| 49 |
2023/08/07 : C0c0n : Talk : Exploring Threats in Operational Technology
|
presentation, Video |
| 50 |
2023/08/06 : C0c0n : Talk : Ai in Cyber Security and Crime Prevention
|
presentation, Video |
| 51 |
2023/08/06 : C0c0n : Talk : Cryptocurrencies and Challenges to Law Enforcement Agencies
|
presentation, Video |
| 52 |
2023/08/06 : C0c0n : Talk : Cybercrimes Victim Compensation Legal Remedies and Process
|
presentation, Video |
| 53 |
2023/08/06 : C0c0n : Talk : Dark Web for Investigations
|
presentation, Video |
| 54 |
2023/08/06 : C0c0n : Talk : Developments in Deep Fake Detection
|
presentation, Video |
| 55 |
2023/08/06 : C0c0n : Talk : Digital Innovation and Its Impact on Cios, Cisos and Dpos
|
presentation, Video |
| 56 |
2023/08/06 : C0c0n : Talk : Influence of Artificial Intelligence in Grc Space
|
presentation, Video |
| 57 |
2022/09/28 : Rootcon : Talk : Gazing Into the Crystal Ball the Fog of Cyberwarfare Escalations
|
presentation, Video |
| 58 |
2022/09/24 : C0c0n : Talk : Bec, Still the Sure Shot Trap
|
presentation, Video |
| 59 |
2022/09/24 : C0c0n : Talk : Building Smart, Resilient and Sustainable Cyber Eco System
|
presentation, Video |
| 60 |
2022/09/24 : C0c0n : Talk : Canalyse a Vehicle Network Analysis and Attack Tool
|
presentation, Video |
| 61 |
2022/09/24 : C0c0n : Talk : Citizen Mobile Security ( Icamps)
|
presentation, Video |
| 62 |
2022/09/24 : C0c0n : Talk : Cryptocurrency Forensics
|
presentation, Video |
| 63 |
2022/09/24 : C0c0n : Talk : Cyber Defence and Role of Private Players Public Private Partnership
|
presentation, Video |
| 64 |
2022/09/24 : C0c0n : Talk : Deep Learning to Detect Network Attacks
|
presentation, Video |
| 65 |
2022/09/24 : C0c0n : Talk : In Production With Grc for Cloud
|
presentation, Video |
| 66 |
2022/09/24 : C0c0n : Talk : Introduction to Rfid Nfc Hacking
|
presentation, Video |
| 67 |
2022/09/24 : C0c0n : Talk : Know Your Organization? Mapping Entities in Google Workspace
|
presentation, Video |
| 68 |
2022/09/24 : C0c0n : Talk : Need for Advanced Soc
|
presentation, Video |
| 69 |
2022/09/24 : C0c0n : Talk : OSI Nt Tools and Techniques
|
presentation, Video |
| 70 |
2022/09/24 : C0c0n : Talk : Power of Narratives in Cyber Security
|
presentation, Video |
| 71 |
2022/09/24 : C0c0n : Talk : Raining Cves on Wordpress Plugins With Semgrep
|
presentation, Video |
| 72 |
2022/09/24 : C0c0n : Talk : Rationalizing Cyber Security Risk in Risk Language
|
presentation, Video |
| 73 |
2022/09/24 : C0c0n : Talk : Towards an Effective Intrusion Detection System Framework for Multi Channel Man in the Middle Attacks Against Protected Wi Fi Networks
|
presentation, Video |
| 74 |
2022/09/24 : C0c0n : Talk : Weaponising Social Media for Psychological Operations
|
presentation, Video |
| 75 |
2022/09/24 : C0c0n : Talk : Web3 Security Security in Meta Verse, and the New World of Web3
|
presentation, Video |
| 76 |
2022/09/23 : C0c0n : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor
|
presentation, Video |
| 77 |
2022/09/23 : C0c0n : Talk : Attacking Connected Industries in 5 G Networks
|
presentation, Video |
| 78 |
2022/09/23 : C0c0n : Talk : Battle of 300 Crore How They Lost It and Got Most of It Back
|
presentation, Video |
| 79 |
2022/09/23 : C0c0n : Talk : Bridging the Gap Between Security and Operations
|
presentation, Video |
| 80 |
2022/09/23 : C0c0n : Talk : Building a Safer and Innovative Digital Ecosystem
|
presentation, Video |
| 81 |
2022/09/23 : C0c0n : Talk : Collaborative Efforts for Safe Digital Banking
|
presentation, Video |
| 82 |
2022/09/23 : C0c0n : Talk : Common Misconfigurations in Your Kubernetes Cluster and What Can You Do About It?
|
presentation, Video |
| 83 |
2022/09/23 : C0c0n : Talk : Cybersecurity for Manufacturing
|
presentation, Video |
| 84 |
2022/09/23 : C0c0n : Talk : Hacking Smart Contracts
|
presentation, Video |
| 85 |
2022/09/23 : C0c0n : Talk : Hyperledger Fabric & Ethereum Apps Security Deep Dive
|
presentation, Video |
| 86 |
2022/09/23 : C0c0n : Talk : Log4j Vulnerability Continuous to Be Favourite for Apt Groups Through Mid 2022
|
presentation, Video |
| 87 |
2022/09/23 : C0c0n : Talk : Pwning Android Apps at Scale
|
presentation, Video |
| 88 |
2022/09/23 : C0c0n : Talk : Ransomware Prevention, Early Detection and Response
|
presentation, Video |
| 89 |
2022/09/23 : C0c0n : Talk : Rolling Out Central Bank Digital Currency Technical Design Considerations
|
presentation, Video |
| 90 |
2022/09/23 : C0c0n : Talk : Securing Your Apis for a Cloud Native Future
|
presentation, Video |
| 91 |
2022/09/23 : C0c0n : Talk : Startup Ecosystem and Investments in Post Covid Era
|
presentation, Video |
| 92 |
2022/09/23 : C0c0n : Talk : Technological Reliance for Resilience
|
presentation, Video |
| 93 |
2022/09/23 : C0c0n : Talk : Threats Landscape and Intelligence of API & Shield to Protect
|
presentation, Video |
| 94 |
2022/09/23 : C0c0n : Talk : Tracking the Bad Guys. an Interesting Story of How the Criminal Underground Operates
|
presentation, Video |
| 95 |
2022/09/23 : C0c0n : Talk : Tropic Trooper Targets High Profile Victims Using Newly Discovered Mqtt Backdoor
|
presentation, Video |
| 96 |
2022/08/14 : Defcon : Talk : Tales From the Trenches Why Organizations Struggle to Get Even the Basics of Ot Asset Visibility & Detection Right
|
presentation, Video |
| 97 |
2022/08/11 : The Diana Initiative : Talk : Connecting Dots Between Security Teams & Customer Expectations
|
presentation, Video |
| 98 |
2022/08/11 : The Diana Initiative : Talk : The Real Cost of Free What You Need to Know Before Downloading a Free App
|
presentation, Video |
| 99 |
2022/07/24 : May Contain Hackers : Talk : No Permissions Needed!
|
presentation, Video |
| 100 |
2022/07/23 : Hope : Talk : Combating Ransom War Evolving Landscape of Ransomware Infections in Cloud Databases
|
presentation, Video |
| 101 |
2022/07/23 : May Contain Hackers : Talk : How Would a Real Life Social Media Be Like?
|
presentation, Video |
| 102 |
2021/11/19 : Hackfest : Talk : Hacking With Physics
|
presentation, Video |
| 103 |
2021/11/18 : Hackinparis : Talk : Is It Really an Intrusion if You Get Called In? Mis Configuration Based Attacks in Aws
|
presentation, Video |
| 104 |
2021/11/13 : C0c0n : Talk : Decoding New Age Hackers and Criminal Investigation
|
presentation, Video |
| 105 |
2021/11/13 : C0c0n : Talk : A Look Into Cyber Espionage Activities Targeting Critical Infrastructure in India
|
presentation, Video |
| 106 |
2021/11/13 : C0c0n : Talk : Building Global Cyber Security Company Out of India Key Lessons Learnt During My Entrepreneurship Journey
|
presentation, Video |
| 107 |
2021/11/13 : C0c0n : Talk : Case Study Cyber Heist in a Bank and Recovery of Systems and Money
|
presentation, Video |
| 108 |
2021/11/13 : C0c0n : Talk : Case Study E Crime Group Targeting Mobile Users
|
presentation, Video |
| 109 |
2021/11/13 : C0c0n : Talk : Changing Cyber Security Paradigm & Cyber Tsunami
|
presentation, Video |
| 110 |
2021/11/13 : C0c0n : Talk : Cloud Threat Landscape
|
presentation, Video |
| 111 |
2021/11/13 : C0c0n : Talk : Connecting the Dots Between Customers and Security Teams
|
presentation, Video |
| 112 |
2021/11/13 : C0c0n : Talk : Crisis Capitalization in a Pandemic
|
presentation, Video |
| 113 |
2021/11/13 : C0c0n : Talk : Cyber Warfare & Securing Critical Infrastructures
|
presentation, Video |
| 114 |
2021/11/13 : C0c0n : Talk : Cybersecurity in the Era of Resilience a Walk Through People, Process and Technology
|
presentation, Video |
| 115 |
2021/11/13 : C0c0n : Talk : Emerging Trends in Cyber Crimes Investigation Tools & Techniques
|
presentation, Video |
| 116 |
2021/11/13 : C0c0n : Talk : Enhancing an Multi Factor Authentication ( Mfa) Through Behavioural Biometrics
|
presentation, Video |
| 117 |
2021/11/13 : C0c0n : Talk : Exploiting 2 A( Authentication and Authorization) Vulnerabilities of Web Application
|
presentation, Video |
| 118 |
2021/11/13 : C0c0n : Talk : Introducing Free & Open Elastic Limitless Xdr
|
presentation, Video |
| 119 |
2021/11/13 : C0c0n : Talk : Machine Learning to Detect Chia Mining
|
presentation, Video |
| 120 |
2021/11/13 : C0c0n : Talk : Mature Your Threat Hunting Program
|
presentation, Video |
| 121 |
2021/11/13 : C0c0n : Talk : Need for Zero Trust in Banking
|
presentation, Video |
| 122 |
2021/11/13 : C0c0n : Talk : New Way of Looking at the Hidden Mysteries in the Code
|
presentation, Video |
| 123 |
2021/11/13 : C0c0n : Talk : Post Pandemic Transformation a Ciso's Perspective
|
presentation, Video |
| 124 |
2021/11/13 : C0c0n : Talk : Securing Ot in O& G Industry
|
presentation, Video |
| 125 |
2021/11/13 : C0c0n : Talk : Third Party Risk Management
|
presentation, Video |
| 126 |
2021/11/13 : C0c0n : Talk : Zero Trust & Micro Segmentation
|
presentation, Video |
| 127 |
2021/11/12 : C0c0n : Talk : “ Let’s Go Phishing” Discerning the Insidious Nature of Social Engineering
|
presentation, Video |
| 128 |
2021/11/12 : C0c0n : Talk : 2021 Supply Chain Attacks Analysis
|
presentation, Video |
| 129 |
2021/11/12 : C0c0n : Talk : Data Security and Privacy
|
presentation, Video |
| 130 |
2021/11/12 : C0c0n : Talk : Dissecting Malicious Software and Analysis
|
presentation, Video |
| 131 |
2021/11/12 : C0c0n : Talk : Enterprise Governance and Risk Management
|
presentation, Video |
| 132 |
2021/11/12 : C0c0n : Talk : Executive Presence....a Cardinal of the Cyber Rostrum
|
presentation, Video |
| 133 |
2021/11/12 : C0c0n : Talk : Ics Security a Need, a Challenge and a New Change in Mindset
|
presentation, Video |
| 134 |
2021/11/12 : C0c0n : Talk : Io T Security Guidelines & Standards
|
presentation, Video |
| 135 |
2021/11/12 : C0c0n : Talk : Post Covid Cisos Disappearing Trusted Boundaries and Innovative Cyber Security Approaches
|
presentation, Video |
| 136 |
2021/11/12 : C0c0n : Talk : Regulating Social Media Platforms Should It Be Done in Democratic Societies ?
|
presentation, Video |
| 137 |
2021/11/12 : C0c0n : Talk : The Evolving Nature of Cyber Community
|
presentation, Video |
| 138 |
2021/11/12 : C0c0n : Talk : Understanding the Psychology Behind Threats Adding Twists to Your Turns
|
presentation, Video |
| 139 |
2020/11/21 : App Sec Indonesia : Talk : Learn How to Find and Exploit Race Conditions in Web Apps With Owasp Time Gap Theory
|
presentation, Video |
| 140 |
2020/11/21 : App Sec Indonesia : Talk : The Caveats of the Unseen Crouching Exposure, Hidden Misconfiguration
|
presentation, Video |
| 141 |
2020/11/21 : App Sec Indonesia : Talk : Threat Defense Defending the Att& Ck With Ttp’s
|
presentation, Video |
| 142 |
2020/09/18 : C0c0n : Talk : Herd Immunity, in the Cyber World
|
presentation, Video |
| 143 |
2020/09/18 : C0c0n : Talk : All About Iot Forensics
|
presentation, Video |
| 144 |
2020/09/18 : C0c0n : Talk : Automation in Bug Bounties to Work Smarter
|
presentation, Video |
| 145 |
2020/09/18 : C0c0n : Talk : Broken Cryptography & Account Takeover
|
presentation, Video |
| 146 |
2020/09/18 : C0c0n : Talk : Deep Learning for Intrusion Attempt Detection
|
presentation, Video |
| 147 |
2020/09/18 : C0c0n : Talk : My Top 3 Findings in Bug Bounty Journey Aiming for High Impact Issues
|
presentation, Video |
| 148 |
2020/09/18 : C0c0n : Talk : Reverse Engineering Bare Metal Io T Firmwares Moving Beyond Linux
|
presentation, Video |
| 149 |
2020/09/18 : C0c0n : Talk : Supercharging Your Initial Foothold in Red Team Engagements
|
presentation, Video |
| 150 |
2020/08/21 : The Diana Initiative : Talk : Trust, No Trust or Zero Trust Myth Demystifying
|
presentation, Video |
| 151 |
2020/07/26 : Hitb Sec Conf : Talk : Swapping Asprin Formulas With Mdma While Red Teaming a Billion Dollar Company
|
presentation, Video |
| 152 |
2020/04/25 : Hitb Sec Conf : Talk : The State of Ics Security Then and Now
|
presentation, Video |
| 153 |
2020/04/24 : Hitb Sec Conf : Talk : Commsec the State of Ics Security Then and Now
|
presentation, Video |
| 154 |
2020/03/06 : Nullcon : Talk : Automated Classification of Web Application Attacks for Intrusion Detection
|
presentation, Video |
| 155 |
2019/11/01 : App Sec Day Australia : Talk : A Purple Team View of Serverless and Graph Ql Applications
|
presentation, Video |
| 156 |
2019/10/22 : Hacklu : Talk : Intro to Dark Arts Getting Started With Ctfs
|
presentation, Video |
| 157 |
2019/10/12 : Texas Cyber Summit : Talk : Hx 3012 Perfidious Make Pe Backdooring Great Again!
|
presentation, Video |
| 158 |
2019/10/12 : Texas Cyber Summit : Talk : Th 2020 Rastrea2r Collecting & Hunting for Iocs With Gusto and Style
|
presentation, Video |
| 159 |
2019/10/11 : Texas Cyber Summit : Talk : Exploit the State of Embedded Web Security in Io T Devices !
|
presentation, Video |
| 160 |
2019/10/03 : Virus Bulletin : Talk : Curious Tale of 8.t Used by Multiple Campaigns Against South Asia
|
presentation, Video |
| 161 |
2019/09/28 : C0c0n : Talk : Vulnerability Prioritization With Threat Intelligence
|
presentation, Video |
| 162 |
2019/09/27 : C0c0n : Talk : A Day in the Life of a Ciso
|
presentation, Video |
| 163 |
2019/09/27 : C0c0n : Talk : Advanced Persistent Threat and Counter Measures
|
presentation, Video |
| 164 |
2019/09/27 : C0c0n : Talk : Ai, Ml and Security
|
presentation, Video |
| 165 |
2019/09/27 : C0c0n : Talk : Auto Source an Automated Framework for Source Code Review
|
presentation, Video |
| 166 |
2019/09/27 : C0c0n : Talk : Block Chain for Secured Automation
|
presentation, Video |
| 167 |
2019/09/27 : C0c0n : Talk : Building a Cloud Security Monitoring and Auditing Framework
|
presentation, Video |
| 168 |
2019/09/27 : C0c0n : Talk : Ciso Mind Set
|
presentation, Video |
| 169 |
2019/09/27 : C0c0n : Talk : Cyber Hygiene From Enterprise Point of View
|
presentation, Video |
| 170 |
2019/09/27 : C0c0n : Talk : Demystifying Health Care Security
|
presentation, Video |
| 171 |
2019/09/27 : C0c0n : Talk : Detection of Tor Sources Using Artificial Intelligence
|
presentation, Video |
| 172 |
2019/09/27 : C0c0n : Talk : Doing Sec Ops for the Cloud Using Cloud Native Services
|
presentation, Video |
| 173 |
2019/09/27 : C0c0n : Talk : Hacking Ics Devices for Fun
|
presentation, Video |
| 174 |
2019/09/27 : C0c0n : Talk : Industry 4.0 Security and Compliance
|
presentation, Video |
| 175 |
2019/09/27 : C0c0n : Talk : Lessons Learned Form Data Breaches in the Cloud
|
presentation, Video |
| 176 |
2019/09/27 : C0c0n : Talk : Looking a Decade Ahead Big Data, Drones , Robots and Cyber Security.
|
presentation, Video |
| 177 |
2019/09/27 : C0c0n : Talk : Offensive Machine Learning for Pentesters and Red Teams
|
presentation, Video |
| 178 |
2019/09/27 : C0c0n : Talk : Practical Approach to Cyber Security for Financial Institutions
|
presentation, Video |
| 179 |
2019/09/27 : C0c0n : Talk : Ransomware to Pay or Not to Pay
|
presentation, Video |
| 180 |
2019/09/27 : C0c0n : Talk : Securing Payment Data With PC I Security Standards and Programs
|
presentation, Video |
| 181 |
2019/09/27 : C0c0n : Talk : Security @Scale for Startups
|
presentation, Video |
| 182 |
2019/09/27 : C0c0n : Talk : Serverless Soar
|
presentation, Video |
| 183 |
2019/09/27 : C0c0n : Talk : Stepping Into Password Less Economy
|
presentation, Video |
| 184 |
2019/09/13 : Global App Sec : Talk : A Purple Team View of Serverless and Graph Ql Applications
|
presentation, Video |
| 185 |
2019/09/13 : Global App Sec : Talk : Real Time Vulnerability Alerting by Using Principles From the United States Tsunami Warning Center
|
presentation, Video |
| 186 |
2019/08/11 : Defcon : Talk : Exploiting and Securing I Os Apps Using Owasp I Goat
|
presentation, Video |
| 187 |
2019/08/08 : Defcon : Talk : Anatomy of Cloud Hacking
|
presentation, Video |
| 188 |
2019/05/21 : Phdays : Talk : Fuzzing 101
|
presentation, Video |
| 189 |
2019/05/21 : Phdays : Talk : Rapid Hardware Hacking 101
|
presentation, Video |
| 190 |
2019/05/04 : Thot Con : Talk : What the Frida Gave Me a Novel Take on E Ticket Forging and E Ticket Stealing
|
presentation, Video |
| 191 |
2019/02/28 : Nullcon : Talk : Dirty Use of Ussd Codes
|
presentation, Video |
| 192 |
2018/11/02 : Hitb Sec Conf : Talk : Defending the Enterprise in 2018
|
presentation, Video |
| 193 |
2018/10/10 : Brucon : Talk : Simplifying the Art of Instrumentation
|
presentation, Video |
| 194 |
2018/10/05 : C0c0n : Talk : Defending Cloud Infrastructures With Cloud Security Suite
|
presentation, Video |
| 195 |
2018/10/05 : C0c0n : Talk : DNS Exfiltration and Out of Band Attacks
|
presentation, Video |
| 196 |
2018/10/05 : C0c0n : Talk : Adaptive Grc
|
presentation, Video |
| 197 |
2018/10/05 : C0c0n : Talk : Artificial Intelligence and Social Media Analytics in Criminal Investigation
|
presentation, Video |
| 198 |
2018/10/05 : C0c0n : Talk : Blockchains as Techno Power Structures Towards Emergence of P2 P Politics
|
presentation, Video |
| 199 |
2018/10/05 : C0c0n : Talk : Cyber Security in Health Care Industry
|
presentation, Video |
| 200 |
2018/10/05 : C0c0n : Talk : Cybersecurity Embedded Digital Transformation the Future
|
presentation, Video |
| 201 |
2018/10/05 : C0c0n : Talk : Data Management Challenge for Privacy Compliance
|
presentation, Video |
| 202 |
2018/10/05 : C0c0n : Talk : Dealing With Changing Threat Landscape
|
presentation, Video |
| 203 |
2018/10/05 : C0c0n : Talk : Defending Healthcare Base
|
presentation, Video |
| 204 |
2018/10/05 : C0c0n : Talk : Digital Innovation Revolution in Kerala Government
|
presentation, Video |
| 205 |
2018/10/05 : C0c0n : Talk : Dom Goat the Dom Security Playground
|
presentation, Video |
| 206 |
2018/10/05 : C0c0n : Talk : Future of Mobility & Cyber Security
|
presentation, Video |
| 207 |
2018/10/05 : C0c0n : Talk : How Can We Use Machine Learning to Prevent Frauds and Password Breaches
|
presentation, Video |
| 208 |
2018/10/05 : C0c0n : Talk : OSI Nt Indian Citizen Edition
|
presentation, Video |
| 209 |
2018/10/05 : C0c0n : Talk : Predictive Policing Using Big Data Analytics.
|
presentation, Video |
| 210 |
2018/10/05 : C0c0n : Talk : Privacy and Data Protection Stakeholders’ Perspectives
|
presentation, Video |
| 211 |
2018/10/05 : C0c0n : Talk : Resiliency Focus Alongside Digital Disruption
|
presentation, Video |
| 212 |
2018/10/05 : C0c0n : Talk : Scanda to Unbosom Malware Behavior
|
presentation, Video |
| 213 |
2018/10/05 : C0c0n : Talk : Taking Cyber Security to the Board Room
|
presentation, Video |
| 214 |
2018/10/05 : C0c0n : Talk : Unconventional Vulnerabilities in Google Cloud Platform
|
presentation, Video |
| 215 |
2018/10/05 : C0c0n : Talk : Using Fault Injection for Forensics
|
presentation, Video |
| 216 |
2018/10/05 : C0c0n : Talk : Will Artificial Intelligence and Machine Learning Bring More Threats on Cyber Security?
|
presentation, Video |
| 217 |
2018/08/09 : Defcon : Talk : Backdooring Dvr Nvr Devices
|
presentation, Video |
| 218 |
2017/11/20 : Hackfest : Talk : How My Sv Machine Nailed Your Malware
|
presentation, Video |
| 219 |
2017/10/05 : Brucon : Talk : Races, Reaches and Rescues!!! ( Race Condition Vulnerabilities Revisited)
|
presentation, Video |
| 220 |
2017/08/19 : C0c0n : Talk : Building Trust for Digital Transactions in India's Cod Culture
|
presentation, Video |
| 221 |
2017/08/19 : C0c0n : Talk : The Public Private Partnership Navigating the Govt
|
presentation, Video |
| 222 |
2017/08/19 : C0c0n : Talk : Trust, the Foundation of Digital Mastery
|
presentation, Video |
| 223 |
2017/08/18 : C0c0n : Talk : Hunting Botnets With Analytics
|
presentation, Video |
| 224 |
2017/08/18 : C0c0n : Talk : Phishing Threats to Customers and Mitigation
|
presentation, Video |
| 225 |
2017/08/18 : C0c0n : Talk : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work
|
presentation, Video |
| 226 |
2017/08/18 : C0c0n : Talk : Androsia a Tool for Securing in Memory Sensitive Data
|
presentation, Video |
| 227 |
2017/08/18 : C0c0n : Talk : Anti Virus Bypassing for Fun and Profit
|
presentation, Video |
| 228 |
2017/08/18 : C0c0n : Talk : Bank on Compliance for Cyber Security
|
presentation, Video |
| 229 |
2017/08/18 : C0c0n : Talk : Big Data Analytics With Pattern Matching for Smarter Analytics
|
presentation, Video |
| 230 |
2017/08/18 : C0c0n : Talk : Blockchain for Information Security
|
presentation, Video |
| 231 |
2017/08/18 : C0c0n : Talk : Call Centre Frauds
|
presentation, Video |
| 232 |
2017/08/18 : C0c0n : Talk : Case Study Security of Digital Wallet Apps in India
|
presentation, Video |
| 233 |
2017/08/18 : C0c0n : Talk : Catching Network Anomalies Using Deep Learning
|
presentation, Video |
| 234 |
2017/08/18 : C0c0n : Talk : Challenges in Digital Banking
|
presentation, Video |
| 235 |
2017/08/18 : C0c0n : Talk : Cloud Security Suite One Stop Tool for Auditing Cloud Infrastructure
|
presentation, Video |
| 236 |
2017/08/18 : C0c0n : Talk : Co Ap Versus Mqtt Io T Protocol Vulnerability Analysis
|
presentation, Video |
| 237 |
2017/08/18 : C0c0n : Talk : Cyber Security Threat Management – Model It, Collect Intelligence and Hunt Them!
|
presentation, Video |
| 238 |
2017/08/18 : C0c0n : Talk : Cyber Threat Intelligence Are We There , Yet…?
|
presentation, Video |
| 239 |
2017/08/18 : C0c0n : Talk : Dynamic Binary Instrumentation
|
presentation, Video |
| 240 |
2017/08/18 : C0c0n : Talk : Exploiting the Smartness of Ble Stack
|
presentation, Video |
| 241 |
2017/08/18 : C0c0n : Talk : Hacking Homes a Hardware Insight for Io T [In] Security
|
presentation, Video |
| 242 |
2017/08/18 : C0c0n : Talk : Hunting the Hunters – Fighting Cyber Crime at the Source
|
presentation, Video |
| 243 |
2017/08/18 : C0c0n : Talk : I Goat – A Self Learning Tool for I Os App Pentesting and Security
|
presentation, Video |
| 244 |
2017/08/18 : C0c0n : Talk : Mobile Banking ( In) Security
|
presentation, Video |
| 245 |
2017/08/18 : C0c0n : Talk : Moving From Cybersecurity Awareness to Cybersecurity Competence
|
presentation, Video |
| 246 |
2017/08/18 : C0c0n : Talk : OSI Nt and Privacy
|
presentation, Video |
| 247 |
2017/08/18 : C0c0n : Talk : Penetration Testing Orchestrator a Framework That Leverages Multi Tool Penetration Testing Approach Combined With Machine Learning Nlp for Faster Result Analysis
|
presentation, Video |
| 248 |
2017/08/18 : C0c0n : Talk : Prevent Dark Side of Your Smart City a Defensive Security Model for Smart City and Critical Infrastructure
|
presentation, Video |
| 249 |
2017/08/18 : C0c0n : Talk : The Card Hack Lessons From the Hitachi Payments Breach
|
presentation, Video |
| 250 |
2017/08/18 : C0c0n : Talk : The Covert Cupid Under .11 Veil !!! * Approach for Covert Wifi*
|
presentation, Video |
| 251 |
2017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)y
|
presentation, Video |
| 252 |
2017/08/18 : C0c0n : Talk : What Security Managers Can Learn From Story Tellers?
|
presentation, Video |
| 253 |
2017/08/18 : C0c0n : Talk : Yarafying Android Malware a Missing Step Before Malware Analysis
|
presentation, Video |
| 254 |
2017/08/18 : C0c0n : Talk : Your Friendly Neighbourhood Exploit
|
presentation, Video |
| 255 |
2017/08/04 : Sha : Talk : Attacking Open Ssl Using Side Channel Attacks the Rsa Case Study
|
presentation, Video |
| 256 |
2017/03/23 : Troopers : Talk : How We Hacked Distributed Configuration Management Systems
|
presentation, Video |
| 257 |
2017/03/23 : Troopers : Talk : How We Hacked Distributed Configuration Management Systems
|
presentation, Video |
| 258 |
2017/03/21 : Troopers : Talk : New Attacks in 4 G Technologies
|
presentation, Video |
| 259 |
2017/03/03 : Nullcon : Talk : Agility With Security Mitigations in Windows 10
|
presentation, Video |
| 260 |
2017/01/25 : Owasp App Sec California : Talk : Ocsp Stapling in the Wild
|
presentation, Video |
| 261 |
2016/11/11 : Deepsec : Talk : Human vs Artificial Intelligence – Battle of Trust
|
presentation, Video |
| 262 |
2016/11/06 : Ground Zero Summit : Talk : Hacking the Droids
|
presentation, Conference Link, Video |
| 263 |
2016/11/05 : Hackfest : Talk : Lock Picker Leaking Data From Live Luks Partition
|
presentation, Video |
| 264 |
2016/10/14 : App Sec Usa : Talk : Dev Ops to Dev Sec Ops a 2 Dimensional View of Security for Dev Ops
|
presentation, Video |
| 265 |
2016/10/13 : App Sec Usa : Talk : Lightning Talk Demystifying Windows Application
|
presentation, Video |
| 266 |
2016/08/19 : C0c0n : Talk : Abusing Digital Certificates Malware Style
|
presentation, Video |
| 267 |
2016/08/19 : C0c0n : Talk : App Sec in the Time of Docker Containers
|
presentation, Video |
| 268 |
2016/08/19 : C0c0n : Talk : Backdooring My Enemies With a Proxy for Threat Intelligence
|
presentation, Video |
| 269 |
2016/08/19 : C0c0n : Talk : Breaking Into Gas Stations!
|
presentation, Video |
| 270 |
2016/08/19 : C0c0n : Talk : Evading Corporate Security – You’re as Secure as the Weakest Link
|
presentation, Video |
| 271 |
2016/08/19 : C0c0n : Talk : How (In)secure Are Indian Gsm Networks?
|
presentation, Video |
| 272 |
2016/08/19 : C0c0n : Talk : Kill the Password a New Era of Authentication
|
presentation, Video |
| 273 |
2016/08/19 : C0c0n : Talk : Ssd Forensics a Nightmare for Forensic Investigators
|
presentation, Video |
| 274 |
2016/08/19 : C0c0n : Talk : The Art of Social Hacking
|
presentation, Video |
| 275 |
2016/08/05 : Defcon : Talk : A Monitor Darkly Reversing and Exploiting Ubiquitous on Screen Display Controllers in Modern Monitors
|
presentation, Video |
| 276 |
2016/05/26 : Hitb Sec Conf : Talk : Hitb Lab Mobile Application Security for I Os and Android
|
presentation, Video |
| 277 |
2016/03/15 : Groundzerosummit : Talk : R00t Kidz and Hacking
|
presentation, Conference Link, Video |
| 278 |
2016/03/15 : Groundzerosummit : Talk : Web App Security
|
presentation, Conference Link, Video |
| 279 |
2016/03/11 : Nullcon : Talk : Hitchhiker's Guide to Hacking Industrial Control Systems ( Ics)
|
presentation, Video |
| 280 |
2016/03/11 : Nullcon : Talk : Million Dollar Baby Towards Angrly Conquering Darpa Cgc
|
presentation, Video |
| 281 |
2016/03/11 : Nullcon : Talk : Physical Lock Security
|
presentation, Video |
| 282 |
2015/11/05 : Ground Zero Summit : Talk : Cyber Security in Hospitals Hospitals Under Seige
|
presentation, Video |
| 283 |
2015/11/05 : Ground Zero Summit : Talk : Exposing Cyber Espionage Hello From Pakistan Iic Session
|
presentation, Video |
| 284 |
2015/11/05 : Ground Zero Summit : Talk : Western Air Command
|
presentation, Video |
| 285 |
2015/11/05 : Ground Zero Summit : Talk : Authentication Flaw in Automatic Bank Passbook Printing Machine.
|
presentation, Video |
| 286 |
2015/11/05 : Ground Zero Summit : Talk : Browser Based Malware Attacks
|
presentation, Video |
| 287 |
2015/11/05 : Ground Zero Summit : Talk : Chellam – A Wi Fi ID S Firewall for Windows
|
presentation, Video |
| 288 |
2015/11/05 : Ground Zero Summit : Talk : Credit Card Frauds – The Money Making Ecosystem for Cyber Criminals
|
presentation, Video |
| 289 |
2015/11/05 : Ground Zero Summit : Talk : Dissecting Android Malware
|
presentation, Video |
| 290 |
2015/11/05 : Ground Zero Summit : Talk : Economics of Post Quantum Crypto Systems Do We Really Need It
|
presentation, Video |
| 291 |
2015/11/05 : Ground Zero Summit : Talk : Elliptical Curve Cryptography
|
presentation, Video |
| 292 |
2015/11/05 : Ground Zero Summit : Talk : Hacking Rfids Under 2000 Inr
|
presentation, Video |
| 293 |
2015/11/05 : Ground Zero Summit : Talk : Sanctioned to Hack Your Scada Hmis Belong to Us!
|
presentation, Video |
| 294 |
2015/11/05 : Ground Zero Summit : Talk : Thanks for the Free Cookies
|
presentation, Video |
| 295 |
2015/11/05 : Ground Zero Summit : Talk : Trailing Terror in the Darknets
|
presentation, Video |
| 296 |
2015/11/05 : Ground Zero Summit : Talk : Wolves Among Sheep Defeating Targeted Attacks With Deception
|
presentation, Video |
| 297 |
2015/11/05 : Ground Zero Summit : Talk : Xss the Art of Evading Web Application Filters!
|
presentation, Video |
| 298 |
2015/10/30 : T2 : Talk : Lte (In) Security
|
presentation, Video |
| 299 |
2015/10/25 : Toor Con : Talk : Pixel Captcha – A Unicode Based Captcha Scheme
|
presentation, Video |
| 300 |
2015/09/25 : App Sec Usa : Talk : The State of Web Application Security in Scada Web Human Machine Interfaces ( Hmis)!
|
presentation, Video |
| 301 |
2015/09/24 : App Sec Usa : Talk : Encouraging Diversity and Advancing Cybersecurity Education
|
presentation, Video |
| 302 |
2015/08/07 : Defcon : Talk : Getting Into the Trust Store We Trust
|
presentation, Video |
| 303 |
2015/08/01 : C0c0n : Talk : A Pentester's Methodology to Discover, Automate and Exploit Windows Privilege Escalation Flaws.
|
presentation, Video |
| 304 |
2015/08/01 : C0c0n : Talk : Attack Chaining for Web Exploitation From Information Leakage to Gaining Root Access
|
presentation, Video |
| 305 |
2015/08/01 : C0c0n : Talk : Blockchains in Security
|
presentation, Video |
| 306 |
2015/08/01 : C0c0n : Talk : Breaking Into Infosec Research
|
presentation, Video |
| 307 |
2015/08/01 : C0c0n : Talk : Demystifying and Breaking Ble
|
presentation, Video |
| 308 |
2015/08/01 : C0c0n : Talk : From Aosp ( Android Open Source Project ) to Abd ( Android Based Devices )
|
presentation, Video |
| 309 |
2015/08/01 : C0c0n : Talk : Hacking Rfids Under 2000 Inr
|
presentation, Video |
| 310 |
2015/08/01 : C0c0n : Talk : Medical Device Security and Critical Infrastructure Inside Hospitals
|
presentation, Video |
| 311 |
2015/08/01 : C0c0n : Talk : No Po the No SQL Honey Pot Framework
|
presentation, Video |
| 312 |
2015/08/01 : C0c0n : Talk : Reversing and Deciphering the Cyber Espionage Malware Communications
|
presentation, Video |
| 313 |
2015/08/01 : C0c0n : Talk : S3curi7y at 36 K Feet
|
presentation, Video |
| 314 |
2015/05/26 : Phdays : Talk : Invisible Backdoors in Your Code
|
presentation, Video |
| 315 |
2015/03/15 : Defcon : Talk : Technical Talk Fuzzing Asynchronous Protocols Built Over Websockets
|
presentation, Conference Link, Video |
| 316 |
2015/03/15 : Defcon : Talk : Technical Talk Wihawk Router Vulnerability Scanner
|
presentation, Conference Link, Video |
| 317 |
2015/02/06 : Nullcon : Talk : Building Security and Compliance Into the Software Delivery Process
|
presentation, Video |
| 318 |
2015/02/06 : Nullcon : Talk : Toliman, a Hadoop Pentesting Tool
|
presentation, Video |
| 319 |
2015/01/27 : Owasp App Sec California : Talk : The Savage Curtain Mobile Ssl Failures
|
presentation, Video |
| 320 |
2014/11/13 : Ground Zero Summit : Talk : Attacking Cryptography & Pki Implementations
|
presentation, Video |
| 321 |
2014/11/13 : Ground Zero Summit : Talk : Identity Theft and Its Impact on Cyber Warfare
|
presentation, Video |
| 322 |
2014/11/13 : Ground Zero Summit : Talk : Network Time Protocol in Amplification Inferno
|
presentation, Video |
| 323 |
2014/11/13 : Ground Zero Summit : Talk : Security Vulnerabilities in Dvb C Networks Hacking Cable Tv Network
|
presentation, Video |
| 324 |
2014/11/13 : Ground Zero Summit : Talk : 9 Cell Cyber Diplomacy
|
presentation, Video |
| 325 |
2014/11/13 : Ground Zero Summit : Talk : Apt Protection for the Enterprise
|
presentation, Video |
| 326 |
2014/11/13 : Ground Zero Summit : Talk : Attacking Web Proxies Like Never Before
|
presentation, Video |
| 327 |
2014/11/13 : Ground Zero Summit : Talk : Cyber ' Brah Mos' Static Analysis Driven Secure Coding
|
presentation, Video |
| 328 |
2014/11/13 : Ground Zero Summit : Talk : Detecting Fake Cell Phone Towers
|
presentation, Video |
| 329 |
2014/11/13 : Ground Zero Summit : Talk : Enterprise Security
|
presentation, Video |
| 330 |
2014/11/13 : Ground Zero Summit : Talk : Evaluating Waf ( Web Application Firewall) for Fun and Profit With Wof
|
presentation, Video |
| 331 |
2014/11/13 : Ground Zero Summit : Talk : Financial Integrity and Cyber Security
|
presentation, Video |
| 332 |
2014/11/13 : Ground Zero Summit : Talk : Fuzzing Asynchronous Protocols Built Over Websockets
|
presentation, Video |
| 333 |
2014/11/13 : Ground Zero Summit : Talk : Hacking Consumer Electronics for Fun
|
presentation, Video |
| 334 |
2014/11/13 : Ground Zero Summit : Talk : How I Won Browser Fuzzing
|
presentation, Video |
| 335 |
2014/11/13 : Ground Zero Summit : Talk : Internet Governance
|
presentation, Video |
| 336 |
2014/11/13 : Ground Zero Summit : Talk : Mobile Security Automation Framework for Intelligent Auditing
|
presentation, Video |
| 337 |
2014/11/13 : Ground Zero Summit : Talk : National Cyber Policy and Its Impact on Business
|
presentation, Video |
| 338 |
2014/11/13 : Ground Zero Summit : Talk : Scada Exploitation Through Firmware
|
presentation, Video |
| 339 |
2014/11/13 : Ground Zero Summit : Talk : Vulnerability Reproduction Using Zest
|
presentation, Video |
| 340 |
2014/10/23 : T2 : Talk : Darshak How to Turn Your Phone Into a Low Cost Imsi Catcher Device
|
presentation, Video |
| 341 |
2014/10/23 : Hacklu : Talk : Wi Hawk Router Vulnerability Scanner
|
presentation, Video |
| 342 |
2014/10/16 : Grrcon : Talk : Socioware Dissecting Online Social Network Worms – Insidious Analysis and Design
|
presentation, Video |
| 343 |
2014/09/24 : Brucon : Talk : Owasp Owtf
|
presentation, Video |
| 344 |
2014/08/22 : C0c0n : Talk : Apt Case Study of Attackers Targeting Public Tendering
|
presentation, Video |
| 345 |
2014/08/22 : C0c0n : Talk : Breaking and Securing Mobile Apps Automagically
|
presentation, Video |
| 346 |
2014/08/22 : C0c0n : Talk : Cryptocalypse, Heart Bleed Is Our Government Listening?
|
presentation, Video |
| 347 |
2014/08/22 : C0c0n : Talk : Cryptographic Backdoors Subverting the Rsa
|
presentation, Video |
| 348 |
2014/08/22 : C0c0n : Talk : Exploiting No SQL Like Never Before
|
presentation, Video |
| 349 |
2014/08/22 : C0c0n : Talk : Hacking Communication
|
presentation, Video |
| 350 |
2014/08/22 : C0c0n : Talk : Idle Machines Doing Bounty Hunting ( Behind Your Back)
|
presentation, Video |
| 351 |
2014/08/22 : C0c0n : Talk : Lesser Known Attack Xml Injection
|
presentation, Video |
| 352 |
2014/08/22 : C0c0n : Talk : Piracy Tracker
|
presentation, Video |
| 353 |
2014/08/22 : C0c0n : Talk : Still Single With a Bleeding Heart ( Tool Release)
|
presentation, Video |
| 354 |
2014/08/22 : C0c0n : Talk : The Curious Case of Proto Bufs Demystifying Google's Hottest Binary Protocol
|
presentation, Video |
| 355 |
2014/03/08 : Defcon : Talk : Wi Hawk
|
presentation, Conference Link, Video |
| 356 |
2014/02/14 : Nullcon : Talk : Strategic Information Warfare When Ends Define the Means
|
presentation, Video |
| 357 |
2014/02/14 : Nullcon : Talk : User Privacy in Cellular Networks
|
presentation, Video |
| 358 |
2013/11/21 : Deepsec : Talk : Automation in Android & I Os Application Security Review
|
presentation, Video |
| 359 |
2013/11/20 : App Sec Usa : Talk : Project Talk Owasp Open Samm Project
|
presentation, Video |
| 360 |
2013/11/07 : Ground Zero Summit : Talk : Advanced Security for Advanced Threats
|
presentation, Video |
| 361 |
2013/11/07 : Ground Zero Summit : Talk : Approach to Containing the Outbreak of Malicious Information in Online Social Networks
|
presentation, Video |
| 362 |
2013/11/07 : Ground Zero Summit : Talk : Central Monitoring System and It Act 2000 – Balance Between Rights of Citizens and State
|
presentation, Video |
| 363 |
2013/11/07 : Ground Zero Summit : Talk : Cloud Security Enabling Continuous, Scalable Security for Today’s Hyper Connected World
|
presentation, Video |
| 364 |
2013/11/07 : Ground Zero Summit : Talk : Evolution of Network Security Around Software Defined Networking ( Sdn) – The Intelligent Network
|
presentation, Video |
| 365 |
2013/11/07 : Ground Zero Summit : Talk : How I Built a Pentest Lab in Under 70 Usd
|
presentation, Video |
| 366 |
2013/11/07 : Ground Zero Summit : Talk : Internet – Transforming Terrorism
|
presentation, Video |
| 367 |
2013/11/07 : Ground Zero Summit : Talk : Iron Wasp
|
presentation, Video |
| 368 |
2013/11/07 : Ground Zero Summit : Talk : Malware for Firefox Mobile Os
|
presentation, Video |
| 369 |
2013/11/07 : Ground Zero Summit : Talk : Securing Government Critical Information Infrastructure
|
presentation, Video |
| 370 |
2013/11/07 : Ground Zero Summit : Talk : Serial Killing of Embedded Systems
|
presentation, Video |
| 371 |
2013/11/07 : Ground Zero Summit : Talk : Setting the Data Center on Fire
|
presentation, Video |
| 372 |
2013/11/07 : Ground Zero Summit : Talk : The Seven Sins of Wi Fi Security
|
presentation, Video |
| 373 |
2013/11/07 : Ground Zero Summit : Talk : Towards a Next Generation Secure Internet
|
presentation, Video |
| 374 |
2013/11/07 : Ground Zero Summit : Talk : Understanding the Anatomy of Advanced Targeted Attacks – The Trend Micro Approach
|
presentation, Video |
| 375 |
2013/10/19 : Toor Con : Talk : Static Malware Analysis With Py Triage
|
presentation, Video |
| 376 |
2013/09/27 : C0c0n : Talk : Arm, Thumb and the Finger
|
presentation, Video |
| 377 |
2013/09/27 : C0c0n : Talk : Blur Captcha
|
presentation, Video |
| 378 |
2013/09/27 : C0c0n : Talk : Disclosing Vulnerabilities the Bug Bounty Style
|
presentation, Video |
| 379 |
2013/09/27 : C0c0n : Talk : From Bedroom to Boardroom Taking Your Weekend Infosec Project Global
|
presentation, Video |
| 380 |
2013/09/27 : C0c0n : Talk : Hello Ciso! How to Make End Users Like and Follow “ Brand Infosec”?
|
presentation, Video |
| 381 |
2013/09/27 : C0c0n : Talk : Infiltrating the Intranet With Skanda
|
presentation, Video |
| 382 |
2013/09/27 : C0c0n : Talk : Lets Play Applanting on New Grounds
|
presentation, Video |
| 383 |
2013/09/27 : C0c0n : Talk : Pwning Wi Fi Devices!
|
presentation, Video |
| 384 |
2013/09/27 : C0c0n : Talk : Risk and Challenges in Virtual Currencies.
|
presentation, Video |
| 385 |
2013/09/27 : C0c0n : Talk : Sandy the Malicious Analysis
|
presentation, Video |
| 386 |
2013/09/27 : C0c0n : Talk : Ssrf Xspa Real World Attacks and Mitigations
|
presentation, Video |
| 387 |
2013/09/27 : C0c0n : Talk : The Art and Science of Anamoly Based Vulnerability Detection
|
presentation, Video |
| 388 |
2013/09/27 : C0c0n : Talk : The Secure Software Development Life Cycle
|
presentation, Video |
| 389 |
2013/09/13 : Grrcon : Talk : Matriux Leandros an Open Source Penetration Testing and Forensic Distribution
|
presentation, Conference Link, Video |
| 390 |
2013/09/13 : Rootcon : Talk : My Experiments With Truth a Different Route to Bug Hunting
|
presentation, Video |
| 391 |
2013/09/12 : Grrcon : Talk : The Droid Exploitation Saga – All Over Again!
|
presentation, Video |
| 392 |
2013/08/16 : Usenix : Talk : Building Securable Infrastructure Open Source Private Clouds
|
presentation, Video |
| 393 |
2013/08/02 : Defcon : Talk : Interactive Web Security Testing With Iron Wasp
|
presentation, Conference Link, Video |
| 394 |
2013/07/31 : Blackhat : Talk : Lte Booms With Vulnerabilities
|
presentation, Video |
| 395 |
2013/04/21 : Defcon : Talk : Lte Boom in Vulnerabilities
|
presentation, Conference Link, Video |
| 396 |
2013/03/01 : Nullcon : Talk : Automating Java Script Static Analysis
|
presentation, Video |
| 397 |
2013/03/01 : Nullcon : Talk : Pawing the Droid Twisting the Arm
|
presentation, Video |
| 398 |
2013/03/01 : Nullcon : Talk : Vulnerability Research Anyone?
|
presentation, Video |
| 399 |
2012/11/23 : Malcon : Talk : Advanced Malware Engine
|
presentation, Video |
| 400 |
2012/11/23 : Malcon : Talk : Surprise Paper!
|
presentation, Video |
| 401 |
2012/11/23 : Malcon : Talk : Windows Phone 8 Malware Prototype
|
presentation, Video |
| 402 |
2012/10/26 : App Sec Usa : Talk : Xss & Csrf With Html5 Attack, Exploit and Defense
|
presentation, Video |
| 403 |
2012/10/23 : Hacklu : Talk : Buster Android Security Buster
|
presentation, Video |
| 404 |
2012/09/29 : Nullcon : Talk : Next Gen Forensics
|
presentation, Video |
| 405 |
2012/09/28 : Nullcon : Talk : Alert( Xss ) How to Catch an Xss Before Someone Exploits Reports It?
|
presentation, Video |
| 406 |
2012/09/28 : Nullcon : Talk : Attacking Angry Droids
|
presentation, Video |
| 407 |
2012/09/27 : Grrcon : Talk : Reversing Patches for Exploit Creation, Pen Testing or Just Fun!
|
presentation, Video |
| 408 |
2012/09/20 : Ekoparty : Talk : Fuzzing Dtmf Input Processing Algorithms
|
presentation, Video |
| 409 |
2012/08/04 : C0c0n : Talk : Impact of Cyber Laws on Various Stakeholders
|
presentation, Video |
| 410 |
2012/08/03 : C0c0n : Talk : Building Security Incident Detection & Handling Capabilities in Enterprises
|
presentation, Video |
| 411 |
2012/08/03 : C0c0n : Talk : Business Continuity and Risk Management in Turbulent Times
|
presentation, Video |
| 412 |
2012/08/03 : C0c0n : Talk : Contemporary Transcription and Resource Parasitism
|
presentation, Video |
| 413 |
2012/08/03 : C0c0n : Talk : Cyber Weapons
|
presentation, Video |
| 414 |
2012/08/03 : C0c0n : Talk : Data Security
|
presentation, Video |
| 415 |
2012/08/03 : C0c0n : Talk : Easy Money With Ui Redressing
|
presentation, Video |
| 416 |
2012/08/03 : C0c0n : Talk : Enterprise Server Security
|
presentation, Video |
| 417 |
2012/08/03 : C0c0n : Talk : Evil Java Script
|
presentation, Video |
| 418 |
2012/08/03 : C0c0n : Talk : Gathering Security Requirements
|
presentation, Video |
| 419 |
2012/08/03 : C0c0n : Talk : Layer 8 Exploitation a Threat to National Security
|
presentation, Video |
| 420 |
2012/08/03 : C0c0n : Talk : Security Incidents – Avoiding the Apocalypse in 2012
|
presentation, Video |
| 421 |
2012/08/03 : C0c0n : Talk : The Management of Information Security – A Corporate Practitioner’s Perspective
|
presentation, Video |
| 422 |
2012/08/03 : C0c0n : Talk : The Weakest Link Reinforcing the Human Element
|
presentation, Video |
| 423 |
2012/05/13 : Carolina Con : Talk : Attacking Captchas for Fun and Profit
|
presentation, Video |
| 424 |
2012/03/15 : Nullcon : Talk : An App(le) a Day Keeps the Wallet Away
|
presentation, Conference Link, Video |
| 425 |
2012/03/15 : C0c0n : Talk : Integrated Dial 100 System for Law Enforcement
|
presentation, Conference Link, Video |
| 426 |
2012/03/15 : Owasp App Sec India : Talk : The Magic of Passive Web Vulnerability Analysis
|
presentation, Conference Link, Video |
| 427 |
2012/02/15 : Nullcon : Talk : Cyberspace Global Commons or a National Asset
|
presentation, Video |
| 428 |
2012/02/15 : Nullcon : Talk : Friction in the Machine
|
presentation, Video |
| 429 |
2012/02/15 : Nullcon : Talk : Open Source Revolution Need Hardware Software Marriage
|
presentation, Video |
| 430 |
2012/02/15 : Nullcon : Talk : Scada Security Why Is It So Hard
|
presentation, Video |
| 431 |
2012/02/15 : Nullcon : Talk : Teensy for Fun and Jugaad
|
presentation, Video |
| 432 |
2012/02/15 : Nullcon : Talk : Your Phone Is Your Phone but Your Calls Are Now My Calls
|
presentation, Video |
| 433 |
2011/12/04 : Clubhack : Talk : Wi Fi Malware for Fun and Profit
|
presentation, Conference Link, Video |
| 434 |
2011/11/25 : Malcon : Talk : Advanced Malware for Apple Products
|
presentation, Video |
| 435 |
2011/11/25 : Malcon : Talk : Exploit the Exploit Kits
|
presentation, Video |
| 436 |
2011/11/25 : Malcon : Talk : Mareech Look It’s a Hid Made Up of Gold
|
presentation, Video |
| 437 |
2011/11/17 : Deepsec : Talk : Fake Anti Virus Journey From Trojan to a Persisent Threat
|
presentation, Video |
| 438 |
2011/11/04 : Hackfest : Talk : Here Are Your Keystrokes
|
presentation, Video |
| 439 |
2011/10/13 : Hitb Sec Conf : Talk : Web Wars 3
|
presentation, Video |
| 440 |
2011/10/08 : C0c0n : Talk : Stratagemizing Security Against Perpetrators in Cloud Infrastructure
|
presentation, Video |
| 441 |
2011/10/07 : C0c0n : Talk : Deep(er) Penetration Reaching the Internal Network Using Exposed Web Applications
|
presentation, Video |
| 442 |
2011/10/07 : C0c0n : Talk : Digital Evidence
|
presentation, Video |
| 443 |
2011/10/07 : C0c0n : Talk : I Phone Jailbreak
|
presentation, Video |
| 444 |
2011/10/07 : C0c0n : Talk : Mobile Security
|
presentation, Video |
| 445 |
2011/10/07 : C0c0n : Talk : Network Security Modern Mechanism for Intrusion Detection and Avoidance in a P2 P Network
|
presentation, Video |
| 446 |
2011/10/07 : C0c0n : Talk : Paranoid Android
|
presentation, Video |
| 447 |
2011/10/07 : C0c0n : Talk : Password Less Authentication, Authorization
|
presentation, Video |
| 448 |
2011/10/07 : C0c0n : Talk : Runtime Thread Injection and Execution in Linux Processes
|
presentation, Video |
| 449 |
2011/10/07 : C0c0n : Talk : Section 43 a It Act Compliance
|
presentation, Video |
| 450 |
2011/10/07 : C0c0n : Talk : Security and Privacy Risks of Cloud Computing
|
presentation, Video |
| 451 |
2011/10/07 : C0c0n : Talk : Wi Fi Malware for Fun and Profit
|
presentation, Video |
| 452 |
2011/09/19 : Hacklu : Talk : Linux Thread Injection the Jugaad Way
|
presentation, Video |
| 453 |
2011/09/19 : Brucon : Talk : Step by Step for Software Security (That Anyone Can Follow)
|
presentation, Video |
| 454 |
2011/09/19 : Hacklu : Talk : The Travelling Hacksmith
|
presentation, Video |
| 455 |
2011/09/07 : Securitybyte : Talk : Data Protection
|
presentation, Video |
| 456 |
2011/09/07 : Securitybyte : Talk : Social Web & Privacy – An Evolving World
|
presentation, Video |
| 457 |
2011/03/15 : Nullcon : Talk : Information Warfare Ñ the Indian Perspective
|
presentation, Conference Link, Video |
| 458 |
2011/02/25 : Nullcon : Talk : Future of Cyber Crimes Limitations and Challenges
|
presentation, Video |
| 459 |
2011/02/25 : Nullcon : Talk : Hacking the Parliament – A Classic Social Engineering Attack
|
presentation, Video |
| 460 |
2011/02/25 : Nullcon : Talk : Incident Management and Beyond
|
presentation, Video |
| 461 |
2011/02/25 : Nullcon : Talk : Jugaad Beta Linux Thread Injection Malware Po C
|
presentation, Video |
| 462 |
2010/10/29 : T2 : Talk : Hacking Femtocells
|
presentation, Video |
| 463 |
2010/08/01 : C0c0n : Talk : Cloud Computing & Security Boon or Bane; Hype or Reality; Cloud Implementation Challenges a Live Case Study
|
presentation, Video |
| 464 |
2010/08/01 : C0c0n : Talk : Code Disclosure Over HTTP
|
presentation, Video |
| 465 |
2010/08/01 : C0c0n : Talk : Concept, Methodology and Challenges in Computer Forensics
|
presentation, Video |
| 466 |
2010/08/01 : C0c0n : Talk : Dangers and Dynamic Malware Analysis
|
presentation, Video |
| 467 |
2010/08/01 : C0c0n : Talk : End Point Security
|
presentation, Video |
| 468 |
2010/08/01 : C0c0n : Talk : Hackers' Eco System in India
|
presentation, Video |
| 469 |
2010/08/01 : C0c0n : Talk : Horses, Rats and Bots
|
presentation, Video |
| 470 |
2010/08/01 : C0c0n : Talk : Last Line of Defense Host Intrusion Prevention and Secure Application Development.
|
presentation, Video |
| 471 |
2010/08/01 : C0c0n : Talk : Mobile Security
|
presentation, Video |
| 472 |
2010/08/01 : C0c0n : Talk : Overview of Cyber Legal Systems in India
|
presentation, Video |
| 473 |
2010/08/01 : C0c0n : Talk : Vo IP Security
|
presentation, Video |
| 474 |
2010/08/01 : C0c0n : Talk : Wireless Mitm
|
presentation, Video |
| 475 |
2010/08/01 : C0c0n : Talk : Writing X86 Shell Code & Secure Self Modifying Code and Cross Platform Programming a Security Angle
|
presentation, Video |
| 476 |
2010/07/30 : Defcon : Talk : Hacking Oracle From Web Apps
|
presentation, Video |
| 477 |
2010/07/01 : Hitb Sec Conf : Talk : The Travelling Hacksmith 2009 – 2010
|
presentation, Video |
| 478 |
2010/06/18 : Syscan : Talk : Reverse Engineering Web 2.0 Applications
|
presentation, Video |
| 479 |
2010/02/25 : Nullcon : Talk : Imposter Ke Karnamey the Browser Phishing Tool.
|
presentation, Video |
| 480 |
2010/02/25 : Nullcon : Talk : Quantum Computing Challenges in the Field of Security
|
presentation, Video |
| 481 |
2009/12/04 : Clubhack : Talk : Facilitate Collaboration With Information Rights Management
|
presentation, Video |
| 482 |
2009/11/18 : Securitybyte : Talk : Cloud Hacking – Distributed Attack & Exploit Platform
|
presentation, Video |
| 483 |
2009/11/17 : Securitybyte : Talk : Business Case Risk Management Compliance at Amity
|
presentation, Video |
| 484 |
2009/11/17 : Securitybyte : Talk : Business Continuity Case Study
|
presentation, Video |
| 485 |
2009/10/28 : Hacklu : Talk : Ownage 2.0
|
presentation, Video |
| 486 |
2009/08/06 : C0c0n : Talk : Cyber Forensics
|
presentation, Video |
| 487 |
2009/08/06 : C0c0n : Talk : Cyber Victimisation
|
presentation, Video |
| 488 |
2009/08/06 : C0c0n : Talk : Information Security Audit
|
presentation, Video |
| 489 |
2009/08/06 : C0c0n : Talk : Information Security Management Practices Technical Issues and the Impact of Risk Management.
|
presentation, Video |
| 490 |
2009/08/06 : C0c0n : Talk : Information Warfare
|
presentation, Video |
| 491 |
2009/08/06 : C0c0n : Talk : Know Your Enemy, and Yourself Demystifying Threat Modelin
|
presentation, Video |
| 492 |
2009/08/06 : C0c0n : Talk : Management & Security of Large Scale Storage Devices
|
presentation, Video |
| 493 |
2009/08/06 : C0c0n : Talk : Microsoft Security Strategies
|
presentation, Video |
| 494 |
2009/08/06 : C0c0n : Talk : Network Intrusions and Hacking
|
presentation, Video |
| 495 |
2009/05/19 : Syscan : Talk : Securing Applications at Gateway With Web Application Firewalls
|
presentation, Video |
| 496 |
2009/05/19 : Syscan : Talk : Securing Enterprise Applications
|
presentation, Video |
| 497 |
2008/11/13 : Deepsec : Talk : Game of Web 2.0 Security Attacking Next Generation Apps
|
presentation, Video |
| 498 |
2008/10/22 : Hacklu : Talk : Browser Exploits a New Model for Browser Security
|
presentation, Video |
| 499 |
2008/08/21 : Owasp App Sec India : Talk : App Sec for Managers
|
presentation, Video |
| 500 |
2008/08/20 : Owasp App Sec India : Talk : Building Enterprise App Sec Program
|
presentation, Video |
| 501 |
2008/04/16 : Hitb Sec Conf : Talk : Securing Next Generation Applications  “ Scan, Detect and Mitigate
|
presentation, Video |
| 502 |
2008/03/28 : Blackhat : Talk : Spam Evolution
|
presentation, Video |
| 503 |
2008/03/26 : Can Sec West : Talk : Vulnerabilities Die Hard
|
presentation, Video |
| 504 |
2008/02/20 : Blackhat : Talk : Hacking Vo IP Through IP Sec Tunnels
|
presentation, Video |
| 505 |
2007/12/09 : Clubhack : Talk : Vulnerabilities in Vo IP Products and Services
|
presentation, Video |
| 506 |
2007/08/01 : Blackhat : Talk : Vulnerabilities in Wi Fi Dual Mode Vo IP Phones
|
presentation, Video |
| 507 |
2007/04/18 : Can Sec West : Talk : Low Rate Denial of Service Attacks
|
presentation, Video |
| 508 |
2007/03/30 : Blackhat : Talk : Web Service Vulnerabilities
|
presentation, Video |
| 509 |
2006/10/19 : Hacklu : Talk : Smashing Heap by Free Simulation
|
presentation, Video |
| 510 |
2006/08/01 : Blackhat : Talk : Writing Metasploit Plugins From Vulnerability to Exploit
|
presentation, Video |
| 511 |
2005/06/10 : Syscan : Talk : . Net Web Security Attack and Defense
|
presentation, Conference Link, Video |
| 512 |
2005/04/10 : Hitb Sec Conf : Talk : Whispers on the Wire Network Based Covert Channels, Exploitation and Detection
|
presentation, Video |
| 513 |
2004/04/21 : Can Sec West : Talk : Cisco Psirt Tcp BGP
|
presentation, Video |
| 514 |
2003/12/12 : Hitb Sec Conf : Talk : Defending Web Applications Strategies, Methods and Practices
|
presentation, Video |
| 515 |
2003/12/12 : Hitb Sec Conf : Talk : New Generation Frauds
|
presentation, Video |
| 516 |
2003/12/12 : Hitb Sec Conf : Talk : Threats to Wireless Networks War Driving
|
presentation, Video |
| 517 |
1998/07/29 : Blackhat : Talk : Security as an Enabler for New Business Opportunities the Business Value of Security
|
presentation, Video |
| S.No |
Name of Entry |
What is missing |
| 1 |
Azdevrecon |
Content, Links (github/gitlab/bitbucket/download/home) |
| 2 |
Frogy-2.0 |
Content, Links (github/gitlab/bitbucket/download/home) |
| 3 |
Pentest-Copilot |
Content, Links (github/gitlab/bitbucket/download/home) |
| 4 |
Q-Tip |
Content, Links (github/gitlab/bitbucket/download/home) |
| 5 |
Arc |
Content, Links (github/gitlab/bitbucket/download/home) |
| 6 |
Cloudlens |
Content, Links (github/gitlab/bitbucket/download/home) |
| 7 |
Parseandc |
Content |
| 8 |
Processinjection |
Content, Links (github/gitlab/bitbucket/download/home) |
| 9 |
Realtic |
Content, Links (github/gitlab/bitbucket/download/home) |
| 10 |
Shadowseek |
Content, Links (github/gitlab/bitbucket/download/home) |
| 11 |
Smuggleshield |
Content |
| 12 |
Threatshield |
Content, Links (github/gitlab/bitbucket/download/home) |
| 13 |
Shivaspampot |
Content |
| 14 |
Trackguard |
Content, Links (github/gitlab/bitbucket/download/home) |
| 15 |
Kubesf |
Content, Links (github/gitlab/bitbucket/download/home) |
| 16 |
Scagoat |
Content |
| 17 |
VulnScout |
Content, Links (github/gitlab/bitbucket/download/home) |
| 18 |
GoatPen |
Content, Links (github/gitlab/bitbucket/download/home) |
| 19 |
Bugbazaar |
Content |
| 20 |
Findmytakeover |
Content |
| 21 |
Huginn |
Content |
| 22 |
Trafficwardenx |
Links (github/gitlab/bitbucket/download/home) |
| 23 |
Autofix |
Links (github/gitlab/bitbucket/download/home) |
| 24 |
AWSDefenderGPT : Leveraging OpenAI to Secure AWS Cloud |
Links (github/gitlab/bitbucket/download/home) |
| 25 |
Detectivesq |
Links (github/gitlab/bitbucket/download/home) |
| 26 |
Androcop |
Links (github/gitlab/bitbucket/download/home) |
| 27 |
Actiongoat |
Content, Links (github/gitlab/bitbucket/download/home) |
| 28 |
ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections |
Content, Links (github/gitlab/bitbucket/download/home) |
| 29 |
Automative Security Testing |
Content, Links (github/gitlab/bitbucket/download/home) |
| 30 |
Apkhunt |
Content |
| 31 |
Zaas |
Links (github/gitlab/bitbucket/download/home) |
| 32 |
Bheemos |
Content, Links (github/gitlab/bitbucket/download/home) |
| 33 |
Buzzard |
Links (github/gitlab/bitbucket/download/home) |
| 34 |
Github Credentials Stroller |
Links (github/gitlab/bitbucket/download/home) |
| 35 |
Tenacity |
Links (github/gitlab/bitbucket/download/home) |
| 36 |
Malvizai |
Links (github/gitlab/bitbucket/download/home) |
| 37 |
Mobexler |
Content |
| 38 |
Python Honeypot |
Content |
| 39 |
Wi Fi Access Point Rootkits |
Content, Links (github/gitlab/bitbucket/download/home) |
| 40 |
SniperPhish |
Content |
| 41 |
SASTRI |
Links (github/gitlab/bitbucket/download/home) |
| 42 |
VyAPI - The Modern Cloud-Based Vulnerable Hybrid Android App |
Links (github/gitlab/bitbucket/download/home) |
| 43 |
Wolverine |
Links (github/gitlab/bitbucket/download/home) |
| 44 |
Clusterfuzz |
Content |
| 45 |
Apad |
Links (github/gitlab/bitbucket/download/home) |
| 46 |
Certpivot |
Links (github/gitlab/bitbucket/download/home) |
| 47 |
VoIPShark: Open Source VoIP Analysis Platform |
Links (github/gitlab/bitbucket/download/home) |
| 48 |
Mafia |
Links (github/gitlab/bitbucket/download/home) |
| 49 |
DomGoat |
Content |
| 50 |
DARWIN (Disguised Adaptive Resilient Wireless Independent Network) |
Links (github/gitlab/bitbucket/download/home) |
| 51 |
SCoDA: Smart COntract Defender and Analyzer |
Links (github/gitlab/bitbucket/download/home) |
| 52 |
Difuze |
Content, Links (github/gitlab/bitbucket/download/home) |
| 53 |
DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers |
Content |
| 54 |
Widy |
Content, Links (github/gitlab/bitbucket/download/home) |
| 55 |
Wimonitor |
Content, Links (github/gitlab/bitbucket/download/home) |
| 56 |
Devknox |
Content |
| 57 |
Diffdroid |
Content |
| 58 |
Droid FF: Android File Fuzzing Framework |
Content |
| 59 |
Angr |
Content |
| 60 |
Chellam |
Links (github/gitlab/bitbucket/download/home) |
| 61 |
Pcap2xml |
Content |
| 62 |
Chigula |
Links (github/gitlab/bitbucket/download/home) |
| 63 |
Secpod Saner |
Content, Links (github/gitlab/bitbucket/download/home) |
| 64 |
Toliman |
Content |
| 65 |
Drupsnipe |
Links (github/gitlab/bitbucket/download/home) |
| 66 |
Xenotix Xbot |
Content |
| 67 |
AFE (Android Framework for Exploitation) |
Content |
| 68 |
Jugaad - Thread Injection Kit |
Content |
| 69 |
Wireplay |
Content |
| 70 |
Zulu Wireless |
Content |
| 71 |
difuze: Fuzzer for Linux Kernel Drivers |
Content |
| 72 |
Industrial Control Systems: Capture the Train! |
Links (github/gitlab/bitbucket/download/home) |