S.No |
Name of Entry |
What is missing |
1 |
2025/04/03 : Blackhat : Talk : Cloud Security Building Connections in the Cloud |
presentation, Video |
2 |
2025/04/03 : Blackhat : Talk : Obfus Qate Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! |
presentation, Video |
3 |
2025/03/02 : Nullcon : Talk : Cyber Security From Telco Lens |
presentation, Video |
4 |
2025/03/02 : Nullcon : Talk : E Kyc Crisis Securing the Lockers |
presentation, Video |
5 |
2025/03/02 : Nullcon : Talk : Hidden in Plain Sight Large Scale Exposure of Orphaned Commits on Major Git Platforms |
presentation, Video |
6 |
2025/03/02 : Nullcon : Talk : Kernel Conquest Breaking Boundaries and Demystifying Kernel Su for Root Access in Azure Cloud Shell |
presentation, Video |
7 |
2025/03/02 : Nullcon : Talk : Satellite Communications Analyzing and Protecting Space Based Assets |
presentation, Video |
8 |
2025/03/02 : Nullcon : Talk : Securing the Chains Building Defensive Layers for Software Supply Chains |
presentation, Video |
9 |
2025/03/01 : Nullcon : Talk : Drawing Parallels Between I Os and MAC Os Pentesting With Dvma |
presentation, Video |
10 |
2025/03/01 : Nullcon : Talk : MAC Os Lockdown Mode a Forensic Deep Dive |
presentation, Video |
11 |
2024/11/28 : Blackhat : Talk : Harnessing Language Models for Detection of Evasive Malicious Email Attachments |
presentation, Video |
12 |
2024/11/28 : Blackhat : Talk : Threat Modelling the Generative Ai |
presentation, Video |
13 |
2024/11/27 : Blackhat : Talk : Ai Powered Cybersecurity Promises & Perils |
presentation, Video |
14 |
2024/11/26 : Blackhat : Talk : Cyber Security & Resiliency a Perspective With Emerging Technologies and Innovation |
presentation, Video |
15 |
2024/11/26 : Blackhat : Talk : The Double Edge Sword Cybersecurity & Ai |
presentation, Video |
16 |
2024/11/26 : Blackhat : Talk : The Gen Ai Double Agent Dilemma Ally or Adversary |
presentation, Video |
17 |
2024/11/21 : Deepsec : Talk : Hacking With Physics V2.0 |
presentation, Video |
18 |
2024/11/16 : C0c0n : Talk : Invisible Invaders Bypassing Email Security With Legitimate Tools |
presentation, Video |
19 |
2024/11/16 : C0c0n : Talk : Access for Sale Inside the World of Ransomware Affiliates and Initial Access Brokers |
presentation, Video |
20 |
2024/11/16 : C0c0n : Talk : Active Directory Deception Strategies |
presentation, Video |
21 |
2024/11/16 : C0c0n : Talk : Breach of the Borderless Cyber Threat Actors Targeting India's Cyberspace |
presentation, Video |
22 |
2024/11/16 : C0c0n : Talk : Hacking the Non Windows Frontier Thick Client Pentesting on Linux & MAC |
presentation, Video |
23 |
2024/11/16 : C0c0n : Talk : Key Note |
presentation, Video |
24 |
2024/11/16 : C0c0n : Talk : Old Bugs, New Tricks How N Day Vulnerabilities Are Fueling Today's Threat Landscape |
presentation, Video |
25 |
2024/11/16 : C0c0n : Talk : Ride on the House Exploiting Public Transport Ticketing Systems for Free Rides |
presentation, Video |
26 |
2024/11/16 : C0c0n : Talk : Serverless Phishing Factory Automate, Attack, Adapt |
presentation, Video |
27 |
2024/11/16 : C0c0n : Talk : The Stealth Code Conspiracy Unmasking Hidden Threats in Ci Cd Pipelines |
presentation, Video |
28 |
2024/11/16 : C0c0n : Talk : The Subtle Art of Checkmating Cisos |
presentation, Video |
29 |
2024/11/16 : C0c0n : Talk : Who Is Holding the Marauders Map? |
presentation, Video |
30 |
2024/11/15 : C0c0n : Talk : [ Yodha] Nightingale Docker for Pentesters |
presentation, Video |
31 |
2024/11/15 : C0c0n : Talk : [ Yodha] Red Cloud a Multi Cloud Hacking Os |
presentation, Video |
32 |
2024/11/15 : C0c0n : Talk : [ Yodha] Scagoat Software Composition Analysis ( Sca) Vulnerability Exploration Tool |
presentation, Video |
33 |
2024/11/15 : C0c0n : Talk : Automated Security Engineer Co Pilot Leveraging Large Language Models for Enhanced Code Security |
presentation, Video |
34 |
2024/11/15 : C0c0n : Talk : Breaking the Defences in Depth Analysis of Edr and Av Tampering Techniques |
presentation, Video |
35 |
2024/11/15 : C0c0n : Talk : Ciso's Take on Byoai |
presentation, Video |
36 |
2024/11/15 : C0c0n : Talk : Gen Ai and Autonomous Security in the Age of Zero Trust |
presentation, Video |
37 |
2024/11/15 : C0c0n : Talk : Hackers Highway Uncovering Vulnerabilities Hidden Behind Every Car's License Plate |
presentation, Video |
38 |
2024/11/15 : C0c0n : Talk : Know Your Enemies Deep Dive Into Ransomware Threat Groups |
presentation, Video |
39 |
2024/11/15 : C0c0n : Talk : PC I 4.0, Javascript Security for Product Security Teams |
presentation, Video |
40 |
2024/11/15 : C0c0n : Talk : Remote Whispers of Mobile Sim |
presentation, Video |
41 |
2024/09/20 : 44 Con : Talk : Unveiling the Ghosts of Mobile Networks When Will Old Bugs Die? |
presentation, Video |
42 |
2024/08/10 : Defcon : Talk : Sneaky Extensions the Mv3 Escape Artists |
presentation, Video |
43 |
2024/08/09 : Defcon : Talk : Breaking Secure Web Gateways ( Swg) for Fun and Profit |
presentation, Video |
44 |
2024/08/09 : Defcon : Talk : Reflections on a Decade in Bug Bounties Experiences and Major Takeaways |
presentation, Video |
45 |
2024/03/21 : Can Sec West : Talk : Rolling in the Dough How Microsoft Identified and Remidiated a Baker's Dozen of Security Threats in the Windows DNS Server |
presentation, Video |
46 |
2024/03/12 : Nullcon : Talk : Secure Web Gateways Are Dead. What’s Next? |
presentation, Video |
47 |
2023/11/17 : Deepsec : Talk : Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption |
presentation, Video |
48 |
2023/10/13 : Hackfest : Talk : Exploring RAM Forensic Analysis for Effective Digital Investigations |
presentation, Video |
49 |
2023/09/29 : Hackinparis : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor |
presentation, Video |
50 |
2023/09/28 : Hackinparis : Talk : How to Have Visibility and Security of Cicd Ecosystem |
presentation, Video |
51 |
2023/08/12 : Defcon : Talk : Getting More Bang for Your Buck Appsec on a Limited Budget |
presentation, Video |
52 |
2023/08/11 : Defcon : Talk : Generative Adversarial Network ( Gan) Based Autonomous Penetration Testing for Web Applications |
presentation, Video |
53 |
2023/08/10 : Defcon : Talk : Hardware Backdooring an E Scooter |
presentation, Video |
54 |
2023/08/07 : C0c0n : Talk : Cellibrite Premium Mobile Forensic Tool I Phone Analysis |
presentation, Video |
55 |
2023/08/07 : C0c0n : Talk : Citizen Mobile Security Responsibilities, Accountability, and Impacts |
presentation, Video |
56 |
2023/08/07 : C0c0n : Talk : Darkweb Investigations |
presentation, Video |
57 |
2023/08/07 : C0c0n : Talk : Esoc Trinetra Project |
presentation, Video |
58 |
2023/08/07 : C0c0n : Talk : Exploring Threats in Operational Technology |
presentation, Video |
59 |
2023/08/06 : C0c0n : Talk : Ai in Cyber Security and Crime Prevention |
presentation, Video |
60 |
2023/08/06 : C0c0n : Talk : Cryptocurrencies and Challenges to Law Enforcement Agencies |
presentation, Video |
61 |
2023/08/06 : C0c0n : Talk : Cybercrimes Victim Compensation Legal Remedies and Process |
presentation, Video |
62 |
2023/08/06 : C0c0n : Talk : Dark Web for Investigations |
presentation, Video |
63 |
2023/08/06 : C0c0n : Talk : Developments in Deep Fake Detection |
presentation, Video |
64 |
2023/08/06 : C0c0n : Talk : Digital Innovation and Its Impact on Cios, Cisos and Dpos |
presentation, Video |
65 |
2023/08/06 : C0c0n : Talk : Influence of Artificial Intelligence in Grc Space |
presentation, Video |
66 |
2022/09/28 : Rootcon : Talk : Gazing Into the Crystal Ball the Fog of Cyberwarfare Escalations |
presentation, Video |
67 |
2022/09/24 : C0c0n : Talk : Bec, Still the Sure Shot Trap |
presentation, Video |
68 |
2022/09/24 : C0c0n : Talk : Building Smart, Resilient and Sustainable Cyber Eco System |
presentation, Video |
69 |
2022/09/24 : C0c0n : Talk : Canalyse a Vehicle Network Analysis and Attack Tool |
presentation, Video |
70 |
2022/09/24 : C0c0n : Talk : Citizen Mobile Security ( Icamps) |
presentation, Video |
71 |
2022/09/24 : C0c0n : Talk : Cryptocurrency Forensics |
presentation, Video |
72 |
2022/09/24 : C0c0n : Talk : Cyber Defence and Role of Private Players Public Private Partnership |
presentation, Video |
73 |
2022/09/24 : C0c0n : Talk : Deep Learning to Detect Network Attacks |
presentation, Video |
74 |
2022/09/24 : C0c0n : Talk : In Production With Grc for Cloud |
presentation, Video |
75 |
2022/09/24 : C0c0n : Talk : Introduction to Rfid Nfc Hacking |
presentation, Video |
76 |
2022/09/24 : C0c0n : Talk : Know Your Organization? Mapping Entities in Google Workspace |
presentation, Video |
77 |
2022/09/24 : C0c0n : Talk : Need for Advanced Soc |
presentation, Video |
78 |
2022/09/24 : C0c0n : Talk : OSI Nt Tools and Techniques |
presentation, Video |
79 |
2022/09/24 : C0c0n : Talk : Power of Narratives in Cyber Security |
presentation, Video |
80 |
2022/09/24 : C0c0n : Talk : Raining Cves on Wordpress Plugins With Semgrep |
presentation, Video |
81 |
2022/09/24 : C0c0n : Talk : Rationalizing Cyber Security Risk in Risk Language |
presentation, Video |
82 |
2022/09/24 : C0c0n : Talk : Towards an Effective Intrusion Detection System Framework for Multi Channel Man in the Middle Attacks Against Protected Wi Fi Networks |
presentation, Video |
83 |
2022/09/24 : C0c0n : Talk : Weaponising Social Media for Psychological Operations |
presentation, Video |
84 |
2022/09/24 : C0c0n : Talk : Web3 Security Security in Meta Verse, and the New World of Web3 |
presentation, Video |
85 |
2022/09/23 : C0c0n : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor |
presentation, Video |
86 |
2022/09/23 : C0c0n : Talk : Attacking Connected Industries in 5 G Networks |
presentation, Video |
87 |
2022/09/23 : C0c0n : Talk : Battle of 300 Crore How They Lost It and Got Most of It Back |
presentation, Video |
88 |
2022/09/23 : C0c0n : Talk : Bridging the Gap Between Security and Operations |
presentation, Video |
89 |
2022/09/23 : C0c0n : Talk : Building a Safer and Innovative Digital Ecosystem |
presentation, Video |
90 |
2022/09/23 : C0c0n : Talk : Collaborative Efforts for Safe Digital Banking |
presentation, Video |
91 |
2022/09/23 : C0c0n : Talk : Common Misconfigurations in Your Kubernetes Cluster and What Can You Do About It? |
presentation, Video |
92 |
2022/09/23 : C0c0n : Talk : Cybersecurity for Manufacturing |
presentation, Video |
93 |
2022/09/23 : C0c0n : Talk : Hacking Smart Contracts |
presentation, Video |
94 |
2022/09/23 : C0c0n : Talk : Hyperledger Fabric & Ethereum Apps Security Deep Dive |
presentation, Video |
95 |
2022/09/23 : C0c0n : Talk : Log4j Vulnerability Continuous to Be Favourite for Apt Groups Through Mid 2022 |
presentation, Video |
96 |
2022/09/23 : C0c0n : Talk : Pwning Android Apps at Scale |
presentation, Video |
97 |
2022/09/23 : C0c0n : Talk : Ransomware Prevention, Early Detection and Response |
presentation, Video |
98 |
2022/09/23 : C0c0n : Talk : Rolling Out Central Bank Digital Currency Technical Design Considerations |
presentation, Video |
99 |
2022/09/23 : C0c0n : Talk : Securing Your Apis for a Cloud Native Future |
presentation, Video |
100 |
2022/09/23 : C0c0n : Talk : Startup Ecosystem and Investments in Post Covid Era |
presentation, Video |
101 |
2022/09/23 : C0c0n : Talk : Technological Reliance for Resilience |
presentation, Video |
102 |
2022/09/23 : C0c0n : Talk : Threats Landscape and Intelligence of API & Shield to Protect |
presentation, Video |
103 |
2022/09/23 : C0c0n : Talk : Tracking the Bad Guys. an Interesting Story of How the Criminal Underground Operates |
presentation, Video |
104 |
2022/09/23 : C0c0n : Talk : Tropic Trooper Targets High Profile Victims Using Newly Discovered Mqtt Backdoor |
presentation, Video |
105 |
2022/08/14 : Defcon : Talk : Tales From the Trenches Why Organizations Struggle to Get Even the Basics of Ot Asset Visibility & Detection Right |
presentation, Video |
106 |
2021/11/18 : Hackinparis : Talk : Is It Really an Intrusion if You Get Called In? Mis Configuration Based Attacks in Aws |
presentation, Video |
107 |
2021/11/13 : C0c0n : Talk : Decoding New Age Hackers and Criminal Investigation |
presentation, Video |
108 |
2021/11/13 : C0c0n : Talk : A Look Into Cyber Espionage Activities Targeting Critical Infrastructure in India |
presentation, Video |
109 |
2021/11/13 : C0c0n : Talk : Building Global Cyber Security Company Out of India Key Lessons Learnt During My Entrepreneurship Journey |
presentation, Video |
110 |
2021/11/13 : C0c0n : Talk : Case Study Cyber Heist in a Bank and Recovery of Systems and Money |
presentation, Video |
111 |
2021/11/13 : C0c0n : Talk : Case Study E Crime Group Targeting Mobile Users |
presentation, Video |
112 |
2021/11/13 : C0c0n : Talk : Changing Cyber Security Paradigm & Cyber Tsunami |
presentation, Video |
113 |
2021/11/13 : C0c0n : Talk : Cloud Threat Landscape |
presentation, Video |
114 |
2021/11/13 : C0c0n : Talk : Connecting the Dots Between Customers and Security Teams |
presentation, Video |
115 |
2021/11/13 : C0c0n : Talk : Crisis Capitalization in a Pandemic |
presentation, Video |
116 |
2021/11/13 : C0c0n : Talk : Cyber Warfare & Securing Critical Infrastructures |
presentation, Video |
117 |
2021/11/13 : C0c0n : Talk : Cybersecurity in the Era of Resilience a Walk Through People, Process and Technology |
presentation, Video |
118 |
2021/11/13 : C0c0n : Talk : Emerging Trends in Cyber Crimes Investigation Tools & Techniques |
presentation, Video |
119 |
2021/11/13 : C0c0n : Talk : Enhancing an Multi Factor Authentication ( Mfa) Through Behavioural Biometrics |
presentation, Video |
120 |
2021/11/13 : C0c0n : Talk : Exploiting 2 A( Authentication and Authorization) Vulnerabilities of Web Application |
presentation, Video |
121 |
2021/11/13 : C0c0n : Talk : Introducing Free & Open Elastic Limitless Xdr |
presentation, Video |
122 |
2021/11/13 : C0c0n : Talk : Machine Learning to Detect Chia Mining |
presentation, Video |
123 |
2021/11/13 : C0c0n : Talk : Mature Your Threat Hunting Program |
presentation, Video |
124 |
2021/11/13 : C0c0n : Talk : Need for Zero Trust in Banking |
presentation, Video |
125 |
2021/11/13 : C0c0n : Talk : New Way of Looking at the Hidden Mysteries in the Code |
presentation, Video |
126 |
2021/11/13 : C0c0n : Talk : Post Pandemic Transformation a Ciso's Perspective |
presentation, Video |
127 |
2021/11/13 : C0c0n : Talk : Securing Ot in O& G Industry |
presentation, Video |
128 |
2021/11/13 : C0c0n : Talk : Third Party Risk Management |
presentation, Video |
129 |
2021/11/13 : C0c0n : Talk : Zero Trust & Micro Segmentation |
presentation, Video |
130 |
2021/11/12 : C0c0n : Talk : “ Let’s Go Phishing” Discerning the Insidious Nature of Social Engineering |
presentation, Video |
131 |
2021/11/12 : C0c0n : Talk : 2021 Supply Chain Attacks Analysis |
presentation, Video |
132 |
2021/11/12 : C0c0n : Talk : Data Security and Privacy |
presentation, Video |
133 |
2021/11/12 : C0c0n : Talk : Dissecting Malicious Software and Analysis |
presentation, Video |
134 |
2021/11/12 : C0c0n : Talk : Enterprise Governance and Risk Management |
presentation, Video |
135 |
2021/11/12 : C0c0n : Talk : Executive Presence....a Cardinal of the Cyber Rostrum |
presentation, Video |
136 |
2021/11/12 : C0c0n : Talk : Ics Security a Need, a Challenge and a New Change in Mindset |
presentation, Video |
137 |
2021/11/12 : C0c0n : Talk : Io T Security Guidelines & Standards |
presentation, Video |
138 |
2021/11/12 : C0c0n : Talk : Post Covid Cisos Disappearing Trusted Boundaries and Innovative Cyber Security Approaches |
presentation, Video |
139 |
2021/11/12 : C0c0n : Talk : Regulating Social Media Platforms Should It Be Done in Democratic Societies ? |
presentation, Video |
140 |
2021/11/12 : C0c0n : Talk : The Evolving Nature of Cyber Community |
presentation, Video |
141 |
2021/11/12 : C0c0n : Talk : Understanding the Psychology Behind Threats Adding Twists to Your Turns |
presentation, Video |
142 |
2020/09/18 : C0c0n : Talk : Herd Immunity, in the Cyber World |
presentation, Video |
143 |
2020/09/18 : C0c0n : Talk : All About Iot Forensics |
presentation, Video |
144 |
2020/09/18 : C0c0n : Talk : Automation in Bug Bounties to Work Smarter |
presentation, Video |
145 |
2020/09/18 : C0c0n : Talk : Broken Cryptography & Account Takeover |
presentation, Video |
146 |
2020/09/18 : C0c0n : Talk : Deep Learning for Intrusion Attempt Detection |
presentation, Video |
147 |
2020/09/18 : C0c0n : Talk : My Top 3 Findings in Bug Bounty Journey Aiming for High Impact Issues |
presentation, Video |
148 |
2020/09/18 : C0c0n : Talk : Reverse Engineering Bare Metal Io T Firmwares Moving Beyond Linux |
presentation, Video |
149 |
2020/09/18 : C0c0n : Talk : Supercharging Your Initial Foothold in Red Team Engagements |
presentation, Video |
150 |
2020/07/26 : Hitb Sec Conf : Talk : Swapping Asprin Formulas With Mdma While Red Teaming a Billion Dollar Company |
presentation, Video |
151 |
2020/04/25 : Hitb Sec Conf : Talk : The State of Ics Security Then and Now |
presentation, Video |
152 |
2020/04/24 : Hitb Sec Conf : Talk : Commsec the State of Ics Security Then and Now |
presentation, Video |
153 |
2020/03/06 : Nullcon : Talk : Automated Classification of Web Application Attacks for Intrusion Detection |
presentation, Video |
154 |
2019/11/01 : App Sec Day Australia : Talk : A Purple Team View of Serverless and Graph Ql Applications |
presentation, Video |
155 |
2019/10/22 : Hacklu : Talk : Intro to Dark Arts Getting Started With Ctfs |
presentation, Video |
156 |
2019/09/28 : C0c0n : Talk : Vulnerability Prioritization With Threat Intelligence |
presentation, Video |
157 |
2019/09/27 : C0c0n : Talk : A Day in the Life of a Ciso |
presentation, Video |
158 |
2019/09/27 : C0c0n : Talk : Advanced Persistent Threat and Counter Measures |
presentation, Video |
159 |
2019/09/27 : C0c0n : Talk : Ai, Ml and Security |
presentation, Video |
160 |
2019/09/27 : C0c0n : Talk : Auto Source an Automated Framework for Source Code Review |
presentation, Video |
161 |
2019/09/27 : C0c0n : Talk : Block Chain for Secured Automation |
presentation, Video |
162 |
2019/09/27 : C0c0n : Talk : Building a Cloud Security Monitoring and Auditing Framework |
presentation, Video |
163 |
2019/09/27 : C0c0n : Talk : Ciso Mind Set |
presentation, Video |
164 |
2019/09/27 : C0c0n : Talk : Cyber Hygiene From Enterprise Point of View |
presentation, Video |
165 |
2019/09/27 : C0c0n : Talk : Demystifying Health Care Security |
presentation, Video |
166 |
2019/09/27 : C0c0n : Talk : Detection of Tor Sources Using Artificial Intelligence |
presentation, Video |
167 |
2019/09/27 : C0c0n : Talk : Doing Sec Ops for the Cloud Using Cloud Native Services |
presentation, Video |
168 |
2019/09/27 : C0c0n : Talk : Hacking Ics Devices for Fun |
presentation, Video |
169 |
2019/09/27 : C0c0n : Talk : Industry 4.0 Security and Compliance |
presentation, Video |
170 |
2019/09/27 : C0c0n : Talk : Lessons Learned Form Data Breaches in the Cloud |
presentation, Video |
171 |
2019/09/27 : C0c0n : Talk : Looking a Decade Ahead Big Data, Drones , Robots and Cyber Security. |
presentation, Video |
172 |
2019/09/27 : C0c0n : Talk : Offensive Machine Learning for Pentesters and Red Teams |
presentation, Video |
173 |
2019/09/27 : C0c0n : Talk : Practical Approach to Cyber Security for Financial Institutions |
presentation, Video |
174 |
2019/09/27 : C0c0n : Talk : Ransomware to Pay or Not to Pay |
presentation, Video |
175 |
2019/09/27 : C0c0n : Talk : Securing Payment Data With PC I Security Standards and Programs |
presentation, Video |
176 |
2019/09/27 : C0c0n : Talk : Security @Scale for Startups |
presentation, Video |
177 |
2019/09/27 : C0c0n : Talk : Serverless Soar |
presentation, Video |
178 |
2019/09/27 : C0c0n : Talk : Stepping Into Password Less Economy |
presentation, Video |
179 |
2019/08/11 : Defcon : Talk : Exploiting and Securing I Os Apps Using Owasp I Goat |
presentation, Video |
180 |
2019/08/08 : Defcon : Talk : Anatomy of Cloud Hacking |
presentation, Video |
181 |
2019/05/21 : Phdays : Talk : Fuzzing 101 |
presentation, Video |
182 |
2019/05/21 : Phdays : Talk : Rapid Hardware Hacking 101 |
presentation, Video |
183 |
2019/02/28 : Nullcon : Talk : Dirty Use of Ussd Codes |
presentation, Video |
184 |
2018/11/02 : Hitb Sec Conf : Talk : Defending the Enterprise in 2018 |
presentation, Video |
185 |
2018/10/10 : Brucon : Talk : Simplifying the Art of Instrumentation |
presentation, Video |
186 |
2018/10/05 : C0c0n : Talk : Defending Cloud Infrastructures With Cloud Security Suite |
presentation, Video |
187 |
2018/10/05 : C0c0n : Talk : DNS Exfiltration and Out of Band Attacks |
presentation, Video |
188 |
2018/10/05 : C0c0n : Talk : Adaptive Grc |
presentation, Video |
189 |
2018/10/05 : C0c0n : Talk : Artificial Intelligence and Social Media Analytics in Criminal Investigation |
presentation, Video |
190 |
2018/10/05 : C0c0n : Talk : Blockchains as Techno Power Structures Towards Emergence of P2 P Politics |
presentation, Video |
191 |
2018/10/05 : C0c0n : Talk : Cyber Security in Health Care Industry |
presentation, Video |
192 |
2018/10/05 : C0c0n : Talk : Cybersecurity Embedded Digital Transformation the Future |
presentation, Video |
193 |
2018/10/05 : C0c0n : Talk : Data Management Challenge for Privacy Compliance |
presentation, Video |
194 |
2018/10/05 : C0c0n : Talk : Dealing With Changing Threat Landscape |
presentation, Video |
195 |
2018/10/05 : C0c0n : Talk : Defending Healthcare Base |
presentation, Video |
196 |
2018/10/05 : C0c0n : Talk : Digital Innovation Revolution in Kerala Government |
presentation, Video |
197 |
2018/10/05 : C0c0n : Talk : Dom Goat the Dom Security Playground |
presentation, Video |
198 |
2018/10/05 : C0c0n : Talk : Future of Mobility & Cyber Security |
presentation, Video |
199 |
2018/10/05 : C0c0n : Talk : How Can We Use Machine Learning to Prevent Frauds and Password Breaches |
presentation, Video |
200 |
2018/10/05 : C0c0n : Talk : OSI Nt Indian Citizen Edition |
presentation, Video |
201 |
2018/10/05 : C0c0n : Talk : Predictive Policing Using Big Data Analytics. |
presentation, Video |
202 |
2018/10/05 : C0c0n : Talk : Privacy and Data Protection Stakeholders’ Perspectives |
presentation, Video |
203 |
2018/10/05 : C0c0n : Talk : Resiliency Focus Alongside Digital Disruption |
presentation, Video |
204 |
2018/10/05 : C0c0n : Talk : Scanda to Unbosom Malware Behavior |
presentation, Video |
205 |
2018/10/05 : C0c0n : Talk : Taking Cyber Security to the Board Room |
presentation, Video |
206 |
2018/10/05 : C0c0n : Talk : Unconventional Vulnerabilities in Google Cloud Platform |
presentation, Video |
207 |
2018/10/05 : C0c0n : Talk : Using Fault Injection for Forensics |
presentation, Video |
208 |
2018/10/05 : C0c0n : Talk : Will Artificial Intelligence and Machine Learning Bring More Threats on Cyber Security? |
presentation, Video |
209 |
2018/08/09 : Defcon : Talk : Backdooring Dvr Nvr Devices |
presentation, Video |
210 |
2017/11/20 : Hackfest : Talk : How My Sv Machine Nailed Your Malware |
presentation, Video |
211 |
2017/10/05 : Brucon : Talk : Races, Reaches and Rescues!!! ( Race Condition Vulnerabilities Revisited) |
presentation, Video |
212 |
2017/08/19 : C0c0n : Talk : The Public Private Partnership Navigating the Govt |
presentation, Video |
213 |
2017/08/19 : C0c0n : Talk : Trust, the Foundation of Digital Mastery |
presentation, Video |
214 |
2017/08/18 : C0c0n : Talk : Hunting Botnets With Analytics |
presentation, Video |
215 |
2017/08/18 : C0c0n : Talk : Phishing Threats to Customers and Mitigation |
presentation, Video |
216 |
2017/08/18 : C0c0n : Talk : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work |
presentation, Video |
217 |
2017/08/18 : C0c0n : Talk : Androsia a Tool for Securing in Memory Sensitive Data |
presentation, Video |
218 |
2017/08/18 : C0c0n : Talk : Anti Virus Bypassing for Fun and Profit |
presentation, Video |
219 |
2017/08/18 : C0c0n : Talk : Bank on Compliance for Cyber Security |
presentation, Video |
220 |
2017/08/18 : C0c0n : Talk : Big Data Analytics With Pattern Matching for Smarter Analytics |
presentation, Video |
221 |
2017/08/18 : C0c0n : Talk : Blockchain for Information Security |
presentation, Video |
222 |
2017/08/18 : C0c0n : Talk : Case Study Security of Digital Wallet Apps in India |
presentation, Video |
223 |
2017/08/18 : C0c0n : Talk : Catching Network Anomalies Using Deep Learning |
presentation, Video |
224 |
2017/08/18 : C0c0n : Talk : Challenges in Digital Banking |
presentation, Video |
225 |
2017/08/18 : C0c0n : Talk : Cloud Security Suite One Stop Tool for Auditing Cloud Infrastructure |
presentation, Video |
226 |
2017/08/18 : C0c0n : Talk : Co Ap Versus Mqtt Io T Protocol Vulnerability Analysis |
presentation, Video |
227 |
2017/08/18 : C0c0n : Talk : Cyber Bullying and Cyber Harassment |
presentation, Video |
228 |
2017/08/18 : C0c0n : Talk : Cyber Bullying Screen the Mean |
presentation, Video |
229 |
2017/08/18 : C0c0n : Talk : Cyber Security Threat Management – Model It, Collect Intelligence and Hunt Them! |
presentation, Video |
230 |
2017/08/18 : C0c0n : Talk : Cyber Threat Intelligence Are We There , Yet…? |
presentation, Video |
231 |
2017/08/18 : C0c0n : Talk : Do Students Really Require Smartphones |
presentation, Video |
232 |
2017/08/18 : C0c0n : Talk : Dynamic Binary Instrumentation |
presentation, Video |
233 |
2017/08/18 : C0c0n : Talk : Exploiting the Smartness of Ble Stack |
presentation, Video |
234 |
2017/08/18 : C0c0n : Talk : Hacking Homes a Hardware Insight for Io T [In] Security |
presentation, Video |
235 |
2017/08/18 : C0c0n : Talk : Hunting the Hunters – Fighting Cyber Crime at the Source |
presentation, Video |
236 |
2017/08/18 : C0c0n : Talk : Identity Theft |
presentation, Video |
237 |
2017/08/18 : C0c0n : Talk : I Goat – A Self Learning Tool for I Os App Pentesting and Security |
presentation, Video |
238 |
2017/08/18 : C0c0n : Talk : Internet Addiction and Children |
presentation, Video |
239 |
2017/08/18 : C0c0n : Talk : Mobile Banking ( In) Security |
presentation, Video |
240 |
2017/08/18 : C0c0n : Talk : Moving From Cybersecurity Awareness to Cybersecurity Competence |
presentation, Video |
241 |
2017/08/18 : C0c0n : Talk : OSI Nt and Privacy |
presentation, Video |
242 |
2017/08/18 : C0c0n : Talk : Penetration Testing Orchestrator a Framework That Leverages Multi Tool Penetration Testing Approach Combined With Machine Learning Nlp for Faster Result Analysis |
presentation, Video |
243 |
2017/08/18 : C0c0n : Talk : Prevent Dark Side of Your Smart City a Defensive Security Model for Smart City and Critical Infrastructure |
presentation, Video |
244 |
2017/08/18 : C0c0n : Talk : Sleep, Screen and Teenagers |
presentation, Video |
245 |
2017/08/18 : C0c0n : Talk : Social Media and You |
presentation, Video |
246 |
2017/08/18 : C0c0n : Talk : Technology the New Frontier in Teaching |
presentation, Video |
247 |
2017/08/18 : C0c0n : Talk : The Card Hack Lessons From the Hitachi Payments Breach |
presentation, Video |
248 |
2017/08/18 : C0c0n : Talk : The Covert Cupid Under .11 Veil !!! * Approach for Covert Wifi* |
presentation, Video |
249 |
2017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)y |
presentation, Video |
250 |
2017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technology |
presentation, Video |
251 |
2017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technology |
presentation, Video |
252 |
2017/08/18 : C0c0n : Talk : The Role of Teachers in Digital Era |
presentation, Video |
253 |
2017/08/18 : C0c0n : Talk : Threats With Online Gaming and Issues With Games Like Pokemon |
presentation, Video |
254 |
2017/08/18 : C0c0n : Talk : What Security Managers Can Learn From Story Tellers? |
presentation, Video |
255 |
2017/08/18 : C0c0n : Talk : Yarafying Android Malware a Missing Step Before Malware Analysis |
presentation, Video |
256 |
2017/08/18 : C0c0n : Talk : Your Friendly Neighbourhood Exploit |
presentation, Video |
257 |
2017/03/23 : Troopers : Talk : How We Hacked Distributed Configuration Management Systems |
presentation, Video |
258 |
2017/03/23 : Troopers : Talk : How We Hacked Distributed Configuration Management Systems |
presentation, Video |
259 |
2017/03/21 : Troopers : Talk : New Attacks in 4 G Technologies |
presentation, Video |
260 |
2017/03/03 : Nullcon : Talk : Agility With Security Mitigations in Windows 10 |
presentation, Video |
261 |
2016/11/11 : Deepsec : Talk : Human vs Artificial Intelligence – Battle of Trust |
presentation, Video |
262 |
2016/11/06 : Ground Zero Summit : Talk : Hacking the Droids |
presentation, Conference Link, Video |
263 |
2016/11/05 : Hackfest : Talk : Lock Picker Leaking Data From Live Luks Partition |
presentation, Video |
264 |
2016/08/19 : C0c0n : Talk : Abusing Digital Certificates Malware Style |
presentation, Video |
265 |
2016/08/19 : C0c0n : Talk : App Sec in the Time of Docker Containers |
presentation, Video |
266 |
2016/08/19 : C0c0n : Talk : Backdooring My Enemies With a Proxy for Threat Intelligence |
presentation, Video |
267 |
2016/08/19 : C0c0n : Talk : Breaking Into Gas Stations! |
presentation, Video |
268 |
2016/08/19 : C0c0n : Talk : Evading Corporate Security – You’re as Secure as the Weakest Link |
presentation, Video |
269 |
2016/08/19 : C0c0n : Talk : How (In)secure Are Indian Gsm Networks? |
presentation, Video |
270 |
2016/08/19 : C0c0n : Talk : Kill the Password a New Era of Authentication |
presentation, Video |
271 |
2016/08/19 : C0c0n : Talk : Ssd Forensics a Nightmare for Forensic Investigators |
presentation, Video |
272 |
2016/08/19 : C0c0n : Talk : The Art of Social Hacking |
presentation, Video |
273 |
2016/05/26 : Hitb Sec Conf : Talk : Hitb Lab Mobile Application Security for I Os and Android |
presentation, Video |
274 |
2016/03/11 : Nullcon : Talk : Hitchhiker's Guide to Hacking Industrial Control Systems ( Ics) |
presentation, Video |
275 |
2016/03/11 : Nullcon : Talk : Million Dollar Baby Towards Angrly Conquering Darpa Cgc |
presentation, Video |
276 |
2015/11/05 : Ground Zero Summit : Talk : Cyber Security in Hospitals Hospitals Under Seige |
presentation, Video |
277 |
2015/11/05 : Ground Zero Summit : Talk : Exposing Cyber Espionage Hello From Pakistan Iic Session |
presentation, Video |
278 |
2015/11/05 : Ground Zero Summit : Talk : Western Air Command |
presentation, Video |
279 |
2015/11/05 : Ground Zero Summit : Talk : Authentication Flaw in Automatic Bank Passbook Printing Machine. |
presentation, Video |
280 |
2015/11/05 : Ground Zero Summit : Talk : Browser Based Malware Attacks |
presentation, Video |
281 |
2015/11/05 : Ground Zero Summit : Talk : Chellam – A Wi Fi ID S Firewall for Windows |
presentation, Video |
282 |
2015/11/05 : Ground Zero Summit : Talk : Credit Card Frauds – The Money Making Ecosystem for Cyber Criminals |
presentation, Video |
283 |
2015/11/05 : Ground Zero Summit : Talk : Dissecting Android Malware |
presentation, Video |
284 |
2015/11/05 : Ground Zero Summit : Talk : Economics of Post Quantum Crypto Systems Do We Really Need It |
presentation, Video |
285 |
2015/11/05 : Ground Zero Summit : Talk : Elliptical Curve Cryptography |
presentation, Video |
286 |
2015/11/05 : Ground Zero Summit : Talk : Hacking Rfids Under 2000 Inr |
presentation, Video |
287 |
2015/11/05 : Ground Zero Summit : Talk : Sanctioned to Hack Your Scada Hmis Belong to Us! |
presentation, Video |
288 |
2015/11/05 : Ground Zero Summit : Talk : Thanks for the Free Cookies |
presentation, Video |
289 |
2015/11/05 : Ground Zero Summit : Talk : Trailing Terror in the Darknets |
presentation, Video |
290 |
2015/11/05 : Ground Zero Summit : Talk : Wolves Among Sheep Defeating Targeted Attacks With Deception |
presentation, Video |
291 |
2015/11/05 : Ground Zero Summit : Talk : Xss the Art of Evading Web Application Filters! |
presentation, Video |
292 |
2015/08/07 : Defcon : Talk : Getting Into the Trust Store We Trust |
presentation, Video |
293 |
2015/08/01 : C0c0n : Talk : A Pentester's Methodology to Discover, Automate and Exploit Windows Privilege Escalation Flaws. |
presentation, Video |
294 |
2015/08/01 : C0c0n : Talk : Attack Chaining for Web Exploitation From Information Leakage to Gaining Root Access |
presentation, Video |
295 |
2015/08/01 : C0c0n : Talk : Blockchains in Security |
presentation, Video |
296 |
2015/08/01 : C0c0n : Talk : Breaking Into Infosec Research |
presentation, Video |
297 |
2015/08/01 : C0c0n : Talk : Demystifying and Breaking Ble |
presentation, Video |
298 |
2015/08/01 : C0c0n : Talk : From Aosp ( Android Open Source Project ) to Abd ( Android Based Devices ) |
presentation, Video |
299 |
2015/08/01 : C0c0n : Talk : Hacking Rfids Under 2000 Inr |
presentation, Video |
300 |
2015/08/01 : C0c0n : Talk : Medical Device Security and Critical Infrastructure Inside Hospitals |
presentation, Video |
301 |
2015/08/01 : C0c0n : Talk : No Po the No SQL Honey Pot Framework |
presentation, Video |
302 |
2015/08/01 : C0c0n : Talk : Reversing and Deciphering the Cyber Espionage Malware Communications |
presentation, Video |
303 |
2015/08/01 : C0c0n : Talk : S3curi7y at 36 K Feet |
presentation, Video |
304 |
2015/05/26 : Phdays : Talk : Invisible Backdoors in Your Code |
presentation, Video |
305 |
2015/03/15 : Defcon : Talk : Technical Talk Fuzzing Asynchronous Protocols Built Over Websockets |
presentation, Conference Link, Video |
306 |
2015/02/06 : Nullcon : Talk : Building Security and Compliance Into the Software Delivery Process |
presentation, Video |
307 |
2015/02/06 : Nullcon : Talk : Toliman, a Hadoop Pentesting Tool |
presentation, Video |
308 |
2014/11/13 : Ground Zero Summit : Talk : Attacking Cryptography & Pki Implementations |
presentation, Video |
309 |
2014/11/13 : Ground Zero Summit : Talk : Identity Theft and Its Impact on Cyber Warfare |
presentation, Video |
310 |
2014/11/13 : Ground Zero Summit : Talk : Network Time Protocol in Amplification Inferno |
presentation, Video |
311 |
2014/11/13 : Ground Zero Summit : Talk : Security Vulnerabilities in Dvb C Networks Hacking Cable Tv Network |
presentation, Video |
312 |
2014/11/13 : Ground Zero Summit : Talk : 9 Cell Cyber Diplomacy |
presentation, Video |
313 |
2014/11/13 : Ground Zero Summit : Talk : Apt Protection for the Enterprise |
presentation, Video |
314 |
2014/11/13 : Ground Zero Summit : Talk : Attacking Web Proxies Like Never Before |
presentation, Video |
315 |
2014/11/13 : Ground Zero Summit : Talk : Cyber ' Brah Mos' Static Analysis Driven Secure Coding |
presentation, Video |
316 |
2014/11/13 : Ground Zero Summit : Talk : Detecting Fake Cell Phone Towers |
presentation, Video |
317 |
2014/11/13 : Ground Zero Summit : Talk : Enterprise Security |
presentation, Video |
318 |
2014/11/13 : Ground Zero Summit : Talk : Evaluating Waf ( Web Application Firewall) for Fun and Profit With Wof |
presentation, Video |
319 |
2014/11/13 : Ground Zero Summit : Talk : Financial Integrity and Cyber Security |
presentation, Video |
320 |
2014/11/13 : Ground Zero Summit : Talk : Fuzzing Asynchronous Protocols Built Over Websockets |
presentation, Video |
321 |
2014/11/13 : Ground Zero Summit : Talk : Hacking Consumer Electronics for Fun |
presentation, Video |
322 |
2014/11/13 : Ground Zero Summit : Talk : How I Won Browser Fuzzing |
presentation, Video |
323 |
2014/11/13 : Ground Zero Summit : Talk : Internet Governance |
presentation, Video |
324 |
2014/11/13 : Ground Zero Summit : Talk : Mobile Security Automation Framework for Intelligent Auditing |
presentation, Video |
325 |
2014/11/13 : Ground Zero Summit : Talk : National Cyber Policy and Its Impact on Business |
presentation, Video |
326 |
2014/11/13 : Ground Zero Summit : Talk : Scada Exploitation Through Firmware |
presentation, Video |
327 |
2014/11/13 : Ground Zero Summit : Talk : Vulnerability Reproduction Using Zest |
presentation, Video |
328 |
2014/10/23 : Hacklu : Talk : Wi Hawk Router Vulnerability Scanner |
presentation, Video |
329 |
2014/10/16 : Grrcon : Talk : Socioware Dissecting Online Social Network Worms – Insidious Analysis and Design |
presentation, Video |
330 |
2014/09/24 : Brucon : Talk : Owasp Owtf |
presentation, Video |
331 |
2014/08/22 : C0c0n : Talk : Apt Case Study of Attackers Targeting Public Tendering |
presentation, Video |
332 |
2014/08/22 : C0c0n : Talk : Breaking and Securing Mobile Apps Automagically |
presentation, Video |
333 |
2014/08/22 : C0c0n : Talk : Cryptocalypse, Heart Bleed Is Our Government Listening? |
presentation, Video |
334 |
2014/08/22 : C0c0n : Talk : Cryptographic Backdoors Subverting the Rsa |
presentation, Video |
335 |
2014/08/22 : C0c0n : Talk : Exploiting No SQL Like Never Before |
presentation, Video |
336 |
2014/08/22 : C0c0n : Talk : Hacking Communication |
presentation, Video |
337 |
2014/08/22 : C0c0n : Talk : Idle Machines Doing Bounty Hunting ( Behind Your Back) |
presentation, Video |
338 |
2014/08/22 : C0c0n : Talk : Lesser Known Attack Xml Injection |
presentation, Video |
339 |
2014/08/22 : C0c0n : Talk : Piracy Tracker |
presentation, Video |
340 |
2014/08/22 : C0c0n : Talk : Still Single With a Bleeding Heart ( Tool Release) |
presentation, Video |
341 |
2014/08/22 : C0c0n : Talk : The Curious Case of Proto Bufs Demystifying Google's Hottest Binary Protocol |
presentation, Video |
342 |
2014/02/14 : Nullcon : Talk : Strategic Information Warfare When Ends Define the Means |
presentation, Video |
343 |
2014/02/14 : Nullcon : Talk : User Privacy in Cellular Networks |
presentation, Video |
344 |
2013/11/21 : Deepsec : Talk : Automation in Android & I Os Application Security Review |
presentation, Video |
345 |
2013/11/07 : Ground Zero Summit : Talk : Advanced Security for Advanced Threats |
presentation, Video |
346 |
2013/11/07 : Ground Zero Summit : Talk : Approach to Containing the Outbreak of Malicious Information in Online Social Networks |
presentation, Video |
347 |
2013/11/07 : Ground Zero Summit : Talk : Central Monitoring System and It Act 2000 – Balance Between Rights of Citizens and State |
presentation, Video |
348 |
2013/11/07 : Ground Zero Summit : Talk : Cloud Security Enabling Continuous, Scalable Security for Today’s Hyper Connected World |
presentation, Video |
349 |
2013/11/07 : Ground Zero Summit : Talk : Evolution of Network Security Around Software Defined Networking ( Sdn) – The Intelligent Network |
presentation, Video |
350 |
2013/11/07 : Ground Zero Summit : Talk : How I Built a Pentest Lab in Under 70 Usd |
presentation, Video |
351 |
2013/11/07 : Ground Zero Summit : Talk : Internet – Transforming Terrorism |
presentation, Video |
352 |
2013/11/07 : Ground Zero Summit : Talk : Iron Wasp |
presentation, Video |
353 |
2013/11/07 : Ground Zero Summit : Talk : Malware for Firefox Mobile Os |
presentation, Video |
354 |
2013/11/07 : Ground Zero Summit : Talk : Securing Government Critical Information Infrastructure |
presentation, Video |
355 |
2013/11/07 : Ground Zero Summit : Talk : Serial Killing of Embedded Systems |
presentation, Video |
356 |
2013/11/07 : Ground Zero Summit : Talk : Setting the Data Center on Fire |
presentation, Video |
357 |
2013/11/07 : Ground Zero Summit : Talk : The Seven Sins of Wi Fi Security |
presentation, Video |
358 |
2013/11/07 : Ground Zero Summit : Talk : Towards a Next Generation Secure Internet |
presentation, Video |
359 |
2013/11/07 : Ground Zero Summit : Talk : Understanding the Anatomy of Advanced Targeted Attacks – The Trend Micro Approach |
presentation, Video |
360 |
2013/09/27 : C0c0n : Talk : Arm, Thumb and the Finger |
presentation, Video |
361 |
2013/09/27 : C0c0n : Talk : Blur Captcha |
presentation, Video |
362 |
2013/09/27 : C0c0n : Talk : Disclosing Vulnerabilities the Bug Bounty Style |
presentation, Video |
363 |
2013/09/27 : C0c0n : Talk : From Bedroom to Boardroom Taking Your Weekend Infosec Project Global |
presentation, Video |
364 |
2013/09/27 : C0c0n : Talk : Hello Ciso! How to Make End Users Like and Follow “ Brand Infosec”? |
presentation, Video |
365 |
2013/09/27 : C0c0n : Talk : Infiltrating the Intranet With Skanda |
presentation, Video |
366 |
2013/09/27 : C0c0n : Talk : Lets Play Applanting on New Grounds |
presentation, Video |
367 |
2013/09/27 : C0c0n : Talk : Pwning Wi Fi Devices! |
presentation, Video |
368 |
2013/09/27 : C0c0n : Talk : Risk and Challenges in Virtual Currencies. |
presentation, Video |
369 |
2013/09/27 : C0c0n : Talk : Sandy the Malicious Analysis |
presentation, Video |
370 |
2013/09/27 : C0c0n : Talk : Ssrf Xspa Real World Attacks and Mitigations |
presentation, Video |
371 |
2013/09/27 : C0c0n : Talk : The Art and Science of Anamoly Based Vulnerability Detection |
presentation, Video |
372 |
2013/09/27 : C0c0n : Talk : The Secure Software Development Life Cycle |
presentation, Video |
373 |
2013/09/13 : Rootcon : Talk : My Experiments With Truth a Different Route to Bug Hunting |
presentation, Video |
374 |
2013/09/12 : Grrcon : Talk : The Droid Exploitation Saga – All Over Again! |
presentation, Video |
375 |
2013/08/02 : Defcon : Talk : Interactive Web Security Testing With Iron Wasp |
presentation, Conference Link, Video |
376 |
2013/07/31 : Blackhat : Talk : Lte Booms With Vulnerabilities |
presentation, Video |
377 |
2013/03/01 : Nullcon : Talk : Automating Java Script Static Analysis |
presentation, Video |
378 |
2013/03/01 : Nullcon : Talk : Pawing the Droid Twisting the Arm |
presentation, Video |
379 |
2013/03/01 : Nullcon : Talk : Vulnerability Research Anyone? |
presentation, Video |
380 |
2012/11/23 : Malcon : Talk : Advanced Malware Engine |
presentation, Video |
381 |
2012/11/23 : Malcon : Talk : Surprise Paper! |
presentation, Video |
382 |
2012/11/23 : Malcon : Talk : Windows Phone 8 Malware Prototype |
presentation, Video |
383 |
2012/10/23 : Hacklu : Talk : Buster Android Security Buster |
presentation, Video |
384 |
2012/09/29 : Nullcon : Talk : Next Gen Forensics |
presentation, Video |
385 |
2012/09/28 : Nullcon : Talk : Alert( Xss ) How to Catch an Xss Before Someone Exploits Reports It? |
presentation, Video |
386 |
2012/09/28 : Nullcon : Talk : Attacking Angry Droids |
presentation, Video |
387 |
2012/09/20 : Ekoparty : Talk : Fuzzing Dtmf Input Processing Algorithms |
presentation, Video |
388 |
2012/08/03 : C0c0n : Talk : Building Security Incident Detection & Handling Capabilities in Enterprises |
presentation, Video |
389 |
2012/08/03 : C0c0n : Talk : Business Continuity and Risk Management in Turbulent Times |
presentation, Video |
390 |
2012/08/03 : C0c0n : Talk : Contemporary Transcription and Resource Parasitism |
presentation, Video |
391 |
2012/08/03 : C0c0n : Talk : Easy Money With Ui Redressing |
presentation, Video |
392 |
2012/08/03 : C0c0n : Talk : Enterprise Server Security |
presentation, Video |
393 |
2012/08/03 : C0c0n : Talk : Evil Java Script |
presentation, Video |
394 |
2012/08/03 : C0c0n : Talk : Gathering Security Requirements |
presentation, Video |
395 |
2012/08/03 : C0c0n : Talk : Layer 8 Exploitation a Threat to National Security |
presentation, Video |
396 |
2012/08/03 : C0c0n : Talk : Security Incidents – Avoiding the Apocalypse in 2012 |
presentation, Video |
397 |
2012/08/03 : C0c0n : Talk : The Management of Information Security – A Corporate Practitioner’s Perspective |
presentation, Video |
398 |
2012/08/03 : C0c0n : Talk : The Weakest Link Reinforcing the Human Element |
presentation, Video |
399 |
2012/03/15 : Owasp App Sec India : Talk : The Magic of Passive Web Vulnerability Analysis |
presentation, Conference Link, Video |
400 |
2012/02/15 : Nullcon : Talk : Cyberspace Global Commons or a National Asset |
presentation, Video |
401 |
2012/02/15 : Nullcon : Talk : Friction in the Machine |
presentation, Video |
402 |
2012/02/15 : Nullcon : Talk : Open Source Revolution Need Hardware Software Marriage |
presentation, Video |
403 |
2012/02/15 : Nullcon : Talk : Scada Security Why Is It So Hard |
presentation, Video |
404 |
2012/02/15 : Nullcon : Talk : Teensy for Fun and Jugaad |
presentation, Video |
405 |
2012/02/15 : Nullcon : Talk : Your Phone Is Your Phone but Your Calls Are Now My Calls |
presentation, Video |
406 |
2011/12/04 : Clubhack : Talk : Wi Fi Malware for Fun and Profit |
presentation, Conference Link, Video |
407 |
2011/11/25 : Malcon : Talk : Advanced Malware for Apple Products |
presentation, Video |
408 |
2011/11/25 : Malcon : Talk : Exploit the Exploit Kits |
presentation, Video |
409 |
2011/11/25 : Malcon : Talk : Mareech Look It’s a Hid Made Up of Gold |
presentation, Video |
410 |
2011/11/17 : Deepsec : Talk : Fake Anti Virus Journey From Trojan to a Persisent Threat |
presentation, Video |
411 |
2011/11/04 : Hackfest : Talk : Here Are Your Keystrokes |
presentation, Video |
412 |
2011/10/13 : Hitb Sec Conf : Talk : Web Wars 3 |
presentation, Video |
413 |
2011/10/08 : C0c0n : Talk : Stratagemizing Security Against Perpetrators in Cloud Infrastructure |
presentation, Video |
414 |
2011/10/07 : C0c0n : Talk : Deep(er) Penetration Reaching the Internal Network Using Exposed Web Applications |
presentation, Video |
415 |
2011/10/07 : C0c0n : Talk : Digital Evidence |
presentation, Video |
416 |
2011/10/07 : C0c0n : Talk : I Phone Jailbreak |
presentation, Video |
417 |
2011/10/07 : C0c0n : Talk : Mobile Security |
presentation, Video |
418 |
2011/10/07 : C0c0n : Talk : Network Security Modern Mechanism for Intrusion Detection and Avoidance in a P2 P Network |
presentation, Video |
419 |
2011/10/07 : C0c0n : Talk : Paranoid Android |
presentation, Video |
420 |
2011/10/07 : C0c0n : Talk : Password Less Authentication, Authorization |
presentation, Video |
421 |
2011/10/07 : C0c0n : Talk : Runtime Thread Injection and Execution in Linux Processes |
presentation, Video |
422 |
2011/10/07 : C0c0n : Talk : Section 43 a It Act Compliance |
presentation, Video |
423 |
2011/10/07 : C0c0n : Talk : Security and Privacy Risks of Cloud Computing |
presentation, Video |
424 |
2011/10/07 : C0c0n : Talk : Wi Fi Malware for Fun and Profit |
presentation, Video |
425 |
2011/09/19 : Hacklu : Talk : Linux Thread Injection the Jugaad Way |
presentation, Video |
426 |
2011/09/19 : Brucon : Talk : Step by Step for Software Security (That Anyone Can Follow) |
presentation, Video |
427 |
2011/09/19 : Hacklu : Talk : The Travelling Hacksmith |
presentation, Video |
428 |
2011/09/07 : Securitybyte : Talk : Data Protection |
presentation, Video |
429 |
2011/09/07 : Securitybyte : Talk : Social Web & Privacy – An Evolving World |
presentation, Video |
430 |
2011/02/25 : Nullcon : Talk : Future of Cyber Crimes Limitations and Challenges |
presentation, Video |
431 |
2011/02/25 : Nullcon : Talk : Hacking the Parliament – A Classic Social Engineering Attack |
presentation, Video |
432 |
2011/02/25 : Nullcon : Talk : Incident Management and Beyond |
presentation, Video |
433 |
2011/02/25 : Nullcon : Talk : Jugaad Beta Linux Thread Injection Malware Po C |
presentation, Video |
434 |
2010/08/01 : C0c0n : Talk : Cloud Computing & Security Boon or Bane; Hype or Reality; Cloud Implementation Challenges a Live Case Study |
presentation, Video |
435 |
2010/08/01 : C0c0n : Talk : Code Disclosure Over HTTP |
presentation, Video |
436 |
2010/08/01 : C0c0n : Talk : Concept, Methodology and Challenges in Computer Forensics |
presentation, Video |
437 |
2010/08/01 : C0c0n : Talk : Dangers and Dynamic Malware Analysis |
presentation, Video |
438 |
2010/08/01 : C0c0n : Talk : End Point Security |
presentation, Video |
439 |
2010/08/01 : C0c0n : Talk : Hackers' Eco System in India |
presentation, Video |
440 |
2010/08/01 : C0c0n : Talk : Horses, Rats and Bots |
presentation, Video |
441 |
2010/08/01 : C0c0n : Talk : Last Line of Defense Host Intrusion Prevention and Secure Application Development. |
presentation, Video |
442 |
2010/08/01 : C0c0n : Talk : Mobile Security |
presentation, Video |
443 |
2010/08/01 : C0c0n : Talk : Overview of Cyber Legal Systems in India |
presentation, Video |
444 |
2010/08/01 : C0c0n : Talk : Vo IP Security |
presentation, Video |
445 |
2010/08/01 : C0c0n : Talk : Wireless Mitm |
presentation, Video |
446 |
2010/08/01 : C0c0n : Talk : Writing X86 Shell Code & Secure Self Modifying Code and Cross Platform Programming a Security Angle |
presentation, Video |
447 |
2010/07/30 : Defcon : Talk : Hacking Oracle From Web Apps |
presentation, Video |
448 |
2010/07/01 : Hitb Sec Conf : Talk : The Travelling Hacksmith 2009 – 2010 |
presentation, Video |
449 |
2010/06/18 : Syscan : Talk : Reverse Engineering Web 2.0 Applications |
presentation, Video |
450 |
2010/02/25 : Nullcon : Talk : Imposter Ke Karnamey the Browser Phishing Tool. |
presentation, Video |
451 |
2010/02/25 : Nullcon : Talk : Quantum Computing Challenges in the Field of Security |
presentation, Video |
452 |
2009/12/04 : Clubhack : Talk : Facilitate Collaboration With Information Rights Management |
presentation, Video |
453 |
2009/11/18 : Securitybyte : Talk : Cloud Hacking – Distributed Attack & Exploit Platform |
presentation, Video |
454 |
2009/11/17 : Securitybyte : Talk : Business Case Risk Management Compliance at Amity |
presentation, Video |
455 |
2009/11/17 : Securitybyte : Talk : Business Continuity Case Study |
presentation, Video |
456 |
2009/10/28 : Hacklu : Talk : Ownage 2.0 |
presentation, Video |
457 |
2009/08/06 : C0c0n : Talk : Cyber Forensics |
presentation, Video |
458 |
2009/08/06 : C0c0n : Talk : Cyber Victimisation |
presentation, Video |
459 |
2009/08/06 : C0c0n : Talk : Information Security Audit |
presentation, Video |
460 |
2009/08/06 : C0c0n : Talk : Information Security Management Practices Technical Issues and the Impact of Risk Management. |
presentation, Video |
461 |
2009/08/06 : C0c0n : Talk : Information Warfare |
presentation, Video |
462 |
2009/08/06 : C0c0n : Talk : Know Your Enemy, and Yourself Demystifying Threat Modelin |
presentation, Video |
463 |
2009/08/06 : C0c0n : Talk : Management & Security of Large Scale Storage Devices |
presentation, Video |
464 |
2009/08/06 : C0c0n : Talk : Microsoft Security Strategies |
presentation, Video |
465 |
2009/08/06 : C0c0n : Talk : Network Intrusions and Hacking |
presentation, Video |
466 |
2009/05/19 : Syscan : Talk : Securing Applications at Gateway With Web Application Firewalls |
presentation, Video |
467 |
2009/05/19 : Syscan : Talk : Securing Enterprise Applications |
presentation, Video |
468 |
2008/11/13 : Deepsec : Talk : Game of Web 2.0 Security Attacking Next Generation Apps |
presentation, Video |
469 |
2008/10/22 : Hacklu : Talk : Browser Exploits a New Model for Browser Security |
presentation, Video |
470 |
2008/08/21 : Owasp App Sec India : Talk : App Sec for Managers |
presentation, Video |
471 |
2008/08/20 : Owasp App Sec India : Talk : Building Enterprise App Sec Program |
presentation, Video |
472 |
2008/04/16 : Hitb Sec Conf : Talk : Securing Next Generation Applications  “ Scan, Detect and Mitigate |
presentation, Video |
473 |
2008/03/28 : Blackhat : Talk : Spam Evolution |
presentation, Video |
474 |
2008/03/26 : Can Sec West : Talk : Vulnerabilities Die Hard |
presentation, Video |
475 |
2008/02/20 : Blackhat : Talk : Hacking Vo IP Through IP Sec Tunnels |
presentation, Video |
476 |
2007/12/09 : Clubhack : Talk : Vulnerabilities in Vo IP Products and Services |
presentation, Video |
477 |
2007/08/01 : Blackhat : Talk : Vulnerabilities in Wi Fi Dual Mode Vo IP Phones |
presentation, Video |
478 |
2007/04/18 : Can Sec West : Talk : Low Rate Denial of Service Attacks |
presentation, Video |
479 |
2007/03/30 : Blackhat : Talk : Web Service Vulnerabilities |
presentation, Video |
480 |
2006/10/19 : Hacklu : Talk : Smashing Heap by Free Simulation |
presentation, Video |
481 |
2006/08/01 : Blackhat : Talk : Writing Metasploit Plugins From Vulnerability to Exploit |
presentation, Video |
482 |
2005/06/10 : Syscan : Talk : . Net Web Security Attack and Defense |
presentation, Conference Link, Video |
483 |
2005/04/10 : Hitb Sec Conf : Talk : Whispers on the Wire Network Based Covert Channels, Exploitation and Detection |
presentation, Video |
484 |
2003/12/12 : Hitb Sec Conf : Talk : Defending Web Applications Strategies, Methods and Practices |
presentation, Video |
485 |
2003/12/12 : Hitb Sec Conf : Talk : New Generation Frauds |
presentation, Video |
486 |
2003/12/12 : Hitb Sec Conf : Talk : Threats to Wireless Networks War Driving |
presentation, Video |
487 |
1998/07/29 : Blackhat : Talk : Security as an Enabler for New Business Opportunities the Business Value of Security |
presentation, Video |
S.No |
Name of Entry |
What is missing |
1 |
Shivaspampot |
Content |
2 |
Trackguard |
Content, Links (github/gitlab/bitbucket/download/home) |
3 |
Halberd |
Content |
4 |
Kubesf |
Content, Links (github/gitlab/bitbucket/download/home) |
5 |
Scagoat |
Content |
6 |
Smuggleshield |
Content |
7 |
VulnScout |
Content, Links (github/gitlab/bitbucket/download/home) |
8 |
GoatPen |
Content, Links (github/gitlab/bitbucket/download/home) |
9 |
Bugbazaar |
Content |
10 |
Findmytakeover |
Content |
11 |
Huginn |
Content |
12 |
Trafficwardenx |
Links (github/gitlab/bitbucket/download/home) |
13 |
Autofix |
Links (github/gitlab/bitbucket/download/home) |
14 |
AWSDefenderGPT : Leveraging OpenAI to Secure AWS Cloud |
Links (github/gitlab/bitbucket/download/home) |
15 |
Detectivesq |
Links (github/gitlab/bitbucket/download/home) |
16 |
Androcop |
Links (github/gitlab/bitbucket/download/home) |
17 |
Actiongoat |
Content, Links (github/gitlab/bitbucket/download/home) |
18 |
ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections |
Content, Links (github/gitlab/bitbucket/download/home) |
19 |
Apkhunt |
Content |
20 |
Zaas |
Links (github/gitlab/bitbucket/download/home) |
21 |
Parseandc |
Content |
22 |
Bheemos |
Content, Links (github/gitlab/bitbucket/download/home) |
23 |
Buzzard |
Links (github/gitlab/bitbucket/download/home) |
24 |
Github Credentials Stroller |
Links (github/gitlab/bitbucket/download/home) |
25 |
Tenacity |
Links (github/gitlab/bitbucket/download/home) |
26 |
Malvizai |
Links (github/gitlab/bitbucket/download/home) |
27 |
Mobexler |
Content |
28 |
Python Honeypot |
Content |
29 |
Wi Fi Access Point Rootkits |
Content, Links (github/gitlab/bitbucket/download/home) |
30 |
SniperPhish |
Content |
31 |
SASTRI |
Links (github/gitlab/bitbucket/download/home) |
32 |
VyAPI - The Modern Cloud-Based Vulnerable Hybrid Android App |
Links (github/gitlab/bitbucket/download/home) |
33 |
Wolverine |
Links (github/gitlab/bitbucket/download/home) |
34 |
Clusterfuzz |
Content |
35 |
Apad |
Links (github/gitlab/bitbucket/download/home) |
36 |
Certpivot |
Links (github/gitlab/bitbucket/download/home) |
37 |
VoIPShark: Open Source VoIP Analysis Platform |
Links (github/gitlab/bitbucket/download/home) |
38 |
Mafia |
Links (github/gitlab/bitbucket/download/home) |
39 |
DomGoat |
Content |
40 |
DARWIN (Disguised Adaptive Resilient Wireless Independent Network) |
Links (github/gitlab/bitbucket/download/home) |
41 |
SCoDA: Smart COntract Defender and Analyzer |
Links (github/gitlab/bitbucket/download/home) |
42 |
Difuze |
Content, Links (github/gitlab/bitbucket/download/home) |
43 |
DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers |
Content |
44 |
Widy |
Content, Links (github/gitlab/bitbucket/download/home) |
45 |
Wimonitor |
Content, Links (github/gitlab/bitbucket/download/home) |
46 |
Devknox |
Content |
47 |
Diffdroid |
Content |
48 |
Damn Vulnerable SS7 Network |
Links (github/gitlab/bitbucket/download/home) |
49 |
Droid FF: Android File Fuzzing Framework |
Content |
50 |
Angr |
Content |
51 |
Chellam |
Links (github/gitlab/bitbucket/download/home) |
52 |
Pcap2xml |
Content |
53 |
Chigula |
Links (github/gitlab/bitbucket/download/home) |
54 |
Secpod Saner |
Content, Links (github/gitlab/bitbucket/download/home) |
55 |
Toliman |
Content |
56 |
Drupsnipe |
Links (github/gitlab/bitbucket/download/home) |
57 |
Xenotix Xbot |
Content |
58 |
AFE (Android Framework for Exploitation) |
Content |
59 |
Jugaad - Thread Injection Kit |
Content |
60 |
Wireplay |
Content |
61 |
Zulu Wireless |
Content |
62 |
difuze: Fuzzer for Linux Kernel Drivers |
Content |
63 |
Industrial Control Systems: Capture the Train! |
Links (github/gitlab/bitbucket/download/home) |