Personal Details

S.No Name of Entry What is missing
1 navin_kumar_singh Twitter, Linkedin, Photo
2 k_v_prashant Photo
3 vipin_kumar Twitter, Photo
4 nitin_kumar Twitter, Linkedin, Photo
5 sachin_burman Twitter, Linkedin, Photo
6 a_a_gafoor Twitter, Linkedin, Photo
7 anant_kochhar Twitter, Linkedin, Photo
8 bhavarth_karmarkar Twitter, Photo
9 m_v_sheshadri Twitter, Linkedin, Photo
10 suresh_sharma Twitter, Photo
11 aashish_kunte Photo
12 aditya_krishna_vinod Twitter, Linkedin, Photo
13 ashwin_vamshi Photo
14 bhushan_gulabrao_borase Twitter, Linkedin
15 gaurav_trivedi Twitter, Linkedin, Photo
16 harsh_patel Twitter, Photo
17 jairam_ramesh Twitter, Linkedin
18 kamlesh_bajaj Twitter, Photo
19 lokesh_pidawekar Twitter, Photo
20 mohammed_imran Photo
21 mohan_sri_rama_krishna_pedhapati Twitter, Photo
22 neelay_s_shah Twitter, Linkedin, Photo
23 rohit_mothe Photo
24 rugved_mehta Twitter, Photo
25 sagar_rahalkar Twitter, Photo
26 shantanu_gawde Twitter, Linkedin, Photo
27 sreepriya_chalakkal Twitter, Photo
28 vijayakumar_k_m Twitter, Photo
29 yashodhan_vivek_mandke Twitter, Linkedin
30 a_muralidhar Twitter, Linkedin, Photo
31 abdul_karim_vettiyanickal Twitter, Linkedin
32 adrip_mukherjee Twitter, Photo
33 ajay_porus Twitter, Linkedin, Photo
34 akshay_shah Twitter, Linkedin, Photo
35 anil_chintala Twitter, Photo
36 anil_kumar Twitter, Photo
37 ankit_john_abraham Twitter, Linkedin, Photo
38 ankur_sand Twitter, Photo
39 anshul_kumar Twitter, Linkedin, Photo
40 antony_k_m Twitter, Linkedin, Photo
41 apoorva_gupta Twitter, Linkedin, Photo
42 arif_hussain Twitter, Photo
43 arpith_rajagopal Twitter, Photo
44 ashfaq_ansari Linkedin, Photo
45 ashish_kumar Twitter, Photo
46 atharva_chincholkar Twitter, Photo
47 avinash_shenoi Twitter, Linkedin, Photo
48 babitha_bp Twitter, Linkedin
49 bala_kumar_s Twitter, Linkedin, Photo
50 bhaskar_rastogi Twitter, Photo
51 bindu_mony Twitter, Linkedin, Photo
52 binoy_vc Twitter, Linkedin, Photo
53 bipul_sahu Twitter, Linkedin, Photo
54 chandrasekar Twitter, Linkedin, Photo
55 cmde_anand Twitter, Linkedin, Photo
56 deepayan_chanda Twitter, Photo
57 devika_a_v Twitter, Linkedin, Photo
58 dipesh_goyal Twitter, Linkedin, Photo
59 gagan_jattana Twitter, Linkedin, Photo
60 ganesh_varadarajan Twitter, Photo
61 hariprasad_chede Twitter, Photo
62 harshal_tupsamudre Twitter, Photo
63 jacob_jose Twitter, Linkedin, Photo
64 jagadeesh_chandraiah Twitter, Photo
65 jojy_joy Twitter, Linkedin
66 jvr_murthy Twitter, Photo
67 k_kamaneesh Twitter, Linkedin
68 kanu_pathania Twitter, Linkedin, Photo
69 karthikeyan_bhargavan Twitter, Linkedin
70 kiran_bandla Twitter, Photo
71 kishan_kendre Twitter, Linkedin, Photo
72 kp_paulson Twitter, Linkedin, Photo
73 krishnakumar_kottekkat Twitter, Linkedin, Photo
74 krishnaprasad_subramaniam Twitter, Linkedin, Photo
75 kushal_das Twitter, Photo
76 laxi_eshwari Twitter, Linkedin, Photo
77 lekshmi_b Twitter, Linkedin, Photo
78 m_l_srinivasan Twitter, Linkedin, Photo
79 madhavi_purandare Twitter, Linkedin, Photo
80 madhusudhan_konda Twitter, Linkedin, Photo
81 manas_pratim_sarma Twitter, Linkedin, Photo
82 maninder_singh Twitter, Linkedin, Photo
83 martina_mathew Twitter, Linkedin, Photo
84 maya_viswanathan Twitter, Linkedin, Photo
85 meera_p Twitter, Linkedin, Photo
86 midhun_babu Twitter, Linkedin, Photo
87 milind_bhargava Twitter, Photo
88 mohamed_emraanullah Twitter, Linkedin, Photo
89 mohit_kumar Twitter, Linkedin, Photo
90 monika_agarwal Twitter, Linkedin, Photo
91 mrigesh Twitter, Linkedin, Photo
92 mukund_krishnamurthy Twitter, Linkedin, Photo
93 natishia_rebecca_chandy Twitter, Linkedin, Photo
94 navin_pai Photo
95 nisha_prayan Twitter, Linkedin, Photo
96 nishant_yadav Twitter, Linkedin, Photo
97 nitin_agarwal Twitter, Linkedin, Photo
98 padnya_manwar Twitter, Linkedin, Photo
99 pankaj_sharma Twitter, Linkedin, Photo
100 pranav_a_menon Twitter, Linkedin, Photo
101 praseed_pai Twitter, Linkedin, Photo
102 pravesh_sharma Twitter, Linkedin, Photo
103 pulkit_deepak_khatri Twitter, Linkedin, Photo
104 r_sarangapani Twitter, Linkedin, Photo
105 raghu_rami_reddy Twitter, Photo
106 raghudeep_kannavara Twitter, Linkedin, Photo
107 rahul_jeyasingh Twitter, Photo
108 rajesh_gunasundaram Photo
109 rajiv_pandey Twitter, Linkedin, Photo
110 ravi_devarasetty Twitter, Photo
111 reena_bhansali Twitter, Linkedin, Photo
112 resmi_rajan Twitter, Linkedin, Photo
113 robin_joy Twitter, Linkedin, Photo
114 rohit_bansal Photo
115 roshen_chandran Twitter, Linkedin, Photo
116 sachine_wagh Twitter, Linkedin, Photo
117 samaksh_k Twitter, Linkedin, Photo
118 sameer_saxena Twitter, Linkedin, Photo
119 sandeep_sharma Twitter, Linkedin
120 sanjay_burman Twitter, Linkedin
121 savita_utreja Twitter, Linkedin, Photo
122 sebastian_edassery Twitter, Linkedin, Photo
123 shibi_anand Twitter, Linkedin, Photo
124 shivam_rawat Twitter, Photo
125 shivansh_agrawal Twitter, Linkedin, Photo
126 shubham_singh Twitter, Photo
127 siddharth_m Twitter, Linkedin, Photo
128 sivamurthy_hiremath Twitter, Linkedin, Photo
129 sridharan_sankaran Twitter, Photo
130 subhajeet_singha Twitter, Photo
131 subir_das Twitter, Photo
132 subrahmanya_gupta_boda Twitter, Linkedin
133 subramanian_kumar Twitter, Linkedin, Photo
134 subramanian_kumaraswamy Twitter, Linkedin, Photo
135 sudeep_patwardhan Twitter, Linkedin, Photo
136 sujay_rajashekar_gundagatti Twitter, Linkedin
137 sumeet_khokhani Twitter, Photo
138 sunil_aggarwal Twitter, Linkedin, Photo
139 surjata_awade Twitter, Linkedin, Photo
140 sushant_paithane Twitter, Photo
141 suvabrata_sinha Twitter, Photo
142 teena_jose Twitter, Linkedin, Photo
143 umesh Twitter, Linkedin, Photo
144 venkatesh Twitter, Linkedin, Photo
145 vidha_murthy Twitter, Linkedin, Photo
146 vinayak_hegde Twitter, Linkedin, Photo
147 vinayak_mishra Twitter, Linkedin, Photo
148 vineet_bhatia Photo
149 vishnu_tiwari Twitter, Linkedin, Photo
150 whiteknight Twitter, Linkedin, Photo
151 yagnesh_waran_p Twitter, Photo
152 yerra_ravi_kiran_raju Twitter, Linkedin, Photo

Presentation Details

S.No Name of Entry What is missing
1 2025/04/04 : Blackhat : Tool Demo : Agneyastra Firebase Misconfiguration Detection Toolkit V2 Source Code
2 2025/04/04 : Blackhat : Tool Demo : Compart Io T Source Code
3 2025/04/04 : Blackhat : Tool Demo : Decoy Mutex Source Code
4 2025/04/04 : Blackhat : Tool Demo : Intro to Cicdguard How to Have Visibility and Security of Cicd Ecosystem Source Code
5 2025/04/04 : Blackhat : Tool Demo : Kernel Goat Source Code
6 2025/04/04 : Blackhat : Tool Demo : Kubernetes Goat a Hands on Interactive Kubernetes Security Playground Source Code
7 2025/04/04 : Blackhat : Tool Demo : Red Infra Craft Automate Complex Red Team Infra Source Code
8 2025/04/04 : Blackhat : Tool Demo : Shiva Spampot Actionable Spam and Phishing Intelligence Source Code
9 2025/04/04 : Blackhat : Tool Demo : Track Guard Browser Fingerprint Detection and Defence Source Code
10 2025/04/03 : Blackhat : Talk : Cloud Security Building Connections in the Cloud presentation, Video
11 2025/04/03 : Blackhat : Tool Demo : Compart Io T Source Code
12 2025/04/03 : Blackhat : Tool Demo : Halberd Multi Cloud Security Testing Tool Source Code
13 2025/04/03 : Blackhat : Tool Demo : Kube Sf V1.2 Kubernetes Security Posture Audit Suite Source Code
14 2025/04/03 : Blackhat : Tool Demo : Mantis Asset Discovery at Scale Source Code
15 2025/04/03 : Blackhat : Tool Demo : Mob Xplore Source Code
16 2025/04/03 : Blackhat : Talk : Obfus Qate Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! presentation, Video
17 2025/04/03 : Blackhat : Tool Demo : R0fuzz a Collaborative Fuzzer Source Code
18 2025/04/03 : Blackhat : Tool Demo : Scagoat Exploiting Damn Vulnerable and Compromised Sca Application Source Code
19 2025/04/03 : Blackhat : Tool Demo : Smuggle Shield 2.0 Basic Protection Against HTML Smuggling Source Code
20 2025/04/03 : Blackhat : Tool Demo : Supply Shield Protecting Your Software Supply Chain Source Code
21 2025/04/03 : Blackhat : Tool Demo : Varunastra Securing the Depths of Docker V2 Source Code
22 2025/04/03 : Blackhat : Tool Demo : Vuln Scout Source Code
23 2025/03/02 : Nullcon : Talk : Cyber Security From Telco Lens presentation, Video
24 2025/03/02 : Nullcon : Talk : E Kyc Crisis Securing the Lockers presentation, Video
25 2025/03/02 : Nullcon : Talk : Hidden in Plain Sight Large Scale Exposure of Orphaned Commits on Major Git Platforms presentation, Video
26 2025/03/02 : Nullcon : Talk : Kernel Conquest Breaking Boundaries and Demystifying Kernel Su for Root Access in Azure Cloud Shell presentation, Video
27 2025/03/02 : Nullcon : Talk : Satellite Communications Analyzing and Protecting Space Based Assets presentation, Video
28 2025/03/02 : Nullcon : Talk : Securing the Chains Building Defensive Layers for Software Supply Chains presentation, Video
29 2025/03/01 : Nullcon : Talk : Drawing Parallels Between I Os and MAC Os Pentesting With Dvma presentation, Video
30 2025/03/01 : Nullcon : Talk : MAC Os Lockdown Mode a Forensic Deep Dive presentation, Video
31 2025/03/01 : Nullcon : Talk : The Future Is Trustless How Zk Vms and Zk Tls Transform Bug Bounties presentation
32 2024/12/12 : Blackhat : Tool Demo : Damn Vulnerable Browser Extension ( Dvbe) Knowing the Risks of Your Browser Supplements Source Code
33 2024/12/12 : Blackhat : Tool Demo : Dark Widow Customizable Dropper Tool Targeting Windows Source Code
34 2024/12/12 : Blackhat : Tool Demo : Genzai the Io T Security Toolkit Source Code
35 2024/12/12 : Blackhat : Tool Demo : Halberd Cloud Security Testing Tool Source Code
36 2024/12/12 : Blackhat : Tool Demo : Morf Mobile Reconnaissance Framework Source Code
37 2024/12/12 : Blackhat : Tool Demo : Mpt Pentest in Action! Source Code
38 2024/12/12 : Blackhat : Tool Demo : Red Cloud Os Cloud Adversary Simulation Operating System Source Code
39 2024/12/11 : Blackhat : Tool Demo : Active Directory Cyber Deception Using Huginn Source Code
40 2024/12/11 : Blackhat : Tool Demo : Agneyastra Firebase Misconfiguration Detection Toolkit Source Code
41 2024/12/11 : Blackhat : Tool Demo : Android Bug Bazaar Your Mobile Appsec Playground to Explore, Exploit, Excel Source Code
42 2024/12/11 : Blackhat : Tool Demo : Findmytakeover Find Dangling Domains in a Multi Cloud Environment Source Code
43 2024/12/11 : Blackhat : Tool Demo : Open Source Tool to Shift Left Security Testing by Leveraging Ai Source Code
44 2024/12/11 : Blackhat : Tool Demo : Scagoat Exploiting Damn Vulnerable Sca Application Source Code
45 2024/11/28 : Blackhat : Talk : Harnessing Language Models for Detection of Evasive Malicious Email Attachments presentation, Video
46 2024/11/28 : Blackhat : Talk : Threat Modelling the Generative Ai presentation, Video
47 2024/11/27 : Blackhat : Talk : Ai Powered Cybersecurity Promises & Perils presentation, Video
48 2024/11/26 : Blackhat : Talk : Cyber Security & Resiliency a Perspective With Emerging Technologies and Innovation presentation, Video
49 2024/11/26 : Blackhat : Talk : The Double Edge Sword Cybersecurity & Ai presentation, Video
50 2024/11/26 : Blackhat : Talk : The Gen Ai Double Agent Dilemma Ally or Adversary presentation, Video
51 2024/11/21 : Deepsec : Talk : Hacking With Physics V2.0 presentation, Video
52 2024/11/16 : C0c0n : Talk : Invisible Invaders Bypassing Email Security With Legitimate Tools presentation, Video
53 2024/11/16 : C0c0n : Talk : Access for Sale Inside the World of Ransomware Affiliates and Initial Access Brokers presentation, Video
54 2024/11/16 : C0c0n : Talk : Active Directory Deception Strategies presentation, Video
55 2024/11/16 : C0c0n : Talk : Breach of the Borderless Cyber Threat Actors Targeting India's Cyberspace presentation, Video
56 2024/11/16 : C0c0n : Talk : Hacking the Non Windows Frontier Thick Client Pentesting on Linux & MAC presentation, Video
57 2024/11/16 : C0c0n : Talk : Key Note presentation, Video
58 2024/11/16 : C0c0n : Talk : Old Bugs, New Tricks How N Day Vulnerabilities Are Fueling Today's Threat Landscape presentation, Video
59 2024/11/16 : C0c0n : Talk : Ride on the House Exploiting Public Transport Ticketing Systems for Free Rides presentation, Video
60 2024/11/16 : C0c0n : Talk : Serverless Phishing Factory Automate, Attack, Adapt presentation, Video
61 2024/11/16 : C0c0n : Talk : The Stealth Code Conspiracy Unmasking Hidden Threats in Ci Cd Pipelines presentation, Video
62 2024/11/16 : C0c0n : Talk : The Subtle Art of Checkmating Cisos presentation, Video
63 2024/11/16 : C0c0n : Talk : Who Is Holding the Marauders Map? presentation, Video
64 2024/11/15 : C0c0n : Talk : [ Yodha] Nightingale Docker for Pentesters presentation, Video
65 2024/11/15 : C0c0n : Talk : [ Yodha] Red Cloud a Multi Cloud Hacking Os presentation, Video
66 2024/11/15 : C0c0n : Talk : [ Yodha] Scagoat Software Composition Analysis ( Sca) Vulnerability Exploration Tool presentation, Video
67 2024/11/15 : C0c0n : Talk : Automated Security Engineer Co Pilot Leveraging Large Language Models for Enhanced Code Security presentation, Video
68 2024/11/15 : C0c0n : Talk : Breaking the Defences in Depth Analysis of Edr and Av Tampering Techniques presentation, Video
69 2024/11/15 : C0c0n : Talk : Ciso's Take on Byoai presentation, Video
70 2024/11/15 : C0c0n : Talk : Gen Ai and Autonomous Security in the Age of Zero Trust presentation, Video
71 2024/11/15 : C0c0n : Talk : Hackers Highway Uncovering Vulnerabilities Hidden Behind Every Car's License Plate presentation, Video
72 2024/11/15 : C0c0n : Talk : Know Your Enemies Deep Dive Into Ransomware Threat Groups presentation, Video
73 2024/11/15 : C0c0n : Talk : PC I 4.0, Javascript Security for Product Security Teams presentation, Video
74 2024/11/15 : C0c0n : Talk : Remote Whispers of Mobile Sim presentation, Video
75 2024/10/29 : Blackhat : Talk : Hacking Deepfake Image Detection System With White and Black Box Attacks presentation
76 2024/10/23 : Blackhat : Tool Demo : Cyber Arsenal47 Source Code
77 2024/10/23 : Blackhat : Tool Demo : Dark Widow Customizable Dropper Tool Targeting Windows Source Code
78 2024/09/26 : Rootcon : Talk : How to Have Visibility and Security of Cicd Ecosystem presentation
79 2024/09/20 : 44 Con : Talk : Unveiling the Ghosts of Mobile Networks When Will Old Bugs Die? presentation, Video
80 2024/08/29 : Hitb Sec Conf : Tool Demo : Ai Assisted Code Reviewer Source Code
81 2024/08/10 : Defcon : Talk : Sneaky Extensions the Mv3 Escape Artists presentation, Video
82 2024/08/09 : Defcon : Talk : Breaking Secure Web Gateways ( Swg) for Fun and Profit presentation, Video
83 2024/08/09 : Defcon : Talk : Reflections on a Decade in Bug Bounties Experiences and Major Takeaways presentation, Video
84 2024/08/08 : Blackhat : Tool Demo : Active Directory Cyber Deception Using Huginn Source Code
85 2024/08/08 : Blackhat : Tool Demo : Open Source Llm Security Source Code
86 2024/08/07 : Blackhat : Tool Demo : Traffic Warden X Open Wrt Security & Monitoring Source Code
87 2024/04/18 : Blackhat : Tool Demo : Detective Sq a Extension Auditing Framework Version 2 Source Code
88 2024/04/18 : Blackhat : Tool Demo : Secure Local Vault Git Based Secret Manager Source Code
89 2024/03/21 : Can Sec West : Talk : Rolling in the Dough How Microsoft Identified and Remidiated a Baker's Dozen of Security Threats in the Windows DNS Server presentation, Video
90 2024/03/12 : Nullcon : Talk : Secure Web Gateways Are Dead. What’s Next? presentation, Video
91 2023/12/06 : Blackhat : Tool Demo : Andro Cop One Click Forensic Investigation & Data Extraction Tool Source Code
92 2023/12/06 : Blackhat : Tool Demo : Detective Sq a Extension Auditing Framework Source Code
93 2023/12/06 : Blackhat : Tool Demo : Supply Shield Protecting Your Software Supply Chain Source Code
94 2023/11/17 : Deepsec : Talk : Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption presentation, Video
95 2023/10/13 : Hackfest : Talk : Exploring RAM Forensic Analysis for Effective Digital Investigations presentation, Video
96 2023/09/29 : Hackinparis : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor presentation, Video
97 2023/09/28 : Rootcon : Talk : Azure Illuminati Unveiling the Mysteries of Cloud Exploitation presentation
98 2023/09/28 : Hackinparis : Talk : How to Have Visibility and Security of Cicd Ecosystem presentation, Video
99 2023/09/23 : Nullcon : Talk : How I Hacked Your Bank Account a Detailed Look at Upi Security presentation
100 2023/08/12 : Defcon : Talk : Getting More Bang for Your Buck Appsec on a Limited Budget presentation, Video
101 2023/08/12 : Defcon : Tool Demo : Open Source API Security for Devsecops Source Code
102 2023/08/11 : Defcon : Talk : Generative Adversarial Network ( Gan) Based Autonomous Penetration Testing for Web Applications presentation, Video
103 2023/08/11 : Defcon : Tool Demo : V API Vulnerable Adversely Programmed Interface Source Code
104 2023/08/10 : Defcon : Talk : Hardware Backdooring an E Scooter presentation, Video
105 2023/08/09 : Blackhat : Tool Demo : Arctic Automated Remediation for Correlation Threat Intelligence Collections Source Code
106 2023/08/09 : Blackhat : Tool Demo : Caspr Code Trust Auditing Framework Source Code
107 2023/08/07 : C0c0n : Talk : Cellibrite Premium Mobile Forensic Tool I Phone Analysis presentation, Video
108 2023/08/07 : C0c0n : Talk : Chinese Apt Against Government Officials Using G7 Summit Lure presentation
109 2023/08/07 : C0c0n : Talk : Citizen Mobile Security Responsibilities, Accountability, and Impacts presentation, Video
110 2023/08/07 : C0c0n : Talk : Cyber Threats to Global Financial Systems presentation
111 2023/08/07 : C0c0n : Talk : Darkweb Investigations presentation, Video
112 2023/08/07 : C0c0n : Talk : Enhancing Red Team Opsec Abusing Stealthy in Memory Binary Execution Techniques in Linux presentation
113 2023/08/07 : C0c0n : Talk : Esoc Trinetra Project presentation, Video
114 2023/08/07 : C0c0n : Talk : Evasion Tactics of Side Copy & Apt36 Persistently Targeting Indian Defense Orgs presentation
115 2023/08/07 : C0c0n : Talk : Exploring Threats in Operational Technology presentation, Video
116 2023/08/07 : C0c0n : Talk : Generative Ai and Cyber Crimes presentation
117 2023/08/07 : C0c0n : Talk : Homomorphic Encryption Myth to Reality presentation
118 2023/08/07 : C0c0n : Talk : Putting a Leash on Ai presentation
119 2023/08/07 : C0c0n : Talk : Serverless Siege Aws Lambda Pentesting presentation
120 2023/08/07 : C0c0n : Talk : Shifting Left Blockchain Development for Safer Dapps presentation
121 2023/08/07 : C0c0n : Talk : Smart Contract Phishing Attack & Defense presentation
122 2023/08/07 : C0c0n : Talk : Start Left SDLC Security With Open Source Dev Sec Ops Tooling presentation
123 2023/08/07 : C0c0n : Talk : Tackling Advanced Threat Landscape With Mdr Best Practices presentation
124 2023/08/07 : C0c0n : Talk : The Dpdpa Effect Jubilation, Twinge and Reticence That Followed presentation
125 2023/08/07 : C0c0n : Talk : Trust Resiliency a Lesson Learned From Russia Ukraine War presentation
126 2023/08/07 : C0c0n : Talk : Uncovering Azure's Silent Threats a Story of Cloud Vulnerabilities presentation
127 2023/08/07 : C0c0n : Talk : Uncovering the Hidden Dangers Lurking as Android Apps Using Ml Algos presentation
128 2023/08/06 : C0c0n : Talk : A Secure Privacy Preserving Lightweight Authentication Scheme for Internet of Medical Things presentation
129 2023/08/06 : C0c0n : Talk : Ai in Cyber Security and Crime Prevention presentation, Video
130 2023/08/06 : C0c0n : Talk : Cbdc and Future of Finance presentation
131 2023/08/06 : C0c0n : Talk : Cryptocurrencies and Challenges to Law Enforcement Agencies presentation, Video
132 2023/08/06 : C0c0n : Talk : Cybercrimes Victim Compensation Legal Remedies and Process presentation, Video
133 2023/08/06 : C0c0n : Talk : Cybersecurity in the Era of Ai presentation
134 2023/08/06 : C0c0n : Talk : Dark Web for Investigations presentation, Video
135 2023/08/06 : C0c0n : Talk : Developments in Deep Fake Detection presentation, Video
136 2023/08/06 : C0c0n : Talk : Digital Innovation and Its Impact on Cios, Cisos and Dpos presentation, Video
137 2023/08/06 : C0c0n : Talk : Emerging Crimes and Threat Landscape in Cyber Domain and the Need for International Cooperation presentation
138 2023/08/06 : C0c0n : Talk : Expanding Capability Horizons Homelabs and Beyond presentation
139 2023/08/06 : C0c0n : Talk : Influence of Artificial Intelligence in Grc Space presentation, Video
140 2023/08/06 : C0c0n : Talk : Insider Threats Best Practices and Common Pitfalls presentation
141 2023/08/06 : C0c0n : Talk : Mitigating Ssrf at Scale the Right Way With Imdsv2! presentation
142 2023/08/06 : C0c0n : Talk : Playing Cat and Mouse With the Adversary Sometimes a Breach Is Inevitable presentation
143 2023/08/06 : C0c0n : Talk : Russia Ukraine Warfare – A Shift in Cyber Threat Landscape presentation
144 2023/08/06 : C0c0n : Talk : Securing the Future Addressing Cybersecurity Challenges in the Age of 5 G presentation
145 2023/08/06 : C0c0n : Talk : Subduing Adversaries With Information Superiority presentation
146 2023/08/06 : C0c0n : Talk : Survivability in the Cyber World presentation
147 2023/08/06 : C0c0n : Talk : Surviving in Dependency Hell presentation
148 2023/08/06 : C0c0n : Talk : Taking a Closer Look at Ci Cd Pipeline Logs Extracting Security Related Information With Build Inspector presentation
149 2023/08/06 : C0c0n : Talk : The New Way to Be Secure presentation
150 2023/08/06 : C0c0n : Talk : Time to Choose Conventional Cti or Next Gen External Threat Landscape Management presentation
151 2023/05/12 : Blackhat : Talk : Abusing Azure Active Directory From Mfa Bypass to Listing Global Administrators presentation
152 2023/05/12 : Blackhat : Talk : Engaging the Next Generation of Cybersecurity Professionals the Power of Security Zines presentation
153 2023/05/12 : Blackhat : Tool Demo : Introducing the Operating System for Automotive Security Testing a Hands on Demonstration Source Code
154 2023/05/11 : Blackhat : Talk : Bypassing Anti Cheats & Hacking Competitive Games presentation
155 2023/05/11 : Blackhat : Tool Demo : Kernel Goat Source Code
156 2022/12/08 : Blackhat : Tool Demo : Industrial Control Systems Capture the Train! Source Code
157 2022/09/29 : Brucon : Talk : 0wn Premises Bypassing Microsoft Defender for Identity presentation
158 2022/09/28 : Rootcon : Talk : Gazing Into the Crystal Ball the Fog of Cyberwarfare Escalations presentation, Video
159 2022/09/24 : C0c0n : Talk : Bec, Still the Sure Shot Trap presentation, Video
160 2022/09/24 : C0c0n : Talk : Building Smart, Resilient and Sustainable Cyber Eco System presentation, Video
161 2022/09/24 : C0c0n : Talk : Canalyse a Vehicle Network Analysis and Attack Tool presentation, Video
162 2022/09/24 : C0c0n : Talk : Citizen Mobile Security ( Icamps) presentation, Video
163 2022/09/24 : C0c0n : Talk : Cryptocurrency Forensics presentation, Video
164 2022/09/24 : C0c0n : Talk : Cyber Defence and Role of Private Players Public Private Partnership presentation, Video
165 2022/09/24 : C0c0n : Talk : Deep Learning to Detect Network Attacks presentation, Video
166 2022/09/24 : C0c0n : Talk : In Production With Grc for Cloud presentation, Video
167 2022/09/24 : C0c0n : Talk : Introduction to Rfid Nfc Hacking presentation, Video
168 2022/09/24 : C0c0n : Talk : Know Your Organization? Mapping Entities in Google Workspace presentation, Video
169 2022/09/24 : C0c0n : Talk : Need for Advanced Soc presentation, Video
170 2022/09/24 : C0c0n : Talk : OSI Nt Tools and Techniques presentation, Video
171 2022/09/24 : C0c0n : Talk : Power of Narratives in Cyber Security presentation, Video
172 2022/09/24 : C0c0n : Talk : Raining Cves on Wordpress Plugins With Semgrep presentation, Video
173 2022/09/24 : C0c0n : Talk : Rationalizing Cyber Security Risk in Risk Language presentation, Video
174 2022/09/24 : C0c0n : Talk : Towards an Effective Intrusion Detection System Framework for Multi Channel Man in the Middle Attacks Against Protected Wi Fi Networks presentation, Video
175 2022/09/24 : C0c0n : Talk : Weaponising Social Media for Psychological Operations presentation, Video
176 2022/09/24 : C0c0n : Talk : Web3 Security Security in Meta Verse, and the New World of Web3 presentation, Video
177 2022/09/23 : C0c0n : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor presentation, Video
178 2022/09/23 : C0c0n : Talk : Attacking Connected Industries in 5 G Networks presentation, Video
179 2022/09/23 : C0c0n : Talk : Battle of 300 Crore How They Lost It and Got Most of It Back presentation, Video
180 2022/09/23 : C0c0n : Talk : Bridging the Gap Between Security and Operations presentation, Video
181 2022/09/23 : C0c0n : Talk : Building a Safer and Innovative Digital Ecosystem presentation, Video
182 2022/09/23 : C0c0n : Talk : Collaborative Efforts for Safe Digital Banking presentation, Video
183 2022/09/23 : C0c0n : Talk : Common Misconfigurations in Your Kubernetes Cluster and What Can You Do About It? presentation, Video
184 2022/09/23 : C0c0n : Talk : Cybersecurity for Manufacturing presentation, Video
185 2022/09/23 : C0c0n : Talk : Hacking Smart Contracts presentation, Video
186 2022/09/23 : C0c0n : Talk : Hyperledger Fabric & Ethereum Apps Security Deep Dive presentation, Video
187 2022/09/23 : C0c0n : Talk : Log4j Vulnerability Continuous to Be Favourite for Apt Groups Through Mid 2022 presentation, Video
188 2022/09/23 : C0c0n : Talk : Pwning Android Apps at Scale presentation, Video
189 2022/09/23 : C0c0n : Talk : Ransomware Prevention, Early Detection and Response presentation, Video
190 2022/09/23 : C0c0n : Talk : Rolling Out Central Bank Digital Currency Technical Design Considerations presentation, Video
191 2022/09/23 : C0c0n : Talk : Securing Your Apis for a Cloud Native Future presentation, Video
192 2022/09/23 : C0c0n : Talk : Startup Ecosystem and Investments in Post Covid Era presentation, Video
193 2022/09/23 : C0c0n : Talk : Technological Reliance for Resilience presentation, Video
194 2022/09/23 : C0c0n : Talk : Threats Landscape and Intelligence of API & Shield to Protect presentation, Video
195 2022/09/23 : C0c0n : Talk : Tracking the Bad Guys. an Interesting Story of How the Criminal Underground Operates presentation, Video
196 2022/09/23 : C0c0n : Talk : Tropic Trooper Targets High Profile Victims Using Newly Discovered Mqtt Backdoor presentation, Video
197 2022/09/08 : Nullcon : Talk : Hack the Source Securing Open Source Software – One Bug at a Time presentation
198 2022/09/08 : Nullcon : Talk : The Different Faces of MAC Os Malware Detecting Anomalies in a Poisoned Apple presentation
199 2022/09/08 : Nullcon : Tool Demo : Zaa S [ Owasp] Zap as a Service Continous Security for 20 K Apis Source Code
200 2022/09/07 : Nullcon : Talk : Electro Volt Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron presentation
201 2022/09/07 : Nullcon : Talk : Scale Hacking to Secure Your Cloud and Beyond presentation
202 2022/08/14 : Defcon : Talk : Tales From the Trenches Why Organizations Struggle to Get Even the Basics of Ot Asset Visibility & Detection Right presentation, Video
203 2022/08/12 : Defcon : Talk : Stop Worrying About Nation States and Zero Days; Let's Fix Things That Have Been Known for Years presentation
204 2022/08/10 : Blackhat : Tool Demo : Caspr Code Trust Audit Framework Source Code
205 2022/04/08 : Nullcon : Talk : Attack Surfaces for 5 G Networks presentation
206 2022/04/08 : Nullcon : Talk : Bheem Os a Next Generation Reasonably Secure Os Using Rust Micro Vm presentation
207 2021/11/18 : Hackinparis : Talk : { Internet of Things or Threats} Anatomizing the Structure of Io T Botnets presentation
208 2021/11/18 : Hackinparis : Talk : Is It Really an Intrusion if You Get Called In? Mis Configuration Based Attacks in Aws presentation, Video
209 2021/11/13 : C0c0n : Talk : Decoding New Age Hackers and Criminal Investigation presentation, Video
210 2021/11/13 : C0c0n : Talk : A Look Into Cyber Espionage Activities Targeting Critical Infrastructure in India presentation, Video
211 2021/11/13 : C0c0n : Talk : Building Global Cyber Security Company Out of India Key Lessons Learnt During My Entrepreneurship Journey presentation, Video
212 2021/11/13 : C0c0n : Talk : Case Study Cyber Heist in a Bank and Recovery of Systems and Money presentation, Video
213 2021/11/13 : C0c0n : Talk : Case Study E Crime Group Targeting Mobile Users presentation, Video
214 2021/11/13 : C0c0n : Talk : Changing Cyber Security Paradigm & Cyber Tsunami presentation, Video
215 2021/11/13 : C0c0n : Talk : Cloud Threat Landscape presentation, Video
216 2021/11/13 : C0c0n : Talk : Connecting the Dots Between Customers and Security Teams presentation, Video
217 2021/11/13 : C0c0n : Talk : Crisis Capitalization in a Pandemic presentation, Video
218 2021/11/13 : C0c0n : Talk : Cyber Warfare & Securing Critical Infrastructures presentation, Video
219 2021/11/13 : C0c0n : Talk : Cybersecurity in the Era of Resilience a Walk Through People, Process and Technology presentation, Video
220 2021/11/13 : C0c0n : Talk : Emerging Trends in Cyber Crimes Investigation Tools & Techniques presentation, Video
221 2021/11/13 : C0c0n : Talk : Enhancing an Multi Factor Authentication ( Mfa) Through Behavioural Biometrics presentation, Video
222 2021/11/13 : C0c0n : Talk : Exploiting 2 A( Authentication and Authorization) Vulnerabilities of Web Application presentation, Video
223 2021/11/13 : C0c0n : Talk : Introducing Free & Open Elastic Limitless Xdr presentation, Video
224 2021/11/13 : C0c0n : Talk : Light Basin Telecom Roaming Network Attack Case Study presentation
225 2021/11/13 : C0c0n : Talk : Machine Learning to Detect Chia Mining presentation, Video
226 2021/11/13 : C0c0n : Talk : Mature Your Threat Hunting Program presentation, Video
227 2021/11/13 : C0c0n : Talk : Need for Zero Trust in Banking presentation, Video
228 2021/11/13 : C0c0n : Talk : New Way of Looking at the Hidden Mysteries in the Code presentation, Video
229 2021/11/13 : C0c0n : Talk : Painting Your Organizations With Shades of Red, Blue & Purple presentation
230 2021/11/13 : C0c0n : Talk : Post Pandemic Transformation a Ciso's Perspective presentation, Video
231 2021/11/13 : C0c0n : Talk : Securing Ot in O& G Industry presentation, Video
232 2021/11/13 : C0c0n : Talk : Third Party Risk Management presentation, Video
233 2021/11/13 : C0c0n : Talk : Zero Trust & Micro Segmentation presentation, Video
234 2021/11/12 : C0c0n : Talk : “ Let’s Go Phishing” Discerning the Insidious Nature of Social Engineering presentation, Video
235 2021/11/12 : C0c0n : Talk : 2021 Supply Chain Attacks Analysis presentation, Video
236 2021/11/12 : C0c0n : Talk : Data Security and Privacy presentation, Video
237 2021/11/12 : C0c0n : Talk : Dissecting Malicious Software and Analysis presentation, Video
238 2021/11/12 : C0c0n : Talk : Enterprise Governance and Risk Management presentation, Video
239 2021/11/12 : C0c0n : Talk : Executive Presence....a Cardinal of the Cyber Rostrum presentation, Video
240 2021/11/12 : C0c0n : Talk : Ics Security a Need, a Challenge and a New Change in Mindset presentation, Video
241 2021/11/12 : C0c0n : Talk : Io T Security Guidelines & Standards presentation, Video
242 2021/11/12 : C0c0n : Talk : Post Covid Cisos Disappearing Trusted Boundaries and Innovative Cyber Security Approaches presentation, Video
243 2021/11/12 : C0c0n : Talk : Regulating Social Media Platforms Should It Be Done in Democratic Societies ? presentation, Video
244 2021/11/12 : C0c0n : Talk : The Evolving Nature of Cyber Community presentation, Video
245 2021/11/12 : C0c0n : Talk : Understanding the Psychology Behind Threats Adding Twists to Your Turns presentation, Video
246 2021/11/04 : Ekoparty : Talk : Dial Did I Just Alert Lambda? a Centralized Security Misconfiguration Detection System presentation
247 2021/10/15 : Rootcon : Talk : The Curious Case of Knowing the Unknown presentation
248 2021/10/13 : Rootcon : Tool Demo : Buzzard Crafting Your Post Exploitation Framework Against Odds Source Code
249 2021/10/13 : Rootcon : Talk : The Kill Chain Future of Cyber in Defense presentation
250 2021/08/08 : Defcon : Talk : App Sec 101 a Journey From Engineer to Hacker presentation
251 2021/08/08 : Defcon : Talk : Top 20 Secure Plc Coding Practices presentation
252 2021/08/07 : Defcon : Tool Demo : Red Team Credentials Reconnaissance ( Old With a Twist) Source Code
253 2021/08/07 : Defcon : Tool Demo : Tenacity an Adversary Emulation Tool for Persistence Source Code
254 2021/08/07 : Defcon : Talk : The Curious Case of Knowing the Unknown presentation
255 2021/08/06 : Defcon : Talk : Adversary Village Kick Off presentation
256 2021/08/06 : Defcon : Talk : Defending Io T in the Future of High Tech Warfare presentation
257 2021/08/05 : Defcon : Talk : The Bug Hunter’s Recon Methodology presentation
258 2021/08/04 : Blackhat : Tool Demo : Parse and C a Universal Parser and Data Visualization Tool for Security Testing Source Code
259 2021/03/06 : Nullcon : Talk : Bug Hunter Adventures presentation
260 2021/03/05 : Nullcon : Talk : Arbitrary Code Execution on Risc v Using Fault Injection presentation
261 2021/03/05 : Nullcon : Talk : Telecom Security Challenges in 5 G presentation
262 2020/10/07 : Rootcon : Talk : Recon Pal Leveraging Nlp for Infosec presentation
263 2020/10/01 : Blackhat : Tool Demo : Wi Fi Access Point Rootkits Source Code
264 2020/09/19 : C0c0n : Talk : Automate Your Recon With Recon Note presentation
265 2020/09/18 : C0c0n : Talk : Herd Immunity, in the Cyber World presentation, Video
266 2020/09/18 : C0c0n : Talk : How I Created My Clone Using Ai Next Gen Social Engineering presentation
267 2020/09/18 : C0c0n : Talk : Introducing Sniper Phish a Web Email Spear Phishing Toolkit presentation
268 2020/09/18 : C0c0n : Talk : Kubernetes Goat Vulnerable by Design Kubernetes Cluster Environment presentation
269 2020/09/18 : C0c0n : Talk : Web Application Hacking With Web Zground presentation
270 2020/09/18 : C0c0n : Talk : All About Iot Forensics presentation, Video
271 2020/09/18 : C0c0n : Talk : Automation in Bug Bounties to Work Smarter presentation, Video
272 2020/09/18 : C0c0n : Talk : Broken Cryptography & Account Takeover presentation, Video
273 2020/09/18 : C0c0n : Talk : Coping With Digital Transformation a Ciso Perspective presentation
274 2020/09/18 : C0c0n : Talk : Covid 19 Cyber Impact on Financial Sector and Remote Employees presentation
275 2020/09/18 : C0c0n : Talk : Cyber Security Shifts During Covid 19 presentation
276 2020/09/18 : C0c0n : Talk : Deep Learning for Intrusion Attempt Detection presentation, Video
277 2020/09/18 : C0c0n : Talk : Demystifying Zero Trust a Real World presentation
278 2020/09/18 : C0c0n : Talk : My Top 3 Findings in Bug Bounty Journey Aiming for High Impact Issues presentation, Video
279 2020/09/18 : C0c0n : Talk : Offensive & Scope Based Recon presentation
280 2020/09/18 : C0c0n : Talk : Offensive Embedded Exploitation Getting Hands Dirty With Iot Embedded Device Security Testing presentation
281 2020/09/18 : C0c0n : Talk : Reverse Engineering Bare Metal Io T Firmwares Moving Beyond Linux presentation, Video
282 2020/09/18 : C0c0n : Talk : Supercharging Your Initial Foothold in Red Team Engagements presentation, Video
283 2020/07/26 : Hitb Sec Conf : Talk : Swapping Asprin Formulas With Mdma While Red Teaming a Billion Dollar Company presentation, Video
284 2020/04/25 : Hitb Sec Conf : Talk : The State of Ics Security Then and Now presentation, Video
285 2020/04/24 : Hitb Sec Conf : Talk : Commsec the State of Ics Security Then and Now presentation, Video
286 2020/03/06 : Nullcon : Talk : Automated Classification of Web Application Attacks for Intrusion Detection presentation, Video
287 2019/11/28 : Deepsec : Talk : Mastering Aws Pentesting and Methodology presentation
288 2019/11/01 : App Sec Day Australia : Talk : A Purple Team View of Serverless and Graph Ql Applications presentation, Video
289 2019/11/01 : App Sec Day Australia : Talk : Protecting the Damned Deploying Insecure Applications at Scale presentation
290 2019/10/22 : Hacklu : Talk : Intro to Dark Arts Getting Started With Ctfs presentation, Video
291 2019/09/28 : C0c0n : Talk : Vulnerability Prioritization With Threat Intelligence presentation, Video
292 2019/09/27 : C0c0n : Talk : A Day in the Life of a Ciso presentation, Video
293 2019/09/27 : C0c0n : Talk : Advanced Persistent Threat and Counter Measures presentation, Video
294 2019/09/27 : C0c0n : Talk : Ai, Ml and Security presentation, Video
295 2019/09/27 : C0c0n : Talk : Auto Source an Automated Framework for Source Code Review presentation, Video
296 2019/09/27 : C0c0n : Talk : Block Chain for Secured Automation presentation, Video
297 2019/09/27 : C0c0n : Talk : Building a Cloud Security Monitoring and Auditing Framework presentation, Video
298 2019/09/27 : C0c0n : Talk : Ciso Mind Set presentation, Video
299 2019/09/27 : C0c0n : Talk : Cyber Hygiene From Enterprise Point of View presentation, Video
300 2019/09/27 : C0c0n : Talk : Demystifying Health Care Security presentation, Video
301 2019/09/27 : C0c0n : Talk : Detection of Tor Sources Using Artificial Intelligence presentation, Video
302 2019/09/27 : C0c0n : Talk : Doing Sec Ops for the Cloud Using Cloud Native Services presentation, Video
303 2019/09/27 : C0c0n : Talk : Hacking Ics Devices for Fun presentation, Video
304 2019/09/27 : C0c0n : Talk : Industry 4.0 Security and Compliance presentation, Video
305 2019/09/27 : C0c0n : Talk : Lessons Learned Form Data Breaches in the Cloud presentation, Video
306 2019/09/27 : C0c0n : Talk : Looking a Decade Ahead Big Data, Drones , Robots and Cyber Security. presentation, Video
307 2019/09/27 : C0c0n : Talk : Offensive Machine Learning for Pentesters and Red Teams presentation, Video
308 2019/09/27 : C0c0n : Talk : Practical Approach to Cyber Security for Financial Institutions presentation, Video
309 2019/09/27 : C0c0n : Talk : Ransomware to Pay or Not to Pay presentation, Video
310 2019/09/27 : C0c0n : Talk : Securing Payment Data With PC I Security Standards and Programs presentation, Video
311 2019/09/27 : C0c0n : Talk : Security @Scale for Startups presentation, Video
312 2019/09/27 : C0c0n : Talk : Serverless Soar presentation, Video
313 2019/09/27 : C0c0n : Talk : Stepping Into Password Less Economy presentation, Video
314 2019/09/23 : Rootcon : Talk : Hacking Ics Devices Plc's for Fun Ics and Iot Hacking presentation
315 2019/09/13 : 44 Con : Talk : One Person Army – Playbook on How to Be the First Security Engineer at a Company presentation
316 2019/08/11 : Defcon : Talk : Exploiting and Securing I Os Apps Using Owasp I Goat presentation, Video
317 2019/08/08 : Defcon : Talk : Anatomy of Cloud Hacking presentation, Video
318 2019/08/08 : Defcon : Talk : Hacking Ics Devices for Fun Penetration Testing of Vehicle Components presentation
319 2019/08/07 : Blackhat : Tool Demo : Sastri Plug and Play Vm for Sast * Static Application Security Testing Realtime Integration* Source Code
320 2019/08/05 : Blackhat : Tool Demo : Cert Pivot Infra Chaining Cert Check Source Code
321 2019/05/21 : Phdays : Talk : Fuzzing 101 presentation, Video
322 2019/05/21 : Phdays : Talk : Rapid Hardware Hacking 101 presentation, Video
323 2019/02/28 : Nullcon : Talk : A Hacker Walks Into a Co Working Space presentation
324 2019/02/28 : Nullcon : Talk : Andromeda Gui Based Dynamic Instrumentation Toolkit Powered by Frida presentation
325 2019/02/28 : Nullcon : Talk : Attacking & Securing Health Care Standards & Hospital Secured Systems presentation
326 2019/02/28 : Nullcon : Talk : Building Hardened Io T Implementations With Lang Sec presentation
327 2019/02/28 : Nullcon : Talk : Dirty Use of Ussd Codes presentation, Video
328 2019/02/28 : Nullcon : Talk : Pentesting Without Pentesters Automating Security Testing With Functional Testing Test Cases presentation
329 2018/11/29 : Deepsec : Talk : DNS Exfiltration and Out of Band Attacks presentation
330 2018/11/02 : Hitb Sec Conf : Talk : Defending the Enterprise in 2018 presentation, Video
331 2018/11/02 : Hackfest : Talk : Exploiting Connected Medical Devices Lessons Learned & Data Earned presentation
332 2018/10/19 : App Sec Day Australia : Talk : Continuous Integration and Delivery With Docker Containers presentation
333 2018/10/19 : App Sec Day Australia : Talk : Threat Modeling as Code & Automation for Dev Sec Ops Wins presentation
334 2018/10/15 : Hacklu : Talk : Come to the Dark Side! We Have Radical Insurance Groups & Ransomware presentation
335 2018/10/10 : Brucon : Talk : Forging Trusts for Deception in Active Directory presentation
336 2018/10/10 : Brucon : Talk : Simplifying the Art of Instrumentation presentation, Video
337 2018/10/05 : C0c0n : Talk : Defending Cloud Infrastructures With Cloud Security Suite presentation, Video
338 2018/10/05 : C0c0n : Talk : DNS Exfiltration and Out of Band Attacks presentation, Video
339 2018/10/05 : C0c0n : Talk : Adaptive Grc presentation, Video
340 2018/10/05 : C0c0n : Talk : Artificial Intelligence and Social Media Analytics in Criminal Investigation presentation, Video
341 2018/10/05 : C0c0n : Talk : Blockchains as Techno Power Structures Towards Emergence of P2 P Politics presentation, Video
342 2018/10/05 : C0c0n : Talk : Cyber Security in Health Care Industry presentation, Video
343 2018/10/05 : C0c0n : Talk : Cybersecurity Embedded Digital Transformation the Future presentation, Video
344 2018/10/05 : C0c0n : Talk : Data Management Challenge for Privacy Compliance presentation, Video
345 2018/10/05 : C0c0n : Talk : Dealing With Changing Threat Landscape presentation, Video
346 2018/10/05 : C0c0n : Talk : Defending Healthcare Base presentation, Video
347 2018/10/05 : C0c0n : Talk : Digital Innovation Revolution in Kerala Government presentation, Video
348 2018/10/05 : C0c0n : Talk : Dom Goat the Dom Security Playground presentation, Video
349 2018/10/05 : C0c0n : Talk : Future of Mobility & Cyber Security presentation, Video
350 2018/10/05 : C0c0n : Talk : How Can We Use Machine Learning to Prevent Frauds and Password Breaches presentation, Video
351 2018/10/05 : C0c0n : Talk : OSI Nt Indian Citizen Edition presentation, Video
352 2018/10/05 : C0c0n : Talk : Predictive Policing Using Big Data Analytics. presentation, Video
353 2018/10/05 : C0c0n : Talk : Privacy and Data Protection Stakeholders’ Perspectives presentation, Video
354 2018/10/05 : C0c0n : Talk : Resiliency Focus Alongside Digital Disruption presentation, Video
355 2018/10/05 : C0c0n : Talk : Scanda to Unbosom Malware Behavior presentation, Video
356 2018/10/05 : C0c0n : Talk : Taking Cyber Security to the Board Room presentation, Video
357 2018/10/05 : C0c0n : Talk : Unconventional Vulnerabilities in Google Cloud Platform presentation, Video
358 2018/10/05 : C0c0n : Talk : Using Fault Injection for Forensics presentation, Video
359 2018/10/05 : C0c0n : Talk : Will Artificial Intelligence and Machine Learning Bring More Threats on Cyber Security? presentation, Video
360 2018/09/06 : Grrcon : Talk : Analyzing Multi Dimensional Malware Dataset presentation
361 2018/08/10 : Defcon : Talk : Building Visualisation Platforms for OSI Nt Data Using Open Source Solutions presentation
362 2018/08/09 : Defcon : Talk : Backdooring Dvr Nvr Devices presentation, Video
363 2018/08/08 : Blackhat : Tool Demo : Darwin Real World Use Cases for Covert Wireless Source Code
364 2018/08/08 : Blackhat : Tool Demo : Sco Da Smart Contract Defender and Analyzer Source Code
365 2018/03/01 : Nullcon : Talk : Darwin ( a Parasite Covert Wireless Network) presentation
366 2018/03/01 : Nullcon : Talk : Spot Phish Zero Hour Phishing Protection presentation
367 2017/11/20 : Hackfest : Talk : How My Sv Machine Nailed Your Malware presentation, Video
368 2017/11/17 : Deepsec : Talk : How Secure Are Your Vo Lte and Vo Wi Fi Calls? presentation
369 2017/10/19 : Hacklu : Talk : Are Your Vo Lte and Vo Wi Fi Calls Secure? presentation
370 2017/10/19 : Hacklu : Talk : Bug Hunting Using Symbolic Virtual Machines! presentation
371 2017/10/19 : Hacklu : Talk : Intel Amt Using & Abusing the Ghost in the Machine presentation
372 2017/08/18 : C0c0n : Talk : Hunting Botnets With Analytics presentation, Video
373 2017/08/18 : C0c0n : Talk : Phishing Threats to Customers and Mitigation presentation, Video
374 2017/08/18 : C0c0n : Talk : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work presentation, Video
375 2017/08/18 : C0c0n : Talk : Androsia a Tool for Securing in Memory Sensitive Data presentation, Video
376 2017/08/18 : C0c0n : Talk : Anti Virus Bypassing for Fun and Profit presentation, Video
377 2017/08/18 : C0c0n : Talk : Bank on Compliance for Cyber Security presentation, Video
378 2017/08/18 : C0c0n : Talk : Big Data Analytics With Pattern Matching for Smarter Analytics presentation, Video
379 2017/08/18 : C0c0n : Talk : Blockchain for Information Security presentation, Video
380 2017/08/18 : C0c0n : Talk : Case Study Security of Digital Wallet Apps in India presentation, Video
381 2017/08/18 : C0c0n : Talk : Catching Network Anomalies Using Deep Learning presentation, Video
382 2017/08/18 : C0c0n : Talk : Challenges in Digital Banking presentation, Video
383 2017/08/18 : C0c0n : Talk : Cloud Security Suite One Stop Tool for Auditing Cloud Infrastructure presentation, Video
384 2017/08/18 : C0c0n : Talk : Co Ap Versus Mqtt Io T Protocol Vulnerability Analysis presentation, Video
385 2017/08/18 : C0c0n : Talk : Cyber Bullying and Cyber Harassment presentation, Video
386 2017/08/18 : C0c0n : Talk : Cyber Bullying Screen the Mean presentation, Video
387 2017/08/18 : C0c0n : Talk : Cyber Security Threat Management – Model It, Collect Intelligence and Hunt Them! presentation, Video
388 2017/08/18 : C0c0n : Talk : Cyber Threat Intelligence Are We There , Yet…? presentation, Video
389 2017/08/18 : C0c0n : Talk : Do Students Really Require Smartphones presentation, Video
390 2017/08/18 : C0c0n : Talk : Dynamic Binary Instrumentation presentation, Video
391 2017/08/18 : C0c0n : Talk : Exploiting the Smartness of Ble Stack presentation, Video
392 2017/08/18 : C0c0n : Talk : Hacking Homes a Hardware Insight for Io T [In] Security presentation, Video
393 2017/08/18 : C0c0n : Talk : Hunting the Hunters – Fighting Cyber Crime at the Source presentation, Video
394 2017/08/18 : C0c0n : Talk : Identity Theft presentation, Video
395 2017/08/18 : C0c0n : Talk : I Goat – A Self Learning Tool for I Os App Pentesting and Security presentation, Video
396 2017/08/18 : C0c0n : Talk : Internet Addiction and Children presentation, Video
397 2017/08/18 : C0c0n : Talk : Mobile Banking ( In) Security presentation, Video
398 2017/08/18 : C0c0n : Talk : Moving From Cybersecurity Awareness to Cybersecurity Competence presentation, Video
399 2017/08/18 : C0c0n : Talk : OSI Nt and Privacy presentation, Video
400 2017/08/18 : C0c0n : Talk : Penetration Testing Orchestrator a Framework That Leverages Multi Tool Penetration Testing Approach Combined With Machine Learning Nlp for Faster Result Analysis presentation, Video
401 2017/08/18 : C0c0n : Talk : Prevent Dark Side of Your Smart City a Defensive Security Model for Smart City and Critical Infrastructure presentation, Video
402 2017/08/18 : C0c0n : Talk : Sleep, Screen and Teenagers presentation, Video
403 2017/08/18 : C0c0n : Talk : Social Media and You presentation, Video
404 2017/08/18 : C0c0n : Talk : Technology the New Frontier in Teaching presentation, Video
405 2017/08/18 : C0c0n : Talk : The Card Hack Lessons From the Hitachi Payments Breach presentation, Video
406 2017/08/18 : C0c0n : Talk : The Covert Cupid Under .11 Veil !!! * Approach for Covert Wifi* presentation, Video
407 2017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)y presentation, Video
408 2017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)y presentation, Video
409 2017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technology presentation, Video
410 2017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technology presentation, Video
411 2017/08/18 : C0c0n : Talk : The Role of Teachers in Digital Era presentation, Video
412 2017/08/18 : C0c0n : Talk : Threats With Online Gaming and Issues With Games Like Pokemon presentation, Video
413 2017/08/18 : C0c0n : Talk : What Security Managers Can Learn From Story Tellers? presentation, Video
414 2017/08/18 : C0c0n : Talk : Yarafying Android Malware a Missing Step Before Malware Analysis presentation, Video
415 2017/08/18 : C0c0n : Talk : Your Friendly Neighbourhood Exploit presentation, Video
416 2017/07/29 : Defcon : Tool Demo : Widy 2.0 Wifi 0 Wnage in Under 5 Reloaded Source Code
417 2017/07/29 : Defcon : Tool Demo : Wi Monitor an Open Wrt Package for Remote Wi Fi Sniffing Source Code
418 2017/07/27 : Defcon : Talk : Recon and Bug Bounties What a Great Love Story presentation
419 2017/03/30 : Blackhat : Tool Demo : Lamma 1.0 Source Code
420 2017/03/30 : Blackhat : Tool Demo : Damn Vulnerable Ss7 Network Source Code
421 2017/03/30 : Blackhat : Tool Demo : Wi Dy Wi Fi 0wnage in Under 5 Source Code
422 2017/03/03 : Nullcon : Talk : Agility With Security Mitigations in Windows 10 presentation, Video
423 2017/03/03 : Nullcon : Talk : Breach Response Time to Shake Up the Status Quo presentation
424 2017/03/03 : Nullcon : Talk : Securing Critical National Infrastructure presentation
425 2016/11/11 : Deepsec : Talk : Amsi How Windows 10 Plans to Stop Script Based Attacks and How Good It Does That presentation
426 2016/11/11 : Deepsec : Talk : Human vs Artificial Intelligence – Battle of Trust presentation, Video
427 2016/11/05 : Hackfest : Talk : Lock Picker Leaking Data From Live Luks Partition presentation, Video
428 2016/10/27 : Brucon : Talk : Decepticon the Rise and Evolution of an Intelligent Evil Twin…!!! presentation
429 2016/08/19 : C0c0n : Talk : Abusing Digital Certificates Malware Style presentation, Video
430 2016/08/19 : C0c0n : Talk : App Sec in the Time of Docker Containers presentation, Video
431 2016/08/19 : C0c0n : Talk : Backdooring My Enemies With a Proxy for Threat Intelligence presentation, Video
432 2016/08/19 : C0c0n : Talk : Breaking Into Gas Stations! presentation, Video
433 2016/08/19 : C0c0n : Talk : Evading Corporate Security – You’re as Secure as the Weakest Link presentation, Video
434 2016/08/19 : C0c0n : Talk : How (In)secure Are Indian Gsm Networks? presentation, Video
435 2016/08/19 : C0c0n : Talk : Kill the Password a New Era of Authentication presentation, Video
436 2016/08/19 : C0c0n : Talk : Ssd Forensics a Nightmare for Forensic Investigators presentation, Video
437 2016/08/19 : C0c0n : Talk : The Art of Social Hacking presentation, Video
438 2016/07/01 : Hackinparis : Talk : Diffdroid Dynamic Analysis Made Easier for Android presentation
439 2016/05/26 : Hitb Sec Conf : Talk : Hitb Lab Mobile Application Security for I Os and Android presentation, Video
440 2016/05/17 : Phdays : Talk : Security Automation Based on Artificial Intelligence presentation
441 2016/03/11 : Nullcon : Talk : Hitchhiker's Guide to Hacking Industrial Control Systems ( Ics) presentation, Video
442 2016/03/11 : Nullcon : Talk : Million Dollar Baby Towards Angrly Conquering Darpa Cgc presentation, Video
443 2015/11/19 : Deepsec : Talk : Continuous Intrusion Why Ci Tools Are an Attacker's Best Friends. presentation
444 2015/11/05 : Ground Zero Summit : Talk : Cyber Security in Hospitals Hospitals Under Seige presentation, Video
445 2015/11/05 : Ground Zero Summit : Talk : Exposing Cyber Espionage Hello From Pakistan Iic Session presentation, Video
446 2015/11/05 : Ground Zero Summit : Talk : Western Air Command presentation, Video
447 2015/11/05 : Ground Zero Summit : Talk : Authentication Flaw in Automatic Bank Passbook Printing Machine. presentation, Video
448 2015/11/05 : Ground Zero Summit : Talk : Browser Based Malware Attacks presentation, Video
449 2015/11/05 : Ground Zero Summit : Talk : Chellam – A Wi Fi ID S Firewall for Windows presentation, Video
450 2015/11/05 : Ground Zero Summit : Talk : Credit Card Frauds – The Money Making Ecosystem for Cyber Criminals presentation, Video
451 2015/11/05 : Ground Zero Summit : Talk : Dissecting Android Malware presentation, Video
452 2015/11/05 : Ground Zero Summit : Talk : Economics of Post Quantum Crypto Systems Do We Really Need It presentation, Video
453 2015/11/05 : Ground Zero Summit : Talk : Elliptical Curve Cryptography presentation, Video
454 2015/11/05 : Ground Zero Summit : Talk : Hacking Rfids Under 2000 Inr presentation, Video
455 2015/11/05 : Ground Zero Summit : Talk : Sanctioned to Hack Your Scada Hmis Belong to Us! presentation, Video
456 2015/11/05 : Ground Zero Summit : Talk : Thanks for the Free Cookies presentation, Video
457 2015/11/05 : Ground Zero Summit : Talk : Trailing Terror in the Darknets presentation, Video
458 2015/11/05 : Ground Zero Summit : Talk : Wolves Among Sheep Defeating Targeted Attacks With Deception presentation, Video
459 2015/11/05 : Ground Zero Summit : Talk : Xss the Art of Evading Web Application Filters! presentation, Video
460 2015/08/09 : Defcon : Talk : 802.11 Monitoring With PC Ap2 Xml Sqlite presentation
461 2015/08/08 : Defcon : Talk : Chigula — A Framework for Wi Fi Intrusion Detection and Forensics presentation
462 2015/08/08 : Defcon : Talk : Dissecting the Design of Scada Web Human Machine Interfaces ( Hmis) Hunting Vulnerabilities presentation
463 2015/08/08 : Defcon : Talk : Powershell for Penetraton Testers presentation
464 2015/08/07 : Defcon : Talk : Getting Into the Trust Store We Trust presentation, Video
465 2015/08/07 : Defcon : Talk : Hacker's Practice Ground presentation
466 2015/08/06 : Blackhat : Tool Demo : Chellam Source Code
467 2015/08/01 : C0c0n : Talk : A Pentester's Methodology to Discover, Automate and Exploit Windows Privilege Escalation Flaws. presentation, Video
468 2015/08/01 : C0c0n : Talk : Attack Chaining for Web Exploitation From Information Leakage to Gaining Root Access presentation, Video
469 2015/08/01 : C0c0n : Talk : Blockchains in Security presentation, Video
470 2015/08/01 : C0c0n : Talk : Breaking Into Infosec Research presentation, Video
471 2015/08/01 : C0c0n : Talk : Demystifying and Breaking Ble presentation, Video
472 2015/08/01 : C0c0n : Talk : From Aosp ( Android Open Source Project ) to Abd ( Android Based Devices ) presentation, Video
473 2015/08/01 : C0c0n : Talk : Hacking Rfids Under 2000 Inr presentation, Video
474 2015/08/01 : C0c0n : Talk : Medical Device Security and Critical Infrastructure Inside Hospitals presentation, Video
475 2015/08/01 : C0c0n : Talk : No Po the No SQL Honey Pot Framework presentation, Video
476 2015/08/01 : C0c0n : Talk : Reversing and Deciphering the Cyber Espionage Malware Communications presentation, Video
477 2015/08/01 : C0c0n : Talk : S3curi7y at 36 K Feet presentation, Video
478 2015/05/26 : Phdays : Talk : Invisible Backdoors in Your Code presentation, Video
479 2015/02/06 : Nullcon : Talk : Building Security and Compliance Into the Software Delivery Process presentation, Video
480 2015/02/06 : Nullcon : Talk : Toliman, a Hadoop Pentesting Tool presentation, Video
481 2014/11/13 : Ground Zero Summit : Talk : Attacking Cryptography & Pki Implementations presentation, Video
482 2014/11/13 : Ground Zero Summit : Talk : Identity Theft and Its Impact on Cyber Warfare presentation, Video
483 2014/11/13 : Ground Zero Summit : Talk : Network Time Protocol in Amplification Inferno presentation, Video
484 2014/11/13 : Ground Zero Summit : Talk : Security Vulnerabilities in Dvb C Networks Hacking Cable Tv Network presentation, Video
485 2014/11/13 : Ground Zero Summit : Talk : 9 Cell Cyber Diplomacy presentation, Video
486 2014/11/13 : Ground Zero Summit : Talk : Apt Protection for the Enterprise presentation, Video
487 2014/11/13 : Ground Zero Summit : Talk : Attacking Web Proxies Like Never Before presentation, Video
488 2014/11/13 : Ground Zero Summit : Talk : Cyber ' Brah Mos' Static Analysis Driven Secure Coding presentation, Video
489 2014/11/13 : Ground Zero Summit : Talk : Detecting Fake Cell Phone Towers presentation, Video
490 2014/11/13 : Ground Zero Summit : Talk : Enterprise Security presentation, Video
491 2014/11/13 : Ground Zero Summit : Talk : Evaluating Waf ( Web Application Firewall) for Fun and Profit With Wof presentation, Video
492 2014/11/13 : Ground Zero Summit : Talk : Financial Integrity and Cyber Security presentation, Video
493 2014/11/13 : Ground Zero Summit : Talk : Fuzzing Asynchronous Protocols Built Over Websockets presentation, Video
494 2014/11/13 : Ground Zero Summit : Talk : Hacking Consumer Electronics for Fun presentation, Video
495 2014/11/13 : Ground Zero Summit : Talk : How I Won Browser Fuzzing presentation, Video
496 2014/11/13 : Ground Zero Summit : Talk : Internet Governance presentation, Video
497 2014/11/13 : Ground Zero Summit : Talk : Mobile Security Automation Framework for Intelligent Auditing presentation, Video
498 2014/11/13 : Ground Zero Summit : Talk : National Cyber Policy and Its Impact on Business presentation, Video
499 2014/11/13 : Ground Zero Summit : Talk : Scada Exploitation Through Firmware presentation, Video
500 2014/11/13 : Ground Zero Summit : Talk : Vulnerability Reproduction Using Zest presentation, Video
501 2014/10/23 : Hacklu : Talk : Wi Hawk Router Vulnerability Scanner presentation, Video
502 2014/10/17 : Blackhat : Talk : Android Kernel and Os Security Assessment With Iron Crow presentation
503 2014/10/16 : Grrcon : Talk : Socioware Dissecting Online Social Network Worms – Insidious Analysis and Design presentation, Video
504 2014/09/24 : Brucon : Talk : Owasp Owtf presentation, Video
505 2014/08/22 : C0c0n : Talk : Apt Case Study of Attackers Targeting Public Tendering presentation, Video
506 2014/08/22 : C0c0n : Talk : Breaking and Securing Mobile Apps Automagically presentation, Video
507 2014/08/22 : C0c0n : Talk : Cryptocalypse, Heart Bleed Is Our Government Listening? presentation, Video
508 2014/08/22 : C0c0n : Talk : Cryptographic Backdoors Subverting the Rsa presentation, Video
509 2014/08/22 : C0c0n : Talk : Exploiting No SQL Like Never Before presentation, Video
510 2014/08/22 : C0c0n : Talk : Hacking Communication presentation, Video
511 2014/08/22 : C0c0n : Talk : Idle Machines Doing Bounty Hunting ( Behind Your Back) presentation, Video
512 2014/08/22 : C0c0n : Talk : Lesser Known Attack Xml Injection presentation, Video
513 2014/08/22 : C0c0n : Talk : Piracy Tracker presentation, Video
514 2014/08/22 : C0c0n : Talk : Still Single With a Bleeding Heart ( Tool Release) presentation, Video
515 2014/08/22 : C0c0n : Talk : The Curious Case of Proto Bufs Demystifying Google's Hottest Binary Protocol presentation, Video
516 2014/05/21 : Phdays : Talk : Android Exploitation presentation
517 2014/05/21 : Phdays : Talk : Arm Exploitation presentation
518 2014/02/15 : Nullcon : Tool Demo : Drup Snipe Source Code
519 2014/02/14 : Nullcon : Talk : Hacking You'r Cable Tv Network. presentation
520 2014/02/14 : Nullcon : Talk : Multi Value W Fi What the Heck Is It presentation
521 2014/02/14 : Nullcon : Talk : O' Dea Assertions Untwining the Security of the Saml Protocol presentation
522 2014/02/14 : Nullcon : Talk : Strategic Information Warfare When Ends Define the Means presentation, Video
523 2013/11/21 : Deepsec : Talk : Automation in Android & I Os Application Security Review presentation, Video
524 2013/11/21 : Deepsec : Talk : Europe in the Carna Botnet Telnet's Threat to the Largest Economy presentation
525 2013/11/07 : Ground Zero Summit : Talk : Advanced Security for Advanced Threats presentation, Video
526 2013/11/07 : Ground Zero Summit : Talk : Approach to Containing the Outbreak of Malicious Information in Online Social Networks presentation, Video
527 2013/11/07 : Ground Zero Summit : Talk : Central Monitoring System and It Act 2000 – Balance Between Rights of Citizens and State presentation, Video
528 2013/11/07 : Ground Zero Summit : Talk : Cloud Security Enabling Continuous, Scalable Security for Today’s Hyper Connected World presentation, Video
529 2013/11/07 : Ground Zero Summit : Talk : Evolution of Network Security Around Software Defined Networking ( Sdn) – The Intelligent Network presentation, Video
530 2013/11/07 : Ground Zero Summit : Talk : How I Built a Pentest Lab in Under 70 Usd presentation, Video
531 2013/11/07 : Ground Zero Summit : Talk : Internet – Transforming Terrorism presentation, Video
532 2013/11/07 : Ground Zero Summit : Talk : Iron Wasp presentation, Video
533 2013/11/07 : Ground Zero Summit : Talk : Malware for Firefox Mobile Os presentation, Video
534 2013/11/07 : Ground Zero Summit : Talk : Securing Government Critical Information Infrastructure presentation, Video
535 2013/11/07 : Ground Zero Summit : Talk : Serial Killing of Embedded Systems presentation, Video
536 2013/11/07 : Ground Zero Summit : Talk : Setting the Data Center on Fire presentation, Video
537 2013/11/07 : Ground Zero Summit : Talk : The Seven Sins of Wi Fi Security presentation, Video
538 2013/11/07 : Ground Zero Summit : Talk : Towards a Next Generation Secure Internet presentation, Video
539 2013/11/07 : Ground Zero Summit : Talk : Understanding the Anatomy of Advanced Targeted Attacks – The Trend Micro Approach presentation, Video
540 2013/09/27 : C0c0n : Talk : Arm, Thumb and the Finger presentation, Video
541 2013/09/27 : C0c0n : Talk : Blur Captcha presentation, Video
542 2013/09/27 : C0c0n : Talk : Disclosing Vulnerabilities the Bug Bounty Style presentation, Video
543 2013/09/27 : C0c0n : Talk : From Bedroom to Boardroom Taking Your Weekend Infosec Project Global presentation, Video
544 2013/09/27 : C0c0n : Talk : Hello Ciso! How to Make End Users Like and Follow “ Brand Infosec”? presentation, Video
545 2013/09/27 : C0c0n : Talk : Infiltrating the Intranet With Skanda presentation, Video
546 2013/09/27 : C0c0n : Talk : Lets Play Applanting on New Grounds presentation, Video
547 2013/09/27 : C0c0n : Talk : Pwning Wi Fi Devices! presentation, Video
548 2013/09/27 : C0c0n : Talk : Risk and Challenges in Virtual Currencies. presentation, Video
549 2013/09/27 : C0c0n : Talk : Sandy the Malicious Analysis presentation, Video
550 2013/09/27 : C0c0n : Talk : Ssrf Xspa Real World Attacks and Mitigations presentation, Video
551 2013/09/27 : C0c0n : Talk : The Art and Science of Anamoly Based Vulnerability Detection presentation, Video
552 2013/09/27 : C0c0n : Talk : The Secure Software Development Life Cycle presentation, Video
553 2013/09/13 : Rootcon : Talk : My Experiments With Truth a Different Route to Bug Hunting presentation, Video
554 2013/09/12 : Grrcon : Talk : The Droid Exploitation Saga – All Over Again! presentation, Video
555 2013/07/31 : Blackhat : Talk : Lte Booms With Vulnerabilities presentation, Video
556 2013/03/01 : Nullcon : Talk : Automating Java Script Static Analysis presentation, Video
557 2013/03/01 : Nullcon : Talk : Byod How Will It Shape Your Wireless Network Security in Future? presentation
558 2013/03/01 : Nullcon : Talk : Capturing Zero Day Information presentation
559 2013/03/01 : Nullcon : Talk : Csrf Finder as a Mozilla Addon presentation
560 2013/03/01 : Nullcon : Talk : Inception of Graphical Passwords presentation
561 2013/03/01 : Nullcon : Talk : Pawing the Droid Twisting the Arm presentation, Video
562 2013/03/01 : Nullcon : Talk : Rest a Real Stealth and Semi Stealth Mitm Attack Tool for Ipv4 Networks presentation
563 2013/03/01 : Nullcon : Talk : Sensitive Campus Security With Network presentation
564 2013/03/01 : Nullcon : Talk : Sms to Meterpreter Fuzzing USB Modems presentation
565 2013/03/01 : Nullcon : Talk : Vulnerability Research Anyone? presentation, Video
566 2012/11/23 : Malcon : Talk : Advanced Malware Engine presentation, Video
567 2012/11/23 : Malcon : Talk : Surprise Paper! presentation, Video
568 2012/11/23 : Malcon : Talk : Windows Phone 8 Malware Prototype presentation, Video
569 2012/10/23 : Hacklu : Talk : Buster Android Security Buster presentation, Video
570 2012/10/10 : Hitb Sec Conf : Talk : Innovative Approaches to Exploit Delivery presentation
571 2012/09/27 : Grrcon : Talk : The Realm of Third Generation Botnet Attacks presentation
572 2012/09/26 : Nullcon : Talk : Forensics Timeline Analysis presentation
573 2012/09/26 : Nullcon : Talk : Highly Harmful Audio Waves Aka Dtmf Fuzzing presentation
574 2012/09/26 : Nullcon : Talk : How Secure Is Internet Banking in India presentation
575 2012/09/26 : Nullcon : Talk : Opening the Kimono Automating Behavioral Analysis for Mobile Apps presentation
576 2012/09/26 : Nullcon : Talk : The Art of Passive Web Vul Analysis With Iron Wasp presentation
577 2012/09/20 : Ekoparty : Talk : Dirty Use of Ussd Codes in Cellular Network presentation
578 2012/09/20 : Ekoparty : Talk : Fuzzing Dtmf Input Processing Algorithms presentation, Video
579 2012/09/05 : 44 Con : Talk : Why Integrity Is Left Alone and Not Given Tlc ( Tender, Love and Care) It Deserves? presentation
580 2012/08/03 : C0c0n : Talk : Building Security Incident Detection & Handling Capabilities in Enterprises presentation, Video
581 2012/08/03 : C0c0n : Talk : Business Continuity and Risk Management in Turbulent Times presentation, Video
582 2012/08/03 : C0c0n : Talk : Contemporary Transcription and Resource Parasitism presentation, Video
583 2012/08/03 : C0c0n : Talk : Easy Money With Ui Redressing presentation, Video
584 2012/08/03 : C0c0n : Talk : Enterprise Server Security presentation, Video
585 2012/08/03 : C0c0n : Talk : Evil Java Script presentation, Video
586 2012/08/03 : C0c0n : Talk : Gathering Security Requirements presentation, Video
587 2012/08/03 : C0c0n : Talk : Layer 8 Exploitation a Threat to National Security presentation, Video
588 2012/08/03 : C0c0n : Talk : Security Incidents – Avoiding the Apocalypse in 2012 presentation, Video
589 2012/08/03 : C0c0n : Talk : The Management of Information Security – A Corporate Practitioner’s Perspective presentation, Video
590 2012/08/03 : C0c0n : Talk : The Weakest Link Reinforcing the Human Element presentation, Video
591 2012/02/15 : Nullcon : Talk : Application Security Cost Management presentation
592 2012/02/15 : Nullcon : Talk : Attacking Backup Software presentation
593 2012/02/15 : Nullcon : Talk : Best Practices to Improve the Security Grading of Your Project presentation
594 2012/02/15 : Nullcon : Talk : Captchas for Fun and Profit presentation
595 2012/02/15 : Nullcon : Talk : Content Sniffing Algorithm Bypassing Techniques and Possible Attack Vectors presentation
596 2012/02/15 : Nullcon : Talk : Cyberspace Global Commons or a National Asset presentation, Video
597 2012/02/15 : Nullcon : Talk : Friction in the Machine presentation, Video
598 2012/02/15 : Nullcon : Talk : Haxdroid Empowering Android Handset presentation
599 2012/02/15 : Nullcon : Talk : Ivr Security Internal Network Attacks via Phone Lines presentation
600 2012/02/15 : Nullcon : Talk : Node.js the Good, Bad and Ugly presentation
601 2012/02/15 : Nullcon : Talk : Open Source Revolution Need Hardware Software Marriage presentation, Video
602 2012/02/15 : Nullcon : Talk : Sandboxing the Deep Truth presentation
603 2012/02/15 : Nullcon : Talk : Scada Security Why Is It So Hard presentation, Video
604 2012/02/15 : Nullcon : Talk : Teensy for Fun and Jugaad presentation, Video
605 2012/02/15 : Nullcon : Talk : Your Phone Is Your Phone but Your Calls Are Now My Calls presentation, Video
606 2011/11/25 : Malcon : Talk : Advanced Malware for Apple Products presentation, Video
607 2011/11/25 : Malcon : Talk : Exploit the Exploit Kits presentation, Video
608 2011/11/25 : Malcon : Talk : Mareech Look It’s a Hid Made Up of Gold presentation, Video
609 2011/11/17 : Deepsec : Talk : Behavioral Security 10 Steps Forward 5 Steps Backward presentation
610 2011/11/17 : Deepsec : Talk : Fake Anti Virus Journey From Trojan to a Persisent Threat presentation, Video
611 2011/11/04 : Hackfest : Talk : Here Are Your Keystrokes presentation, Video
612 2011/10/13 : Hitb Sec Conf : Talk : Web Wars 3 presentation, Video
613 2011/10/08 : C0c0n : Talk : Stratagemizing Security Against Perpetrators in Cloud Infrastructure presentation, Video
614 2011/10/07 : C0c0n : Talk : Deep(er) Penetration Reaching the Internal Network Using Exposed Web Applications presentation, Video
615 2011/10/07 : C0c0n : Talk : Digital Evidence presentation, Video
616 2011/10/07 : C0c0n : Talk : I Phone Jailbreak presentation, Video
617 2011/10/07 : C0c0n : Talk : Mobile Security presentation, Video
618 2011/10/07 : C0c0n : Talk : Network Security Modern Mechanism for Intrusion Detection and Avoidance in a P2 P Network presentation, Video
619 2011/10/07 : C0c0n : Talk : Paranoid Android presentation, Video
620 2011/10/07 : C0c0n : Talk : Password Less Authentication, Authorization presentation, Video
621 2011/10/07 : C0c0n : Talk : Runtime Thread Injection and Execution in Linux Processes presentation, Video
622 2011/10/07 : C0c0n : Talk : Section 43 a It Act Compliance presentation, Video
623 2011/10/07 : C0c0n : Talk : Security and Privacy Risks of Cloud Computing presentation, Video
624 2011/10/07 : C0c0n : Talk : Wi Fi Malware for Fun and Profit presentation, Video
625 2011/09/19 : Hacklu : Talk : Linux Thread Injection the Jugaad Way presentation, Video
626 2011/09/19 : Brucon : Talk : Step by Step for Software Security (That Anyone Can Follow) presentation, Video
627 2011/09/19 : Hacklu : Talk : The Travelling Hacksmith presentation, Video
628 2011/09/07 : Securitybyte : Talk : Data Protection presentation, Video
629 2011/09/07 : Securitybyte : Talk : Social Web & Privacy – An Evolving World presentation, Video
630 2011/02/25 : Nullcon : Talk : Future of Cyber Crimes Limitations and Challenges presentation, Video
631 2011/02/25 : Nullcon : Talk : Hacking the Parliament – A Classic Social Engineering Attack presentation, Video
632 2011/02/25 : Nullcon : Talk : Incident Management and Beyond presentation, Video
633 2011/02/25 : Nullcon : Talk : Jugaad Beta Linux Thread Injection Malware Po C presentation, Video
634 2010/11/25 : Deepsec : Talk : Developers Are From Mars, Compliance Auditors Are From Venus presentation
635 2010/08/01 : C0c0n : Talk : Cloud Computing & Security Boon or Bane; Hype or Reality; Cloud Implementation Challenges a Live Case Study presentation, Video
636 2010/08/01 : C0c0n : Talk : Code Disclosure Over HTTP presentation, Video
637 2010/08/01 : C0c0n : Talk : Concept, Methodology and Challenges in Computer Forensics presentation, Video
638 2010/08/01 : C0c0n : Talk : Dangers and Dynamic Malware Analysis presentation, Video
639 2010/08/01 : C0c0n : Talk : End Point Security presentation, Video
640 2010/08/01 : C0c0n : Talk : Hackers' Eco System in India presentation, Video
641 2010/08/01 : C0c0n : Talk : Horses, Rats and Bots presentation, Video
642 2010/08/01 : C0c0n : Talk : Last Line of Defense Host Intrusion Prevention and Secure Application Development. presentation, Video
643 2010/08/01 : C0c0n : Talk : Mobile Security presentation, Video
644 2010/08/01 : C0c0n : Talk : Overview of Cyber Legal Systems in India presentation, Video
645 2010/08/01 : C0c0n : Talk : Vo IP Security presentation, Video
646 2010/08/01 : C0c0n : Talk : Wireless Mitm presentation, Video
647 2010/08/01 : C0c0n : Talk : Writing X86 Shell Code & Secure Self Modifying Code and Cross Platform Programming a Security Angle presentation, Video
648 2010/07/01 : Hitb Sec Conf : Talk : The Travelling Hacksmith 2009 – 2010 presentation, Video
649 2010/06/18 : Syscan : Talk : Reverse Engineering Web 2.0 Applications presentation, Video
650 2010/02/25 : Nullcon : Talk : Imposter Ke Karnamey the Browser Phishing Tool. presentation, Video
651 2010/02/25 : Nullcon : Talk : Quantum Computing Challenges in the Field of Security presentation, Video
652 2009/12/04 : Clubhack : Talk : Facilitate Collaboration With Information Rights Management presentation, Video
653 2009/11/19 : Deepsec : Talk : Top 10 Security Issues Developers Don't Know About presentation
654 2009/11/18 : Securitybyte : Talk : Cloud Hacking – Distributed Attack & Exploit Platform presentation, Video
655 2009/11/17 : Securitybyte : Talk : Business Case Risk Management Compliance at Amity presentation, Video
656 2009/11/17 : Securitybyte : Talk : Business Continuity Case Study presentation, Video
657 2009/10/28 : Hacklu : Talk : Ownage 2.0 presentation, Video
658 2009/08/06 : C0c0n : Talk : Cyber Forensics presentation, Video
659 2009/08/06 : C0c0n : Talk : Cyber Victimisation presentation, Video
660 2009/08/06 : C0c0n : Talk : Information Security Audit presentation, Video
661 2009/08/06 : C0c0n : Talk : Information Security Management Practices Technical Issues and the Impact of Risk Management. presentation, Video
662 2009/08/06 : C0c0n : Talk : Information Warfare presentation, Video
663 2009/08/06 : C0c0n : Talk : Know Your Enemy, and Yourself Demystifying Threat Modelin presentation, Video
664 2009/08/06 : C0c0n : Talk : Management & Security of Large Scale Storage Devices presentation, Video
665 2009/08/06 : C0c0n : Talk : Microsoft Security Strategies presentation, Video
666 2009/08/06 : C0c0n : Talk : Network Intrusions and Hacking presentation, Video
667 2009/05/19 : Syscan : Talk : Securing Applications at Gateway With Web Application Firewalls presentation, Video
668 2009/05/19 : Syscan : Talk : Securing Enterprise Applications presentation, Video
669 2008/11/13 : Deepsec : Talk : Game of Web 2.0 Security Attacking Next Generation Apps presentation, Video
670 2008/10/29 : Hitb Sec Conf : Talk : Browser Exploits a New Model for Browser Security presentation
671 2008/10/22 : Hacklu : Talk : Browser Exploits a New Model for Browser Security presentation, Video
672 2008/08/21 : Owasp App Sec India : Talk : App Sec for Managers presentation, Video
673 2008/08/20 : Owasp App Sec India : Talk : Building Enterprise App Sec Program presentation, Video
674 2008/04/16 : Hitb Sec Conf : Talk : Securing Next Generation Applications  “ Scan, Detect and Mitigate presentation, Video
675 2008/03/28 : Blackhat : Talk : Spam Evolution presentation, Video
676 2008/03/26 : Can Sec West : Talk : Vulnerabilities Die Hard presentation, Video
677 2008/02/20 : Blackhat : Talk : Hacking Vo IP Through IP Sec Tunnels presentation, Video
678 2007/12/09 : Clubhack : Talk : Vulnerabilities in Vo IP Products and Services presentation, Video
679 2007/08/01 : Blackhat : Talk : Vulnerabilities in Wi Fi Dual Mode Vo IP Phones presentation, Video
680 2007/04/18 : Can Sec West : Talk : Low Rate Denial of Service Attacks presentation, Video
681 2007/03/30 : Blackhat : Talk : Web Service Vulnerabilities presentation, Video
682 2006/10/19 : Hacklu : Talk : Smashing Heap by Free Simulation presentation, Video
683 2006/08/05 : Defcon : Talk : Zulu a Command Line Wireless Frame Generator presentation
684 2005/09/29 : Hitb Sec Conf : Talk : Trends in Real World Attacks a Compilation of Case Studies presentation
685 2005/04/10 : Hitb Sec Conf : Talk : Whispers on the Wire Network Based Covert Channels, Exploitation and Detection presentation, Video
686 2004/07/28 : Blackhat : Talk : Defeating Automated Web Assessment Tools presentation
687 2003/12/12 : Hitb Sec Conf : Talk : Defending Web Applications Strategies, Methods and Practices presentation, Video
688 2003/12/12 : Hitb Sec Conf : Talk : New Generation Frauds presentation, Video
689 2003/12/12 : Hitb Sec Conf : Talk : Threats to Wireless Networks War Driving presentation, Video
690 2001/07/13 : Defcon : Talk : Security & Privacy Are Critically Important Issues in Todays Digitally Connected Age presentation
691 1998/07/29 : Blackhat : Talk : Security as an Enabler for New Business Opportunities the Business Value of Security presentation, Video