S.No |
Name of Entry |
What is missing |
1 |
2025/04/04 : Blackhat : Tool Demo : Agneyastra Firebase Misconfiguration Detection Toolkit V2 |
Source Code |
2 |
2025/04/04 : Blackhat : Tool Demo : Compart Io T |
Source Code |
3 |
2025/04/04 : Blackhat : Tool Demo : Decoy Mutex |
Source Code |
4 |
2025/04/04 : Blackhat : Tool Demo : Intro to Cicdguard How to Have Visibility and Security of Cicd Ecosystem |
Source Code |
5 |
2025/04/04 : Blackhat : Tool Demo : Kernel Goat |
Source Code |
6 |
2025/04/04 : Blackhat : Tool Demo : Kubernetes Goat a Hands on Interactive Kubernetes Security Playground |
Source Code |
7 |
2025/04/04 : Blackhat : Tool Demo : Red Infra Craft Automate Complex Red Team Infra |
Source Code |
8 |
2025/04/04 : Blackhat : Tool Demo : Shiva Spampot Actionable Spam and Phishing Intelligence |
Source Code |
9 |
2025/04/04 : Blackhat : Tool Demo : Track Guard Browser Fingerprint Detection and Defence |
Source Code |
10 |
2025/04/03 : Blackhat : Talk : Cloud Security Building Connections in the Cloud |
presentation, Video |
11 |
2025/04/03 : Blackhat : Tool Demo : Compart Io T |
Source Code |
12 |
2025/04/03 : Blackhat : Tool Demo : Halberd Multi Cloud Security Testing Tool |
Source Code |
13 |
2025/04/03 : Blackhat : Tool Demo : Kube Sf V1.2 Kubernetes Security Posture Audit Suite |
Source Code |
14 |
2025/04/03 : Blackhat : Tool Demo : Mantis Asset Discovery at Scale |
Source Code |
15 |
2025/04/03 : Blackhat : Tool Demo : Mob Xplore |
Source Code |
16 |
2025/04/03 : Blackhat : Talk : Obfus Qate Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! |
presentation, Video |
17 |
2025/04/03 : Blackhat : Tool Demo : R0fuzz a Collaborative Fuzzer |
Source Code |
18 |
2025/04/03 : Blackhat : Tool Demo : Scagoat Exploiting Damn Vulnerable and Compromised Sca Application |
Source Code |
19 |
2025/04/03 : Blackhat : Tool Demo : Smuggle Shield 2.0 Basic Protection Against HTML Smuggling |
Source Code |
20 |
2025/04/03 : Blackhat : Tool Demo : Supply Shield Protecting Your Software Supply Chain |
Source Code |
21 |
2025/04/03 : Blackhat : Tool Demo : Varunastra Securing the Depths of Docker V2 |
Source Code |
22 |
2025/04/03 : Blackhat : Tool Demo : Vuln Scout |
Source Code |
23 |
2025/03/02 : Nullcon : Talk : Cyber Security From Telco Lens |
presentation, Video |
24 |
2025/03/02 : Nullcon : Talk : E Kyc Crisis Securing the Lockers |
presentation, Video |
25 |
2025/03/02 : Nullcon : Talk : Hidden in Plain Sight Large Scale Exposure of Orphaned Commits on Major Git Platforms |
presentation, Video |
26 |
2025/03/02 : Nullcon : Talk : Kernel Conquest Breaking Boundaries and Demystifying Kernel Su for Root Access in Azure Cloud Shell |
presentation, Video |
27 |
2025/03/02 : Nullcon : Talk : Satellite Communications Analyzing and Protecting Space Based Assets |
presentation, Video |
28 |
2025/03/02 : Nullcon : Talk : Securing the Chains Building Defensive Layers for Software Supply Chains |
presentation, Video |
29 |
2025/03/01 : Nullcon : Talk : Drawing Parallels Between I Os and MAC Os Pentesting With Dvma |
presentation, Video |
30 |
2025/03/01 : Nullcon : Talk : MAC Os Lockdown Mode a Forensic Deep Dive |
presentation, Video |
31 |
2025/03/01 : Nullcon : Talk : The Future Is Trustless How Zk Vms and Zk Tls Transform Bug Bounties |
presentation |
32 |
2024/12/12 : Blackhat : Tool Demo : Damn Vulnerable Browser Extension ( Dvbe) Knowing the Risks of Your Browser Supplements |
Source Code |
33 |
2024/12/12 : Blackhat : Tool Demo : Dark Widow Customizable Dropper Tool Targeting Windows |
Source Code |
34 |
2024/12/12 : Blackhat : Tool Demo : Genzai the Io T Security Toolkit |
Source Code |
35 |
2024/12/12 : Blackhat : Tool Demo : Halberd Cloud Security Testing Tool |
Source Code |
36 |
2024/12/12 : Blackhat : Tool Demo : Morf Mobile Reconnaissance Framework |
Source Code |
37 |
2024/12/12 : Blackhat : Tool Demo : Mpt Pentest in Action! |
Source Code |
38 |
2024/12/12 : Blackhat : Tool Demo : Red Cloud Os Cloud Adversary Simulation Operating System |
Source Code |
39 |
2024/12/11 : Blackhat : Tool Demo : Active Directory Cyber Deception Using Huginn |
Source Code |
40 |
2024/12/11 : Blackhat : Tool Demo : Agneyastra Firebase Misconfiguration Detection Toolkit |
Source Code |
41 |
2024/12/11 : Blackhat : Tool Demo : Android Bug Bazaar Your Mobile Appsec Playground to Explore, Exploit, Excel |
Source Code |
42 |
2024/12/11 : Blackhat : Tool Demo : Findmytakeover Find Dangling Domains in a Multi Cloud Environment |
Source Code |
43 |
2024/12/11 : Blackhat : Tool Demo : Open Source Tool to Shift Left Security Testing by Leveraging Ai |
Source Code |
44 |
2024/12/11 : Blackhat : Tool Demo : Scagoat Exploiting Damn Vulnerable Sca Application |
Source Code |
45 |
2024/11/28 : Blackhat : Talk : Harnessing Language Models for Detection of Evasive Malicious Email Attachments |
presentation, Video |
46 |
2024/11/28 : Blackhat : Talk : Threat Modelling the Generative Ai |
presentation, Video |
47 |
2024/11/27 : Blackhat : Talk : Ai Powered Cybersecurity Promises & Perils |
presentation, Video |
48 |
2024/11/26 : Blackhat : Talk : Cyber Security & Resiliency a Perspective With Emerging Technologies and Innovation |
presentation, Video |
49 |
2024/11/26 : Blackhat : Talk : The Double Edge Sword Cybersecurity & Ai |
presentation, Video |
50 |
2024/11/26 : Blackhat : Talk : The Gen Ai Double Agent Dilemma Ally or Adversary |
presentation, Video |
51 |
2024/11/21 : Deepsec : Talk : Hacking With Physics V2.0 |
presentation, Video |
52 |
2024/11/16 : C0c0n : Talk : Invisible Invaders Bypassing Email Security With Legitimate Tools |
presentation, Video |
53 |
2024/11/16 : C0c0n : Talk : Access for Sale Inside the World of Ransomware Affiliates and Initial Access Brokers |
presentation, Video |
54 |
2024/11/16 : C0c0n : Talk : Active Directory Deception Strategies |
presentation, Video |
55 |
2024/11/16 : C0c0n : Talk : Breach of the Borderless Cyber Threat Actors Targeting India's Cyberspace |
presentation, Video |
56 |
2024/11/16 : C0c0n : Talk : Hacking the Non Windows Frontier Thick Client Pentesting on Linux & MAC |
presentation, Video |
57 |
2024/11/16 : C0c0n : Talk : Key Note |
presentation, Video |
58 |
2024/11/16 : C0c0n : Talk : Old Bugs, New Tricks How N Day Vulnerabilities Are Fueling Today's Threat Landscape |
presentation, Video |
59 |
2024/11/16 : C0c0n : Talk : Ride on the House Exploiting Public Transport Ticketing Systems for Free Rides |
presentation, Video |
60 |
2024/11/16 : C0c0n : Talk : Serverless Phishing Factory Automate, Attack, Adapt |
presentation, Video |
61 |
2024/11/16 : C0c0n : Talk : The Stealth Code Conspiracy Unmasking Hidden Threats in Ci Cd Pipelines |
presentation, Video |
62 |
2024/11/16 : C0c0n : Talk : The Subtle Art of Checkmating Cisos |
presentation, Video |
63 |
2024/11/16 : C0c0n : Talk : Who Is Holding the Marauders Map? |
presentation, Video |
64 |
2024/11/15 : C0c0n : Talk : [ Yodha] Nightingale Docker for Pentesters |
presentation, Video |
65 |
2024/11/15 : C0c0n : Talk : [ Yodha] Red Cloud a Multi Cloud Hacking Os |
presentation, Video |
66 |
2024/11/15 : C0c0n : Talk : [ Yodha] Scagoat Software Composition Analysis ( Sca) Vulnerability Exploration Tool |
presentation, Video |
67 |
2024/11/15 : C0c0n : Talk : Automated Security Engineer Co Pilot Leveraging Large Language Models for Enhanced Code Security |
presentation, Video |
68 |
2024/11/15 : C0c0n : Talk : Breaking the Defences in Depth Analysis of Edr and Av Tampering Techniques |
presentation, Video |
69 |
2024/11/15 : C0c0n : Talk : Ciso's Take on Byoai |
presentation, Video |
70 |
2024/11/15 : C0c0n : Talk : Gen Ai and Autonomous Security in the Age of Zero Trust |
presentation, Video |
71 |
2024/11/15 : C0c0n : Talk : Hackers Highway Uncovering Vulnerabilities Hidden Behind Every Car's License Plate |
presentation, Video |
72 |
2024/11/15 : C0c0n : Talk : Know Your Enemies Deep Dive Into Ransomware Threat Groups |
presentation, Video |
73 |
2024/11/15 : C0c0n : Talk : PC I 4.0, Javascript Security for Product Security Teams |
presentation, Video |
74 |
2024/11/15 : C0c0n : Talk : Remote Whispers of Mobile Sim |
presentation, Video |
75 |
2024/10/29 : Blackhat : Talk : Hacking Deepfake Image Detection System With White and Black Box Attacks |
presentation |
76 |
2024/10/23 : Blackhat : Tool Demo : Cyber Arsenal47 |
Source Code |
77 |
2024/10/23 : Blackhat : Tool Demo : Dark Widow Customizable Dropper Tool Targeting Windows |
Source Code |
78 |
2024/09/26 : Rootcon : Talk : How to Have Visibility and Security of Cicd Ecosystem |
presentation |
79 |
2024/09/20 : 44 Con : Talk : Unveiling the Ghosts of Mobile Networks When Will Old Bugs Die? |
presentation, Video |
80 |
2024/08/29 : Hitb Sec Conf : Tool Demo : Ai Assisted Code Reviewer |
Source Code |
81 |
2024/08/10 : Defcon : Talk : Sneaky Extensions the Mv3 Escape Artists |
presentation, Video |
82 |
2024/08/09 : Defcon : Talk : Breaking Secure Web Gateways ( Swg) for Fun and Profit |
presentation, Video |
83 |
2024/08/09 : Defcon : Talk : Reflections on a Decade in Bug Bounties Experiences and Major Takeaways |
presentation, Video |
84 |
2024/08/08 : Blackhat : Tool Demo : Active Directory Cyber Deception Using Huginn |
Source Code |
85 |
2024/08/08 : Blackhat : Tool Demo : Open Source Llm Security |
Source Code |
86 |
2024/08/07 : Blackhat : Tool Demo : Traffic Warden X Open Wrt Security & Monitoring |
Source Code |
87 |
2024/04/18 : Blackhat : Tool Demo : Detective Sq a Extension Auditing Framework Version 2 |
Source Code |
88 |
2024/04/18 : Blackhat : Tool Demo : Secure Local Vault Git Based Secret Manager |
Source Code |
89 |
2024/03/21 : Can Sec West : Talk : Rolling in the Dough How Microsoft Identified and Remidiated a Baker's Dozen of Security Threats in the Windows DNS Server |
presentation, Video |
90 |
2024/03/12 : Nullcon : Talk : Secure Web Gateways Are Dead. What’s Next? |
presentation, Video |
91 |
2023/12/06 : Blackhat : Tool Demo : Andro Cop One Click Forensic Investigation & Data Extraction Tool |
Source Code |
92 |
2023/12/06 : Blackhat : Tool Demo : Detective Sq a Extension Auditing Framework |
Source Code |
93 |
2023/12/06 : Blackhat : Tool Demo : Supply Shield Protecting Your Software Supply Chain |
Source Code |
94 |
2023/11/17 : Deepsec : Talk : Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption |
presentation, Video |
95 |
2023/10/13 : Hackfest : Talk : Exploring RAM Forensic Analysis for Effective Digital Investigations |
presentation, Video |
96 |
2023/09/29 : Hackinparis : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor |
presentation, Video |
97 |
2023/09/28 : Rootcon : Talk : Azure Illuminati Unveiling the Mysteries of Cloud Exploitation |
presentation |
98 |
2023/09/28 : Hackinparis : Talk : How to Have Visibility and Security of Cicd Ecosystem |
presentation, Video |
99 |
2023/09/23 : Nullcon : Talk : How I Hacked Your Bank Account a Detailed Look at Upi Security |
presentation |
100 |
2023/08/12 : Defcon : Talk : Getting More Bang for Your Buck Appsec on a Limited Budget |
presentation, Video |
101 |
2023/08/12 : Defcon : Tool Demo : Open Source API Security for Devsecops |
Source Code |
102 |
2023/08/11 : Defcon : Talk : Generative Adversarial Network ( Gan) Based Autonomous Penetration Testing for Web Applications |
presentation, Video |
103 |
2023/08/11 : Defcon : Tool Demo : V API Vulnerable Adversely Programmed Interface |
Source Code |
104 |
2023/08/10 : Defcon : Talk : Hardware Backdooring an E Scooter |
presentation, Video |
105 |
2023/08/09 : Blackhat : Tool Demo : Arctic Automated Remediation for Correlation Threat Intelligence Collections |
Source Code |
106 |
2023/08/09 : Blackhat : Tool Demo : Caspr Code Trust Auditing Framework |
Source Code |
107 |
2023/08/07 : C0c0n : Talk : Cellibrite Premium Mobile Forensic Tool I Phone Analysis |
presentation, Video |
108 |
2023/08/07 : C0c0n : Talk : Chinese Apt Against Government Officials Using G7 Summit Lure |
presentation |
109 |
2023/08/07 : C0c0n : Talk : Citizen Mobile Security Responsibilities, Accountability, and Impacts |
presentation, Video |
110 |
2023/08/07 : C0c0n : Talk : Cyber Threats to Global Financial Systems |
presentation |
111 |
2023/08/07 : C0c0n : Talk : Darkweb Investigations |
presentation, Video |
112 |
2023/08/07 : C0c0n : Talk : Enhancing Red Team Opsec Abusing Stealthy in Memory Binary Execution Techniques in Linux |
presentation |
113 |
2023/08/07 : C0c0n : Talk : Esoc Trinetra Project |
presentation, Video |
114 |
2023/08/07 : C0c0n : Talk : Evasion Tactics of Side Copy & Apt36 Persistently Targeting Indian Defense Orgs |
presentation |
115 |
2023/08/07 : C0c0n : Talk : Exploring Threats in Operational Technology |
presentation, Video |
116 |
2023/08/07 : C0c0n : Talk : Generative Ai and Cyber Crimes |
presentation |
117 |
2023/08/07 : C0c0n : Talk : Homomorphic Encryption Myth to Reality |
presentation |
118 |
2023/08/07 : C0c0n : Talk : Putting a Leash on Ai |
presentation |
119 |
2023/08/07 : C0c0n : Talk : Serverless Siege Aws Lambda Pentesting |
presentation |
120 |
2023/08/07 : C0c0n : Talk : Shifting Left Blockchain Development for Safer Dapps |
presentation |
121 |
2023/08/07 : C0c0n : Talk : Smart Contract Phishing Attack & Defense |
presentation |
122 |
2023/08/07 : C0c0n : Talk : Start Left SDLC Security With Open Source Dev Sec Ops Tooling |
presentation |
123 |
2023/08/07 : C0c0n : Talk : Tackling Advanced Threat Landscape With Mdr Best Practices |
presentation |
124 |
2023/08/07 : C0c0n : Talk : The Dpdpa Effect Jubilation, Twinge and Reticence That Followed |
presentation |
125 |
2023/08/07 : C0c0n : Talk : Trust Resiliency a Lesson Learned From Russia Ukraine War |
presentation |
126 |
2023/08/07 : C0c0n : Talk : Uncovering Azure's Silent Threats a Story of Cloud Vulnerabilities |
presentation |
127 |
2023/08/07 : C0c0n : Talk : Uncovering the Hidden Dangers Lurking as Android Apps Using Ml Algos |
presentation |
128 |
2023/08/06 : C0c0n : Talk : A Secure Privacy Preserving Lightweight Authentication Scheme for Internet of Medical Things |
presentation |
129 |
2023/08/06 : C0c0n : Talk : Ai in Cyber Security and Crime Prevention |
presentation, Video |
130 |
2023/08/06 : C0c0n : Talk : Cbdc and Future of Finance |
presentation |
131 |
2023/08/06 : C0c0n : Talk : Cryptocurrencies and Challenges to Law Enforcement Agencies |
presentation, Video |
132 |
2023/08/06 : C0c0n : Talk : Cybercrimes Victim Compensation Legal Remedies and Process |
presentation, Video |
133 |
2023/08/06 : C0c0n : Talk : Cybersecurity in the Era of Ai |
presentation |
134 |
2023/08/06 : C0c0n : Talk : Dark Web for Investigations |
presentation, Video |
135 |
2023/08/06 : C0c0n : Talk : Developments in Deep Fake Detection |
presentation, Video |
136 |
2023/08/06 : C0c0n : Talk : Digital Innovation and Its Impact on Cios, Cisos and Dpos |
presentation, Video |
137 |
2023/08/06 : C0c0n : Talk : Emerging Crimes and Threat Landscape in Cyber Domain and the Need for International Cooperation |
presentation |
138 |
2023/08/06 : C0c0n : Talk : Expanding Capability Horizons Homelabs and Beyond |
presentation |
139 |
2023/08/06 : C0c0n : Talk : Influence of Artificial Intelligence in Grc Space |
presentation, Video |
140 |
2023/08/06 : C0c0n : Talk : Insider Threats Best Practices and Common Pitfalls |
presentation |
141 |
2023/08/06 : C0c0n : Talk : Mitigating Ssrf at Scale the Right Way With Imdsv2! |
presentation |
142 |
2023/08/06 : C0c0n : Talk : Playing Cat and Mouse With the Adversary Sometimes a Breach Is Inevitable |
presentation |
143 |
2023/08/06 : C0c0n : Talk : Russia Ukraine Warfare – A Shift in Cyber Threat Landscape |
presentation |
144 |
2023/08/06 : C0c0n : Talk : Securing the Future Addressing Cybersecurity Challenges in the Age of 5 G |
presentation |
145 |
2023/08/06 : C0c0n : Talk : Subduing Adversaries With Information Superiority |
presentation |
146 |
2023/08/06 : C0c0n : Talk : Survivability in the Cyber World |
presentation |
147 |
2023/08/06 : C0c0n : Talk : Surviving in Dependency Hell |
presentation |
148 |
2023/08/06 : C0c0n : Talk : Taking a Closer Look at Ci Cd Pipeline Logs Extracting Security Related Information With Build Inspector |
presentation |
149 |
2023/08/06 : C0c0n : Talk : The New Way to Be Secure |
presentation |
150 |
2023/08/06 : C0c0n : Talk : Time to Choose Conventional Cti or Next Gen External Threat Landscape Management |
presentation |
151 |
2023/05/12 : Blackhat : Talk : Abusing Azure Active Directory From Mfa Bypass to Listing Global Administrators |
presentation |
152 |
2023/05/12 : Blackhat : Talk : Engaging the Next Generation of Cybersecurity Professionals the Power of Security Zines |
presentation |
153 |
2023/05/12 : Blackhat : Tool Demo : Introducing the Operating System for Automotive Security Testing a Hands on Demonstration |
Source Code |
154 |
2023/05/11 : Blackhat : Talk : Bypassing Anti Cheats & Hacking Competitive Games |
presentation |
155 |
2023/05/11 : Blackhat : Tool Demo : Kernel Goat |
Source Code |
156 |
2022/12/08 : Blackhat : Tool Demo : Industrial Control Systems Capture the Train! |
Source Code |
157 |
2022/09/29 : Brucon : Talk : 0wn Premises Bypassing Microsoft Defender for Identity |
presentation |
158 |
2022/09/28 : Rootcon : Talk : Gazing Into the Crystal Ball the Fog of Cyberwarfare Escalations |
presentation, Video |
159 |
2022/09/24 : C0c0n : Talk : Bec, Still the Sure Shot Trap |
presentation, Video |
160 |
2022/09/24 : C0c0n : Talk : Building Smart, Resilient and Sustainable Cyber Eco System |
presentation, Video |
161 |
2022/09/24 : C0c0n : Talk : Canalyse a Vehicle Network Analysis and Attack Tool |
presentation, Video |
162 |
2022/09/24 : C0c0n : Talk : Citizen Mobile Security ( Icamps) |
presentation, Video |
163 |
2022/09/24 : C0c0n : Talk : Cryptocurrency Forensics |
presentation, Video |
164 |
2022/09/24 : C0c0n : Talk : Cyber Defence and Role of Private Players Public Private Partnership |
presentation, Video |
165 |
2022/09/24 : C0c0n : Talk : Deep Learning to Detect Network Attacks |
presentation, Video |
166 |
2022/09/24 : C0c0n : Talk : In Production With Grc for Cloud |
presentation, Video |
167 |
2022/09/24 : C0c0n : Talk : Introduction to Rfid Nfc Hacking |
presentation, Video |
168 |
2022/09/24 : C0c0n : Talk : Know Your Organization? Mapping Entities in Google Workspace |
presentation, Video |
169 |
2022/09/24 : C0c0n : Talk : Need for Advanced Soc |
presentation, Video |
170 |
2022/09/24 : C0c0n : Talk : OSI Nt Tools and Techniques |
presentation, Video |
171 |
2022/09/24 : C0c0n : Talk : Power of Narratives in Cyber Security |
presentation, Video |
172 |
2022/09/24 : C0c0n : Talk : Raining Cves on Wordpress Plugins With Semgrep |
presentation, Video |
173 |
2022/09/24 : C0c0n : Talk : Rationalizing Cyber Security Risk in Risk Language |
presentation, Video |
174 |
2022/09/24 : C0c0n : Talk : Towards an Effective Intrusion Detection System Framework for Multi Channel Man in the Middle Attacks Against Protected Wi Fi Networks |
presentation, Video |
175 |
2022/09/24 : C0c0n : Talk : Weaponising Social Media for Psychological Operations |
presentation, Video |
176 |
2022/09/24 : C0c0n : Talk : Web3 Security Security in Meta Verse, and the New World of Web3 |
presentation, Video |
177 |
2022/09/23 : C0c0n : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor |
presentation, Video |
178 |
2022/09/23 : C0c0n : Talk : Attacking Connected Industries in 5 G Networks |
presentation, Video |
179 |
2022/09/23 : C0c0n : Talk : Battle of 300 Crore How They Lost It and Got Most of It Back |
presentation, Video |
180 |
2022/09/23 : C0c0n : Talk : Bridging the Gap Between Security and Operations |
presentation, Video |
181 |
2022/09/23 : C0c0n : Talk : Building a Safer and Innovative Digital Ecosystem |
presentation, Video |
182 |
2022/09/23 : C0c0n : Talk : Collaborative Efforts for Safe Digital Banking |
presentation, Video |
183 |
2022/09/23 : C0c0n : Talk : Common Misconfigurations in Your Kubernetes Cluster and What Can You Do About It? |
presentation, Video |
184 |
2022/09/23 : C0c0n : Talk : Cybersecurity for Manufacturing |
presentation, Video |
185 |
2022/09/23 : C0c0n : Talk : Hacking Smart Contracts |
presentation, Video |
186 |
2022/09/23 : C0c0n : Talk : Hyperledger Fabric & Ethereum Apps Security Deep Dive |
presentation, Video |
187 |
2022/09/23 : C0c0n : Talk : Log4j Vulnerability Continuous to Be Favourite for Apt Groups Through Mid 2022 |
presentation, Video |
188 |
2022/09/23 : C0c0n : Talk : Pwning Android Apps at Scale |
presentation, Video |
189 |
2022/09/23 : C0c0n : Talk : Ransomware Prevention, Early Detection and Response |
presentation, Video |
190 |
2022/09/23 : C0c0n : Talk : Rolling Out Central Bank Digital Currency Technical Design Considerations |
presentation, Video |
191 |
2022/09/23 : C0c0n : Talk : Securing Your Apis for a Cloud Native Future |
presentation, Video |
192 |
2022/09/23 : C0c0n : Talk : Startup Ecosystem and Investments in Post Covid Era |
presentation, Video |
193 |
2022/09/23 : C0c0n : Talk : Technological Reliance for Resilience |
presentation, Video |
194 |
2022/09/23 : C0c0n : Talk : Threats Landscape and Intelligence of API & Shield to Protect |
presentation, Video |
195 |
2022/09/23 : C0c0n : Talk : Tracking the Bad Guys. an Interesting Story of How the Criminal Underground Operates |
presentation, Video |
196 |
2022/09/23 : C0c0n : Talk : Tropic Trooper Targets High Profile Victims Using Newly Discovered Mqtt Backdoor |
presentation, Video |
197 |
2022/09/08 : Nullcon : Talk : Hack the Source Securing Open Source Software – One Bug at a Time |
presentation |
198 |
2022/09/08 : Nullcon : Talk : The Different Faces of MAC Os Malware Detecting Anomalies in a Poisoned Apple |
presentation |
199 |
2022/09/08 : Nullcon : Tool Demo : Zaa S [ Owasp] Zap as a Service Continous Security for 20 K Apis |
Source Code |
200 |
2022/09/07 : Nullcon : Talk : Electro Volt Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron |
presentation |
201 |
2022/09/07 : Nullcon : Talk : Scale Hacking to Secure Your Cloud and Beyond |
presentation |
202 |
2022/08/14 : Defcon : Talk : Tales From the Trenches Why Organizations Struggle to Get Even the Basics of Ot Asset Visibility & Detection Right |
presentation, Video |
203 |
2022/08/12 : Defcon : Talk : Stop Worrying About Nation States and Zero Days; Let's Fix Things That Have Been Known for Years |
presentation |
204 |
2022/08/10 : Blackhat : Tool Demo : Caspr Code Trust Audit Framework |
Source Code |
205 |
2022/04/08 : Nullcon : Talk : Attack Surfaces for 5 G Networks |
presentation |
206 |
2022/04/08 : Nullcon : Talk : Bheem Os a Next Generation Reasonably Secure Os Using Rust Micro Vm |
presentation |
207 |
2021/11/18 : Hackinparis : Talk : { Internet of Things or Threats} Anatomizing the Structure of Io T Botnets |
presentation |
208 |
2021/11/18 : Hackinparis : Talk : Is It Really an Intrusion if You Get Called In? Mis Configuration Based Attacks in Aws |
presentation, Video |
209 |
2021/11/13 : C0c0n : Talk : Decoding New Age Hackers and Criminal Investigation |
presentation, Video |
210 |
2021/11/13 : C0c0n : Talk : A Look Into Cyber Espionage Activities Targeting Critical Infrastructure in India |
presentation, Video |
211 |
2021/11/13 : C0c0n : Talk : Building Global Cyber Security Company Out of India Key Lessons Learnt During My Entrepreneurship Journey |
presentation, Video |
212 |
2021/11/13 : C0c0n : Talk : Case Study Cyber Heist in a Bank and Recovery of Systems and Money |
presentation, Video |
213 |
2021/11/13 : C0c0n : Talk : Case Study E Crime Group Targeting Mobile Users |
presentation, Video |
214 |
2021/11/13 : C0c0n : Talk : Changing Cyber Security Paradigm & Cyber Tsunami |
presentation, Video |
215 |
2021/11/13 : C0c0n : Talk : Cloud Threat Landscape |
presentation, Video |
216 |
2021/11/13 : C0c0n : Talk : Connecting the Dots Between Customers and Security Teams |
presentation, Video |
217 |
2021/11/13 : C0c0n : Talk : Crisis Capitalization in a Pandemic |
presentation, Video |
218 |
2021/11/13 : C0c0n : Talk : Cyber Warfare & Securing Critical Infrastructures |
presentation, Video |
219 |
2021/11/13 : C0c0n : Talk : Cybersecurity in the Era of Resilience a Walk Through People, Process and Technology |
presentation, Video |
220 |
2021/11/13 : C0c0n : Talk : Emerging Trends in Cyber Crimes Investigation Tools & Techniques |
presentation, Video |
221 |
2021/11/13 : C0c0n : Talk : Enhancing an Multi Factor Authentication ( Mfa) Through Behavioural Biometrics |
presentation, Video |
222 |
2021/11/13 : C0c0n : Talk : Exploiting 2 A( Authentication and Authorization) Vulnerabilities of Web Application |
presentation, Video |
223 |
2021/11/13 : C0c0n : Talk : Introducing Free & Open Elastic Limitless Xdr |
presentation, Video |
224 |
2021/11/13 : C0c0n : Talk : Light Basin Telecom Roaming Network Attack Case Study |
presentation |
225 |
2021/11/13 : C0c0n : Talk : Machine Learning to Detect Chia Mining |
presentation, Video |
226 |
2021/11/13 : C0c0n : Talk : Mature Your Threat Hunting Program |
presentation, Video |
227 |
2021/11/13 : C0c0n : Talk : Need for Zero Trust in Banking |
presentation, Video |
228 |
2021/11/13 : C0c0n : Talk : New Way of Looking at the Hidden Mysteries in the Code |
presentation, Video |
229 |
2021/11/13 : C0c0n : Talk : Painting Your Organizations With Shades of Red, Blue & Purple |
presentation |
230 |
2021/11/13 : C0c0n : Talk : Post Pandemic Transformation a Ciso's Perspective |
presentation, Video |
231 |
2021/11/13 : C0c0n : Talk : Securing Ot in O& G Industry |
presentation, Video |
232 |
2021/11/13 : C0c0n : Talk : Third Party Risk Management |
presentation, Video |
233 |
2021/11/13 : C0c0n : Talk : Zero Trust & Micro Segmentation |
presentation, Video |
234 |
2021/11/12 : C0c0n : Talk : “ Let’s Go Phishing” Discerning the Insidious Nature of Social Engineering |
presentation, Video |
235 |
2021/11/12 : C0c0n : Talk : 2021 Supply Chain Attacks Analysis |
presentation, Video |
236 |
2021/11/12 : C0c0n : Talk : Data Security and Privacy |
presentation, Video |
237 |
2021/11/12 : C0c0n : Talk : Dissecting Malicious Software and Analysis |
presentation, Video |
238 |
2021/11/12 : C0c0n : Talk : Enterprise Governance and Risk Management |
presentation, Video |
239 |
2021/11/12 : C0c0n : Talk : Executive Presence....a Cardinal of the Cyber Rostrum |
presentation, Video |
240 |
2021/11/12 : C0c0n : Talk : Ics Security a Need, a Challenge and a New Change in Mindset |
presentation, Video |
241 |
2021/11/12 : C0c0n : Talk : Io T Security Guidelines & Standards |
presentation, Video |
242 |
2021/11/12 : C0c0n : Talk : Post Covid Cisos Disappearing Trusted Boundaries and Innovative Cyber Security Approaches |
presentation, Video |
243 |
2021/11/12 : C0c0n : Talk : Regulating Social Media Platforms Should It Be Done in Democratic Societies ? |
presentation, Video |
244 |
2021/11/12 : C0c0n : Talk : The Evolving Nature of Cyber Community |
presentation, Video |
245 |
2021/11/12 : C0c0n : Talk : Understanding the Psychology Behind Threats Adding Twists to Your Turns |
presentation, Video |
246 |
2021/11/04 : Ekoparty : Talk : Dial Did I Just Alert Lambda? a Centralized Security Misconfiguration Detection System |
presentation |
247 |
2021/10/15 : Rootcon : Talk : The Curious Case of Knowing the Unknown |
presentation |
248 |
2021/10/13 : Rootcon : Tool Demo : Buzzard Crafting Your Post Exploitation Framework Against Odds |
Source Code |
249 |
2021/10/13 : Rootcon : Talk : The Kill Chain Future of Cyber in Defense |
presentation |
250 |
2021/08/08 : Defcon : Talk : App Sec 101 a Journey From Engineer to Hacker |
presentation |
251 |
2021/08/08 : Defcon : Talk : Top 20 Secure Plc Coding Practices |
presentation |
252 |
2021/08/07 : Defcon : Tool Demo : Red Team Credentials Reconnaissance ( Old With a Twist) |
Source Code |
253 |
2021/08/07 : Defcon : Tool Demo : Tenacity an Adversary Emulation Tool for Persistence |
Source Code |
254 |
2021/08/07 : Defcon : Talk : The Curious Case of Knowing the Unknown |
presentation |
255 |
2021/08/06 : Defcon : Talk : Adversary Village Kick Off |
presentation |
256 |
2021/08/06 : Defcon : Talk : Defending Io T in the Future of High Tech Warfare |
presentation |
257 |
2021/08/05 : Defcon : Talk : The Bug Hunter’s Recon Methodology |
presentation |
258 |
2021/08/04 : Blackhat : Tool Demo : Parse and C a Universal Parser and Data Visualization Tool for Security Testing |
Source Code |
259 |
2021/03/06 : Nullcon : Talk : Bug Hunter Adventures |
presentation |
260 |
2021/03/05 : Nullcon : Talk : Arbitrary Code Execution on Risc v Using Fault Injection |
presentation |
261 |
2021/03/05 : Nullcon : Talk : Telecom Security Challenges in 5 G |
presentation |
262 |
2020/10/07 : Rootcon : Talk : Recon Pal Leveraging Nlp for Infosec |
presentation |
263 |
2020/10/01 : Blackhat : Tool Demo : Wi Fi Access Point Rootkits |
Source Code |
264 |
2020/09/19 : C0c0n : Talk : Automate Your Recon With Recon Note |
presentation |
265 |
2020/09/18 : C0c0n : Talk : Herd Immunity, in the Cyber World |
presentation, Video |
266 |
2020/09/18 : C0c0n : Talk : How I Created My Clone Using Ai Next Gen Social Engineering |
presentation |
267 |
2020/09/18 : C0c0n : Talk : Introducing Sniper Phish a Web Email Spear Phishing Toolkit |
presentation |
268 |
2020/09/18 : C0c0n : Talk : Kubernetes Goat Vulnerable by Design Kubernetes Cluster Environment |
presentation |
269 |
2020/09/18 : C0c0n : Talk : Web Application Hacking With Web Zground |
presentation |
270 |
2020/09/18 : C0c0n : Talk : All About Iot Forensics |
presentation, Video |
271 |
2020/09/18 : C0c0n : Talk : Automation in Bug Bounties to Work Smarter |
presentation, Video |
272 |
2020/09/18 : C0c0n : Talk : Broken Cryptography & Account Takeover |
presentation, Video |
273 |
2020/09/18 : C0c0n : Talk : Coping With Digital Transformation a Ciso Perspective |
presentation |
274 |
2020/09/18 : C0c0n : Talk : Covid 19 Cyber Impact on Financial Sector and Remote Employees |
presentation |
275 |
2020/09/18 : C0c0n : Talk : Cyber Security Shifts During Covid 19 |
presentation |
276 |
2020/09/18 : C0c0n : Talk : Deep Learning for Intrusion Attempt Detection |
presentation, Video |
277 |
2020/09/18 : C0c0n : Talk : Demystifying Zero Trust a Real World |
presentation |
278 |
2020/09/18 : C0c0n : Talk : My Top 3 Findings in Bug Bounty Journey Aiming for High Impact Issues |
presentation, Video |
279 |
2020/09/18 : C0c0n : Talk : Offensive & Scope Based Recon |
presentation |
280 |
2020/09/18 : C0c0n : Talk : Offensive Embedded Exploitation Getting Hands Dirty With Iot Embedded Device Security Testing |
presentation |
281 |
2020/09/18 : C0c0n : Talk : Reverse Engineering Bare Metal Io T Firmwares Moving Beyond Linux |
presentation, Video |
282 |
2020/09/18 : C0c0n : Talk : Supercharging Your Initial Foothold in Red Team Engagements |
presentation, Video |
283 |
2020/07/26 : Hitb Sec Conf : Talk : Swapping Asprin Formulas With Mdma While Red Teaming a Billion Dollar Company |
presentation, Video |
284 |
2020/04/25 : Hitb Sec Conf : Talk : The State of Ics Security Then and Now |
presentation, Video |
285 |
2020/04/24 : Hitb Sec Conf : Talk : Commsec the State of Ics Security Then and Now |
presentation, Video |
286 |
2020/03/06 : Nullcon : Talk : Automated Classification of Web Application Attacks for Intrusion Detection |
presentation, Video |
287 |
2019/11/28 : Deepsec : Talk : Mastering Aws Pentesting and Methodology |
presentation |
288 |
2019/11/01 : App Sec Day Australia : Talk : A Purple Team View of Serverless and Graph Ql Applications |
presentation, Video |
289 |
2019/11/01 : App Sec Day Australia : Talk : Protecting the Damned Deploying Insecure Applications at Scale |
presentation |
290 |
2019/10/22 : Hacklu : Talk : Intro to Dark Arts Getting Started With Ctfs |
presentation, Video |
291 |
2019/09/28 : C0c0n : Talk : Vulnerability Prioritization With Threat Intelligence |
presentation, Video |
292 |
2019/09/27 : C0c0n : Talk : A Day in the Life of a Ciso |
presentation, Video |
293 |
2019/09/27 : C0c0n : Talk : Advanced Persistent Threat and Counter Measures |
presentation, Video |
294 |
2019/09/27 : C0c0n : Talk : Ai, Ml and Security |
presentation, Video |
295 |
2019/09/27 : C0c0n : Talk : Auto Source an Automated Framework for Source Code Review |
presentation, Video |
296 |
2019/09/27 : C0c0n : Talk : Block Chain for Secured Automation |
presentation, Video |
297 |
2019/09/27 : C0c0n : Talk : Building a Cloud Security Monitoring and Auditing Framework |
presentation, Video |
298 |
2019/09/27 : C0c0n : Talk : Ciso Mind Set |
presentation, Video |
299 |
2019/09/27 : C0c0n : Talk : Cyber Hygiene From Enterprise Point of View |
presentation, Video |
300 |
2019/09/27 : C0c0n : Talk : Demystifying Health Care Security |
presentation, Video |
301 |
2019/09/27 : C0c0n : Talk : Detection of Tor Sources Using Artificial Intelligence |
presentation, Video |
302 |
2019/09/27 : C0c0n : Talk : Doing Sec Ops for the Cloud Using Cloud Native Services |
presentation, Video |
303 |
2019/09/27 : C0c0n : Talk : Hacking Ics Devices for Fun |
presentation, Video |
304 |
2019/09/27 : C0c0n : Talk : Industry 4.0 Security and Compliance |
presentation, Video |
305 |
2019/09/27 : C0c0n : Talk : Lessons Learned Form Data Breaches in the Cloud |
presentation, Video |
306 |
2019/09/27 : C0c0n : Talk : Looking a Decade Ahead Big Data, Drones , Robots and Cyber Security. |
presentation, Video |
307 |
2019/09/27 : C0c0n : Talk : Offensive Machine Learning for Pentesters and Red Teams |
presentation, Video |
308 |
2019/09/27 : C0c0n : Talk : Practical Approach to Cyber Security for Financial Institutions |
presentation, Video |
309 |
2019/09/27 : C0c0n : Talk : Ransomware to Pay or Not to Pay |
presentation, Video |
310 |
2019/09/27 : C0c0n : Talk : Securing Payment Data With PC I Security Standards and Programs |
presentation, Video |
311 |
2019/09/27 : C0c0n : Talk : Security @Scale for Startups |
presentation, Video |
312 |
2019/09/27 : C0c0n : Talk : Serverless Soar |
presentation, Video |
313 |
2019/09/27 : C0c0n : Talk : Stepping Into Password Less Economy |
presentation, Video |
314 |
2019/09/23 : Rootcon : Talk : Hacking Ics Devices Plc's for Fun Ics and Iot Hacking |
presentation |
315 |
2019/09/13 : 44 Con : Talk : One Person Army – Playbook on How to Be the First Security Engineer at a Company |
presentation |
316 |
2019/08/11 : Defcon : Talk : Exploiting and Securing I Os Apps Using Owasp I Goat |
presentation, Video |
317 |
2019/08/08 : Defcon : Talk : Anatomy of Cloud Hacking |
presentation, Video |
318 |
2019/08/08 : Defcon : Talk : Hacking Ics Devices for Fun Penetration Testing of Vehicle Components |
presentation |
319 |
2019/08/07 : Blackhat : Tool Demo : Sastri Plug and Play Vm for Sast * Static Application Security Testing Realtime Integration* |
Source Code |
320 |
2019/08/05 : Blackhat : Tool Demo : Cert Pivot Infra Chaining Cert Check |
Source Code |
321 |
2019/05/21 : Phdays : Talk : Fuzzing 101 |
presentation, Video |
322 |
2019/05/21 : Phdays : Talk : Rapid Hardware Hacking 101 |
presentation, Video |
323 |
2019/02/28 : Nullcon : Talk : A Hacker Walks Into a Co Working Space |
presentation |
324 |
2019/02/28 : Nullcon : Talk : Andromeda Gui Based Dynamic Instrumentation Toolkit Powered by Frida |
presentation |
325 |
2019/02/28 : Nullcon : Talk : Attacking & Securing Health Care Standards & Hospital Secured Systems |
presentation |
326 |
2019/02/28 : Nullcon : Talk : Building Hardened Io T Implementations With Lang Sec |
presentation |
327 |
2019/02/28 : Nullcon : Talk : Dirty Use of Ussd Codes |
presentation, Video |
328 |
2019/02/28 : Nullcon : Talk : Pentesting Without Pentesters Automating Security Testing With Functional Testing Test Cases |
presentation |
329 |
2018/11/29 : Deepsec : Talk : DNS Exfiltration and Out of Band Attacks |
presentation |
330 |
2018/11/02 : Hitb Sec Conf : Talk : Defending the Enterprise in 2018 |
presentation, Video |
331 |
2018/11/02 : Hackfest : Talk : Exploiting Connected Medical Devices Lessons Learned & Data Earned |
presentation |
332 |
2018/10/19 : App Sec Day Australia : Talk : Continuous Integration and Delivery With Docker Containers |
presentation |
333 |
2018/10/19 : App Sec Day Australia : Talk : Threat Modeling as Code & Automation for Dev Sec Ops Wins |
presentation |
334 |
2018/10/15 : Hacklu : Talk : Come to the Dark Side! We Have Radical Insurance Groups & Ransomware |
presentation |
335 |
2018/10/10 : Brucon : Talk : Forging Trusts for Deception in Active Directory |
presentation |
336 |
2018/10/10 : Brucon : Talk : Simplifying the Art of Instrumentation |
presentation, Video |
337 |
2018/10/05 : C0c0n : Talk : Defending Cloud Infrastructures With Cloud Security Suite |
presentation, Video |
338 |
2018/10/05 : C0c0n : Talk : DNS Exfiltration and Out of Band Attacks |
presentation, Video |
339 |
2018/10/05 : C0c0n : Talk : Adaptive Grc |
presentation, Video |
340 |
2018/10/05 : C0c0n : Talk : Artificial Intelligence and Social Media Analytics in Criminal Investigation |
presentation, Video |
341 |
2018/10/05 : C0c0n : Talk : Blockchains as Techno Power Structures Towards Emergence of P2 P Politics |
presentation, Video |
342 |
2018/10/05 : C0c0n : Talk : Cyber Security in Health Care Industry |
presentation, Video |
343 |
2018/10/05 : C0c0n : Talk : Cybersecurity Embedded Digital Transformation the Future |
presentation, Video |
344 |
2018/10/05 : C0c0n : Talk : Data Management Challenge for Privacy Compliance |
presentation, Video |
345 |
2018/10/05 : C0c0n : Talk : Dealing With Changing Threat Landscape |
presentation, Video |
346 |
2018/10/05 : C0c0n : Talk : Defending Healthcare Base |
presentation, Video |
347 |
2018/10/05 : C0c0n : Talk : Digital Innovation Revolution in Kerala Government |
presentation, Video |
348 |
2018/10/05 : C0c0n : Talk : Dom Goat the Dom Security Playground |
presentation, Video |
349 |
2018/10/05 : C0c0n : Talk : Future of Mobility & Cyber Security |
presentation, Video |
350 |
2018/10/05 : C0c0n : Talk : How Can We Use Machine Learning to Prevent Frauds and Password Breaches |
presentation, Video |
351 |
2018/10/05 : C0c0n : Talk : OSI Nt Indian Citizen Edition |
presentation, Video |
352 |
2018/10/05 : C0c0n : Talk : Predictive Policing Using Big Data Analytics. |
presentation, Video |
353 |
2018/10/05 : C0c0n : Talk : Privacy and Data Protection Stakeholders’ Perspectives |
presentation, Video |
354 |
2018/10/05 : C0c0n : Talk : Resiliency Focus Alongside Digital Disruption |
presentation, Video |
355 |
2018/10/05 : C0c0n : Talk : Scanda to Unbosom Malware Behavior |
presentation, Video |
356 |
2018/10/05 : C0c0n : Talk : Taking Cyber Security to the Board Room |
presentation, Video |
357 |
2018/10/05 : C0c0n : Talk : Unconventional Vulnerabilities in Google Cloud Platform |
presentation, Video |
358 |
2018/10/05 : C0c0n : Talk : Using Fault Injection for Forensics |
presentation, Video |
359 |
2018/10/05 : C0c0n : Talk : Will Artificial Intelligence and Machine Learning Bring More Threats on Cyber Security? |
presentation, Video |
360 |
2018/09/06 : Grrcon : Talk : Analyzing Multi Dimensional Malware Dataset |
presentation |
361 |
2018/08/10 : Defcon : Talk : Building Visualisation Platforms for OSI Nt Data Using Open Source Solutions |
presentation |
362 |
2018/08/09 : Defcon : Talk : Backdooring Dvr Nvr Devices |
presentation, Video |
363 |
2018/08/08 : Blackhat : Tool Demo : Darwin Real World Use Cases for Covert Wireless |
Source Code |
364 |
2018/08/08 : Blackhat : Tool Demo : Sco Da Smart Contract Defender and Analyzer |
Source Code |
365 |
2018/03/01 : Nullcon : Talk : Darwin ( a Parasite Covert Wireless Network) |
presentation |
366 |
2018/03/01 : Nullcon : Talk : Spot Phish Zero Hour Phishing Protection |
presentation |
367 |
2017/11/20 : Hackfest : Talk : How My Sv Machine Nailed Your Malware |
presentation, Video |
368 |
2017/11/17 : Deepsec : Talk : How Secure Are Your Vo Lte and Vo Wi Fi Calls? |
presentation |
369 |
2017/10/19 : Hacklu : Talk : Are Your Vo Lte and Vo Wi Fi Calls Secure? |
presentation |
370 |
2017/10/19 : Hacklu : Talk : Bug Hunting Using Symbolic Virtual Machines! |
presentation |
371 |
2017/10/19 : Hacklu : Talk : Intel Amt Using & Abusing the Ghost in the Machine |
presentation |
372 |
2017/08/18 : C0c0n : Talk : Hunting Botnets With Analytics |
presentation, Video |
373 |
2017/08/18 : C0c0n : Talk : Phishing Threats to Customers and Mitigation |
presentation, Video |
374 |
2017/08/18 : C0c0n : Talk : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work |
presentation, Video |
375 |
2017/08/18 : C0c0n : Talk : Androsia a Tool for Securing in Memory Sensitive Data |
presentation, Video |
376 |
2017/08/18 : C0c0n : Talk : Anti Virus Bypassing for Fun and Profit |
presentation, Video |
377 |
2017/08/18 : C0c0n : Talk : Bank on Compliance for Cyber Security |
presentation, Video |
378 |
2017/08/18 : C0c0n : Talk : Big Data Analytics With Pattern Matching for Smarter Analytics |
presentation, Video |
379 |
2017/08/18 : C0c0n : Talk : Blockchain for Information Security |
presentation, Video |
380 |
2017/08/18 : C0c0n : Talk : Case Study Security of Digital Wallet Apps in India |
presentation, Video |
381 |
2017/08/18 : C0c0n : Talk : Catching Network Anomalies Using Deep Learning |
presentation, Video |
382 |
2017/08/18 : C0c0n : Talk : Challenges in Digital Banking |
presentation, Video |
383 |
2017/08/18 : C0c0n : Talk : Cloud Security Suite One Stop Tool for Auditing Cloud Infrastructure |
presentation, Video |
384 |
2017/08/18 : C0c0n : Talk : Co Ap Versus Mqtt Io T Protocol Vulnerability Analysis |
presentation, Video |
385 |
2017/08/18 : C0c0n : Talk : Cyber Bullying and Cyber Harassment |
presentation, Video |
386 |
2017/08/18 : C0c0n : Talk : Cyber Bullying Screen the Mean |
presentation, Video |
387 |
2017/08/18 : C0c0n : Talk : Cyber Security Threat Management – Model It, Collect Intelligence and Hunt Them! |
presentation, Video |
388 |
2017/08/18 : C0c0n : Talk : Cyber Threat Intelligence Are We There , Yet…? |
presentation, Video |
389 |
2017/08/18 : C0c0n : Talk : Do Students Really Require Smartphones |
presentation, Video |
390 |
2017/08/18 : C0c0n : Talk : Dynamic Binary Instrumentation |
presentation, Video |
391 |
2017/08/18 : C0c0n : Talk : Exploiting the Smartness of Ble Stack |
presentation, Video |
392 |
2017/08/18 : C0c0n : Talk : Hacking Homes a Hardware Insight for Io T [In] Security |
presentation, Video |
393 |
2017/08/18 : C0c0n : Talk : Hunting the Hunters – Fighting Cyber Crime at the Source |
presentation, Video |
394 |
2017/08/18 : C0c0n : Talk : Identity Theft |
presentation, Video |
395 |
2017/08/18 : C0c0n : Talk : I Goat – A Self Learning Tool for I Os App Pentesting and Security |
presentation, Video |
396 |
2017/08/18 : C0c0n : Talk : Internet Addiction and Children |
presentation, Video |
397 |
2017/08/18 : C0c0n : Talk : Mobile Banking ( In) Security |
presentation, Video |
398 |
2017/08/18 : C0c0n : Talk : Moving From Cybersecurity Awareness to Cybersecurity Competence |
presentation, Video |
399 |
2017/08/18 : C0c0n : Talk : OSI Nt and Privacy |
presentation, Video |
400 |
2017/08/18 : C0c0n : Talk : Penetration Testing Orchestrator a Framework That Leverages Multi Tool Penetration Testing Approach Combined With Machine Learning Nlp for Faster Result Analysis |
presentation, Video |
401 |
2017/08/18 : C0c0n : Talk : Prevent Dark Side of Your Smart City a Defensive Security Model for Smart City and Critical Infrastructure |
presentation, Video |
402 |
2017/08/18 : C0c0n : Talk : Sleep, Screen and Teenagers |
presentation, Video |
403 |
2017/08/18 : C0c0n : Talk : Social Media and You |
presentation, Video |
404 |
2017/08/18 : C0c0n : Talk : Technology the New Frontier in Teaching |
presentation, Video |
405 |
2017/08/18 : C0c0n : Talk : The Card Hack Lessons From the Hitachi Payments Breach |
presentation, Video |
406 |
2017/08/18 : C0c0n : Talk : The Covert Cupid Under .11 Veil !!! * Approach for Covert Wifi* |
presentation, Video |
407 |
2017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)y |
presentation, Video |
408 |
2017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)y |
presentation, Video |
409 |
2017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technology |
presentation, Video |
410 |
2017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technology |
presentation, Video |
411 |
2017/08/18 : C0c0n : Talk : The Role of Teachers in Digital Era |
presentation, Video |
412 |
2017/08/18 : C0c0n : Talk : Threats With Online Gaming and Issues With Games Like Pokemon |
presentation, Video |
413 |
2017/08/18 : C0c0n : Talk : What Security Managers Can Learn From Story Tellers? |
presentation, Video |
414 |
2017/08/18 : C0c0n : Talk : Yarafying Android Malware a Missing Step Before Malware Analysis |
presentation, Video |
415 |
2017/08/18 : C0c0n : Talk : Your Friendly Neighbourhood Exploit |
presentation, Video |
416 |
2017/07/29 : Defcon : Tool Demo : Widy 2.0 Wifi 0 Wnage in Under 5 Reloaded |
Source Code |
417 |
2017/07/29 : Defcon : Tool Demo : Wi Monitor an Open Wrt Package for Remote Wi Fi Sniffing |
Source Code |
418 |
2017/07/27 : Defcon : Talk : Recon and Bug Bounties What a Great Love Story |
presentation |
419 |
2017/03/30 : Blackhat : Tool Demo : Lamma 1.0 |
Source Code |
420 |
2017/03/30 : Blackhat : Tool Demo : Damn Vulnerable Ss7 Network |
Source Code |
421 |
2017/03/30 : Blackhat : Tool Demo : Wi Dy Wi Fi 0wnage in Under 5 |
Source Code |
422 |
2017/03/03 : Nullcon : Talk : Agility With Security Mitigations in Windows 10 |
presentation, Video |
423 |
2017/03/03 : Nullcon : Talk : Breach Response Time to Shake Up the Status Quo |
presentation |
424 |
2017/03/03 : Nullcon : Talk : Securing Critical National Infrastructure |
presentation |
425 |
2016/11/11 : Deepsec : Talk : Amsi How Windows 10 Plans to Stop Script Based Attacks and How Good It Does That |
presentation |
426 |
2016/11/11 : Deepsec : Talk : Human vs Artificial Intelligence – Battle of Trust |
presentation, Video |
427 |
2016/11/05 : Hackfest : Talk : Lock Picker Leaking Data From Live Luks Partition |
presentation, Video |
428 |
2016/10/27 : Brucon : Talk : Decepticon the Rise and Evolution of an Intelligent Evil Twin…!!! |
presentation |
429 |
2016/08/19 : C0c0n : Talk : Abusing Digital Certificates Malware Style |
presentation, Video |
430 |
2016/08/19 : C0c0n : Talk : App Sec in the Time of Docker Containers |
presentation, Video |
431 |
2016/08/19 : C0c0n : Talk : Backdooring My Enemies With a Proxy for Threat Intelligence |
presentation, Video |
432 |
2016/08/19 : C0c0n : Talk : Breaking Into Gas Stations! |
presentation, Video |
433 |
2016/08/19 : C0c0n : Talk : Evading Corporate Security – You’re as Secure as the Weakest Link |
presentation, Video |
434 |
2016/08/19 : C0c0n : Talk : How (In)secure Are Indian Gsm Networks? |
presentation, Video |
435 |
2016/08/19 : C0c0n : Talk : Kill the Password a New Era of Authentication |
presentation, Video |
436 |
2016/08/19 : C0c0n : Talk : Ssd Forensics a Nightmare for Forensic Investigators |
presentation, Video |
437 |
2016/08/19 : C0c0n : Talk : The Art of Social Hacking |
presentation, Video |
438 |
2016/07/01 : Hackinparis : Talk : Diffdroid Dynamic Analysis Made Easier for Android |
presentation |
439 |
2016/05/26 : Hitb Sec Conf : Talk : Hitb Lab Mobile Application Security for I Os and Android |
presentation, Video |
440 |
2016/05/17 : Phdays : Talk : Security Automation Based on Artificial Intelligence |
presentation |
441 |
2016/03/11 : Nullcon : Talk : Hitchhiker's Guide to Hacking Industrial Control Systems ( Ics) |
presentation, Video |
442 |
2016/03/11 : Nullcon : Talk : Million Dollar Baby Towards Angrly Conquering Darpa Cgc |
presentation, Video |
443 |
2015/11/19 : Deepsec : Talk : Continuous Intrusion Why Ci Tools Are an Attacker's Best Friends. |
presentation |
444 |
2015/11/05 : Ground Zero Summit : Talk : Cyber Security in Hospitals Hospitals Under Seige |
presentation, Video |
445 |
2015/11/05 : Ground Zero Summit : Talk : Exposing Cyber Espionage Hello From Pakistan Iic Session |
presentation, Video |
446 |
2015/11/05 : Ground Zero Summit : Talk : Western Air Command |
presentation, Video |
447 |
2015/11/05 : Ground Zero Summit : Talk : Authentication Flaw in Automatic Bank Passbook Printing Machine. |
presentation, Video |
448 |
2015/11/05 : Ground Zero Summit : Talk : Browser Based Malware Attacks |
presentation, Video |
449 |
2015/11/05 : Ground Zero Summit : Talk : Chellam – A Wi Fi ID S Firewall for Windows |
presentation, Video |
450 |
2015/11/05 : Ground Zero Summit : Talk : Credit Card Frauds – The Money Making Ecosystem for Cyber Criminals |
presentation, Video |
451 |
2015/11/05 : Ground Zero Summit : Talk : Dissecting Android Malware |
presentation, Video |
452 |
2015/11/05 : Ground Zero Summit : Talk : Economics of Post Quantum Crypto Systems Do We Really Need It |
presentation, Video |
453 |
2015/11/05 : Ground Zero Summit : Talk : Elliptical Curve Cryptography |
presentation, Video |
454 |
2015/11/05 : Ground Zero Summit : Talk : Hacking Rfids Under 2000 Inr |
presentation, Video |
455 |
2015/11/05 : Ground Zero Summit : Talk : Sanctioned to Hack Your Scada Hmis Belong to Us! |
presentation, Video |
456 |
2015/11/05 : Ground Zero Summit : Talk : Thanks for the Free Cookies |
presentation, Video |
457 |
2015/11/05 : Ground Zero Summit : Talk : Trailing Terror in the Darknets |
presentation, Video |
458 |
2015/11/05 : Ground Zero Summit : Talk : Wolves Among Sheep Defeating Targeted Attacks With Deception |
presentation, Video |
459 |
2015/11/05 : Ground Zero Summit : Talk : Xss the Art of Evading Web Application Filters! |
presentation, Video |
460 |
2015/08/09 : Defcon : Talk : 802.11 Monitoring With PC Ap2 Xml Sqlite |
presentation |
461 |
2015/08/08 : Defcon : Talk : Chigula — A Framework for Wi Fi Intrusion Detection and Forensics |
presentation |
462 |
2015/08/08 : Defcon : Talk : Dissecting the Design of Scada Web Human Machine Interfaces ( Hmis) Hunting Vulnerabilities |
presentation |
463 |
2015/08/08 : Defcon : Talk : Powershell for Penetraton Testers |
presentation |
464 |
2015/08/07 : Defcon : Talk : Getting Into the Trust Store We Trust |
presentation, Video |
465 |
2015/08/07 : Defcon : Talk : Hacker's Practice Ground |
presentation |
466 |
2015/08/06 : Blackhat : Tool Demo : Chellam |
Source Code |
467 |
2015/08/01 : C0c0n : Talk : A Pentester's Methodology to Discover, Automate and Exploit Windows Privilege Escalation Flaws. |
presentation, Video |
468 |
2015/08/01 : C0c0n : Talk : Attack Chaining for Web Exploitation From Information Leakage to Gaining Root Access |
presentation, Video |
469 |
2015/08/01 : C0c0n : Talk : Blockchains in Security |
presentation, Video |
470 |
2015/08/01 : C0c0n : Talk : Breaking Into Infosec Research |
presentation, Video |
471 |
2015/08/01 : C0c0n : Talk : Demystifying and Breaking Ble |
presentation, Video |
472 |
2015/08/01 : C0c0n : Talk : From Aosp ( Android Open Source Project ) to Abd ( Android Based Devices ) |
presentation, Video |
473 |
2015/08/01 : C0c0n : Talk : Hacking Rfids Under 2000 Inr |
presentation, Video |
474 |
2015/08/01 : C0c0n : Talk : Medical Device Security and Critical Infrastructure Inside Hospitals |
presentation, Video |
475 |
2015/08/01 : C0c0n : Talk : No Po the No SQL Honey Pot Framework |
presentation, Video |
476 |
2015/08/01 : C0c0n : Talk : Reversing and Deciphering the Cyber Espionage Malware Communications |
presentation, Video |
477 |
2015/08/01 : C0c0n : Talk : S3curi7y at 36 K Feet |
presentation, Video |
478 |
2015/05/26 : Phdays : Talk : Invisible Backdoors in Your Code |
presentation, Video |
479 |
2015/02/06 : Nullcon : Talk : Building Security and Compliance Into the Software Delivery Process |
presentation, Video |
480 |
2015/02/06 : Nullcon : Talk : Toliman, a Hadoop Pentesting Tool |
presentation, Video |
481 |
2014/11/13 : Ground Zero Summit : Talk : Attacking Cryptography & Pki Implementations |
presentation, Video |
482 |
2014/11/13 : Ground Zero Summit : Talk : Identity Theft and Its Impact on Cyber Warfare |
presentation, Video |
483 |
2014/11/13 : Ground Zero Summit : Talk : Network Time Protocol in Amplification Inferno |
presentation, Video |
484 |
2014/11/13 : Ground Zero Summit : Talk : Security Vulnerabilities in Dvb C Networks Hacking Cable Tv Network |
presentation, Video |
485 |
2014/11/13 : Ground Zero Summit : Talk : 9 Cell Cyber Diplomacy |
presentation, Video |
486 |
2014/11/13 : Ground Zero Summit : Talk : Apt Protection for the Enterprise |
presentation, Video |
487 |
2014/11/13 : Ground Zero Summit : Talk : Attacking Web Proxies Like Never Before |
presentation, Video |
488 |
2014/11/13 : Ground Zero Summit : Talk : Cyber ' Brah Mos' Static Analysis Driven Secure Coding |
presentation, Video |
489 |
2014/11/13 : Ground Zero Summit : Talk : Detecting Fake Cell Phone Towers |
presentation, Video |
490 |
2014/11/13 : Ground Zero Summit : Talk : Enterprise Security |
presentation, Video |
491 |
2014/11/13 : Ground Zero Summit : Talk : Evaluating Waf ( Web Application Firewall) for Fun and Profit With Wof |
presentation, Video |
492 |
2014/11/13 : Ground Zero Summit : Talk : Financial Integrity and Cyber Security |
presentation, Video |
493 |
2014/11/13 : Ground Zero Summit : Talk : Fuzzing Asynchronous Protocols Built Over Websockets |
presentation, Video |
494 |
2014/11/13 : Ground Zero Summit : Talk : Hacking Consumer Electronics for Fun |
presentation, Video |
495 |
2014/11/13 : Ground Zero Summit : Talk : How I Won Browser Fuzzing |
presentation, Video |
496 |
2014/11/13 : Ground Zero Summit : Talk : Internet Governance |
presentation, Video |
497 |
2014/11/13 : Ground Zero Summit : Talk : Mobile Security Automation Framework for Intelligent Auditing |
presentation, Video |
498 |
2014/11/13 : Ground Zero Summit : Talk : National Cyber Policy and Its Impact on Business |
presentation, Video |
499 |
2014/11/13 : Ground Zero Summit : Talk : Scada Exploitation Through Firmware |
presentation, Video |
500 |
2014/11/13 : Ground Zero Summit : Talk : Vulnerability Reproduction Using Zest |
presentation, Video |
501 |
2014/10/23 : Hacklu : Talk : Wi Hawk Router Vulnerability Scanner |
presentation, Video |
502 |
2014/10/17 : Blackhat : Talk : Android Kernel and Os Security Assessment With Iron Crow |
presentation |
503 |
2014/10/16 : Grrcon : Talk : Socioware Dissecting Online Social Network Worms – Insidious Analysis and Design |
presentation, Video |
504 |
2014/09/24 : Brucon : Talk : Owasp Owtf |
presentation, Video |
505 |
2014/08/22 : C0c0n : Talk : Apt Case Study of Attackers Targeting Public Tendering |
presentation, Video |
506 |
2014/08/22 : C0c0n : Talk : Breaking and Securing Mobile Apps Automagically |
presentation, Video |
507 |
2014/08/22 : C0c0n : Talk : Cryptocalypse, Heart Bleed Is Our Government Listening? |
presentation, Video |
508 |
2014/08/22 : C0c0n : Talk : Cryptographic Backdoors Subverting the Rsa |
presentation, Video |
509 |
2014/08/22 : C0c0n : Talk : Exploiting No SQL Like Never Before |
presentation, Video |
510 |
2014/08/22 : C0c0n : Talk : Hacking Communication |
presentation, Video |
511 |
2014/08/22 : C0c0n : Talk : Idle Machines Doing Bounty Hunting ( Behind Your Back) |
presentation, Video |
512 |
2014/08/22 : C0c0n : Talk : Lesser Known Attack Xml Injection |
presentation, Video |
513 |
2014/08/22 : C0c0n : Talk : Piracy Tracker |
presentation, Video |
514 |
2014/08/22 : C0c0n : Talk : Still Single With a Bleeding Heart ( Tool Release) |
presentation, Video |
515 |
2014/08/22 : C0c0n : Talk : The Curious Case of Proto Bufs Demystifying Google's Hottest Binary Protocol |
presentation, Video |
516 |
2014/05/21 : Phdays : Talk : Android Exploitation |
presentation |
517 |
2014/05/21 : Phdays : Talk : Arm Exploitation |
presentation |
518 |
2014/02/15 : Nullcon : Tool Demo : Drup Snipe |
Source Code |
519 |
2014/02/14 : Nullcon : Talk : Hacking You'r Cable Tv Network. |
presentation |
520 |
2014/02/14 : Nullcon : Talk : Multi Value W Fi What the Heck Is It |
presentation |
521 |
2014/02/14 : Nullcon : Talk : O' Dea Assertions Untwining the Security of the Saml Protocol |
presentation |
522 |
2014/02/14 : Nullcon : Talk : Strategic Information Warfare When Ends Define the Means |
presentation, Video |
523 |
2013/11/21 : Deepsec : Talk : Automation in Android & I Os Application Security Review |
presentation, Video |
524 |
2013/11/21 : Deepsec : Talk : Europe in the Carna Botnet Telnet's Threat to the Largest Economy |
presentation |
525 |
2013/11/07 : Ground Zero Summit : Talk : Advanced Security for Advanced Threats |
presentation, Video |
526 |
2013/11/07 : Ground Zero Summit : Talk : Approach to Containing the Outbreak of Malicious Information in Online Social Networks |
presentation, Video |
527 |
2013/11/07 : Ground Zero Summit : Talk : Central Monitoring System and It Act 2000 – Balance Between Rights of Citizens and State |
presentation, Video |
528 |
2013/11/07 : Ground Zero Summit : Talk : Cloud Security Enabling Continuous, Scalable Security for Today’s Hyper Connected World |
presentation, Video |
529 |
2013/11/07 : Ground Zero Summit : Talk : Evolution of Network Security Around Software Defined Networking ( Sdn) – The Intelligent Network |
presentation, Video |
530 |
2013/11/07 : Ground Zero Summit : Talk : How I Built a Pentest Lab in Under 70 Usd |
presentation, Video |
531 |
2013/11/07 : Ground Zero Summit : Talk : Internet – Transforming Terrorism |
presentation, Video |
532 |
2013/11/07 : Ground Zero Summit : Talk : Iron Wasp |
presentation, Video |
533 |
2013/11/07 : Ground Zero Summit : Talk : Malware for Firefox Mobile Os |
presentation, Video |
534 |
2013/11/07 : Ground Zero Summit : Talk : Securing Government Critical Information Infrastructure |
presentation, Video |
535 |
2013/11/07 : Ground Zero Summit : Talk : Serial Killing of Embedded Systems |
presentation, Video |
536 |
2013/11/07 : Ground Zero Summit : Talk : Setting the Data Center on Fire |
presentation, Video |
537 |
2013/11/07 : Ground Zero Summit : Talk : The Seven Sins of Wi Fi Security |
presentation, Video |
538 |
2013/11/07 : Ground Zero Summit : Talk : Towards a Next Generation Secure Internet |
presentation, Video |
539 |
2013/11/07 : Ground Zero Summit : Talk : Understanding the Anatomy of Advanced Targeted Attacks – The Trend Micro Approach |
presentation, Video |
540 |
2013/09/27 : C0c0n : Talk : Arm, Thumb and the Finger |
presentation, Video |
541 |
2013/09/27 : C0c0n : Talk : Blur Captcha |
presentation, Video |
542 |
2013/09/27 : C0c0n : Talk : Disclosing Vulnerabilities the Bug Bounty Style |
presentation, Video |
543 |
2013/09/27 : C0c0n : Talk : From Bedroom to Boardroom Taking Your Weekend Infosec Project Global |
presentation, Video |
544 |
2013/09/27 : C0c0n : Talk : Hello Ciso! How to Make End Users Like and Follow “ Brand Infosec”? |
presentation, Video |
545 |
2013/09/27 : C0c0n : Talk : Infiltrating the Intranet With Skanda |
presentation, Video |
546 |
2013/09/27 : C0c0n : Talk : Lets Play Applanting on New Grounds |
presentation, Video |
547 |
2013/09/27 : C0c0n : Talk : Pwning Wi Fi Devices! |
presentation, Video |
548 |
2013/09/27 : C0c0n : Talk : Risk and Challenges in Virtual Currencies. |
presentation, Video |
549 |
2013/09/27 : C0c0n : Talk : Sandy the Malicious Analysis |
presentation, Video |
550 |
2013/09/27 : C0c0n : Talk : Ssrf Xspa Real World Attacks and Mitigations |
presentation, Video |
551 |
2013/09/27 : C0c0n : Talk : The Art and Science of Anamoly Based Vulnerability Detection |
presentation, Video |
552 |
2013/09/27 : C0c0n : Talk : The Secure Software Development Life Cycle |
presentation, Video |
553 |
2013/09/13 : Rootcon : Talk : My Experiments With Truth a Different Route to Bug Hunting |
presentation, Video |
554 |
2013/09/12 : Grrcon : Talk : The Droid Exploitation Saga – All Over Again! |
presentation, Video |
555 |
2013/07/31 : Blackhat : Talk : Lte Booms With Vulnerabilities |
presentation, Video |
556 |
2013/03/01 : Nullcon : Talk : Automating Java Script Static Analysis |
presentation, Video |
557 |
2013/03/01 : Nullcon : Talk : Byod How Will It Shape Your Wireless Network Security in Future? |
presentation |
558 |
2013/03/01 : Nullcon : Talk : Capturing Zero Day Information |
presentation |
559 |
2013/03/01 : Nullcon : Talk : Csrf Finder as a Mozilla Addon |
presentation |
560 |
2013/03/01 : Nullcon : Talk : Inception of Graphical Passwords |
presentation |
561 |
2013/03/01 : Nullcon : Talk : Pawing the Droid Twisting the Arm |
presentation, Video |
562 |
2013/03/01 : Nullcon : Talk : Rest a Real Stealth and Semi Stealth Mitm Attack Tool for Ipv4 Networks |
presentation |
563 |
2013/03/01 : Nullcon : Talk : Sensitive Campus Security With Network |
presentation |
564 |
2013/03/01 : Nullcon : Talk : Sms to Meterpreter Fuzzing USB Modems |
presentation |
565 |
2013/03/01 : Nullcon : Talk : Vulnerability Research Anyone? |
presentation, Video |
566 |
2012/11/23 : Malcon : Talk : Advanced Malware Engine |
presentation, Video |
567 |
2012/11/23 : Malcon : Talk : Surprise Paper! |
presentation, Video |
568 |
2012/11/23 : Malcon : Talk : Windows Phone 8 Malware Prototype |
presentation, Video |
569 |
2012/10/23 : Hacklu : Talk : Buster Android Security Buster |
presentation, Video |
570 |
2012/10/10 : Hitb Sec Conf : Talk : Innovative Approaches to Exploit Delivery |
presentation |
571 |
2012/09/27 : Grrcon : Talk : The Realm of Third Generation Botnet Attacks |
presentation |
572 |
2012/09/26 : Nullcon : Talk : Forensics Timeline Analysis |
presentation |
573 |
2012/09/26 : Nullcon : Talk : Highly Harmful Audio Waves Aka Dtmf Fuzzing |
presentation |
574 |
2012/09/26 : Nullcon : Talk : How Secure Is Internet Banking in India |
presentation |
575 |
2012/09/26 : Nullcon : Talk : Opening the Kimono Automating Behavioral Analysis for Mobile Apps |
presentation |
576 |
2012/09/26 : Nullcon : Talk : The Art of Passive Web Vul Analysis With Iron Wasp |
presentation |
577 |
2012/09/20 : Ekoparty : Talk : Dirty Use of Ussd Codes in Cellular Network |
presentation |
578 |
2012/09/20 : Ekoparty : Talk : Fuzzing Dtmf Input Processing Algorithms |
presentation, Video |
579 |
2012/09/05 : 44 Con : Talk : Why Integrity Is Left Alone and Not Given Tlc ( Tender, Love and Care) It Deserves? |
presentation |
580 |
2012/08/03 : C0c0n : Talk : Building Security Incident Detection & Handling Capabilities in Enterprises |
presentation, Video |
581 |
2012/08/03 : C0c0n : Talk : Business Continuity and Risk Management in Turbulent Times |
presentation, Video |
582 |
2012/08/03 : C0c0n : Talk : Contemporary Transcription and Resource Parasitism |
presentation, Video |
583 |
2012/08/03 : C0c0n : Talk : Easy Money With Ui Redressing |
presentation, Video |
584 |
2012/08/03 : C0c0n : Talk : Enterprise Server Security |
presentation, Video |
585 |
2012/08/03 : C0c0n : Talk : Evil Java Script |
presentation, Video |
586 |
2012/08/03 : C0c0n : Talk : Gathering Security Requirements |
presentation, Video |
587 |
2012/08/03 : C0c0n : Talk : Layer 8 Exploitation a Threat to National Security |
presentation, Video |
588 |
2012/08/03 : C0c0n : Talk : Security Incidents – Avoiding the Apocalypse in 2012 |
presentation, Video |
589 |
2012/08/03 : C0c0n : Talk : The Management of Information Security – A Corporate Practitioner’s Perspective |
presentation, Video |
590 |
2012/08/03 : C0c0n : Talk : The Weakest Link Reinforcing the Human Element |
presentation, Video |
591 |
2012/02/15 : Nullcon : Talk : Application Security Cost Management |
presentation |
592 |
2012/02/15 : Nullcon : Talk : Attacking Backup Software |
presentation |
593 |
2012/02/15 : Nullcon : Talk : Best Practices to Improve the Security Grading of Your Project |
presentation |
594 |
2012/02/15 : Nullcon : Talk : Captchas for Fun and Profit |
presentation |
595 |
2012/02/15 : Nullcon : Talk : Content Sniffing Algorithm Bypassing Techniques and Possible Attack Vectors |
presentation |
596 |
2012/02/15 : Nullcon : Talk : Cyberspace Global Commons or a National Asset |
presentation, Video |
597 |
2012/02/15 : Nullcon : Talk : Friction in the Machine |
presentation, Video |
598 |
2012/02/15 : Nullcon : Talk : Haxdroid Empowering Android Handset |
presentation |
599 |
2012/02/15 : Nullcon : Talk : Ivr Security Internal Network Attacks via Phone Lines |
presentation |
600 |
2012/02/15 : Nullcon : Talk : Node.js the Good, Bad and Ugly |
presentation |
601 |
2012/02/15 : Nullcon : Talk : Open Source Revolution Need Hardware Software Marriage |
presentation, Video |
602 |
2012/02/15 : Nullcon : Talk : Sandboxing the Deep Truth |
presentation |
603 |
2012/02/15 : Nullcon : Talk : Scada Security Why Is It So Hard |
presentation, Video |
604 |
2012/02/15 : Nullcon : Talk : Teensy for Fun and Jugaad |
presentation, Video |
605 |
2012/02/15 : Nullcon : Talk : Your Phone Is Your Phone but Your Calls Are Now My Calls |
presentation, Video |
606 |
2011/11/25 : Malcon : Talk : Advanced Malware for Apple Products |
presentation, Video |
607 |
2011/11/25 : Malcon : Talk : Exploit the Exploit Kits |
presentation, Video |
608 |
2011/11/25 : Malcon : Talk : Mareech Look It’s a Hid Made Up of Gold |
presentation, Video |
609 |
2011/11/17 : Deepsec : Talk : Behavioral Security 10 Steps Forward 5 Steps Backward |
presentation |
610 |
2011/11/17 : Deepsec : Talk : Fake Anti Virus Journey From Trojan to a Persisent Threat |
presentation, Video |
611 |
2011/11/04 : Hackfest : Talk : Here Are Your Keystrokes |
presentation, Video |
612 |
2011/10/13 : Hitb Sec Conf : Talk : Web Wars 3 |
presentation, Video |
613 |
2011/10/08 : C0c0n : Talk : Stratagemizing Security Against Perpetrators in Cloud Infrastructure |
presentation, Video |
614 |
2011/10/07 : C0c0n : Talk : Deep(er) Penetration Reaching the Internal Network Using Exposed Web Applications |
presentation, Video |
615 |
2011/10/07 : C0c0n : Talk : Digital Evidence |
presentation, Video |
616 |
2011/10/07 : C0c0n : Talk : I Phone Jailbreak |
presentation, Video |
617 |
2011/10/07 : C0c0n : Talk : Mobile Security |
presentation, Video |
618 |
2011/10/07 : C0c0n : Talk : Network Security Modern Mechanism for Intrusion Detection and Avoidance in a P2 P Network |
presentation, Video |
619 |
2011/10/07 : C0c0n : Talk : Paranoid Android |
presentation, Video |
620 |
2011/10/07 : C0c0n : Talk : Password Less Authentication, Authorization |
presentation, Video |
621 |
2011/10/07 : C0c0n : Talk : Runtime Thread Injection and Execution in Linux Processes |
presentation, Video |
622 |
2011/10/07 : C0c0n : Talk : Section 43 a It Act Compliance |
presentation, Video |
623 |
2011/10/07 : C0c0n : Talk : Security and Privacy Risks of Cloud Computing |
presentation, Video |
624 |
2011/10/07 : C0c0n : Talk : Wi Fi Malware for Fun and Profit |
presentation, Video |
625 |
2011/09/19 : Hacklu : Talk : Linux Thread Injection the Jugaad Way |
presentation, Video |
626 |
2011/09/19 : Brucon : Talk : Step by Step for Software Security (That Anyone Can Follow) |
presentation, Video |
627 |
2011/09/19 : Hacklu : Talk : The Travelling Hacksmith |
presentation, Video |
628 |
2011/09/07 : Securitybyte : Talk : Data Protection |
presentation, Video |
629 |
2011/09/07 : Securitybyte : Talk : Social Web & Privacy – An Evolving World |
presentation, Video |
630 |
2011/02/25 : Nullcon : Talk : Future of Cyber Crimes Limitations and Challenges |
presentation, Video |
631 |
2011/02/25 : Nullcon : Talk : Hacking the Parliament – A Classic Social Engineering Attack |
presentation, Video |
632 |
2011/02/25 : Nullcon : Talk : Incident Management and Beyond |
presentation, Video |
633 |
2011/02/25 : Nullcon : Talk : Jugaad Beta Linux Thread Injection Malware Po C |
presentation, Video |
634 |
2010/11/25 : Deepsec : Talk : Developers Are From Mars, Compliance Auditors Are From Venus |
presentation |
635 |
2010/08/01 : C0c0n : Talk : Cloud Computing & Security Boon or Bane; Hype or Reality; Cloud Implementation Challenges a Live Case Study |
presentation, Video |
636 |
2010/08/01 : C0c0n : Talk : Code Disclosure Over HTTP |
presentation, Video |
637 |
2010/08/01 : C0c0n : Talk : Concept, Methodology and Challenges in Computer Forensics |
presentation, Video |
638 |
2010/08/01 : C0c0n : Talk : Dangers and Dynamic Malware Analysis |
presentation, Video |
639 |
2010/08/01 : C0c0n : Talk : End Point Security |
presentation, Video |
640 |
2010/08/01 : C0c0n : Talk : Hackers' Eco System in India |
presentation, Video |
641 |
2010/08/01 : C0c0n : Talk : Horses, Rats and Bots |
presentation, Video |
642 |
2010/08/01 : C0c0n : Talk : Last Line of Defense Host Intrusion Prevention and Secure Application Development. |
presentation, Video |
643 |
2010/08/01 : C0c0n : Talk : Mobile Security |
presentation, Video |
644 |
2010/08/01 : C0c0n : Talk : Overview of Cyber Legal Systems in India |
presentation, Video |
645 |
2010/08/01 : C0c0n : Talk : Vo IP Security |
presentation, Video |
646 |
2010/08/01 : C0c0n : Talk : Wireless Mitm |
presentation, Video |
647 |
2010/08/01 : C0c0n : Talk : Writing X86 Shell Code & Secure Self Modifying Code and Cross Platform Programming a Security Angle |
presentation, Video |
648 |
2010/07/01 : Hitb Sec Conf : Talk : The Travelling Hacksmith 2009 – 2010 |
presentation, Video |
649 |
2010/06/18 : Syscan : Talk : Reverse Engineering Web 2.0 Applications |
presentation, Video |
650 |
2010/02/25 : Nullcon : Talk : Imposter Ke Karnamey the Browser Phishing Tool. |
presentation, Video |
651 |
2010/02/25 : Nullcon : Talk : Quantum Computing Challenges in the Field of Security |
presentation, Video |
652 |
2009/12/04 : Clubhack : Talk : Facilitate Collaboration With Information Rights Management |
presentation, Video |
653 |
2009/11/19 : Deepsec : Talk : Top 10 Security Issues Developers Don't Know About |
presentation |
654 |
2009/11/18 : Securitybyte : Talk : Cloud Hacking – Distributed Attack & Exploit Platform |
presentation, Video |
655 |
2009/11/17 : Securitybyte : Talk : Business Case Risk Management Compliance at Amity |
presentation, Video |
656 |
2009/11/17 : Securitybyte : Talk : Business Continuity Case Study |
presentation, Video |
657 |
2009/10/28 : Hacklu : Talk : Ownage 2.0 |
presentation, Video |
658 |
2009/08/06 : C0c0n : Talk : Cyber Forensics |
presentation, Video |
659 |
2009/08/06 : C0c0n : Talk : Cyber Victimisation |
presentation, Video |
660 |
2009/08/06 : C0c0n : Talk : Information Security Audit |
presentation, Video |
661 |
2009/08/06 : C0c0n : Talk : Information Security Management Practices Technical Issues and the Impact of Risk Management. |
presentation, Video |
662 |
2009/08/06 : C0c0n : Talk : Information Warfare |
presentation, Video |
663 |
2009/08/06 : C0c0n : Talk : Know Your Enemy, and Yourself Demystifying Threat Modelin |
presentation, Video |
664 |
2009/08/06 : C0c0n : Talk : Management & Security of Large Scale Storage Devices |
presentation, Video |
665 |
2009/08/06 : C0c0n : Talk : Microsoft Security Strategies |
presentation, Video |
666 |
2009/08/06 : C0c0n : Talk : Network Intrusions and Hacking |
presentation, Video |
667 |
2009/05/19 : Syscan : Talk : Securing Applications at Gateway With Web Application Firewalls |
presentation, Video |
668 |
2009/05/19 : Syscan : Talk : Securing Enterprise Applications |
presentation, Video |
669 |
2008/11/13 : Deepsec : Talk : Game of Web 2.0 Security Attacking Next Generation Apps |
presentation, Video |
670 |
2008/10/29 : Hitb Sec Conf : Talk : Browser Exploits a New Model for Browser Security |
presentation |
671 |
2008/10/22 : Hacklu : Talk : Browser Exploits a New Model for Browser Security |
presentation, Video |
672 |
2008/08/21 : Owasp App Sec India : Talk : App Sec for Managers |
presentation, Video |
673 |
2008/08/20 : Owasp App Sec India : Talk : Building Enterprise App Sec Program |
presentation, Video |
674 |
2008/04/16 : Hitb Sec Conf : Talk : Securing Next Generation Applications  “ Scan, Detect and Mitigate |
presentation, Video |
675 |
2008/03/28 : Blackhat : Talk : Spam Evolution |
presentation, Video |
676 |
2008/03/26 : Can Sec West : Talk : Vulnerabilities Die Hard |
presentation, Video |
677 |
2008/02/20 : Blackhat : Talk : Hacking Vo IP Through IP Sec Tunnels |
presentation, Video |
678 |
2007/12/09 : Clubhack : Talk : Vulnerabilities in Vo IP Products and Services |
presentation, Video |
679 |
2007/08/01 : Blackhat : Talk : Vulnerabilities in Wi Fi Dual Mode Vo IP Phones |
presentation, Video |
680 |
2007/04/18 : Can Sec West : Talk : Low Rate Denial of Service Attacks |
presentation, Video |
681 |
2007/03/30 : Blackhat : Talk : Web Service Vulnerabilities |
presentation, Video |
682 |
2006/10/19 : Hacklu : Talk : Smashing Heap by Free Simulation |
presentation, Video |
683 |
2006/08/05 : Defcon : Talk : Zulu a Command Line Wireless Frame Generator |
presentation |
684 |
2005/09/29 : Hitb Sec Conf : Talk : Trends in Real World Attacks a Compilation of Case Studies |
presentation |
685 |
2005/04/10 : Hitb Sec Conf : Talk : Whispers on the Wire Network Based Covert Channels, Exploitation and Detection |
presentation, Video |
686 |
2004/07/28 : Blackhat : Talk : Defeating Automated Web Assessment Tools |
presentation |
687 |
2003/12/12 : Hitb Sec Conf : Talk : Defending Web Applications Strategies, Methods and Practices |
presentation, Video |
688 |
2003/12/12 : Hitb Sec Conf : Talk : New Generation Frauds |
presentation, Video |
689 |
2003/12/12 : Hitb Sec Conf : Talk : Threats to Wireless Networks War Driving |
presentation, Video |
690 |
2001/07/13 : Defcon : Talk : Security & Privacy Are Critically Important Issues in Todays Digitally Connected Age |
presentation |
691 |
1998/07/29 : Blackhat : Talk : Security as an Enabler for New Business Opportunities the Business Value of Security |
presentation, Video |