Personal Details

S.NoName of EntryWhat is missing
1navin_kumar_singhTwitter, Linkedin, Photo
2k_v_prashantPhoto
3vipin_kumarTwitter, Photo
4nitin_kumarTwitter, Linkedin, Photo
5a_a_gafoorTwitter, Linkedin, Photo
6anant_kochharTwitter, Linkedin, Photo
7sachin_burmanTwitter, Linkedin, Photo
8suresh_sharmaTwitter, Photo
9aashish_kuntePhoto
10ashwin_vamshiPhoto
11bhushan_gulabrao_boraseTwitter, Linkedin
12gaurav_trivediTwitter, Linkedin, Photo
13harsh_patelTwitter, Photo
14kamlesh_bajajTwitter, Photo
15lokesh_pidawekarTwitter, Photo
16mohammed_imranPhoto
17mohan_sri_rama_krishna_pedhapatiTwitter, Photo
18neelay_s_shahTwitter, Linkedin, Photo
19rohit_mothePhoto
20rugved_mehtaTwitter, Photo
21satyendra_vermaTwitter, Linkedin, Photo
22shantanu_gawdeTwitter, Linkedin, Photo
23sreepriya_chalakkalTwitter, Photo
24vijayakumar_k_mTwitter, Photo
25a_muralidharTwitter, Linkedin, Photo
26abdul_karim_vettiyanickalTwitter, Linkedin
27adrip_mukherjeeTwitter, Photo
28ajay_porusTwitter, Linkedin, Photo
29ajit__hattiTwitter, Linkedin, Photo
30ajith_balagopalTwitter, Photo
31akhilesh_variarTwitter, Photo
32akshay_shahTwitter, Linkedin, Photo
33anil_chintalaTwitter, Photo
34anil_kumarTwitter, Photo
35anjana_sathyanTwitter, Linkedin, Photo
36ankit_john_abrahamTwitter, Linkedin, Photo
37ankur_chowdharyTwitter, Photo
38anshul_kumarTwitter, Linkedin, Photo
39antony_k_mTwitter, Linkedin, Photo
40apoorva_guptaTwitter, Linkedin, Photo
41arjun_gopalakrishnaTwitter, Photo
42arpan_abani_sarkarTwitter, Photo
43arpith_rajagopalTwitter, Photo
44ashfaq_ansariLinkedin, Photo
45atharva_chincholkarTwitter, Photo
46atul_nairTwitter, Photo
47avinash_shenoiTwitter, Linkedin, Photo
48babitha_bpTwitter, Linkedin
49bala_kumar_sTwitter, Linkedin, Photo
50bhaskar_rastogiTwitter, Photo
51bhavarth_karmarkarTwitter, Photo
52bhavin_bhansaliTwitter, Photo
53bindu_monyTwitter, Linkedin, Photo
54binoy_vcTwitter, Linkedin, Photo
55bipul_sahuTwitter, Linkedin, Photo
56cmde_anandTwitter, Linkedin, Photo
57devang_solankiTwitter, Photo
58devika_a_vTwitter, Linkedin, Photo
59dhruv_shahTwitter, Linkedin, Photo
60dipesh_goyalTwitter, Linkedin, Photo
61dr_chandrasekarTwitter, Linkedin, Photo
62dr_venkateshTwitter, Linkedin, Photo
63gagan_jattanaTwitter, Linkedin, Photo
64ganesh_varadarajanTwitter, Photo
65gem_georgeTwitter, Photo
66hari_vasudevTwitter, Linkedin, Photo
67hariprasad_chedeTwitter, Photo
68harshal_tupsamudreTwitter, Photo
69jacob_joseTwitter, Linkedin, Photo
70jagadeesh_chandraiahTwitter, Photo
71jairam_rameshTwitter, Linkedin, Photo
72jayaram_rameshTwitter, Linkedin, Photo
73jojy_joyTwitter, Linkedin
74jvr_murthyTwitter, Photo
75k_kamaneeshTwitter, Linkedin
76kanu_pathaniaTwitter, Linkedin, Photo
77karthikeyan_bhargavanTwitter, Linkedin
78kiran_bandlaTwitter, Photo
79kiran_shiraliTwitter, Photo
80kiran_sivakumarTwitter, Linkedin, Photo
81kishan_kendreTwitter, Linkedin, Photo
82kp_paulsonTwitter, Linkedin, Photo
83krishnakumar_kottekkatTwitter, Linkedin, Photo
84krishnaprasad_subramaniamTwitter, Linkedin, Photo
85kushal_dasTwitter, Linkedin, Photo
86laxi_eshwariTwitter, Linkedin, Photo
87lekshmi_bTwitter, Linkedin, Photo
88m_nagarajanTwitter, Photo
89m_sheshadriTwitter, Linkedin, Photo
90madhavi_purandareTwitter, Linkedin, Photo
91madhusudhan_kondaTwitter, Linkedin, Photo
92manas_pratim_sarmaTwitter, Linkedin, Photo
93maninder_singhTwitter, Linkedin, Photo
94martina_mathewTwitter, Linkedin, Photo
95maya_viswanathanTwitter, Linkedin, Photo
96meera_pTwitter, Linkedin, Photo
97midhun_babuTwitter, Linkedin, Photo
98migreshTwitter, Linkedin, Photo
99milind_bhargavaTwitter, Photo
100mohamed_emraanullahTwitter, Linkedin, Photo
101mohit_kumarTwitter, Linkedin, Photo
102mukund_krishnamurthyTwitter, Linkedin, Photo
103mv_shashadriTwitter, Linkedin, Photo
104natishia_rebecca_chandyTwitter, Linkedin, Photo
105navendu_pottekkatTwitter, Linkedin
106navin_paiPhoto
107nikhil_shrivastavaTwitter, Linkedin, Photo
108niru_ragupathyTwitter, Photo
109nisha_prayanTwitter, Linkedin, Photo
110nishant_yadavTwitter, Linkedin, Photo
111nitin_agarwalTwitter, Linkedin, Photo
112padnya_manwarTwitter, Linkedin, Photo
113pranav_a_menonTwitter, Linkedin, Photo
114praseed_paiTwitter, Linkedin, Photo
115pratik_shahPhoto
116pravesh_sharmaTwitter, Linkedin, Photo
117pulkit_deepak_khatriTwitter, Linkedin, Photo
118r_sarangapaniTwitter, Linkedin, Photo
119raghudeep_kannavaraTwitter, Linkedin, Photo
120rahul_jPhoto
121rajiv_pandeyTwitter, Linkedin, Photo
122rakesh_viswanathanTwitter, Photo
123reena_bhansaliTwitter, Linkedin, Photo
124resmi_rajanTwitter, Linkedin, Photo
125robin_joyTwitter, Linkedin, Photo
126rohit_bansalPhoto
127rohit_kumarTwitter, Photo
128rohit_tammaTwitter, Linkedin, Photo
129roshen_chandranTwitter, Linkedin, Photo
130sachin_joglekarTwitter, Photo
131sachine_waghTwitter, Linkedin, Photo
132sameer_ratolikarTwitter, Photo
133sameer_saxenaTwitter, Linkedin, Photo
134sandeep_sharmaTwitter, Linkedin
135sanjay_burmanTwitter, Linkedin
136sapan_talwarTwitter, Photo
137sebastian_edasseryTwitter, Linkedin, Photo
138shantanu_khandelwalTwitter, Photo
139sheshadri_mvTwitter, Linkedin, Photo
140shibi_anandTwitter, Linkedin, Photo
141shivam_rawatTwitter, Photo
142shivansh_agrawalTwitter, Linkedin, Photo
143shubham_singhTwitter, Photo
144siddharth_mTwitter, Linkedin, Photo
145sivamurthy_hiremathTwitter, Linkedin, Photo
146sowmya_potluriTwitter, Photo
147sridharan_sankaranTwitter, Photo
148srikanta_prasadTwitter, Photo
149srinavas_raoTwitter, Linkedin, Photo
150Srinivasa_rao_kotipalliTwitter, Linkedin, Photo
151subhajeet_singhaTwitter, Photo
152subir_dasTwitter, Photo
153subrahmanya_gupta_bodaTwitter, Linkedin
154subramanian_kumarTwitter, Linkedin, Photo
155subramanian_kumaraswamyTwitter, Linkedin, Photo
156sudeep_patwardhanTwitter, Linkedin, Photo
157sujay_rajashekar_gundagattiTwitter, Linkedin
158sumeet_khokhaniTwitter, Photo
159sumit_d_chowdhuryTwitter, Photo
160sunil_aggarwalTwitter, Linkedin, Photo
161surjata_awadeTwitter, Linkedin, Photo
162sushant_paithaneTwitter, Photo
163suvabrata_sinhaTwitter, Photo
164teena_joseTwitter, Linkedin, Photo
165trupti_shiralkarTwitter, Photo
166umeshTwitter, Linkedin, Photo
167vidha_murthyTwitter, Linkedin, Photo
168vijay_k_vermaTwitter, Photo
169vinayak_hegdeTwitter, Linkedin, Photo
170vinayak_mishraTwitter, Linkedin, Photo
171vineet_bhatiaPhoto
172vishnu_tiwariTwitter, Linkedin, Photo
173whiteknightTwitter, Linkedin, Photo
174yagnesh_waran_pTwitter, Photo
175yash_kadakiaTwitter, Linkedin, Photo
176yashodhan_vivek_mandkeTwitter, Linkedin
177yerra_ravi_kiran_rajuTwitter, Linkedin, Photo

Presentation Details

S.NoName of EntryWhat is missing
12024/12/12 : Blackhat : Tool Demo : Damn Vulnerable Browser Extension ( Dvbe) Knowing the Risks of Your Browser SupplementsSource Code
22024/12/12 : Blackhat : Tool Demo : Dark Widow Customizable Dropper Tool Targeting WindowsSource Code
32024/12/12 : Blackhat : Tool Demo : Genzai the Io T Security ToolkitSource Code
42024/12/12 : Blackhat : Tool Demo : Halberd Cloud Security Testing ToolSource Code
52024/12/12 : Blackhat : Tool Demo : Morf Mobile Reconnaissance FrameworkSource Code
62024/12/12 : Blackhat : Tool Demo : Mpt Pentest in Action!Source Code
72024/12/12 : Blackhat : Tool Demo : Red Cloud Os Cloud Adversary Simulation Operating SystemSource Code
82024/12/11 : Blackhat : Tool Demo : Agneyastra Firebase Misconfiguration Detection ToolkitSource Code
92024/12/11 : Blackhat : Tool Demo : Android Bug Bazaar Your Mobile Appsec Playground to Explore, Exploit, ExcelSource Code
102024/12/11 : Blackhat : Tool Demo : Findmytakeover Find Dangling Domains in a Multi Cloud EnvironmentSource Code
112024/12/11 : Blackhat : Tool Demo : Open Source Tool to Shift Left Security Testing by Leveraging AiSource Code
122024/12/11 : Blackhat : Tool Demo : Scagoat Exploiting Damn Vulnerable Sca ApplicationSource Code
132024/11/16 : C0c0n : Talk : Invisible Invaders Bypassing Email Security With Legitimate Toolspresentation, Video
142024/11/16 : C0c0n : Talk : Active Directory Deception Strategiespresentation, Video
152024/11/16 : C0c0n : Talk : Hacking the Non Windows Frontier Thick Client Pentesting on Linux & MACpresentation, Video
162024/11/16 : C0c0n : Talk : Key Notepresentation, Video
172024/11/16 : C0c0n : Talk : Ride on the House Exploiting Public Transport Ticketing Systems for Free Ridespresentation, Video
182024/11/16 : C0c0n : Talk : Serverless Phishing Factory Automate, Attack, Adaptpresentation, Video
192024/11/16 : C0c0n : Talk : The Stealth Code Conspiracy Unmasking Hidden Threats in Ci Cd Pipelinespresentation, Video
202024/11/15 : C0c0n : Talk : [ Yodha] Nightingale Docker for Pentesterspresentation, Video
212024/11/15 : C0c0n : Talk : [ Yodha] Red Cloud a Multi Cloud Hacking Ospresentation, Video
222024/11/15 : C0c0n : Talk : [ Yodha] Scagoat Software Composition Analysis ( Sca) Vulnerability Exploration Toolpresentation, Video
232024/11/15 : C0c0n : Talk : Automated Security Engineer Co Pilot Leveraging Large Language Models for Enhanced Code Securitypresentation, Video
242024/11/15 : C0c0n : Talk : Breaking the Defences in Depth Analysis of Edr and Av Tampering Techniquespresentation, Video
252024/11/15 : C0c0n : Talk : Remote Whispers of Mobile Simpresentation, Video
262024/08/08 : Blackhat : Tool Demo : Active Directory Cyber Deception Using HuginnSource Code
272024/08/08 : Blackhat : Tool Demo : Open Source Llm SecuritySource Code
282024/08/07 : Blackhat : Tool Demo : Traffic Warden X Open Wrt Security & MonitoringSource Code
292024/04/18 : Blackhat : Tool Demo : Detective Sq a Extension Auditing Framework Version 2Source Code
302024/04/18 : Blackhat : Tool Demo : Secure Local Vault Git Based Secret ManagerSource Code
312024/03/12 : Nullcon : Talk : Secure Web Gateways Are Dead. What’s Next?presentation, Video
322023/12/06 : Blackhat : Tool Demo : Andro Cop One Click Forensic Investigation & Data Extraction ToolSource Code
332023/12/06 : Blackhat : Tool Demo : Detective Sq a Extension Auditing FrameworkSource Code
342023/12/06 : Blackhat : Tool Demo : Supply Shield Protecting Your Software Supply ChainSource Code
352023/11/17 : Deepsec : Talk : Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruptionpresentation, Video
362023/10/13 : Hackfest : Talk : Exploring RAM Forensic Analysis for Effective Digital Investigationspresentation, Video
372023/09/29 : Hackinparis : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actorpresentation, Video
382023/09/28 : Hackinparis : Talk : How to Have Visibility and Security of Cicd Ecosystempresentation, Video
392023/09/23 : Nullcon : Talk : How I Hacked Your Bank Account a Detailed Look at Upi Securitypresentation
402023/08/12 : Defcon : Talk : Getting More Bang for Your Buck Appsec on a Limited Budgetpresentation, Video
412023/08/12 : Defcon : Tool Demo : Open Source API Security for DevsecopsSource Code
422023/08/11 : Defcon : Talk : Generative Adversarial Network ( Gan) Based Autonomous Penetration Testing for Web Applicationspresentation, Video
432023/08/11 : Defcon : Tool Demo : V API Vulnerable Adversely Programmed InterfaceSource Code
442023/08/10 : Defcon : Talk : Hardware Backdooring an E Scooterpresentation, Video
452023/08/09 : Blackhat : Tool Demo : Arctic Automated Remediation for Correlation Threat Intelligence CollectionsSource Code
462023/08/09 : Blackhat : Tool Demo : Caspr Code Trust Auditing FrameworkSource Code
472023/08/07 : C0c0n : Talk : Cellibrite Premium Mobile Forensic Tool I Phone Analysispresentation, Video
482023/08/07 : C0c0n : Talk : Chinese Apt Against Government Officials Using G7 Summit Lurepresentation
492023/08/07 : C0c0n : Talk : Citizen Mobile Security Responsibilities, Accountability, and Impactspresentation, Video
502023/08/07 : C0c0n : Talk : Cyber Threats to Global Financial Systemspresentation
512023/08/07 : C0c0n : Talk : Darkweb Investigationspresentation, Video
522023/08/07 : C0c0n : Talk : Enhancing Red Team Opsec Abusing Stealthy in Memory Binary Execution Techniques in Linuxpresentation
532023/08/07 : C0c0n : Talk : Esoc Trinetra Projectpresentation, Video
542023/08/07 : C0c0n : Talk : Evasion Tactics of Side Copy & Apt36 Persistently Targeting Indian Defense Orgspresentation
552023/08/07 : C0c0n : Talk : Exploring Threats in Operational Technologypresentation, Video
562023/08/07 : C0c0n : Talk : Generative Ai and Cyber Crimespresentation
572023/08/07 : C0c0n : Talk : Homomorphic Encryption Myth to Realitypresentation
582023/08/07 : C0c0n : Talk : Putting a Leash on Aipresentation
592023/08/07 : C0c0n : Talk : Serverless Siege Aws Lambda Pentestingpresentation
602023/08/07 : C0c0n : Talk : Shifting Left Blockchain Development for Safer Dappspresentation
612023/08/07 : C0c0n : Talk : Smart Contract Phishing Attack & Defensepresentation
622023/08/07 : C0c0n : Talk : Start Left SDLC Security With Open Source Dev Sec Ops Toolingpresentation
632023/08/07 : C0c0n : Talk : Tackling Advanced Threat Landscape With Mdr Best Practicespresentation
642023/08/07 : C0c0n : Talk : The Dpdpa Effect Jubilation, Twinge and Reticence That Followedpresentation
652023/08/07 : C0c0n : Talk : Trust Resiliency a Lesson Learned From Russia Ukraine Warpresentation
662023/08/07 : C0c0n : Talk : Uncovering Azure's Silent Threats a Story of Cloud Vulnerabilitiespresentation
672023/08/07 : C0c0n : Talk : Uncovering the Hidden Dangers Lurking as Android Apps Using Ml Algospresentation
682023/08/06 : C0c0n : Talk : A Secure Privacy Preserving Lightweight Authentication Scheme for Internet of Medical Thingspresentation
692023/08/06 : C0c0n : Talk : Ai in Cyber Security and Crime Preventionpresentation, Video
702023/08/06 : C0c0n : Talk : Cbdc and Future of Financepresentation
712023/08/06 : C0c0n : Talk : Cryptocurrencies and Challenges to Law Enforcement Agenciespresentation, Video
722023/08/06 : C0c0n : Talk : Cybercrimes Victim Compensation Legal Remedies and Processpresentation, Video
732023/08/06 : C0c0n : Talk : Cybersecurity in the Era of Aipresentation
742023/08/06 : C0c0n : Talk : Dark Web for Investigationspresentation, Video
752023/08/06 : C0c0n : Talk : Developments in Deep Fake Detectionpresentation, Video
762023/08/06 : C0c0n : Talk : Digital Innovation and Its Impact on Cios, Cisos and Dpospresentation, Video
772023/08/06 : C0c0n : Talk : Emerging Crimes and Threat Landscape in Cyber Domain and the Need for International Cooperationpresentation
782023/08/06 : C0c0n : Talk : Expanding Capability Horizons Homelabs and Beyondpresentation
792023/08/06 : C0c0n : Talk : Influence of Artificial Intelligence in Grc Spacepresentation, Video
802023/08/06 : C0c0n : Talk : Insider Threats Best Practices and Common Pitfallspresentation
812023/08/06 : C0c0n : Talk : Mitigating Ssrf at Scale the Right Way With Imdsv2!presentation
822023/08/06 : C0c0n : Talk : Playing Cat and Mouse With the Adversary Sometimes a Breach Is Inevitablepresentation
832023/08/06 : C0c0n : Talk : Russia Ukraine Warfare – A Shift in Cyber Threat Landscapepresentation
842023/08/06 : C0c0n : Talk : Securing the Future Addressing Cybersecurity Challenges in the Age of 5 Gpresentation
852023/08/06 : C0c0n : Talk : Subduing Adversaries With Information Superioritypresentation
862023/08/06 : C0c0n : Talk : Survivability in the Cyber Worldpresentation
872023/08/06 : C0c0n : Talk : Surviving in Dependency Hellpresentation
882023/08/06 : C0c0n : Talk : Taking a Closer Look at Ci Cd Pipeline Logs Extracting Security Related Information With Build Inspectorpresentation
892023/08/06 : C0c0n : Talk : The New Way to Be Securepresentation
902023/08/06 : C0c0n : Talk : Time to Choose Conventional Cti or Next Gen External Threat Landscape Managementpresentation
912023/05/12 : Blackhat : Talk : Abusing Azure Active Directory From Mfa Bypass to Listing Global Administratorspresentation
922023/05/12 : Blackhat : Talk : Engaging the Next Generation of Cybersecurity Professionals the Power of Security Zinespresentation
932023/05/12 : Blackhat : Tool Demo : Introducing the Operating System for Automotive Security Testing a Hands on DemonstrationSource Code
942023/05/11 : Blackhat : Talk : Bypassing Anti Cheats & Hacking Competitive Gamespresentation
952023/05/11 : Blackhat : Tool Demo : Kernel GoatSource Code
962022/12/08 : Blackhat : Tool Demo : Industrial Control Systems Capture the Train!Source Code
972022/09/29 : Brucon : Talk : 0wn Premises Bypassing Microsoft Defender for Identitypresentation
982022/09/28 : Rootcon : Talk : Gazing Into the Crystal Ball the Fog of Cyberwarfare Escalationspresentation, Video
992022/09/24 : C0c0n : Talk : Bec, Still the Sure Shot Trappresentation, Video
1002022/09/24 : C0c0n : Talk : Building Smart, Resilient and Sustainable Cyber Eco Systempresentation, Video
1012022/09/24 : C0c0n : Talk : Canalyse a Vehicle Network Analysis and Attack Toolpresentation, Video
1022022/09/24 : C0c0n : Talk : Citizen Mobile Security ( Icamps)presentation, Video
1032022/09/24 : C0c0n : Talk : Cryptocurrency Forensicspresentation, Video
1042022/09/24 : C0c0n : Talk : Cyber Defence and Role of Private Players Public Private Partnershippresentation, Video
1052022/09/24 : C0c0n : Talk : Deep Learning to Detect Network Attackspresentation, Video
1062022/09/24 : C0c0n : Talk : In Production With Grc for Cloudpresentation, Video
1072022/09/24 : C0c0n : Talk : Introduction to Rfid Nfc Hackingpresentation, Video
1082022/09/24 : C0c0n : Talk : Know Your Organization? Mapping Entities in Google Workspacepresentation, Video
1092022/09/24 : C0c0n : Talk : Need for Advanced Socpresentation, Video
1102022/09/24 : C0c0n : Talk : OSI Nt Tools and Techniquespresentation, Video
1112022/09/24 : C0c0n : Talk : Power of Narratives in Cyber Securitypresentation, Video
1122022/09/24 : C0c0n : Talk : Raining Cves on Wordpress Plugins With Semgreppresentation, Video
1132022/09/24 : C0c0n : Talk : Rationalizing Cyber Security Risk in Risk Languagepresentation, Video
1142022/09/24 : C0c0n : Talk : Towards an Effective Intrusion Detection System Framework for Multi Channel Man in the Middle Attacks Against Protected Wi Fi Networkspresentation, Video
1152022/09/24 : C0c0n : Talk : Weaponising Social Media for Psychological Operationspresentation, Video
1162022/09/24 : C0c0n : Talk : Web3 Security Security in Meta Verse, and the New World of Web3presentation, Video
1172022/09/23 : C0c0n : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actorpresentation, Video
1182022/09/23 : C0c0n : Talk : Attacking Connected Industries in 5 G Networkspresentation, Video
1192022/09/23 : C0c0n : Talk : Battle of 300 Crore How They Lost It and Got Most of It Backpresentation, Video
1202022/09/23 : C0c0n : Talk : Bridging the Gap Between Security and Operationspresentation, Video
1212022/09/23 : C0c0n : Talk : Building a Safer and Innovative Digital Ecosystempresentation, Video
1222022/09/23 : C0c0n : Talk : Collaborative Efforts for Safe Digital Bankingpresentation, Video
1232022/09/23 : C0c0n : Talk : Common Misconfigurations in Your Kubernetes Cluster and What Can You Do About It?presentation, Video
1242022/09/23 : C0c0n : Talk : Cybersecurity for Manufacturingpresentation, Video
1252022/09/23 : C0c0n : Talk : Hacking Smart Contractspresentation, Video
1262022/09/23 : C0c0n : Talk : Hyperledger Fabric & Ethereum Apps Security Deep Divepresentation, Video
1272022/09/23 : C0c0n : Talk : Log4j Vulnerability Continuous to Be Favourite for Apt Groups Through Mid 2022presentation, Video
1282022/09/23 : C0c0n : Talk : Pwning Android Apps at Scalepresentation, Video
1292022/09/23 : C0c0n : Talk : Ransomware Prevention, Early Detection and Responsepresentation, Video
1302022/09/23 : C0c0n : Talk : Rolling Out Central Bank Digital Currency Technical Design Considerationspresentation, Video
1312022/09/23 : C0c0n : Talk : Securing Your Apis for a Cloud Native Futurepresentation, Video
1322022/09/23 : C0c0n : Talk : Startup Ecosystem and Investments in Post Covid Erapresentation, Video
1332022/09/23 : C0c0n : Talk : Technological Reliance for Resiliencepresentation, Video
1342022/09/23 : C0c0n : Talk : Threats Landscape and Intelligence of API & Shield to Protectpresentation, Video
1352022/09/23 : C0c0n : Talk : Tracking the Bad Guys. an Interesting Story of How the Criminal Underground Operatespresentation, Video
1362022/09/23 : C0c0n : Talk : Tropic Trooper Targets High Profile Victims Using Newly Discovered Mqtt Backdoorpresentation, Video
1372022/09/08 : Nullcon : Talk : Hack the Source Securing Open Source Software – One Bug at a Timepresentation
1382022/09/08 : Nullcon : Talk : The Different Faces of MAC Os Malware Detecting Anomalies in a Poisoned Applepresentation
1392022/09/08 : Nullcon : Tool Demo : Zaa S [ Owasp] Zap as a Service Continous Security for 20 K ApisSource Code
1402022/09/07 : Nullcon : Talk : Electro Volt Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electronpresentation
1412022/09/07 : Nullcon : Talk : Scale Hacking to Secure Your Cloud and Beyondpresentation
1422022/08/14 : Defcon : Talk : Tales From the Trenches Why Organizations Struggle to Get Even the Basics of Ot Asset Visibility & Detection Rightpresentation, Video
1432022/08/12 : Defcon : Talk : Stop Worrying About Nation States and Zero Days; Let's Fix Things That Have Been Known for Yearspresentation
1442022/08/10 : Blackhat : Tool Demo : Caspr Code Trust Audit FrameworkSource Code
1452022/04/08 : Nullcon : Talk : Attack Surfaces for 5 G Networkspresentation
1462022/04/08 : Nullcon : Talk : Bheem Os a Next Generation Reasonably Secure Os Using Rust Micro Vmpresentation
1472021/11/18 : Hackinparis : Talk : { Internet of Things or Threats} Anatomizing the Structure of Io T Botnetspresentation
1482021/11/18 : Hackinparis : Talk : Is It Really an Intrusion if You Get Called In? Mis Configuration Based Attacks in Awspresentation, Video
1492021/11/13 : C0c0n : Talk : Decoding New Age Hackers and Criminal Investigationpresentation, Video
1502021/11/13 : C0c0n : Talk : A Look Into Cyber Espionage Activities Targeting Critical Infrastructure in Indiapresentation, Video
1512021/11/13 : C0c0n : Talk : Building Global Cyber Security Company Out of India Key Lessons Learnt During My Entrepreneurship Journeypresentation, Video
1522021/11/13 : C0c0n : Talk : Case Study Cyber Heist in a Bank and Recovery of Systems and Moneypresentation, Video
1532021/11/13 : C0c0n : Talk : Case Study E Crime Group Targeting Mobile Userspresentation, Video
1542021/11/13 : C0c0n : Talk : Changing Cyber Security Paradigm & Cyber Tsunamipresentation, Video
1552021/11/13 : C0c0n : Talk : Cloud Threat Landscapepresentation, Video
1562021/11/13 : C0c0n : Talk : Connecting the Dots Between Customers and Security Teamspresentation, Video
1572021/11/13 : C0c0n : Talk : Crisis Capitalization in a Pandemicpresentation, Video
1582021/11/13 : C0c0n : Talk : Cyber Warfare & Securing Critical Infrastructurespresentation, Video
1592021/11/13 : C0c0n : Talk : Cybersecurity in the Era of Resilience a Walk Through People, Process and Technologypresentation, Video
1602021/11/13 : C0c0n : Talk : Emerging Trends in Cyber Crimes Investigation Tools & Techniquespresentation, Video
1612021/11/13 : C0c0n : Talk : Enhancing an Multi Factor Authentication ( Mfa) Through Behavioural Biometricspresentation, Video
1622021/11/13 : C0c0n : Talk : Exploiting 2 A( Authentication and Authorization) Vulnerabilities of Web Applicationpresentation, Video
1632021/11/13 : C0c0n : Talk : Introducing Free & Open Elastic Limitless Xdrpresentation, Video
1642021/11/13 : C0c0n : Talk : Light Basin Telecom Roaming Network Attack Case Studypresentation
1652021/11/13 : C0c0n : Talk : Machine Learning to Detect Chia Miningpresentation, Video
1662021/11/13 : C0c0n : Talk : Mature Your Threat Hunting Programpresentation, Video
1672021/11/13 : C0c0n : Talk : Need for Zero Trust in Bankingpresentation, Video
1682021/11/13 : C0c0n : Talk : New Way of Looking at the Hidden Mysteries in the Codepresentation, Video
1692021/11/13 : C0c0n : Talk : Painting Your Organizations With Shades of Red, Blue & Purplepresentation
1702021/11/13 : C0c0n : Talk : Post Pandemic Transformation a Ciso's Perspectivepresentation, Video
1712021/11/13 : C0c0n : Talk : Securing Ot in O& G Industrypresentation, Video
1722021/11/13 : C0c0n : Talk : Third Party Risk Managementpresentation, Video
1732021/11/13 : C0c0n : Talk : Zero Trust & Micro Segmentationpresentation, Video
1742021/11/12 : C0c0n : Talk : “ Let’s Go Phishing” Discerning the Insidious Nature of Social Engineeringpresentation, Video
1752021/11/12 : C0c0n : Talk : 2021 Supply Chain Attacks Analysispresentation, Video
1762021/11/12 : C0c0n : Talk : Data Security and Privacypresentation, Video
1772021/11/12 : C0c0n : Talk : Dissecting Malicious Software and Analysispresentation, Video
1782021/11/12 : C0c0n : Talk : Enterprise Governance and Risk Managementpresentation, Video
1792021/11/12 : C0c0n : Talk : Executive Presence....a Cardinal of the Cyber Rostrumpresentation, Video
1802021/11/12 : C0c0n : Talk : Ics Security a Need, a Challenge and a New Change in Mindsetpresentation, Video
1812021/11/12 : C0c0n : Talk : Io T Security Guidelines & Standardspresentation, Video
1822021/11/12 : C0c0n : Talk : Post Covid Cisos Disappearing Trusted Boundaries and Innovative Cyber Security Approachespresentation, Video
1832021/11/12 : C0c0n : Talk : Regulating Social Media Platforms Should It Be Done in Democratic Societies ?presentation, Video
1842021/11/12 : C0c0n : Talk : The Evolving Nature of Cyber Communitypresentation, Video
1852021/11/12 : C0c0n : Talk : Understanding the Psychology Behind Threats Adding Twists to Your Turnspresentation, Video
1862021/11/04 : Ekoparty : Talk : Dial Did I Just Alert Lambda? a Centralized Security Misconfiguration Detection Systempresentation
1872021/10/15 : Rootcon : Talk : The Curious Case of Knowing the Unknownpresentation
1882021/10/13 : Rootcon : Tool Demo : Buzzard Crafting Your Post Exploitation Framework Against OddsSource Code
1892021/10/13 : Rootcon : Talk : The Kill Chain Future of Cyber in Defensepresentation
1902021/08/08 : Defcon : Talk : App Sec 101 a Journey From Engineer to Hackerpresentation
1912021/08/08 : Defcon : Talk : Top 20 Secure Plc Coding Practicespresentation
1922021/08/07 : Defcon : Tool Demo : Red Team Credentials Reconnaissance ( Old With a Twist)Source Code
1932021/08/07 : Defcon : Tool Demo : Tenacity an Adversary Emulation Tool for PersistenceSource Code
1942021/08/07 : Defcon : Talk : The Curious Case of Knowing the Unknownpresentation
1952021/08/06 : Defcon : Talk : Adversary Village Kick Offpresentation
1962021/08/06 : Defcon : Talk : Defending Io T in the Future of High Tech Warfarepresentation
1972021/08/05 : Defcon : Talk : The Bug Hunter’s Recon Methodologypresentation
1982021/08/04 : Blackhat : Tool Demo : Parse and C a Universal Parser and Data Visualization Tool for Security TestingSource Code
1992021/03/06 : Nullcon : Talk : Bug Hunter Adventurespresentation
2002021/03/05 : Nullcon : Talk : Arbitrary Code Execution on Risc v Using Fault Injectionpresentation
2012021/03/05 : Nullcon : Talk : Telecom Security Challenges in 5 Gpresentation
2022020/10/07 : Rootcon : Talk : Recon Pal Leveraging Nlp for Infosecpresentation
2032020/10/01 : Blackhat : Tool Demo : Wi Fi Access Point RootkitsSource Code
2042020/09/19 : C0c0n : Talk : Automate Your Recon With Recon Notepresentation
2052020/09/18 : C0c0n : Talk : Herd Immunity, in the Cyber Worldpresentation, Video
2062020/09/18 : C0c0n : Talk : How I Created My Clone Using Ai Next Gen Social Engineeringpresentation
2072020/09/18 : C0c0n : Talk : Introducing Sniper Phish a Web Email Spear Phishing Toolkitpresentation
2082020/09/18 : C0c0n : Talk : Kubernetes Goat Vulnerable by Design Kubernetes Cluster Environmentpresentation
2092020/09/18 : C0c0n : Talk : Web Application Hacking With Web Zgroundpresentation
2102020/09/18 : C0c0n : Talk : All About Iot Forensicspresentation, Video
2112020/09/18 : C0c0n : Talk : Automation in Bug Bounties to Work Smarterpresentation, Video
2122020/09/18 : C0c0n : Talk : Broken Cryptography & Account Takeoverpresentation, Video
2132020/09/18 : C0c0n : Talk : Coping With Digital Transformation a Ciso Perspectivepresentation
2142020/09/18 : C0c0n : Talk : Covid 19 Cyber Impact on Financial Sector and Remote Employeespresentation
2152020/09/18 : C0c0n : Talk : Cyber Security Shifts During Covid 19presentation
2162020/09/18 : C0c0n : Talk : Deep Learning for Intrusion Attempt Detectionpresentation, Video
2172020/09/18 : C0c0n : Talk : Demystifying Zero Trust a Real Worldpresentation
2182020/09/18 : C0c0n : Talk : My Top 3 Findings in Bug Bounty Journey Aiming for High Impact Issuespresentation, Video
2192020/09/18 : C0c0n : Talk : Offensive & Scope Based Reconpresentation
2202020/09/18 : C0c0n : Talk : Offensive Embedded Exploitation Getting Hands Dirty With Iot Embedded Device Security Testingpresentation
2212020/09/18 : C0c0n : Talk : Reverse Engineering Bare Metal Io T Firmwares Moving Beyond Linuxpresentation, Video
2222020/09/18 : C0c0n : Talk : Supercharging Your Initial Foothold in Red Team Engagementspresentation, Video
2232020/07/26 : Hitb Sec Conf : Talk : Swapping Asprin Formulas With Mdma While Red Teaming a Billion Dollar Companypresentation, Video
2242020/04/25 : Hitb Sec Conf : Talk : The State of Ics Security Then and Nowpresentation, Video
2252020/04/24 : Hitb Sec Conf : Talk : Commsec the State of Ics Security Then and Nowpresentation, Video
2262020/03/06 : Nullcon : Talk : Automated Classification of Web Application Attacks for Intrusion Detectionpresentation, Video
2272019/11/28 : Deepsec : Talk : Mastering Aws Pentesting and Methodologypresentation
2282019/11/01 : App Sec Day Australia : Talk : A Purple Team View of Serverless and Graph Ql Applicationspresentation, Video
2292019/11/01 : App Sec Day Australia : Talk : Protecting the Damned Deploying Insecure Applications at Scalepresentation
2302019/10/22 : Hacklu : Talk : Intro to Dark Arts Getting Started With Ctfspresentation, Video
2312019/09/28 : C0c0n : Talk : Vulnerability Prioritization With Threat Intelligencepresentation, Video
2322019/09/27 : C0c0n : Talk : A Day in the Life of a Cisopresentation, Video
2332019/09/27 : C0c0n : Talk : Advanced Persistent Threat and Counter Measurespresentation, Video
2342019/09/27 : C0c0n : Talk : Ai, Ml and Securitypresentation, Video
2352019/09/27 : C0c0n : Talk : Auto Source an Automated Framework for Source Code Reviewpresentation, Video
2362019/09/27 : C0c0n : Talk : Block Chain for Secured Automationpresentation, Video
2372019/09/27 : C0c0n : Talk : Building a Cloud Security Monitoring and Auditing Frameworkpresentation, Video
2382019/09/27 : C0c0n : Talk : Ciso Mind Setpresentation, Video
2392019/09/27 : C0c0n : Talk : Cyber Hygiene From Enterprise Point of Viewpresentation, Video
2402019/09/27 : C0c0n : Talk : Demystifying Health Care Securitypresentation, Video
2412019/09/27 : C0c0n : Talk : Detection of Tor Sources Using Artificial Intelligencepresentation, Video
2422019/09/27 : C0c0n : Talk : Doing Sec Ops for the Cloud Using Cloud Native Servicespresentation, Video
2432019/09/27 : C0c0n : Talk : Hacking Ics Devices for Funpresentation, Video
2442019/09/27 : C0c0n : Talk : Industry 4.0 Security and Compliancepresentation, Video
2452019/09/27 : C0c0n : Talk : Lessons Learned Form Data Breaches in the Cloudpresentation, Video
2462019/09/27 : C0c0n : Talk : Looking a Decade Ahead Big Data, Drones , Robots and Cyber Security.presentation, Video
2472019/09/27 : C0c0n : Talk : Offensive Machine Learning for Pentesters and Red Teamspresentation, Video
2482019/09/27 : C0c0n : Talk : Practical Approach to Cyber Security for Financial Institutionspresentation, Video
2492019/09/27 : C0c0n : Talk : Ransomware to Pay or Not to Paypresentation, Video
2502019/09/27 : C0c0n : Talk : Securing Payment Data With PC I Security Standards and Programspresentation, Video
2512019/09/27 : C0c0n : Talk : Security @Scale for Startupspresentation, Video
2522019/09/27 : C0c0n : Talk : Serverless Soarpresentation, Video
2532019/09/27 : C0c0n : Talk : Stepping Into Password Less Economypresentation, Video
2542019/09/23 : Rootcon : Talk : Hacking Ics Devices Plc's for Fun Ics and Iot Hackingpresentation
2552019/09/13 : 44 Con : Talk : One Person Army – Playbook on How to Be the First Security Engineer at a Companypresentation
2562019/08/11 : Defcon : Talk : Exploiting and Securing I Os Apps Using Owasp I Goatpresentation, Video
2572019/08/08 : Defcon : Talk : Anatomy of Cloud Hackingpresentation, Video
2582019/08/08 : Defcon : Talk : Hacking Ics Devices for Fun Penetration Testing of Vehicle Componentspresentation
2592019/08/07 : Blackhat : Tool Demo : Sastri Plug and Play Vm for Sast * Static Application Security Testing Realtime Integration*Source Code
2602019/08/05 : Blackhat : Tool Demo : Cert Pivot Infra Chaining Cert CheckSource Code
2612019/05/21 : Phdays : Talk : Fuzzing 101presentation, Video
2622019/05/21 : Phdays : Talk : Rapid Hardware Hacking 101presentation, Video
2632019/02/28 : Nullcon : Talk : A Hacker Walks Into a Co Working Spacepresentation
2642019/02/28 : Nullcon : Talk : Andromeda Gui Based Dynamic Instrumentation Toolkit Powered by Fridapresentation
2652019/02/28 : Nullcon : Talk : Attacking & Securing Health Care Standards & Hospital Secured Systemspresentation
2662019/02/28 : Nullcon : Talk : Building Hardened Io T Implementations With Lang Secpresentation
2672019/02/28 : Nullcon : Talk : Dirty Use of Ussd Codespresentation, Video
2682019/02/28 : Nullcon : Talk : Pentesting Without Pentesters Automating Security Testing With Functional Testing Test Casespresentation
2692018/11/29 : Deepsec : Talk : DNS Exfiltration and Out of Band Attackspresentation
2702018/11/02 : Hitb Sec Conf : Talk : Defending the Enterprise in 2018presentation, Video
2712018/11/02 : Hackfest : Talk : Exploiting Connected Medical Devices Lessons Learned & Data Earnedpresentation
2722018/10/19 : App Sec Day Australia : Talk : Continuous Integration and Delivery With Docker Containerspresentation
2732018/10/19 : App Sec Day Australia : Talk : Threat Modeling as Code & Automation for Dev Sec Ops Winspresentation
2742018/10/15 : Hacklu : Talk : Come to the Dark Side! We Have Radical Insurance Groups & Ransomwarepresentation
2752018/10/10 : Brucon : Talk : Forging Trusts for Deception in Active Directorypresentation
2762018/10/10 : Brucon : Talk : Simplifying the Art of Instrumentationpresentation, Video
2772018/10/05 : C0c0n : Talk : Defending Cloud Infrastructures With Cloud Security Suitepresentation, Video
2782018/10/05 : C0c0n : Talk : DNS Exfiltration and Out of Band Attackspresentation, Video
2792018/10/05 : C0c0n : Talk : Adaptive Grcpresentation, Video
2802018/10/05 : C0c0n : Talk : Artificial Intelligence and Social Media Analytics in Criminal Investigationpresentation, Video
2812018/10/05 : C0c0n : Talk : Blockchains as Techno Power Structures Towards Emergence of P2 P Politicspresentation, Video
2822018/10/05 : C0c0n : Talk : Cyber Security in Health Care Industrypresentation, Video
2832018/10/05 : C0c0n : Talk : Cybersecurity Embedded Digital Transformation the Futurepresentation, Video
2842018/10/05 : C0c0n : Talk : Data Management Challenge for Privacy Compliancepresentation, Video
2852018/10/05 : C0c0n : Talk : Dealing With Changing Threat Landscapepresentation, Video
2862018/10/05 : C0c0n : Talk : Defending Healthcare Basepresentation, Video
2872018/10/05 : C0c0n : Talk : Digital Innovation Revolution in Kerala Governmentpresentation, Video
2882018/10/05 : C0c0n : Talk : Dom Goat the Dom Security Playgroundpresentation, Video
2892018/10/05 : C0c0n : Talk : Future of Mobility & Cyber Securitypresentation, Video
2902018/10/05 : C0c0n : Talk : How Can We Use Machine Learning to Prevent Frauds and Password Breachespresentation, Video
2912018/10/05 : C0c0n : Talk : OSI Nt Indian Citizen Editionpresentation, Video
2922018/10/05 : C0c0n : Talk : Predictive Policing Using Big Data Analytics.presentation, Video
2932018/10/05 : C0c0n : Talk : Privacy and Data Protection Stakeholders’ Perspectivespresentation, Video
2942018/10/05 : C0c0n : Talk : Resiliency Focus Alongside Digital Disruptionpresentation, Video
2952018/10/05 : C0c0n : Talk : Scanda to Unbosom Malware Behaviorpresentation, Video
2962018/10/05 : C0c0n : Talk : Taking Cyber Security to the Board Roompresentation, Video
2972018/10/05 : C0c0n : Talk : Unconventional Vulnerabilities in Google Cloud Platformpresentation, Video
2982018/10/05 : C0c0n : Talk : Using Fault Injection for Forensicspresentation, Video
2992018/10/05 : C0c0n : Talk : Will Artificial Intelligence and Machine Learning Bring More Threats on Cyber Security?presentation, Video
3002018/09/06 : Grrcon : Talk : Analyzing Multi Dimensional Malware Datasetpresentation
3012018/08/10 : Defcon : Talk : Building Visualisation Platforms for OSI Nt Data Using Open Source Solutionspresentation
3022018/08/09 : Defcon : Talk : Backdooring Dvr Nvr Devicespresentation, Video
3032018/08/08 : Blackhat : Tool Demo : Darwin Real World Use Cases for Covert WirelessSource Code
3042018/08/08 : Blackhat : Tool Demo : Sco Da Smart Contract Defender and AnalyzerSource Code
3052018/03/01 : Nullcon : Talk : Darwin ( a Parasite Covert Wireless Network)presentation
3062018/03/01 : Nullcon : Talk : Spot Phish Zero Hour Phishing Protectionpresentation
3072017/11/20 : Hackfest : Talk : How My Sv Machine Nailed Your Malwarepresentation, Video
3082017/11/17 : Deepsec : Talk : How Secure Are Your Vo Lte and Vo Wi Fi Calls?presentation
3092017/10/19 : Hacklu : Talk : Are Your Vo Lte and Vo Wi Fi Calls Secure?presentation
3102017/10/19 : Hacklu : Talk : Bug Hunting Using Symbolic Virtual Machines!presentation
3112017/10/19 : Hacklu : Talk : Intel Amt Using & Abusing the Ghost in the Machinepresentation
3122017/08/18 : C0c0n : Talk : Hunting Botnets With Analyticspresentation, Video
3132017/08/18 : C0c0n : Talk : Phishing Threats to Customers and Mitigationpresentation, Video
3142017/08/18 : C0c0n : Talk : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Workpresentation, Video
3152017/08/18 : C0c0n : Talk : Androsia a Tool for Securing in Memory Sensitive Datapresentation, Video
3162017/08/18 : C0c0n : Talk : Anti Virus Bypassing for Fun and Profitpresentation, Video
3172017/08/18 : C0c0n : Talk : Bank on Compliance for Cyber Securitypresentation, Video
3182017/08/18 : C0c0n : Talk : Big Data Analytics With Pattern Matching for Smarter Analyticspresentation, Video
3192017/08/18 : C0c0n : Talk : Blockchain for Information Securitypresentation, Video
3202017/08/18 : C0c0n : Talk : Case Study Security of Digital Wallet Apps in Indiapresentation, Video
3212017/08/18 : C0c0n : Talk : Catching Network Anomalies Using Deep Learningpresentation, Video
3222017/08/18 : C0c0n : Talk : Challenges in Digital Bankingpresentation, Video
3232017/08/18 : C0c0n : Talk : Cloud Security Suite One Stop Tool for Auditing Cloud Infrastructurepresentation, Video
3242017/08/18 : C0c0n : Talk : Co Ap Versus Mqtt Io T Protocol Vulnerability Analysispresentation, Video
3252017/08/18 : C0c0n : Talk : Cyber Bullying and Cyber Harassmentpresentation, Video
3262017/08/18 : C0c0n : Talk : Cyber Bullying Screen the Meanpresentation, Video
3272017/08/18 : C0c0n : Talk : Cyber Security Threat Management – Model It, Collect Intelligence and Hunt Them!presentation, Video
3282017/08/18 : C0c0n : Talk : Cyber Threat Intelligence Are We There , Yet…?presentation, Video
3292017/08/18 : C0c0n : Talk : Do Students Really Require Smartphonespresentation, Video
3302017/08/18 : C0c0n : Talk : Dynamic Binary Instrumentationpresentation, Video
3312017/08/18 : C0c0n : Talk : Exploiting the Smartness of Ble Stackpresentation, Video
3322017/08/18 : C0c0n : Talk : Hacking Homes a Hardware Insight for Io T [In] Securitypresentation, Video
3332017/08/18 : C0c0n : Talk : Hunting the Hunters – Fighting Cyber Crime at the Sourcepresentation, Video
3342017/08/18 : C0c0n : Talk : Identity Theftpresentation, Video
3352017/08/18 : C0c0n : Talk : I Goat – A Self Learning Tool for I Os App Pentesting and Securitypresentation, Video
3362017/08/18 : C0c0n : Talk : Internet Addiction and Childrenpresentation, Video
3372017/08/18 : C0c0n : Talk : Mobile Banking ( In) Securitypresentation, Video
3382017/08/18 : C0c0n : Talk : Moving From Cybersecurity Awareness to Cybersecurity Competencepresentation, Video
3392017/08/18 : C0c0n : Talk : OSI Nt and Privacypresentation, Video
3402017/08/18 : C0c0n : Talk : Penetration Testing Orchestrator a Framework That Leverages Multi Tool Penetration Testing Approach Combined With Machine Learning Nlp for Faster Result Analysispresentation, Video
3412017/08/18 : C0c0n : Talk : Prevent Dark Side of Your Smart City a Defensive Security Model for Smart City and Critical Infrastructurepresentation, Video
3422017/08/18 : C0c0n : Talk : Sleep, Screen and Teenagerspresentation, Video
3432017/08/18 : C0c0n : Talk : Social Media and Youpresentation, Video
3442017/08/18 : C0c0n : Talk : Technology the New Frontier in Teachingpresentation, Video
3452017/08/18 : C0c0n : Talk : The Card Hack Lessons From the Hitachi Payments Breachpresentation, Video
3462017/08/18 : C0c0n : Talk : The Covert Cupid Under .11 Veil !!! * Approach for Covert Wifi*presentation, Video
3472017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)ypresentation, Video
3482017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)ypresentation, Video
3492017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technologypresentation, Video
3502017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technologypresentation, Video
3512017/08/18 : C0c0n : Talk : The Role of Teachers in Digital Erapresentation, Video
3522017/08/18 : C0c0n : Talk : Threats With Online Gaming and Issues With Games Like Pokemonpresentation, Video
3532017/08/18 : C0c0n : Talk : What Security Managers Can Learn From Story Tellers?presentation, Video
3542017/08/18 : C0c0n : Talk : Yarafying Android Malware a Missing Step Before Malware Analysispresentation, Video
3552017/08/18 : C0c0n : Talk : Your Friendly Neighbourhood Exploitpresentation, Video
3562017/07/29 : Defcon : Tool Demo : Widy 2.0 Wifi 0 Wnage in Under 5 ReloadedSource Code
3572017/07/29 : Defcon : Tool Demo : Wi Monitor an Open Wrt Package for Remote Wi Fi SniffingSource Code
3582017/07/27 : Defcon : Talk : Recon and Bug Bounties What a Great Love Storypresentation
3592017/03/30 : Blackhat : Tool Demo : Lamma 1.0Source Code
3602017/03/30 : Blackhat : Tool Demo : Damn Vulnerable Ss7 NetworkSource Code
3612017/03/30 : Blackhat : Tool Demo : Wi Dy Wi Fi 0wnage in Under 5Source Code
3622017/03/03 : Nullcon : Talk : Agility With Security Mitigations in Windows 10presentation, Video
3632017/03/03 : Nullcon : Talk : Breach Response Time to Shake Up the Status Quopresentation
3642017/03/03 : Nullcon : Talk : Securing Critical National Infrastructurepresentation
3652016/11/11 : Deepsec : Talk : Amsi How Windows 10 Plans to Stop Script Based Attacks and How Good It Does Thatpresentation
3662016/11/11 : Deepsec : Talk : Human vs Artificial Intelligence – Battle of Trustpresentation, Video
3672016/11/05 : Hackfest : Talk : Lock Picker Leaking Data From Live Luks Partitionpresentation, Video
3682016/10/27 : Brucon : Talk : Decepticon the Rise and Evolution of an Intelligent Evil Twin…!!!presentation
3692016/08/19 : C0c0n : Talk : Abusing Digital Certificates Malware Stylepresentation, Video
3702016/08/19 : C0c0n : Talk : App Sec in the Time of Docker Containerspresentation, Video
3712016/08/19 : C0c0n : Talk : Backdooring My Enemies With a Proxy for Threat Intelligencepresentation, Video
3722016/08/19 : C0c0n : Talk : Breaking Into Gas Stations!presentation, Video
3732016/08/19 : C0c0n : Talk : Evading Corporate Security – You’re as Secure as the Weakest Linkpresentation, Video
3742016/08/19 : C0c0n : Talk : How (In)secure Are Indian Gsm Networks?presentation, Video
3752016/08/19 : C0c0n : Talk : Kill the Password a New Era of Authenticationpresentation, Video
3762016/08/19 : C0c0n : Talk : Ssd Forensics a Nightmare for Forensic Investigatorspresentation, Video
3772016/08/19 : C0c0n : Talk : The Art of Social Hackingpresentation, Video
3782016/07/01 : Hackinparis : Talk : Diffdroid Dynamic Analysis Made Easier for Androidpresentation
3792016/05/26 : Hitb Sec Conf : Talk : Hitb Lab Mobile Application Security for I Os and Androidpresentation, Video
3802016/05/17 : Phdays : Talk : Security Automation Based on Artificial Intelligencepresentation
3812016/03/11 : Nullcon : Talk : Hitchhiker's Guide to Hacking Industrial Control Systems ( Ics)presentation, Video
3822016/03/11 : Nullcon : Talk : Million Dollar Baby Towards Angrly Conquering Darpa Cgcpresentation, Video
3832015/11/19 : Deepsec : Talk : Continuous Intrusion Why Ci Tools Are an Attacker's Best Friends.presentation
3842015/11/05 : Ground Zero Summit : Talk : Cyber Security in Hospitals Hospitals Under Seigepresentation, Video
3852015/11/05 : Ground Zero Summit : Talk : Exposing Cyber Espionage Hello From Pakistan Iic Sessionpresentation, Video
3862015/11/05 : Ground Zero Summit : Talk : Western Air Commandpresentation, Video
3872015/11/05 : Ground Zero Summit : Talk : Authentication Flaw in Automatic Bank Passbook Printing Machine.presentation, Video
3882015/11/05 : Ground Zero Summit : Talk : Browser Based Malware Attackspresentation, Video
3892015/11/05 : Ground Zero Summit : Talk : Chellam – A Wi Fi ID S Firewall for Windowspresentation, Video
3902015/11/05 : Ground Zero Summit : Talk : Credit Card Frauds – The Money Making Ecosystem for Cyber Criminalspresentation, Video
3912015/11/05 : Ground Zero Summit : Talk : Dissecting Android Malwarepresentation, Video
3922015/11/05 : Ground Zero Summit : Talk : Economics of Post Quantum Crypto Systems Do We Really Need Itpresentation, Video
3932015/11/05 : Ground Zero Summit : Talk : Elliptical Curve Cryptographypresentation, Video
3942015/11/05 : Ground Zero Summit : Talk : Hacking Rfids Under 2000 Inrpresentation, Video
3952015/11/05 : Ground Zero Summit : Talk : Sanctioned to Hack Your Scada Hmis Belong to Us!presentation, Video
3962015/11/05 : Ground Zero Summit : Talk : Thanks for the Free Cookiespresentation, Video
3972015/11/05 : Ground Zero Summit : Talk : Trailing Terror in the Darknetspresentation, Video
3982015/11/05 : Ground Zero Summit : Talk : Wolves Among Sheep Defeating Targeted Attacks With Deceptionpresentation, Video
3992015/11/05 : Ground Zero Summit : Talk : Xss the Art of Evading Web Application Filters!presentation, Video
4002015/08/09 : Defcon : Talk : 802.11 Monitoring With PC Ap2 Xml Sqlitepresentation
4012015/08/08 : Defcon : Talk : Chigula — A Framework for Wi Fi Intrusion Detection and Forensicspresentation
4022015/08/08 : Defcon : Talk : Dissecting the Design of Scada Web Human Machine Interfaces ( Hmis) Hunting Vulnerabilitiespresentation
4032015/08/08 : Defcon : Talk : Powershell for Penetraton Testerspresentation
4042015/08/07 : Defcon : Talk : Getting Into the Trust Store We Trustpresentation, Video
4052015/08/07 : Defcon : Talk : Hacker's Practice Groundpresentation
4062015/08/06 : Blackhat : Tool Demo : ChellamSource Code
4072015/08/01 : C0c0n : Talk : A Pentester's Methodology to Discover, Automate and Exploit Windows Privilege Escalation Flaws.presentation, Video
4082015/08/01 : C0c0n : Talk : Attack Chaining for Web Exploitation From Information Leakage to Gaining Root Accesspresentation, Video
4092015/08/01 : C0c0n : Talk : Blockchains in Securitypresentation, Video
4102015/08/01 : C0c0n : Talk : Breaking Into Infosec Researchpresentation, Video
4112015/08/01 : C0c0n : Talk : Demystifying and Breaking Blepresentation, Video
4122015/08/01 : C0c0n : Talk : From Aosp ( Android Open Source Project ) to Abd ( Android Based Devices )presentation, Video
4132015/08/01 : C0c0n : Talk : Hacking Rfids Under 2000 Inrpresentation, Video
4142015/08/01 : C0c0n : Talk : Medical Device Security and Critical Infrastructure Inside Hospitalspresentation, Video
4152015/08/01 : C0c0n : Talk : No Po the No SQL Honey Pot Frameworkpresentation, Video
4162015/08/01 : C0c0n : Talk : Reversing and Deciphering the Cyber Espionage Malware Communicationspresentation, Video
4172015/08/01 : C0c0n : Talk : S3curi7y at 36 K Feetpresentation, Video
4182015/05/26 : Phdays : Talk : Invisible Backdoors in Your Codepresentation, Video
4192015/02/06 : Nullcon : Talk : Building Security and Compliance Into the Software Delivery Processpresentation, Video
4202015/02/06 : Nullcon : Talk : Toliman, a Hadoop Pentesting Toolpresentation, Video
4212014/11/13 : Ground Zero Summit : Talk : Attacking Cryptography & Pki Implementationspresentation, Video
4222014/11/13 : Ground Zero Summit : Talk : Identity Theft and Its Impact on Cyber Warfarepresentation, Video
4232014/11/13 : Ground Zero Summit : Talk : Network Time Protocol in Amplification Infernopresentation, Video
4242014/11/13 : Ground Zero Summit : Talk : Security Vulnerabilities in Dvb C Networks Hacking Cable Tv Networkpresentation, Video
4252014/11/13 : Ground Zero Summit : Talk : 9 Cell Cyber Diplomacypresentation, Video
4262014/11/13 : Ground Zero Summit : Talk : Apt Protection for the Enterprisepresentation, Video
4272014/11/13 : Ground Zero Summit : Talk : Attacking Web Proxies Like Never Beforepresentation, Video
4282014/11/13 : Ground Zero Summit : Talk : Cyber ' Brah Mos' Static Analysis Driven Secure Codingpresentation, Video
4292014/11/13 : Ground Zero Summit : Talk : Detecting Fake Cell Phone Towerspresentation, Video
4302014/11/13 : Ground Zero Summit : Talk : Enterprise Securitypresentation, Video
4312014/11/13 : Ground Zero Summit : Talk : Evaluating Waf ( Web Application Firewall) for Fun and Profit With Wofpresentation, Video
4322014/11/13 : Ground Zero Summit : Talk : Financial Integrity and Cyber Securitypresentation, Video
4332014/11/13 : Ground Zero Summit : Talk : Fuzzing Asynchronous Protocols Built Over Websocketspresentation, Video
4342014/11/13 : Ground Zero Summit : Talk : Hacking Consumer Electronics for Funpresentation, Video
4352014/11/13 : Ground Zero Summit : Talk : How I Won Browser Fuzzingpresentation, Video
4362014/11/13 : Ground Zero Summit : Talk : Internet Governancepresentation, Video
4372014/11/13 : Ground Zero Summit : Talk : Mobile Security Automation Framework for Intelligent Auditingpresentation, Video
4382014/11/13 : Ground Zero Summit : Talk : National Cyber Policy and Its Impact on Businesspresentation, Video
4392014/11/13 : Ground Zero Summit : Talk : Scada Exploitation Through Firmwarepresentation, Video
4402014/11/13 : Ground Zero Summit : Talk : Vulnerability Reproduction Using Zestpresentation, Video
4412014/10/23 : Hacklu : Talk : Wi Hawk Router Vulnerability Scannerpresentation, Video
4422014/10/17 : Blackhat : Talk : Android Kernel and Os Security Assessment With Iron Crowpresentation
4432014/10/16 : Grrcon : Talk : Socioware Dissecting Online Social Network Worms – Insidious Analysis and Designpresentation, Video
4442014/09/24 : Brucon : Talk : Owasp Owtfpresentation, Video
4452014/08/22 : C0c0n : Talk : Apt Case Study of Attackers Targeting Public Tenderingpresentation, Video
4462014/08/22 : C0c0n : Talk : Breaking and Securing Mobile Apps Automagicallypresentation, Video
4472014/08/22 : C0c0n : Talk : Cryptocalypse, Heart Bleed Is Our Government Listening?presentation, Video
4482014/08/22 : C0c0n : Talk : Cryptographic Backdoors Subverting the Rsapresentation, Video
4492014/08/22 : C0c0n : Talk : Exploiting No SQL Like Never Beforepresentation, Video
4502014/08/22 : C0c0n : Talk : Hacking Communicationpresentation, Video
4512014/08/22 : C0c0n : Talk : Idle Machines Doing Bounty Hunting ( Behind Your Back)presentation, Video
4522014/08/22 : C0c0n : Talk : Lesser Known Attack Xml Injectionpresentation, Video
4532014/08/22 : C0c0n : Talk : Piracy Trackerpresentation, Video
4542014/08/22 : C0c0n : Talk : Still Single With a Bleeding Heart ( Tool Release)presentation, Video
4552014/08/22 : C0c0n : Talk : The Curious Case of Proto Bufs Demystifying Google's Hottest Binary Protocolpresentation, Video
4562014/05/21 : Phdays : Talk : Android Exploitationpresentation
4572014/05/21 : Phdays : Talk : Arm Exploitationpresentation
4582014/02/15 : Nullcon : Tool Demo : Drup SnipeSource Code
4592014/02/14 : Nullcon : Talk : Hacking You'r Cable Tv Network.presentation
4602014/02/14 : Nullcon : Talk : Multi Value W Fi What the Heck Is Itpresentation
4612014/02/14 : Nullcon : Talk : O' Dea Assertions Untwining the Security of the Saml Protocolpresentation
4622014/02/14 : Nullcon : Talk : Strategic Information Warfare When Ends Define the Meanspresentation, Video
4632013/11/21 : Deepsec : Talk : Automation in Android & I Os Application Security Reviewpresentation, Video
4642013/11/21 : Deepsec : Talk : Europe in the Carna Botnet Telnet's Threat to the Largest Economypresentation
4652013/11/07 : Ground Zero Summit : Talk : Advanced Security for Advanced Threatspresentation, Video
4662013/11/07 : Ground Zero Summit : Talk : Approach to Containing the Outbreak of Malicious Information in Online Social Networkspresentation, Video
4672013/11/07 : Ground Zero Summit : Talk : Central Monitoring System and It Act 2000 – Balance Between Rights of Citizens and Statepresentation, Video
4682013/11/07 : Ground Zero Summit : Talk : Cloud Security Enabling Continuous, Scalable Security for Today’s Hyper Connected Worldpresentation, Video
4692013/11/07 : Ground Zero Summit : Talk : Evolution of Network Security Around Software Defined Networking ( Sdn) – The Intelligent Networkpresentation, Video
4702013/11/07 : Ground Zero Summit : Talk : How I Built a Pentest Lab in Under 70 Usdpresentation, Video
4712013/11/07 : Ground Zero Summit : Talk : Internet – Transforming Terrorismpresentation, Video
4722013/11/07 : Ground Zero Summit : Talk : Iron Wasppresentation, Video
4732013/11/07 : Ground Zero Summit : Talk : Malware for Firefox Mobile Ospresentation, Video
4742013/11/07 : Ground Zero Summit : Talk : Securing Government Critical Information Infrastructurepresentation, Video
4752013/11/07 : Ground Zero Summit : Talk : Serial Killing of Embedded Systemspresentation, Video
4762013/11/07 : Ground Zero Summit : Talk : Setting the Data Center on Firepresentation, Video
4772013/11/07 : Ground Zero Summit : Talk : The Seven Sins of Wi Fi Securitypresentation, Video
4782013/11/07 : Ground Zero Summit : Talk : Towards a Next Generation Secure Internetpresentation, Video
4792013/11/07 : Ground Zero Summit : Talk : Understanding the Anatomy of Advanced Targeted Attacks – The Trend Micro Approachpresentation, Video
4802013/09/27 : C0c0n : Talk : Arm, Thumb and the Fingerpresentation, Video
4812013/09/27 : C0c0n : Talk : Blur Captchapresentation, Video
4822013/09/27 : C0c0n : Talk : Disclosing Vulnerabilities the Bug Bounty Stylepresentation, Video
4832013/09/27 : C0c0n : Talk : From Bedroom to Boardroom Taking Your Weekend Infosec Project Globalpresentation, Video
4842013/09/27 : C0c0n : Talk : Hello Ciso! How to Make End Users Like and Follow “ Brand Infosec”?presentation, Video
4852013/09/27 : C0c0n : Talk : Infiltrating the Intranet With Skandapresentation, Video
4862013/09/27 : C0c0n : Talk : Lets Play Applanting on New Groundspresentation, Video
4872013/09/27 : C0c0n : Talk : Pwning Wi Fi Devices!presentation, Video
4882013/09/27 : C0c0n : Talk : Risk and Challenges in Virtual Currencies.presentation, Video
4892013/09/27 : C0c0n : Talk : Sandy the Malicious Analysispresentation, Video
4902013/09/27 : C0c0n : Talk : Ssrf Xspa Real World Attacks and Mitigationspresentation, Video
4912013/09/27 : C0c0n : Talk : The Art and Science of Anamoly Based Vulnerability Detectionpresentation, Video
4922013/09/27 : C0c0n : Talk : The Secure Software Development Life Cyclepresentation, Video
4932013/09/13 : Rootcon : Talk : My Experiments With Truth a Different Route to Bug Huntingpresentation, Video
4942013/09/12 : Grrcon : Talk : The Droid Exploitation Saga – All Over Again!presentation, Video
4952013/07/31 : Blackhat : Talk : Lte Booms With Vulnerabilitiespresentation, Video
4962013/03/01 : Nullcon : Talk : Automating Java Script Static Analysispresentation, Video
4972013/03/01 : Nullcon : Talk : Byod How Will It Shape Your Wireless Network Security in Future?presentation
4982013/03/01 : Nullcon : Talk : Capturing Zero Day Informationpresentation
4992013/03/01 : Nullcon : Talk : Csrf Finder as a Mozilla Addonpresentation
5002013/03/01 : Nullcon : Talk : Inception of Graphical Passwordspresentation
5012013/03/01 : Nullcon : Talk : Pawing the Droid Twisting the Armpresentation, Video
5022013/03/01 : Nullcon : Talk : Rest a Real Stealth and Semi Stealth Mitm Attack Tool for Ipv4 Networkspresentation
5032013/03/01 : Nullcon : Talk : Sensitive Campus Security With Networkpresentation
5042013/03/01 : Nullcon : Talk : Sms to Meterpreter Fuzzing USB Modemspresentation
5052013/03/01 : Nullcon : Talk : Vulnerability Research Anyone?presentation, Video
5062012/11/23 : Malcon : Talk : Advanced Malware Enginepresentation, Video
5072012/11/23 : Malcon : Talk : Surprise Paper!presentation, Video
5082012/11/23 : Malcon : Talk : Windows Phone 8 Malware Prototypepresentation, Video
5092012/10/23 : Hacklu : Talk : Buster Android Security Busterpresentation, Video
5102012/10/10 : Hitb Sec Conf : Talk : Innovative Approaches to Exploit Deliverypresentation
5112012/09/27 : Grrcon : Talk : The Realm of Third Generation Botnet Attackspresentation
5122012/09/26 : Nullcon : Talk : Forensics Timeline Analysispresentation
5132012/09/26 : Nullcon : Talk : Highly Harmful Audio Waves Aka Dtmf Fuzzingpresentation
5142012/09/26 : Nullcon : Talk : How Secure Is Internet Banking in Indiapresentation
5152012/09/26 : Nullcon : Talk : Opening the Kimono Automating Behavioral Analysis for Mobile Appspresentation
5162012/09/26 : Nullcon : Talk : The Art of Passive Web Vul Analysis With Iron Wasppresentation
5172012/09/20 : Ekoparty : Talk : Dirty Use of Ussd Codes in Cellular Networkpresentation
5182012/09/20 : Ekoparty : Talk : Fuzzing Dtmf Input Processing Algorithmspresentation, Video
5192012/09/05 : 44 Con : Talk : Why Integrity Is Left Alone and Not Given Tlc ( Tender, Love and Care) It Deserves?presentation
5202012/08/03 : C0c0n : Talk : Building Security Incident Detection & Handling Capabilities in Enterprisespresentation, Video
5212012/08/03 : C0c0n : Talk : Business Continuity and Risk Management in Turbulent Timespresentation, Video
5222012/08/03 : C0c0n : Talk : Contemporary Transcription and Resource Parasitismpresentation, Video
5232012/08/03 : C0c0n : Talk : Easy Money With Ui Redressingpresentation, Video
5242012/08/03 : C0c0n : Talk : Enterprise Server Securitypresentation, Video
5252012/08/03 : C0c0n : Talk : Evil Java Scriptpresentation, Video
5262012/08/03 : C0c0n : Talk : Gathering Security Requirementspresentation, Video
5272012/08/03 : C0c0n : Talk : Layer 8 Exploitation a Threat to National Securitypresentation, Video
5282012/08/03 : C0c0n : Talk : Security Incidents – Avoiding the Apocalypse in 2012presentation, Video
5292012/08/03 : C0c0n : Talk : The Management of Information Security – A Corporate Practitioner’s Perspectivepresentation, Video
5302012/08/03 : C0c0n : Talk : The Weakest Link Reinforcing the Human Elementpresentation, Video
5312012/02/15 : Nullcon : Talk : Application Security Cost Managementpresentation
5322012/02/15 : Nullcon : Talk : Attacking Backup Softwarepresentation
5332012/02/15 : Nullcon : Talk : Best Practices to Improve the Security Grading of Your Projectpresentation
5342012/02/15 : Nullcon : Talk : Captchas for Fun and Profitpresentation
5352012/02/15 : Nullcon : Talk : Content Sniffing Algorithm Bypassing Techniques and Possible Attack Vectorspresentation
5362012/02/15 : Nullcon : Talk : Cyberspace Global Commons or a National Assetpresentation, Video
5372012/02/15 : Nullcon : Talk : Friction in the Machinepresentation, Video
5382012/02/15 : Nullcon : Talk : Haxdroid Empowering Android Handsetpresentation
5392012/02/15 : Nullcon : Talk : Ivr Security Internal Network Attacks via Phone Linespresentation
5402012/02/15 : Nullcon : Talk : Node.js the Good, Bad and Uglypresentation
5412012/02/15 : Nullcon : Talk : Open Source Revolution Need Hardware Software Marriagepresentation, Video
5422012/02/15 : Nullcon : Talk : Sandboxing the Deep Truthpresentation
5432012/02/15 : Nullcon : Talk : Scada Security Why Is It So Hardpresentation, Video
5442012/02/15 : Nullcon : Talk : Teensy for Fun and Jugaadpresentation, Video
5452012/02/15 : Nullcon : Talk : Your Phone Is Your Phone but Your Calls Are Now My Callspresentation, Video
5462011/11/25 : Malcon : Talk : Advanced Malware for Apple Productspresentation, Video
5472011/11/25 : Malcon : Talk : Exploit the Exploit Kitspresentation, Video
5482011/11/25 : Malcon : Talk : Mareech Look It’s a Hid Made Up of Goldpresentation, Video
5492011/11/17 : Deepsec : Talk : Behavioral Security 10 Steps Forward 5 Steps Backwardpresentation
5502011/11/17 : Deepsec : Talk : Fake Anti Virus Journey From Trojan to a Persisent Threatpresentation, Video
5512011/11/04 : Hackfest : Talk : Here Are Your Keystrokespresentation, Video
5522011/10/13 : Hitb Sec Conf : Talk : Web Wars 3presentation, Video
5532011/10/08 : C0c0n : Talk : Stratagemizing Security Against Perpetrators in Cloud Infrastructurepresentation, Video
5542011/10/07 : C0c0n : Talk : Deep(er) Penetration Reaching the Internal Network Using Exposed Web Applicationspresentation, Video
5552011/10/07 : C0c0n : Talk : Digital Evidencepresentation, Video
5562011/10/07 : C0c0n : Talk : I Phone Jailbreakpresentation, Video
5572011/10/07 : C0c0n : Talk : Mobile Securitypresentation, Video
5582011/10/07 : C0c0n : Talk : Network Security Modern Mechanism for Intrusion Detection and Avoidance in a P2 P Networkpresentation, Video
5592011/10/07 : C0c0n : Talk : Paranoid Androidpresentation, Video
5602011/10/07 : C0c0n : Talk : Password Less Authentication, Authorizationpresentation, Video
5612011/10/07 : C0c0n : Talk : Runtime Thread Injection and Execution in Linux Processespresentation, Video
5622011/10/07 : C0c0n : Talk : Section 43 a It Act Compliancepresentation, Video
5632011/10/07 : C0c0n : Talk : Security and Privacy Risks of Cloud Computingpresentation, Video
5642011/10/07 : C0c0n : Talk : Wi Fi Malware for Fun and Profitpresentation, Video
5652011/09/19 : Hacklu : Talk : Linux Thread Injection the Jugaad Waypresentation, Video
5662011/09/19 : Brucon : Talk : Step by Step for Software Security (That Anyone Can Follow)presentation, Video
5672011/09/19 : Hacklu : Talk : The Travelling Hacksmithpresentation, Video
5682011/09/07 : Securitybyte : Talk : Data Protectionpresentation, Video
5692011/09/07 : Securitybyte : Talk : Social Web & Privacy – An Evolving Worldpresentation, Video
5702011/02/25 : Nullcon : Talk : Future of Cyber Crimes Limitations and Challengespresentation, Video
5712011/02/25 : Nullcon : Talk : Hacking the Parliament – A Classic Social Engineering Attackpresentation, Video
5722011/02/25 : Nullcon : Talk : Incident Management and Beyondpresentation, Video
5732011/02/25 : Nullcon : Talk : Jugaad Beta Linux Thread Injection Malware Po Cpresentation, Video
5742010/11/25 : Deepsec : Talk : Developers Are From Mars, Compliance Auditors Are From Venuspresentation
5752010/08/01 : C0c0n : Talk : Cloud Computing & Security Boon or Bane; Hype or Reality; Cloud Implementation Challenges a Live Case Studypresentation, Video
5762010/08/01 : C0c0n : Talk : Code Disclosure Over HTTPpresentation, Video
5772010/08/01 : C0c0n : Talk : Concept, Methodology and Challenges in Computer Forensicspresentation, Video
5782010/08/01 : C0c0n : Talk : Dangers and Dynamic Malware Analysispresentation, Video
5792010/08/01 : C0c0n : Talk : End Point Securitypresentation, Video
5802010/08/01 : C0c0n : Talk : Hackers' Eco System in Indiapresentation, Video
5812010/08/01 : C0c0n : Talk : Horses, Rats and Botspresentation, Video
5822010/08/01 : C0c0n : Talk : Last Line of Defense Host Intrusion Prevention and Secure Application Development.presentation, Video
5832010/08/01 : C0c0n : Talk : Mobile Securitypresentation, Video
5842010/08/01 : C0c0n : Talk : Overview of Cyber Legal Systems in Indiapresentation, Video
5852010/08/01 : C0c0n : Talk : Vo IP Securitypresentation, Video
5862010/08/01 : C0c0n : Talk : Wireless Mitmpresentation, Video
5872010/08/01 : C0c0n : Talk : Writing X86 Shell Code & Secure Self Modifying Code and Cross Platform Programming a Security Anglepresentation, Video
5882010/07/01 : Hitb Sec Conf : Talk : The Travelling Hacksmith 2009 – 2010presentation, Video
5892010/06/18 : Syscan : Talk : Reverse Engineering Web 2.0 Applicationspresentation, Video
5902010/02/25 : Nullcon : Talk : Imposter Ke Karnamey the Browser Phishing Tool.presentation, Video
5912010/02/25 : Nullcon : Talk : Quantum Computing Challenges in the Field of Securitypresentation, Video
5922009/12/04 : Clubhack : Talk : Facilitate Collaboration With Information Rights Managementpresentation, Video
5932009/11/19 : Deepsec : Talk : Top 10 Security Issues Developers Don't Know Aboutpresentation
5942009/11/18 : Securitybyte : Talk : Cloud Hacking – Distributed Attack & Exploit Platformpresentation, Video
5952009/11/17 : Securitybyte : Talk : Business Case Risk Management Compliance at Amitypresentation, Video
5962009/11/17 : Securitybyte : Talk : Business Continuity Case Studypresentation, Video
5972009/10/28 : Hacklu : Talk : Ownage 2.0presentation, Video
5982009/08/06 : C0c0n : Talk : Cyber Forensicspresentation, Video
5992009/08/06 : C0c0n : Talk : Cyber Victimisationpresentation, Video
6002009/08/06 : C0c0n : Talk : Information Security Auditpresentation, Video
6012009/08/06 : C0c0n : Talk : Information Security Management Practices Technical Issues and the Impact of Risk Management.presentation, Video
6022009/08/06 : C0c0n : Talk : Information Warfarepresentation, Video
6032009/08/06 : C0c0n : Talk : Know Your Enemy, and Yourself Demystifying Threat Modelinpresentation, Video
6042009/08/06 : C0c0n : Talk : Management & Security of Large Scale Storage Devicespresentation, Video
6052009/08/06 : C0c0n : Talk : Microsoft Security Strategiespresentation, Video
6062009/08/06 : C0c0n : Talk : Network Intrusions and Hackingpresentation, Video
6072009/05/19 : Syscan : Talk : Securing Applications at Gateway With Web Application Firewallspresentation, Video
6082009/05/19 : Syscan : Talk : Securing Enterprise Applicationspresentation, Video
6092008/11/13 : Deepsec : Talk : Game of Web 2.0 Security Attacking Next Generation Appspresentation, Video
6102008/10/29 : Hitb Sec Conf : Talk : Browser Exploits a New Model for Browser Securitypresentation
6112008/10/22 : Hacklu : Talk : Browser Exploits a New Model for Browser Securitypresentation, Video
6122008/08/21 : Owasp App Sec India : Talk : App Sec for Managerspresentation, Video
6132008/08/20 : Owasp App Sec India : Talk : Building Enterprise App Sec Programpresentation, Video
6142008/04/16 : Hitb Sec Conf : Talk : Securing Next Generation Applications  “ Scan, Detect and Mitigatepresentation, Video
6152008/03/28 : Blackhat : Talk : Spam Evolutionpresentation, Video
6162008/03/26 : Can Sec West : Talk : Vulnerabilities Die Hardpresentation, Video
6172008/02/20 : Blackhat : Talk : Hacking Vo IP Through IP Sec Tunnelspresentation, Video
6182007/12/09 : Clubhack : Talk : Vulnerabilities in Vo IP Products and Servicespresentation, Video
6192007/08/01 : Blackhat : Talk : Vulnerabilities in Wi Fi Dual Mode Vo IP Phonespresentation, Video
6202007/04/18 : Can Sec West : Talk : Low Rate Denial of Service Attackspresentation, Video
6212007/03/30 : Blackhat : Talk : Web Service Vulnerabilitiespresentation, Video
6222006/10/19 : Hacklu : Talk : Smashing Heap by Free Simulationpresentation, Video
6232006/08/05 : Defcon : Talk : Zulu a Command Line Wireless Frame Generatorpresentation
6242005/09/29 : Hitb Sec Conf : Talk : Trends in Real World Attacks a Compilation of Case Studiespresentation
6252005/04/10 : Hitb Sec Conf : Talk : Whispers on the Wire Network Based Covert Channels, Exploitation and Detectionpresentation, Video
6262004/07/28 : Blackhat : Talk : Defeating Automated Web Assessment Toolspresentation
6272003/12/12 : Hitb Sec Conf : Talk : Defending Web Applications Strategies, Methods and Practicespresentation, Video
6282003/12/12 : Hitb Sec Conf : Talk : New Generation Fraudspresentation, Video
6292003/12/12 : Hitb Sec Conf : Talk : Threats to Wireless Networks War Drivingpresentation, Video
6302001/07/13 : Defcon : Talk : Security & Privacy Are Critically Important Issues in Todays Digitally Connected Agepresentation
6311998/07/29 : Blackhat : Talk : Security as an Enabler for New Business Opportunities the Business Value of Securitypresentation, Video