S.No | Name of Entry | What is missing |
---|
1 | 2024/12/12 : Blackhat : Tool Demo : Damn Vulnerable Browser Extension ( Dvbe) Knowing the Risks of Your Browser Supplements | Source Code |
2 | 2024/12/12 : Blackhat : Tool Demo : Dark Widow Customizable Dropper Tool Targeting Windows | Source Code |
3 | 2024/12/12 : Blackhat : Tool Demo : Genzai the Io T Security Toolkit | Source Code |
4 | 2024/12/12 : Blackhat : Tool Demo : Halberd Cloud Security Testing Tool | Source Code |
5 | 2024/12/12 : Blackhat : Tool Demo : Morf Mobile Reconnaissance Framework | Source Code |
6 | 2024/12/12 : Blackhat : Tool Demo : Mpt Pentest in Action! | Source Code |
7 | 2024/12/12 : Blackhat : Tool Demo : Red Cloud Os Cloud Adversary Simulation Operating System | Source Code |
8 | 2024/12/11 : Blackhat : Tool Demo : Agneyastra Firebase Misconfiguration Detection Toolkit | Source Code |
9 | 2024/12/11 : Blackhat : Tool Demo : Android Bug Bazaar Your Mobile Appsec Playground to Explore, Exploit, Excel | Source Code |
10 | 2024/12/11 : Blackhat : Tool Demo : Findmytakeover Find Dangling Domains in a Multi Cloud Environment | Source Code |
11 | 2024/12/11 : Blackhat : Tool Demo : Open Source Tool to Shift Left Security Testing by Leveraging Ai | Source Code |
12 | 2024/12/11 : Blackhat : Tool Demo : Scagoat Exploiting Damn Vulnerable Sca Application | Source Code |
13 | 2024/11/16 : C0c0n : Talk : Invisible Invaders Bypassing Email Security With Legitimate Tools | presentation, Video |
14 | 2024/11/16 : C0c0n : Talk : Active Directory Deception Strategies | presentation, Video |
15 | 2024/11/16 : C0c0n : Talk : Hacking the Non Windows Frontier Thick Client Pentesting on Linux & MAC | presentation, Video |
16 | 2024/11/16 : C0c0n : Talk : Key Note | presentation, Video |
17 | 2024/11/16 : C0c0n : Talk : Ride on the House Exploiting Public Transport Ticketing Systems for Free Rides | presentation, Video |
18 | 2024/11/16 : C0c0n : Talk : Serverless Phishing Factory Automate, Attack, Adapt | presentation, Video |
19 | 2024/11/16 : C0c0n : Talk : The Stealth Code Conspiracy Unmasking Hidden Threats in Ci Cd Pipelines | presentation, Video |
20 | 2024/11/15 : C0c0n : Talk : [ Yodha] Nightingale Docker for Pentesters | presentation, Video |
21 | 2024/11/15 : C0c0n : Talk : [ Yodha] Red Cloud a Multi Cloud Hacking Os | presentation, Video |
22 | 2024/11/15 : C0c0n : Talk : [ Yodha] Scagoat Software Composition Analysis ( Sca) Vulnerability Exploration Tool | presentation, Video |
23 | 2024/11/15 : C0c0n : Talk : Automated Security Engineer Co Pilot Leveraging Large Language Models for Enhanced Code Security | presentation, Video |
24 | 2024/11/15 : C0c0n : Talk : Breaking the Defences in Depth Analysis of Edr and Av Tampering Techniques | presentation, Video |
25 | 2024/11/15 : C0c0n : Talk : Remote Whispers of Mobile Sim | presentation, Video |
26 | 2024/08/08 : Blackhat : Tool Demo : Active Directory Cyber Deception Using Huginn | Source Code |
27 | 2024/08/08 : Blackhat : Tool Demo : Open Source Llm Security | Source Code |
28 | 2024/08/07 : Blackhat : Tool Demo : Traffic Warden X Open Wrt Security & Monitoring | Source Code |
29 | 2024/04/18 : Blackhat : Tool Demo : Detective Sq a Extension Auditing Framework Version 2 | Source Code |
30 | 2024/04/18 : Blackhat : Tool Demo : Secure Local Vault Git Based Secret Manager | Source Code |
31 | 2024/03/12 : Nullcon : Talk : Secure Web Gateways Are Dead. What’s Next? | presentation, Video |
32 | 2023/12/06 : Blackhat : Tool Demo : Andro Cop One Click Forensic Investigation & Data Extraction Tool | Source Code |
33 | 2023/12/06 : Blackhat : Tool Demo : Detective Sq a Extension Auditing Framework | Source Code |
34 | 2023/12/06 : Blackhat : Tool Demo : Supply Shield Protecting Your Software Supply Chain | Source Code |
35 | 2023/11/17 : Deepsec : Talk : Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption | presentation, Video |
36 | 2023/10/13 : Hackfest : Talk : Exploring RAM Forensic Analysis for Effective Digital Investigations | presentation, Video |
37 | 2023/09/29 : Hackinparis : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor | presentation, Video |
38 | 2023/09/28 : Hackinparis : Talk : How to Have Visibility and Security of Cicd Ecosystem | presentation, Video |
39 | 2023/09/23 : Nullcon : Talk : How I Hacked Your Bank Account a Detailed Look at Upi Security | presentation |
40 | 2023/08/12 : Defcon : Talk : Getting More Bang for Your Buck Appsec on a Limited Budget | presentation, Video |
41 | 2023/08/12 : Defcon : Tool Demo : Open Source API Security for Devsecops | Source Code |
42 | 2023/08/11 : Defcon : Talk : Generative Adversarial Network ( Gan) Based Autonomous Penetration Testing for Web Applications | presentation, Video |
43 | 2023/08/11 : Defcon : Tool Demo : V API Vulnerable Adversely Programmed Interface | Source Code |
44 | 2023/08/10 : Defcon : Talk : Hardware Backdooring an E Scooter | presentation, Video |
45 | 2023/08/09 : Blackhat : Tool Demo : Arctic Automated Remediation for Correlation Threat Intelligence Collections | Source Code |
46 | 2023/08/09 : Blackhat : Tool Demo : Caspr Code Trust Auditing Framework | Source Code |
47 | 2023/08/07 : C0c0n : Talk : Cellibrite Premium Mobile Forensic Tool I Phone Analysis | presentation, Video |
48 | 2023/08/07 : C0c0n : Talk : Chinese Apt Against Government Officials Using G7 Summit Lure | presentation |
49 | 2023/08/07 : C0c0n : Talk : Citizen Mobile Security Responsibilities, Accountability, and Impacts | presentation, Video |
50 | 2023/08/07 : C0c0n : Talk : Cyber Threats to Global Financial Systems | presentation |
51 | 2023/08/07 : C0c0n : Talk : Darkweb Investigations | presentation, Video |
52 | 2023/08/07 : C0c0n : Talk : Enhancing Red Team Opsec Abusing Stealthy in Memory Binary Execution Techniques in Linux | presentation |
53 | 2023/08/07 : C0c0n : Talk : Esoc Trinetra Project | presentation, Video |
54 | 2023/08/07 : C0c0n : Talk : Evasion Tactics of Side Copy & Apt36 Persistently Targeting Indian Defense Orgs | presentation |
55 | 2023/08/07 : C0c0n : Talk : Exploring Threats in Operational Technology | presentation, Video |
56 | 2023/08/07 : C0c0n : Talk : Generative Ai and Cyber Crimes | presentation |
57 | 2023/08/07 : C0c0n : Talk : Homomorphic Encryption Myth to Reality | presentation |
58 | 2023/08/07 : C0c0n : Talk : Putting a Leash on Ai | presentation |
59 | 2023/08/07 : C0c0n : Talk : Serverless Siege Aws Lambda Pentesting | presentation |
60 | 2023/08/07 : C0c0n : Talk : Shifting Left Blockchain Development for Safer Dapps | presentation |
61 | 2023/08/07 : C0c0n : Talk : Smart Contract Phishing Attack & Defense | presentation |
62 | 2023/08/07 : C0c0n : Talk : Start Left SDLC Security With Open Source Dev Sec Ops Tooling | presentation |
63 | 2023/08/07 : C0c0n : Talk : Tackling Advanced Threat Landscape With Mdr Best Practices | presentation |
64 | 2023/08/07 : C0c0n : Talk : The Dpdpa Effect Jubilation, Twinge and Reticence That Followed | presentation |
65 | 2023/08/07 : C0c0n : Talk : Trust Resiliency a Lesson Learned From Russia Ukraine War | presentation |
66 | 2023/08/07 : C0c0n : Talk : Uncovering Azure's Silent Threats a Story of Cloud Vulnerabilities | presentation |
67 | 2023/08/07 : C0c0n : Talk : Uncovering the Hidden Dangers Lurking as Android Apps Using Ml Algos | presentation |
68 | 2023/08/06 : C0c0n : Talk : A Secure Privacy Preserving Lightweight Authentication Scheme for Internet of Medical Things | presentation |
69 | 2023/08/06 : C0c0n : Talk : Ai in Cyber Security and Crime Prevention | presentation, Video |
70 | 2023/08/06 : C0c0n : Talk : Cbdc and Future of Finance | presentation |
71 | 2023/08/06 : C0c0n : Talk : Cryptocurrencies and Challenges to Law Enforcement Agencies | presentation, Video |
72 | 2023/08/06 : C0c0n : Talk : Cybercrimes Victim Compensation Legal Remedies and Process | presentation, Video |
73 | 2023/08/06 : C0c0n : Talk : Cybersecurity in the Era of Ai | presentation |
74 | 2023/08/06 : C0c0n : Talk : Dark Web for Investigations | presentation, Video |
75 | 2023/08/06 : C0c0n : Talk : Developments in Deep Fake Detection | presentation, Video |
76 | 2023/08/06 : C0c0n : Talk : Digital Innovation and Its Impact on Cios, Cisos and Dpos | presentation, Video |
77 | 2023/08/06 : C0c0n : Talk : Emerging Crimes and Threat Landscape in Cyber Domain and the Need for International Cooperation | presentation |
78 | 2023/08/06 : C0c0n : Talk : Expanding Capability Horizons Homelabs and Beyond | presentation |
79 | 2023/08/06 : C0c0n : Talk : Influence of Artificial Intelligence in Grc Space | presentation, Video |
80 | 2023/08/06 : C0c0n : Talk : Insider Threats Best Practices and Common Pitfalls | presentation |
81 | 2023/08/06 : C0c0n : Talk : Mitigating Ssrf at Scale the Right Way With Imdsv2! | presentation |
82 | 2023/08/06 : C0c0n : Talk : Playing Cat and Mouse With the Adversary Sometimes a Breach Is Inevitable | presentation |
83 | 2023/08/06 : C0c0n : Talk : Russia Ukraine Warfare – A Shift in Cyber Threat Landscape | presentation |
84 | 2023/08/06 : C0c0n : Talk : Securing the Future Addressing Cybersecurity Challenges in the Age of 5 G | presentation |
85 | 2023/08/06 : C0c0n : Talk : Subduing Adversaries With Information Superiority | presentation |
86 | 2023/08/06 : C0c0n : Talk : Survivability in the Cyber World | presentation |
87 | 2023/08/06 : C0c0n : Talk : Surviving in Dependency Hell | presentation |
88 | 2023/08/06 : C0c0n : Talk : Taking a Closer Look at Ci Cd Pipeline Logs Extracting Security Related Information With Build Inspector | presentation |
89 | 2023/08/06 : C0c0n : Talk : The New Way to Be Secure | presentation |
90 | 2023/08/06 : C0c0n : Talk : Time to Choose Conventional Cti or Next Gen External Threat Landscape Management | presentation |
91 | 2023/05/12 : Blackhat : Talk : Abusing Azure Active Directory From Mfa Bypass to Listing Global Administrators | presentation |
92 | 2023/05/12 : Blackhat : Talk : Engaging the Next Generation of Cybersecurity Professionals the Power of Security Zines | presentation |
93 | 2023/05/12 : Blackhat : Tool Demo : Introducing the Operating System for Automotive Security Testing a Hands on Demonstration | Source Code |
94 | 2023/05/11 : Blackhat : Talk : Bypassing Anti Cheats & Hacking Competitive Games | presentation |
95 | 2023/05/11 : Blackhat : Tool Demo : Kernel Goat | Source Code |
96 | 2022/12/08 : Blackhat : Tool Demo : Industrial Control Systems Capture the Train! | Source Code |
97 | 2022/09/29 : Brucon : Talk : 0wn Premises Bypassing Microsoft Defender for Identity | presentation |
98 | 2022/09/28 : Rootcon : Talk : Gazing Into the Crystal Ball the Fog of Cyberwarfare Escalations | presentation, Video |
99 | 2022/09/24 : C0c0n : Talk : Bec, Still the Sure Shot Trap | presentation, Video |
100 | 2022/09/24 : C0c0n : Talk : Building Smart, Resilient and Sustainable Cyber Eco System | presentation, Video |
101 | 2022/09/24 : C0c0n : Talk : Canalyse a Vehicle Network Analysis and Attack Tool | presentation, Video |
102 | 2022/09/24 : C0c0n : Talk : Citizen Mobile Security ( Icamps) | presentation, Video |
103 | 2022/09/24 : C0c0n : Talk : Cryptocurrency Forensics | presentation, Video |
104 | 2022/09/24 : C0c0n : Talk : Cyber Defence and Role of Private Players Public Private Partnership | presentation, Video |
105 | 2022/09/24 : C0c0n : Talk : Deep Learning to Detect Network Attacks | presentation, Video |
106 | 2022/09/24 : C0c0n : Talk : In Production With Grc for Cloud | presentation, Video |
107 | 2022/09/24 : C0c0n : Talk : Introduction to Rfid Nfc Hacking | presentation, Video |
108 | 2022/09/24 : C0c0n : Talk : Know Your Organization? Mapping Entities in Google Workspace | presentation, Video |
109 | 2022/09/24 : C0c0n : Talk : Need for Advanced Soc | presentation, Video |
110 | 2022/09/24 : C0c0n : Talk : OSI Nt Tools and Techniques | presentation, Video |
111 | 2022/09/24 : C0c0n : Talk : Power of Narratives in Cyber Security | presentation, Video |
112 | 2022/09/24 : C0c0n : Talk : Raining Cves on Wordpress Plugins With Semgrep | presentation, Video |
113 | 2022/09/24 : C0c0n : Talk : Rationalizing Cyber Security Risk in Risk Language | presentation, Video |
114 | 2022/09/24 : C0c0n : Talk : Towards an Effective Intrusion Detection System Framework for Multi Channel Man in the Middle Attacks Against Protected Wi Fi Networks | presentation, Video |
115 | 2022/09/24 : C0c0n : Talk : Weaponising Social Media for Psychological Operations | presentation, Video |
116 | 2022/09/24 : C0c0n : Talk : Web3 Security Security in Meta Verse, and the New World of Web3 | presentation, Video |
117 | 2022/09/23 : C0c0n : Talk : A Tale of Credential Leak of a Popular Cloud Threat Actor | presentation, Video |
118 | 2022/09/23 : C0c0n : Talk : Attacking Connected Industries in 5 G Networks | presentation, Video |
119 | 2022/09/23 : C0c0n : Talk : Battle of 300 Crore How They Lost It and Got Most of It Back | presentation, Video |
120 | 2022/09/23 : C0c0n : Talk : Bridging the Gap Between Security and Operations | presentation, Video |
121 | 2022/09/23 : C0c0n : Talk : Building a Safer and Innovative Digital Ecosystem | presentation, Video |
122 | 2022/09/23 : C0c0n : Talk : Collaborative Efforts for Safe Digital Banking | presentation, Video |
123 | 2022/09/23 : C0c0n : Talk : Common Misconfigurations in Your Kubernetes Cluster and What Can You Do About It? | presentation, Video |
124 | 2022/09/23 : C0c0n : Talk : Cybersecurity for Manufacturing | presentation, Video |
125 | 2022/09/23 : C0c0n : Talk : Hacking Smart Contracts | presentation, Video |
126 | 2022/09/23 : C0c0n : Talk : Hyperledger Fabric & Ethereum Apps Security Deep Dive | presentation, Video |
127 | 2022/09/23 : C0c0n : Talk : Log4j Vulnerability Continuous to Be Favourite for Apt Groups Through Mid 2022 | presentation, Video |
128 | 2022/09/23 : C0c0n : Talk : Pwning Android Apps at Scale | presentation, Video |
129 | 2022/09/23 : C0c0n : Talk : Ransomware Prevention, Early Detection and Response | presentation, Video |
130 | 2022/09/23 : C0c0n : Talk : Rolling Out Central Bank Digital Currency Technical Design Considerations | presentation, Video |
131 | 2022/09/23 : C0c0n : Talk : Securing Your Apis for a Cloud Native Future | presentation, Video |
132 | 2022/09/23 : C0c0n : Talk : Startup Ecosystem and Investments in Post Covid Era | presentation, Video |
133 | 2022/09/23 : C0c0n : Talk : Technological Reliance for Resilience | presentation, Video |
134 | 2022/09/23 : C0c0n : Talk : Threats Landscape and Intelligence of API & Shield to Protect | presentation, Video |
135 | 2022/09/23 : C0c0n : Talk : Tracking the Bad Guys. an Interesting Story of How the Criminal Underground Operates | presentation, Video |
136 | 2022/09/23 : C0c0n : Talk : Tropic Trooper Targets High Profile Victims Using Newly Discovered Mqtt Backdoor | presentation, Video |
137 | 2022/09/08 : Nullcon : Talk : Hack the Source Securing Open Source Software – One Bug at a Time | presentation |
138 | 2022/09/08 : Nullcon : Talk : The Different Faces of MAC Os Malware Detecting Anomalies in a Poisoned Apple | presentation |
139 | 2022/09/08 : Nullcon : Tool Demo : Zaa S [ Owasp] Zap as a Service Continous Security for 20 K Apis | Source Code |
140 | 2022/09/07 : Nullcon : Talk : Electro Volt Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron | presentation |
141 | 2022/09/07 : Nullcon : Talk : Scale Hacking to Secure Your Cloud and Beyond | presentation |
142 | 2022/08/14 : Defcon : Talk : Tales From the Trenches Why Organizations Struggle to Get Even the Basics of Ot Asset Visibility & Detection Right | presentation, Video |
143 | 2022/08/12 : Defcon : Talk : Stop Worrying About Nation States and Zero Days; Let's Fix Things That Have Been Known for Years | presentation |
144 | 2022/08/10 : Blackhat : Tool Demo : Caspr Code Trust Audit Framework | Source Code |
145 | 2022/04/08 : Nullcon : Talk : Attack Surfaces for 5 G Networks | presentation |
146 | 2022/04/08 : Nullcon : Talk : Bheem Os a Next Generation Reasonably Secure Os Using Rust Micro Vm | presentation |
147 | 2021/11/18 : Hackinparis : Talk : { Internet of Things or Threats} Anatomizing the Structure of Io T Botnets | presentation |
148 | 2021/11/18 : Hackinparis : Talk : Is It Really an Intrusion if You Get Called In? Mis Configuration Based Attacks in Aws | presentation, Video |
149 | 2021/11/13 : C0c0n : Talk : Decoding New Age Hackers and Criminal Investigation | presentation, Video |
150 | 2021/11/13 : C0c0n : Talk : A Look Into Cyber Espionage Activities Targeting Critical Infrastructure in India | presentation, Video |
151 | 2021/11/13 : C0c0n : Talk : Building Global Cyber Security Company Out of India Key Lessons Learnt During My Entrepreneurship Journey | presentation, Video |
152 | 2021/11/13 : C0c0n : Talk : Case Study Cyber Heist in a Bank and Recovery of Systems and Money | presentation, Video |
153 | 2021/11/13 : C0c0n : Talk : Case Study E Crime Group Targeting Mobile Users | presentation, Video |
154 | 2021/11/13 : C0c0n : Talk : Changing Cyber Security Paradigm & Cyber Tsunami | presentation, Video |
155 | 2021/11/13 : C0c0n : Talk : Cloud Threat Landscape | presentation, Video |
156 | 2021/11/13 : C0c0n : Talk : Connecting the Dots Between Customers and Security Teams | presentation, Video |
157 | 2021/11/13 : C0c0n : Talk : Crisis Capitalization in a Pandemic | presentation, Video |
158 | 2021/11/13 : C0c0n : Talk : Cyber Warfare & Securing Critical Infrastructures | presentation, Video |
159 | 2021/11/13 : C0c0n : Talk : Cybersecurity in the Era of Resilience a Walk Through People, Process and Technology | presentation, Video |
160 | 2021/11/13 : C0c0n : Talk : Emerging Trends in Cyber Crimes Investigation Tools & Techniques | presentation, Video |
161 | 2021/11/13 : C0c0n : Talk : Enhancing an Multi Factor Authentication ( Mfa) Through Behavioural Biometrics | presentation, Video |
162 | 2021/11/13 : C0c0n : Talk : Exploiting 2 A( Authentication and Authorization) Vulnerabilities of Web Application | presentation, Video |
163 | 2021/11/13 : C0c0n : Talk : Introducing Free & Open Elastic Limitless Xdr | presentation, Video |
164 | 2021/11/13 : C0c0n : Talk : Light Basin Telecom Roaming Network Attack Case Study | presentation |
165 | 2021/11/13 : C0c0n : Talk : Machine Learning to Detect Chia Mining | presentation, Video |
166 | 2021/11/13 : C0c0n : Talk : Mature Your Threat Hunting Program | presentation, Video |
167 | 2021/11/13 : C0c0n : Talk : Need for Zero Trust in Banking | presentation, Video |
168 | 2021/11/13 : C0c0n : Talk : New Way of Looking at the Hidden Mysteries in the Code | presentation, Video |
169 | 2021/11/13 : C0c0n : Talk : Painting Your Organizations With Shades of Red, Blue & Purple | presentation |
170 | 2021/11/13 : C0c0n : Talk : Post Pandemic Transformation a Ciso's Perspective | presentation, Video |
171 | 2021/11/13 : C0c0n : Talk : Securing Ot in O& G Industry | presentation, Video |
172 | 2021/11/13 : C0c0n : Talk : Third Party Risk Management | presentation, Video |
173 | 2021/11/13 : C0c0n : Talk : Zero Trust & Micro Segmentation | presentation, Video |
174 | 2021/11/12 : C0c0n : Talk : “ Let’s Go Phishing” Discerning the Insidious Nature of Social Engineering | presentation, Video |
175 | 2021/11/12 : C0c0n : Talk : 2021 Supply Chain Attacks Analysis | presentation, Video |
176 | 2021/11/12 : C0c0n : Talk : Data Security and Privacy | presentation, Video |
177 | 2021/11/12 : C0c0n : Talk : Dissecting Malicious Software and Analysis | presentation, Video |
178 | 2021/11/12 : C0c0n : Talk : Enterprise Governance and Risk Management | presentation, Video |
179 | 2021/11/12 : C0c0n : Talk : Executive Presence....a Cardinal of the Cyber Rostrum | presentation, Video |
180 | 2021/11/12 : C0c0n : Talk : Ics Security a Need, a Challenge and a New Change in Mindset | presentation, Video |
181 | 2021/11/12 : C0c0n : Talk : Io T Security Guidelines & Standards | presentation, Video |
182 | 2021/11/12 : C0c0n : Talk : Post Covid Cisos Disappearing Trusted Boundaries and Innovative Cyber Security Approaches | presentation, Video |
183 | 2021/11/12 : C0c0n : Talk : Regulating Social Media Platforms Should It Be Done in Democratic Societies ? | presentation, Video |
184 | 2021/11/12 : C0c0n : Talk : The Evolving Nature of Cyber Community | presentation, Video |
185 | 2021/11/12 : C0c0n : Talk : Understanding the Psychology Behind Threats Adding Twists to Your Turns | presentation, Video |
186 | 2021/11/04 : Ekoparty : Talk : Dial Did I Just Alert Lambda? a Centralized Security Misconfiguration Detection System | presentation |
187 | 2021/10/15 : Rootcon : Talk : The Curious Case of Knowing the Unknown | presentation |
188 | 2021/10/13 : Rootcon : Tool Demo : Buzzard Crafting Your Post Exploitation Framework Against Odds | Source Code |
189 | 2021/10/13 : Rootcon : Talk : The Kill Chain Future of Cyber in Defense | presentation |
190 | 2021/08/08 : Defcon : Talk : App Sec 101 a Journey From Engineer to Hacker | presentation |
191 | 2021/08/08 : Defcon : Talk : Top 20 Secure Plc Coding Practices | presentation |
192 | 2021/08/07 : Defcon : Tool Demo : Red Team Credentials Reconnaissance ( Old With a Twist) | Source Code |
193 | 2021/08/07 : Defcon : Tool Demo : Tenacity an Adversary Emulation Tool for Persistence | Source Code |
194 | 2021/08/07 : Defcon : Talk : The Curious Case of Knowing the Unknown | presentation |
195 | 2021/08/06 : Defcon : Talk : Adversary Village Kick Off | presentation |
196 | 2021/08/06 : Defcon : Talk : Defending Io T in the Future of High Tech Warfare | presentation |
197 | 2021/08/05 : Defcon : Talk : The Bug Hunter’s Recon Methodology | presentation |
198 | 2021/08/04 : Blackhat : Tool Demo : Parse and C a Universal Parser and Data Visualization Tool for Security Testing | Source Code |
199 | 2021/03/06 : Nullcon : Talk : Bug Hunter Adventures | presentation |
200 | 2021/03/05 : Nullcon : Talk : Arbitrary Code Execution on Risc v Using Fault Injection | presentation |
201 | 2021/03/05 : Nullcon : Talk : Telecom Security Challenges in 5 G | presentation |
202 | 2020/10/07 : Rootcon : Talk : Recon Pal Leveraging Nlp for Infosec | presentation |
203 | 2020/10/01 : Blackhat : Tool Demo : Wi Fi Access Point Rootkits | Source Code |
204 | 2020/09/19 : C0c0n : Talk : Automate Your Recon With Recon Note | presentation |
205 | 2020/09/18 : C0c0n : Talk : Herd Immunity, in the Cyber World | presentation, Video |
206 | 2020/09/18 : C0c0n : Talk : How I Created My Clone Using Ai Next Gen Social Engineering | presentation |
207 | 2020/09/18 : C0c0n : Talk : Introducing Sniper Phish a Web Email Spear Phishing Toolkit | presentation |
208 | 2020/09/18 : C0c0n : Talk : Kubernetes Goat Vulnerable by Design Kubernetes Cluster Environment | presentation |
209 | 2020/09/18 : C0c0n : Talk : Web Application Hacking With Web Zground | presentation |
210 | 2020/09/18 : C0c0n : Talk : All About Iot Forensics | presentation, Video |
211 | 2020/09/18 : C0c0n : Talk : Automation in Bug Bounties to Work Smarter | presentation, Video |
212 | 2020/09/18 : C0c0n : Talk : Broken Cryptography & Account Takeover | presentation, Video |
213 | 2020/09/18 : C0c0n : Talk : Coping With Digital Transformation a Ciso Perspective | presentation |
214 | 2020/09/18 : C0c0n : Talk : Covid 19 Cyber Impact on Financial Sector and Remote Employees | presentation |
215 | 2020/09/18 : C0c0n : Talk : Cyber Security Shifts During Covid 19 | presentation |
216 | 2020/09/18 : C0c0n : Talk : Deep Learning for Intrusion Attempt Detection | presentation, Video |
217 | 2020/09/18 : C0c0n : Talk : Demystifying Zero Trust a Real World | presentation |
218 | 2020/09/18 : C0c0n : Talk : My Top 3 Findings in Bug Bounty Journey Aiming for High Impact Issues | presentation, Video |
219 | 2020/09/18 : C0c0n : Talk : Offensive & Scope Based Recon | presentation |
220 | 2020/09/18 : C0c0n : Talk : Offensive Embedded Exploitation Getting Hands Dirty With Iot Embedded Device Security Testing | presentation |
221 | 2020/09/18 : C0c0n : Talk : Reverse Engineering Bare Metal Io T Firmwares Moving Beyond Linux | presentation, Video |
222 | 2020/09/18 : C0c0n : Talk : Supercharging Your Initial Foothold in Red Team Engagements | presentation, Video |
223 | 2020/07/26 : Hitb Sec Conf : Talk : Swapping Asprin Formulas With Mdma While Red Teaming a Billion Dollar Company | presentation, Video |
224 | 2020/04/25 : Hitb Sec Conf : Talk : The State of Ics Security Then and Now | presentation, Video |
225 | 2020/04/24 : Hitb Sec Conf : Talk : Commsec the State of Ics Security Then and Now | presentation, Video |
226 | 2020/03/06 : Nullcon : Talk : Automated Classification of Web Application Attacks for Intrusion Detection | presentation, Video |
227 | 2019/11/28 : Deepsec : Talk : Mastering Aws Pentesting and Methodology | presentation |
228 | 2019/11/01 : App Sec Day Australia : Talk : A Purple Team View of Serverless and Graph Ql Applications | presentation, Video |
229 | 2019/11/01 : App Sec Day Australia : Talk : Protecting the Damned Deploying Insecure Applications at Scale | presentation |
230 | 2019/10/22 : Hacklu : Talk : Intro to Dark Arts Getting Started With Ctfs | presentation, Video |
231 | 2019/09/28 : C0c0n : Talk : Vulnerability Prioritization With Threat Intelligence | presentation, Video |
232 | 2019/09/27 : C0c0n : Talk : A Day in the Life of a Ciso | presentation, Video |
233 | 2019/09/27 : C0c0n : Talk : Advanced Persistent Threat and Counter Measures | presentation, Video |
234 | 2019/09/27 : C0c0n : Talk : Ai, Ml and Security | presentation, Video |
235 | 2019/09/27 : C0c0n : Talk : Auto Source an Automated Framework for Source Code Review | presentation, Video |
236 | 2019/09/27 : C0c0n : Talk : Block Chain for Secured Automation | presentation, Video |
237 | 2019/09/27 : C0c0n : Talk : Building a Cloud Security Monitoring and Auditing Framework | presentation, Video |
238 | 2019/09/27 : C0c0n : Talk : Ciso Mind Set | presentation, Video |
239 | 2019/09/27 : C0c0n : Talk : Cyber Hygiene From Enterprise Point of View | presentation, Video |
240 | 2019/09/27 : C0c0n : Talk : Demystifying Health Care Security | presentation, Video |
241 | 2019/09/27 : C0c0n : Talk : Detection of Tor Sources Using Artificial Intelligence | presentation, Video |
242 | 2019/09/27 : C0c0n : Talk : Doing Sec Ops for the Cloud Using Cloud Native Services | presentation, Video |
243 | 2019/09/27 : C0c0n : Talk : Hacking Ics Devices for Fun | presentation, Video |
244 | 2019/09/27 : C0c0n : Talk : Industry 4.0 Security and Compliance | presentation, Video |
245 | 2019/09/27 : C0c0n : Talk : Lessons Learned Form Data Breaches in the Cloud | presentation, Video |
246 | 2019/09/27 : C0c0n : Talk : Looking a Decade Ahead Big Data, Drones , Robots and Cyber Security. | presentation, Video |
247 | 2019/09/27 : C0c0n : Talk : Offensive Machine Learning for Pentesters and Red Teams | presentation, Video |
248 | 2019/09/27 : C0c0n : Talk : Practical Approach to Cyber Security for Financial Institutions | presentation, Video |
249 | 2019/09/27 : C0c0n : Talk : Ransomware to Pay or Not to Pay | presentation, Video |
250 | 2019/09/27 : C0c0n : Talk : Securing Payment Data With PC I Security Standards and Programs | presentation, Video |
251 | 2019/09/27 : C0c0n : Talk : Security @Scale for Startups | presentation, Video |
252 | 2019/09/27 : C0c0n : Talk : Serverless Soar | presentation, Video |
253 | 2019/09/27 : C0c0n : Talk : Stepping Into Password Less Economy | presentation, Video |
254 | 2019/09/23 : Rootcon : Talk : Hacking Ics Devices Plc's for Fun Ics and Iot Hacking | presentation |
255 | 2019/09/13 : 44 Con : Talk : One Person Army – Playbook on How to Be the First Security Engineer at a Company | presentation |
256 | 2019/08/11 : Defcon : Talk : Exploiting and Securing I Os Apps Using Owasp I Goat | presentation, Video |
257 | 2019/08/08 : Defcon : Talk : Anatomy of Cloud Hacking | presentation, Video |
258 | 2019/08/08 : Defcon : Talk : Hacking Ics Devices for Fun Penetration Testing of Vehicle Components | presentation |
259 | 2019/08/07 : Blackhat : Tool Demo : Sastri Plug and Play Vm for Sast * Static Application Security Testing Realtime Integration* | Source Code |
260 | 2019/08/05 : Blackhat : Tool Demo : Cert Pivot Infra Chaining Cert Check | Source Code |
261 | 2019/05/21 : Phdays : Talk : Fuzzing 101 | presentation, Video |
262 | 2019/05/21 : Phdays : Talk : Rapid Hardware Hacking 101 | presentation, Video |
263 | 2019/02/28 : Nullcon : Talk : A Hacker Walks Into a Co Working Space | presentation |
264 | 2019/02/28 : Nullcon : Talk : Andromeda Gui Based Dynamic Instrumentation Toolkit Powered by Frida | presentation |
265 | 2019/02/28 : Nullcon : Talk : Attacking & Securing Health Care Standards & Hospital Secured Systems | presentation |
266 | 2019/02/28 : Nullcon : Talk : Building Hardened Io T Implementations With Lang Sec | presentation |
267 | 2019/02/28 : Nullcon : Talk : Dirty Use of Ussd Codes | presentation, Video |
268 | 2019/02/28 : Nullcon : Talk : Pentesting Without Pentesters Automating Security Testing With Functional Testing Test Cases | presentation |
269 | 2018/11/29 : Deepsec : Talk : DNS Exfiltration and Out of Band Attacks | presentation |
270 | 2018/11/02 : Hitb Sec Conf : Talk : Defending the Enterprise in 2018 | presentation, Video |
271 | 2018/11/02 : Hackfest : Talk : Exploiting Connected Medical Devices Lessons Learned & Data Earned | presentation |
272 | 2018/10/19 : App Sec Day Australia : Talk : Continuous Integration and Delivery With Docker Containers | presentation |
273 | 2018/10/19 : App Sec Day Australia : Talk : Threat Modeling as Code & Automation for Dev Sec Ops Wins | presentation |
274 | 2018/10/15 : Hacklu : Talk : Come to the Dark Side! We Have Radical Insurance Groups & Ransomware | presentation |
275 | 2018/10/10 : Brucon : Talk : Forging Trusts for Deception in Active Directory | presentation |
276 | 2018/10/10 : Brucon : Talk : Simplifying the Art of Instrumentation | presentation, Video |
277 | 2018/10/05 : C0c0n : Talk : Defending Cloud Infrastructures With Cloud Security Suite | presentation, Video |
278 | 2018/10/05 : C0c0n : Talk : DNS Exfiltration and Out of Band Attacks | presentation, Video |
279 | 2018/10/05 : C0c0n : Talk : Adaptive Grc | presentation, Video |
280 | 2018/10/05 : C0c0n : Talk : Artificial Intelligence and Social Media Analytics in Criminal Investigation | presentation, Video |
281 | 2018/10/05 : C0c0n : Talk : Blockchains as Techno Power Structures Towards Emergence of P2 P Politics | presentation, Video |
282 | 2018/10/05 : C0c0n : Talk : Cyber Security in Health Care Industry | presentation, Video |
283 | 2018/10/05 : C0c0n : Talk : Cybersecurity Embedded Digital Transformation the Future | presentation, Video |
284 | 2018/10/05 : C0c0n : Talk : Data Management Challenge for Privacy Compliance | presentation, Video |
285 | 2018/10/05 : C0c0n : Talk : Dealing With Changing Threat Landscape | presentation, Video |
286 | 2018/10/05 : C0c0n : Talk : Defending Healthcare Base | presentation, Video |
287 | 2018/10/05 : C0c0n : Talk : Digital Innovation Revolution in Kerala Government | presentation, Video |
288 | 2018/10/05 : C0c0n : Talk : Dom Goat the Dom Security Playground | presentation, Video |
289 | 2018/10/05 : C0c0n : Talk : Future of Mobility & Cyber Security | presentation, Video |
290 | 2018/10/05 : C0c0n : Talk : How Can We Use Machine Learning to Prevent Frauds and Password Breaches | presentation, Video |
291 | 2018/10/05 : C0c0n : Talk : OSI Nt Indian Citizen Edition | presentation, Video |
292 | 2018/10/05 : C0c0n : Talk : Predictive Policing Using Big Data Analytics. | presentation, Video |
293 | 2018/10/05 : C0c0n : Talk : Privacy and Data Protection Stakeholders’ Perspectives | presentation, Video |
294 | 2018/10/05 : C0c0n : Talk : Resiliency Focus Alongside Digital Disruption | presentation, Video |
295 | 2018/10/05 : C0c0n : Talk : Scanda to Unbosom Malware Behavior | presentation, Video |
296 | 2018/10/05 : C0c0n : Talk : Taking Cyber Security to the Board Room | presentation, Video |
297 | 2018/10/05 : C0c0n : Talk : Unconventional Vulnerabilities in Google Cloud Platform | presentation, Video |
298 | 2018/10/05 : C0c0n : Talk : Using Fault Injection for Forensics | presentation, Video |
299 | 2018/10/05 : C0c0n : Talk : Will Artificial Intelligence and Machine Learning Bring More Threats on Cyber Security? | presentation, Video |
300 | 2018/09/06 : Grrcon : Talk : Analyzing Multi Dimensional Malware Dataset | presentation |
301 | 2018/08/10 : Defcon : Talk : Building Visualisation Platforms for OSI Nt Data Using Open Source Solutions | presentation |
302 | 2018/08/09 : Defcon : Talk : Backdooring Dvr Nvr Devices | presentation, Video |
303 | 2018/08/08 : Blackhat : Tool Demo : Darwin Real World Use Cases for Covert Wireless | Source Code |
304 | 2018/08/08 : Blackhat : Tool Demo : Sco Da Smart Contract Defender and Analyzer | Source Code |
305 | 2018/03/01 : Nullcon : Talk : Darwin ( a Parasite Covert Wireless Network) | presentation |
306 | 2018/03/01 : Nullcon : Talk : Spot Phish Zero Hour Phishing Protection | presentation |
307 | 2017/11/20 : Hackfest : Talk : How My Sv Machine Nailed Your Malware | presentation, Video |
308 | 2017/11/17 : Deepsec : Talk : How Secure Are Your Vo Lte and Vo Wi Fi Calls? | presentation |
309 | 2017/10/19 : Hacklu : Talk : Are Your Vo Lte and Vo Wi Fi Calls Secure? | presentation |
310 | 2017/10/19 : Hacklu : Talk : Bug Hunting Using Symbolic Virtual Machines! | presentation |
311 | 2017/10/19 : Hacklu : Talk : Intel Amt Using & Abusing the Ghost in the Machine | presentation |
312 | 2017/08/18 : C0c0n : Talk : Hunting Botnets With Analytics | presentation, Video |
313 | 2017/08/18 : C0c0n : Talk : Phishing Threats to Customers and Mitigation | presentation, Video |
314 | 2017/08/18 : C0c0n : Talk : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work | presentation, Video |
315 | 2017/08/18 : C0c0n : Talk : Androsia a Tool for Securing in Memory Sensitive Data | presentation, Video |
316 | 2017/08/18 : C0c0n : Talk : Anti Virus Bypassing for Fun and Profit | presentation, Video |
317 | 2017/08/18 : C0c0n : Talk : Bank on Compliance for Cyber Security | presentation, Video |
318 | 2017/08/18 : C0c0n : Talk : Big Data Analytics With Pattern Matching for Smarter Analytics | presentation, Video |
319 | 2017/08/18 : C0c0n : Talk : Blockchain for Information Security | presentation, Video |
320 | 2017/08/18 : C0c0n : Talk : Case Study Security of Digital Wallet Apps in India | presentation, Video |
321 | 2017/08/18 : C0c0n : Talk : Catching Network Anomalies Using Deep Learning | presentation, Video |
322 | 2017/08/18 : C0c0n : Talk : Challenges in Digital Banking | presentation, Video |
323 | 2017/08/18 : C0c0n : Talk : Cloud Security Suite One Stop Tool for Auditing Cloud Infrastructure | presentation, Video |
324 | 2017/08/18 : C0c0n : Talk : Co Ap Versus Mqtt Io T Protocol Vulnerability Analysis | presentation, Video |
325 | 2017/08/18 : C0c0n : Talk : Cyber Bullying and Cyber Harassment | presentation, Video |
326 | 2017/08/18 : C0c0n : Talk : Cyber Bullying Screen the Mean | presentation, Video |
327 | 2017/08/18 : C0c0n : Talk : Cyber Security Threat Management – Model It, Collect Intelligence and Hunt Them! | presentation, Video |
328 | 2017/08/18 : C0c0n : Talk : Cyber Threat Intelligence Are We There , Yet…? | presentation, Video |
329 | 2017/08/18 : C0c0n : Talk : Do Students Really Require Smartphones | presentation, Video |
330 | 2017/08/18 : C0c0n : Talk : Dynamic Binary Instrumentation | presentation, Video |
331 | 2017/08/18 : C0c0n : Talk : Exploiting the Smartness of Ble Stack | presentation, Video |
332 | 2017/08/18 : C0c0n : Talk : Hacking Homes a Hardware Insight for Io T [In] Security | presentation, Video |
333 | 2017/08/18 : C0c0n : Talk : Hunting the Hunters – Fighting Cyber Crime at the Source | presentation, Video |
334 | 2017/08/18 : C0c0n : Talk : Identity Theft | presentation, Video |
335 | 2017/08/18 : C0c0n : Talk : I Goat – A Self Learning Tool for I Os App Pentesting and Security | presentation, Video |
336 | 2017/08/18 : C0c0n : Talk : Internet Addiction and Children | presentation, Video |
337 | 2017/08/18 : C0c0n : Talk : Mobile Banking ( In) Security | presentation, Video |
338 | 2017/08/18 : C0c0n : Talk : Moving From Cybersecurity Awareness to Cybersecurity Competence | presentation, Video |
339 | 2017/08/18 : C0c0n : Talk : OSI Nt and Privacy | presentation, Video |
340 | 2017/08/18 : C0c0n : Talk : Penetration Testing Orchestrator a Framework That Leverages Multi Tool Penetration Testing Approach Combined With Machine Learning Nlp for Faster Result Analysis | presentation, Video |
341 | 2017/08/18 : C0c0n : Talk : Prevent Dark Side of Your Smart City a Defensive Security Model for Smart City and Critical Infrastructure | presentation, Video |
342 | 2017/08/18 : C0c0n : Talk : Sleep, Screen and Teenagers | presentation, Video |
343 | 2017/08/18 : C0c0n : Talk : Social Media and You | presentation, Video |
344 | 2017/08/18 : C0c0n : Talk : Technology the New Frontier in Teaching | presentation, Video |
345 | 2017/08/18 : C0c0n : Talk : The Card Hack Lessons From the Hitachi Payments Breach | presentation, Video |
346 | 2017/08/18 : C0c0n : Talk : The Covert Cupid Under .11 Veil !!! * Approach for Covert Wifi* | presentation, Video |
347 | 2017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)y | presentation, Video |
348 | 2017/08/18 : C0c0n : Talk : The Internet of Things Essentials of Secur( Iot)y | presentation, Video |
349 | 2017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technology | presentation, Video |
350 | 2017/08/18 : C0c0n : Talk : The Need for Teachers to Cope With Technology | presentation, Video |
351 | 2017/08/18 : C0c0n : Talk : The Role of Teachers in Digital Era | presentation, Video |
352 | 2017/08/18 : C0c0n : Talk : Threats With Online Gaming and Issues With Games Like Pokemon | presentation, Video |
353 | 2017/08/18 : C0c0n : Talk : What Security Managers Can Learn From Story Tellers? | presentation, Video |
354 | 2017/08/18 : C0c0n : Talk : Yarafying Android Malware a Missing Step Before Malware Analysis | presentation, Video |
355 | 2017/08/18 : C0c0n : Talk : Your Friendly Neighbourhood Exploit | presentation, Video |
356 | 2017/07/29 : Defcon : Tool Demo : Widy 2.0 Wifi 0 Wnage in Under 5 Reloaded | Source Code |
357 | 2017/07/29 : Defcon : Tool Demo : Wi Monitor an Open Wrt Package for Remote Wi Fi Sniffing | Source Code |
358 | 2017/07/27 : Defcon : Talk : Recon and Bug Bounties What a Great Love Story | presentation |
359 | 2017/03/30 : Blackhat : Tool Demo : Lamma 1.0 | Source Code |
360 | 2017/03/30 : Blackhat : Tool Demo : Damn Vulnerable Ss7 Network | Source Code |
361 | 2017/03/30 : Blackhat : Tool Demo : Wi Dy Wi Fi 0wnage in Under 5 | Source Code |
362 | 2017/03/03 : Nullcon : Talk : Agility With Security Mitigations in Windows 10 | presentation, Video |
363 | 2017/03/03 : Nullcon : Talk : Breach Response Time to Shake Up the Status Quo | presentation |
364 | 2017/03/03 : Nullcon : Talk : Securing Critical National Infrastructure | presentation |
365 | 2016/11/11 : Deepsec : Talk : Amsi How Windows 10 Plans to Stop Script Based Attacks and How Good It Does That | presentation |
366 | 2016/11/11 : Deepsec : Talk : Human vs Artificial Intelligence – Battle of Trust | presentation, Video |
367 | 2016/11/05 : Hackfest : Talk : Lock Picker Leaking Data From Live Luks Partition | presentation, Video |
368 | 2016/10/27 : Brucon : Talk : Decepticon the Rise and Evolution of an Intelligent Evil Twin…!!! | presentation |
369 | 2016/08/19 : C0c0n : Talk : Abusing Digital Certificates Malware Style | presentation, Video |
370 | 2016/08/19 : C0c0n : Talk : App Sec in the Time of Docker Containers | presentation, Video |
371 | 2016/08/19 : C0c0n : Talk : Backdooring My Enemies With a Proxy for Threat Intelligence | presentation, Video |
372 | 2016/08/19 : C0c0n : Talk : Breaking Into Gas Stations! | presentation, Video |
373 | 2016/08/19 : C0c0n : Talk : Evading Corporate Security – You’re as Secure as the Weakest Link | presentation, Video |
374 | 2016/08/19 : C0c0n : Talk : How (In)secure Are Indian Gsm Networks? | presentation, Video |
375 | 2016/08/19 : C0c0n : Talk : Kill the Password a New Era of Authentication | presentation, Video |
376 | 2016/08/19 : C0c0n : Talk : Ssd Forensics a Nightmare for Forensic Investigators | presentation, Video |
377 | 2016/08/19 : C0c0n : Talk : The Art of Social Hacking | presentation, Video |
378 | 2016/07/01 : Hackinparis : Talk : Diffdroid Dynamic Analysis Made Easier for Android | presentation |
379 | 2016/05/26 : Hitb Sec Conf : Talk : Hitb Lab Mobile Application Security for I Os and Android | presentation, Video |
380 | 2016/05/17 : Phdays : Talk : Security Automation Based on Artificial Intelligence | presentation |
381 | 2016/03/11 : Nullcon : Talk : Hitchhiker's Guide to Hacking Industrial Control Systems ( Ics) | presentation, Video |
382 | 2016/03/11 : Nullcon : Talk : Million Dollar Baby Towards Angrly Conquering Darpa Cgc | presentation, Video |
383 | 2015/11/19 : Deepsec : Talk : Continuous Intrusion Why Ci Tools Are an Attacker's Best Friends. | presentation |
384 | 2015/11/05 : Ground Zero Summit : Talk : Cyber Security in Hospitals Hospitals Under Seige | presentation, Video |
385 | 2015/11/05 : Ground Zero Summit : Talk : Exposing Cyber Espionage Hello From Pakistan Iic Session | presentation, Video |
386 | 2015/11/05 : Ground Zero Summit : Talk : Western Air Command | presentation, Video |
387 | 2015/11/05 : Ground Zero Summit : Talk : Authentication Flaw in Automatic Bank Passbook Printing Machine. | presentation, Video |
388 | 2015/11/05 : Ground Zero Summit : Talk : Browser Based Malware Attacks | presentation, Video |
389 | 2015/11/05 : Ground Zero Summit : Talk : Chellam – A Wi Fi ID S Firewall for Windows | presentation, Video |
390 | 2015/11/05 : Ground Zero Summit : Talk : Credit Card Frauds – The Money Making Ecosystem for Cyber Criminals | presentation, Video |
391 | 2015/11/05 : Ground Zero Summit : Talk : Dissecting Android Malware | presentation, Video |
392 | 2015/11/05 : Ground Zero Summit : Talk : Economics of Post Quantum Crypto Systems Do We Really Need It | presentation, Video |
393 | 2015/11/05 : Ground Zero Summit : Talk : Elliptical Curve Cryptography | presentation, Video |
394 | 2015/11/05 : Ground Zero Summit : Talk : Hacking Rfids Under 2000 Inr | presentation, Video |
395 | 2015/11/05 : Ground Zero Summit : Talk : Sanctioned to Hack Your Scada Hmis Belong to Us! | presentation, Video |
396 | 2015/11/05 : Ground Zero Summit : Talk : Thanks for the Free Cookies | presentation, Video |
397 | 2015/11/05 : Ground Zero Summit : Talk : Trailing Terror in the Darknets | presentation, Video |
398 | 2015/11/05 : Ground Zero Summit : Talk : Wolves Among Sheep Defeating Targeted Attacks With Deception | presentation, Video |
399 | 2015/11/05 : Ground Zero Summit : Talk : Xss the Art of Evading Web Application Filters! | presentation, Video |
400 | 2015/08/09 : Defcon : Talk : 802.11 Monitoring With PC Ap2 Xml Sqlite | presentation |
401 | 2015/08/08 : Defcon : Talk : Chigula — A Framework for Wi Fi Intrusion Detection and Forensics | presentation |
402 | 2015/08/08 : Defcon : Talk : Dissecting the Design of Scada Web Human Machine Interfaces ( Hmis) Hunting Vulnerabilities | presentation |
403 | 2015/08/08 : Defcon : Talk : Powershell for Penetraton Testers | presentation |
404 | 2015/08/07 : Defcon : Talk : Getting Into the Trust Store We Trust | presentation, Video |
405 | 2015/08/07 : Defcon : Talk : Hacker's Practice Ground | presentation |
406 | 2015/08/06 : Blackhat : Tool Demo : Chellam | Source Code |
407 | 2015/08/01 : C0c0n : Talk : A Pentester's Methodology to Discover, Automate and Exploit Windows Privilege Escalation Flaws. | presentation, Video |
408 | 2015/08/01 : C0c0n : Talk : Attack Chaining for Web Exploitation From Information Leakage to Gaining Root Access | presentation, Video |
409 | 2015/08/01 : C0c0n : Talk : Blockchains in Security | presentation, Video |
410 | 2015/08/01 : C0c0n : Talk : Breaking Into Infosec Research | presentation, Video |
411 | 2015/08/01 : C0c0n : Talk : Demystifying and Breaking Ble | presentation, Video |
412 | 2015/08/01 : C0c0n : Talk : From Aosp ( Android Open Source Project ) to Abd ( Android Based Devices ) | presentation, Video |
413 | 2015/08/01 : C0c0n : Talk : Hacking Rfids Under 2000 Inr | presentation, Video |
414 | 2015/08/01 : C0c0n : Talk : Medical Device Security and Critical Infrastructure Inside Hospitals | presentation, Video |
415 | 2015/08/01 : C0c0n : Talk : No Po the No SQL Honey Pot Framework | presentation, Video |
416 | 2015/08/01 : C0c0n : Talk : Reversing and Deciphering the Cyber Espionage Malware Communications | presentation, Video |
417 | 2015/08/01 : C0c0n : Talk : S3curi7y at 36 K Feet | presentation, Video |
418 | 2015/05/26 : Phdays : Talk : Invisible Backdoors in Your Code | presentation, Video |
419 | 2015/02/06 : Nullcon : Talk : Building Security and Compliance Into the Software Delivery Process | presentation, Video |
420 | 2015/02/06 : Nullcon : Talk : Toliman, a Hadoop Pentesting Tool | presentation, Video |
421 | 2014/11/13 : Ground Zero Summit : Talk : Attacking Cryptography & Pki Implementations | presentation, Video |
422 | 2014/11/13 : Ground Zero Summit : Talk : Identity Theft and Its Impact on Cyber Warfare | presentation, Video |
423 | 2014/11/13 : Ground Zero Summit : Talk : Network Time Protocol in Amplification Inferno | presentation, Video |
424 | 2014/11/13 : Ground Zero Summit : Talk : Security Vulnerabilities in Dvb C Networks Hacking Cable Tv Network | presentation, Video |
425 | 2014/11/13 : Ground Zero Summit : Talk : 9 Cell Cyber Diplomacy | presentation, Video |
426 | 2014/11/13 : Ground Zero Summit : Talk : Apt Protection for the Enterprise | presentation, Video |
427 | 2014/11/13 : Ground Zero Summit : Talk : Attacking Web Proxies Like Never Before | presentation, Video |
428 | 2014/11/13 : Ground Zero Summit : Talk : Cyber ' Brah Mos' Static Analysis Driven Secure Coding | presentation, Video |
429 | 2014/11/13 : Ground Zero Summit : Talk : Detecting Fake Cell Phone Towers | presentation, Video |
430 | 2014/11/13 : Ground Zero Summit : Talk : Enterprise Security | presentation, Video |
431 | 2014/11/13 : Ground Zero Summit : Talk : Evaluating Waf ( Web Application Firewall) for Fun and Profit With Wof | presentation, Video |
432 | 2014/11/13 : Ground Zero Summit : Talk : Financial Integrity and Cyber Security | presentation, Video |
433 | 2014/11/13 : Ground Zero Summit : Talk : Fuzzing Asynchronous Protocols Built Over Websockets | presentation, Video |
434 | 2014/11/13 : Ground Zero Summit : Talk : Hacking Consumer Electronics for Fun | presentation, Video |
435 | 2014/11/13 : Ground Zero Summit : Talk : How I Won Browser Fuzzing | presentation, Video |
436 | 2014/11/13 : Ground Zero Summit : Talk : Internet Governance | presentation, Video |
437 | 2014/11/13 : Ground Zero Summit : Talk : Mobile Security Automation Framework for Intelligent Auditing | presentation, Video |
438 | 2014/11/13 : Ground Zero Summit : Talk : National Cyber Policy and Its Impact on Business | presentation, Video |
439 | 2014/11/13 : Ground Zero Summit : Talk : Scada Exploitation Through Firmware | presentation, Video |
440 | 2014/11/13 : Ground Zero Summit : Talk : Vulnerability Reproduction Using Zest | presentation, Video |
441 | 2014/10/23 : Hacklu : Talk : Wi Hawk Router Vulnerability Scanner | presentation, Video |
442 | 2014/10/17 : Blackhat : Talk : Android Kernel and Os Security Assessment With Iron Crow | presentation |
443 | 2014/10/16 : Grrcon : Talk : Socioware Dissecting Online Social Network Worms – Insidious Analysis and Design | presentation, Video |
444 | 2014/09/24 : Brucon : Talk : Owasp Owtf | presentation, Video |
445 | 2014/08/22 : C0c0n : Talk : Apt Case Study of Attackers Targeting Public Tendering | presentation, Video |
446 | 2014/08/22 : C0c0n : Talk : Breaking and Securing Mobile Apps Automagically | presentation, Video |
447 | 2014/08/22 : C0c0n : Talk : Cryptocalypse, Heart Bleed Is Our Government Listening? | presentation, Video |
448 | 2014/08/22 : C0c0n : Talk : Cryptographic Backdoors Subverting the Rsa | presentation, Video |
449 | 2014/08/22 : C0c0n : Talk : Exploiting No SQL Like Never Before | presentation, Video |
450 | 2014/08/22 : C0c0n : Talk : Hacking Communication | presentation, Video |
451 | 2014/08/22 : C0c0n : Talk : Idle Machines Doing Bounty Hunting ( Behind Your Back) | presentation, Video |
452 | 2014/08/22 : C0c0n : Talk : Lesser Known Attack Xml Injection | presentation, Video |
453 | 2014/08/22 : C0c0n : Talk : Piracy Tracker | presentation, Video |
454 | 2014/08/22 : C0c0n : Talk : Still Single With a Bleeding Heart ( Tool Release) | presentation, Video |
455 | 2014/08/22 : C0c0n : Talk : The Curious Case of Proto Bufs Demystifying Google's Hottest Binary Protocol | presentation, Video |
456 | 2014/05/21 : Phdays : Talk : Android Exploitation | presentation |
457 | 2014/05/21 : Phdays : Talk : Arm Exploitation | presentation |
458 | 2014/02/15 : Nullcon : Tool Demo : Drup Snipe | Source Code |
459 | 2014/02/14 : Nullcon : Talk : Hacking You'r Cable Tv Network. | presentation |
460 | 2014/02/14 : Nullcon : Talk : Multi Value W Fi What the Heck Is It | presentation |
461 | 2014/02/14 : Nullcon : Talk : O' Dea Assertions Untwining the Security of the Saml Protocol | presentation |
462 | 2014/02/14 : Nullcon : Talk : Strategic Information Warfare When Ends Define the Means | presentation, Video |
463 | 2013/11/21 : Deepsec : Talk : Automation in Android & I Os Application Security Review | presentation, Video |
464 | 2013/11/21 : Deepsec : Talk : Europe in the Carna Botnet Telnet's Threat to the Largest Economy | presentation |
465 | 2013/11/07 : Ground Zero Summit : Talk : Advanced Security for Advanced Threats | presentation, Video |
466 | 2013/11/07 : Ground Zero Summit : Talk : Approach to Containing the Outbreak of Malicious Information in Online Social Networks | presentation, Video |
467 | 2013/11/07 : Ground Zero Summit : Talk : Central Monitoring System and It Act 2000 – Balance Between Rights of Citizens and State | presentation, Video |
468 | 2013/11/07 : Ground Zero Summit : Talk : Cloud Security Enabling Continuous, Scalable Security for Today’s Hyper Connected World | presentation, Video |
469 | 2013/11/07 : Ground Zero Summit : Talk : Evolution of Network Security Around Software Defined Networking ( Sdn) – The Intelligent Network | presentation, Video |
470 | 2013/11/07 : Ground Zero Summit : Talk : How I Built a Pentest Lab in Under 70 Usd | presentation, Video |
471 | 2013/11/07 : Ground Zero Summit : Talk : Internet – Transforming Terrorism | presentation, Video |
472 | 2013/11/07 : Ground Zero Summit : Talk : Iron Wasp | presentation, Video |
473 | 2013/11/07 : Ground Zero Summit : Talk : Malware for Firefox Mobile Os | presentation, Video |
474 | 2013/11/07 : Ground Zero Summit : Talk : Securing Government Critical Information Infrastructure | presentation, Video |
475 | 2013/11/07 : Ground Zero Summit : Talk : Serial Killing of Embedded Systems | presentation, Video |
476 | 2013/11/07 : Ground Zero Summit : Talk : Setting the Data Center on Fire | presentation, Video |
477 | 2013/11/07 : Ground Zero Summit : Talk : The Seven Sins of Wi Fi Security | presentation, Video |
478 | 2013/11/07 : Ground Zero Summit : Talk : Towards a Next Generation Secure Internet | presentation, Video |
479 | 2013/11/07 : Ground Zero Summit : Talk : Understanding the Anatomy of Advanced Targeted Attacks – The Trend Micro Approach | presentation, Video |
480 | 2013/09/27 : C0c0n : Talk : Arm, Thumb and the Finger | presentation, Video |
481 | 2013/09/27 : C0c0n : Talk : Blur Captcha | presentation, Video |
482 | 2013/09/27 : C0c0n : Talk : Disclosing Vulnerabilities the Bug Bounty Style | presentation, Video |
483 | 2013/09/27 : C0c0n : Talk : From Bedroom to Boardroom Taking Your Weekend Infosec Project Global | presentation, Video |
484 | 2013/09/27 : C0c0n : Talk : Hello Ciso! How to Make End Users Like and Follow “ Brand Infosec”? | presentation, Video |
485 | 2013/09/27 : C0c0n : Talk : Infiltrating the Intranet With Skanda | presentation, Video |
486 | 2013/09/27 : C0c0n : Talk : Lets Play Applanting on New Grounds | presentation, Video |
487 | 2013/09/27 : C0c0n : Talk : Pwning Wi Fi Devices! | presentation, Video |
488 | 2013/09/27 : C0c0n : Talk : Risk and Challenges in Virtual Currencies. | presentation, Video |
489 | 2013/09/27 : C0c0n : Talk : Sandy the Malicious Analysis | presentation, Video |
490 | 2013/09/27 : C0c0n : Talk : Ssrf Xspa Real World Attacks and Mitigations | presentation, Video |
491 | 2013/09/27 : C0c0n : Talk : The Art and Science of Anamoly Based Vulnerability Detection | presentation, Video |
492 | 2013/09/27 : C0c0n : Talk : The Secure Software Development Life Cycle | presentation, Video |
493 | 2013/09/13 : Rootcon : Talk : My Experiments With Truth a Different Route to Bug Hunting | presentation, Video |
494 | 2013/09/12 : Grrcon : Talk : The Droid Exploitation Saga – All Over Again! | presentation, Video |
495 | 2013/07/31 : Blackhat : Talk : Lte Booms With Vulnerabilities | presentation, Video |
496 | 2013/03/01 : Nullcon : Talk : Automating Java Script Static Analysis | presentation, Video |
497 | 2013/03/01 : Nullcon : Talk : Byod How Will It Shape Your Wireless Network Security in Future? | presentation |
498 | 2013/03/01 : Nullcon : Talk : Capturing Zero Day Information | presentation |
499 | 2013/03/01 : Nullcon : Talk : Csrf Finder as a Mozilla Addon | presentation |
500 | 2013/03/01 : Nullcon : Talk : Inception of Graphical Passwords | presentation |
501 | 2013/03/01 : Nullcon : Talk : Pawing the Droid Twisting the Arm | presentation, Video |
502 | 2013/03/01 : Nullcon : Talk : Rest a Real Stealth and Semi Stealth Mitm Attack Tool for Ipv4 Networks | presentation |
503 | 2013/03/01 : Nullcon : Talk : Sensitive Campus Security With Network | presentation |
504 | 2013/03/01 : Nullcon : Talk : Sms to Meterpreter Fuzzing USB Modems | presentation |
505 | 2013/03/01 : Nullcon : Talk : Vulnerability Research Anyone? | presentation, Video |
506 | 2012/11/23 : Malcon : Talk : Advanced Malware Engine | presentation, Video |
507 | 2012/11/23 : Malcon : Talk : Surprise Paper! | presentation, Video |
508 | 2012/11/23 : Malcon : Talk : Windows Phone 8 Malware Prototype | presentation, Video |
509 | 2012/10/23 : Hacklu : Talk : Buster Android Security Buster | presentation, Video |
510 | 2012/10/10 : Hitb Sec Conf : Talk : Innovative Approaches to Exploit Delivery | presentation |
511 | 2012/09/27 : Grrcon : Talk : The Realm of Third Generation Botnet Attacks | presentation |
512 | 2012/09/26 : Nullcon : Talk : Forensics Timeline Analysis | presentation |
513 | 2012/09/26 : Nullcon : Talk : Highly Harmful Audio Waves Aka Dtmf Fuzzing | presentation |
514 | 2012/09/26 : Nullcon : Talk : How Secure Is Internet Banking in India | presentation |
515 | 2012/09/26 : Nullcon : Talk : Opening the Kimono Automating Behavioral Analysis for Mobile Apps | presentation |
516 | 2012/09/26 : Nullcon : Talk : The Art of Passive Web Vul Analysis With Iron Wasp | presentation |
517 | 2012/09/20 : Ekoparty : Talk : Dirty Use of Ussd Codes in Cellular Network | presentation |
518 | 2012/09/20 : Ekoparty : Talk : Fuzzing Dtmf Input Processing Algorithms | presentation, Video |
519 | 2012/09/05 : 44 Con : Talk : Why Integrity Is Left Alone and Not Given Tlc ( Tender, Love and Care) It Deserves? | presentation |
520 | 2012/08/03 : C0c0n : Talk : Building Security Incident Detection & Handling Capabilities in Enterprises | presentation, Video |
521 | 2012/08/03 : C0c0n : Talk : Business Continuity and Risk Management in Turbulent Times | presentation, Video |
522 | 2012/08/03 : C0c0n : Talk : Contemporary Transcription and Resource Parasitism | presentation, Video |
523 | 2012/08/03 : C0c0n : Talk : Easy Money With Ui Redressing | presentation, Video |
524 | 2012/08/03 : C0c0n : Talk : Enterprise Server Security | presentation, Video |
525 | 2012/08/03 : C0c0n : Talk : Evil Java Script | presentation, Video |
526 | 2012/08/03 : C0c0n : Talk : Gathering Security Requirements | presentation, Video |
527 | 2012/08/03 : C0c0n : Talk : Layer 8 Exploitation a Threat to National Security | presentation, Video |
528 | 2012/08/03 : C0c0n : Talk : Security Incidents – Avoiding the Apocalypse in 2012 | presentation, Video |
529 | 2012/08/03 : C0c0n : Talk : The Management of Information Security – A Corporate Practitioner’s Perspective | presentation, Video |
530 | 2012/08/03 : C0c0n : Talk : The Weakest Link Reinforcing the Human Element | presentation, Video |
531 | 2012/02/15 : Nullcon : Talk : Application Security Cost Management | presentation |
532 | 2012/02/15 : Nullcon : Talk : Attacking Backup Software | presentation |
533 | 2012/02/15 : Nullcon : Talk : Best Practices to Improve the Security Grading of Your Project | presentation |
534 | 2012/02/15 : Nullcon : Talk : Captchas for Fun and Profit | presentation |
535 | 2012/02/15 : Nullcon : Talk : Content Sniffing Algorithm Bypassing Techniques and Possible Attack Vectors | presentation |
536 | 2012/02/15 : Nullcon : Talk : Cyberspace Global Commons or a National Asset | presentation, Video |
537 | 2012/02/15 : Nullcon : Talk : Friction in the Machine | presentation, Video |
538 | 2012/02/15 : Nullcon : Talk : Haxdroid Empowering Android Handset | presentation |
539 | 2012/02/15 : Nullcon : Talk : Ivr Security Internal Network Attacks via Phone Lines | presentation |
540 | 2012/02/15 : Nullcon : Talk : Node.js the Good, Bad and Ugly | presentation |
541 | 2012/02/15 : Nullcon : Talk : Open Source Revolution Need Hardware Software Marriage | presentation, Video |
542 | 2012/02/15 : Nullcon : Talk : Sandboxing the Deep Truth | presentation |
543 | 2012/02/15 : Nullcon : Talk : Scada Security Why Is It So Hard | presentation, Video |
544 | 2012/02/15 : Nullcon : Talk : Teensy for Fun and Jugaad | presentation, Video |
545 | 2012/02/15 : Nullcon : Talk : Your Phone Is Your Phone but Your Calls Are Now My Calls | presentation, Video |
546 | 2011/11/25 : Malcon : Talk : Advanced Malware for Apple Products | presentation, Video |
547 | 2011/11/25 : Malcon : Talk : Exploit the Exploit Kits | presentation, Video |
548 | 2011/11/25 : Malcon : Talk : Mareech Look It’s a Hid Made Up of Gold | presentation, Video |
549 | 2011/11/17 : Deepsec : Talk : Behavioral Security 10 Steps Forward 5 Steps Backward | presentation |
550 | 2011/11/17 : Deepsec : Talk : Fake Anti Virus Journey From Trojan to a Persisent Threat | presentation, Video |
551 | 2011/11/04 : Hackfest : Talk : Here Are Your Keystrokes | presentation, Video |
552 | 2011/10/13 : Hitb Sec Conf : Talk : Web Wars 3 | presentation, Video |
553 | 2011/10/08 : C0c0n : Talk : Stratagemizing Security Against Perpetrators in Cloud Infrastructure | presentation, Video |
554 | 2011/10/07 : C0c0n : Talk : Deep(er) Penetration Reaching the Internal Network Using Exposed Web Applications | presentation, Video |
555 | 2011/10/07 : C0c0n : Talk : Digital Evidence | presentation, Video |
556 | 2011/10/07 : C0c0n : Talk : I Phone Jailbreak | presentation, Video |
557 | 2011/10/07 : C0c0n : Talk : Mobile Security | presentation, Video |
558 | 2011/10/07 : C0c0n : Talk : Network Security Modern Mechanism for Intrusion Detection and Avoidance in a P2 P Network | presentation, Video |
559 | 2011/10/07 : C0c0n : Talk : Paranoid Android | presentation, Video |
560 | 2011/10/07 : C0c0n : Talk : Password Less Authentication, Authorization | presentation, Video |
561 | 2011/10/07 : C0c0n : Talk : Runtime Thread Injection and Execution in Linux Processes | presentation, Video |
562 | 2011/10/07 : C0c0n : Talk : Section 43 a It Act Compliance | presentation, Video |
563 | 2011/10/07 : C0c0n : Talk : Security and Privacy Risks of Cloud Computing | presentation, Video |
564 | 2011/10/07 : C0c0n : Talk : Wi Fi Malware for Fun and Profit | presentation, Video |
565 | 2011/09/19 : Hacklu : Talk : Linux Thread Injection the Jugaad Way | presentation, Video |
566 | 2011/09/19 : Brucon : Talk : Step by Step for Software Security (That Anyone Can Follow) | presentation, Video |
567 | 2011/09/19 : Hacklu : Talk : The Travelling Hacksmith | presentation, Video |
568 | 2011/09/07 : Securitybyte : Talk : Data Protection | presentation, Video |
569 | 2011/09/07 : Securitybyte : Talk : Social Web & Privacy – An Evolving World | presentation, Video |
570 | 2011/02/25 : Nullcon : Talk : Future of Cyber Crimes Limitations and Challenges | presentation, Video |
571 | 2011/02/25 : Nullcon : Talk : Hacking the Parliament – A Classic Social Engineering Attack | presentation, Video |
572 | 2011/02/25 : Nullcon : Talk : Incident Management and Beyond | presentation, Video |
573 | 2011/02/25 : Nullcon : Talk : Jugaad Beta Linux Thread Injection Malware Po C | presentation, Video |
574 | 2010/11/25 : Deepsec : Talk : Developers Are From Mars, Compliance Auditors Are From Venus | presentation |
575 | 2010/08/01 : C0c0n : Talk : Cloud Computing & Security Boon or Bane; Hype or Reality; Cloud Implementation Challenges a Live Case Study | presentation, Video |
576 | 2010/08/01 : C0c0n : Talk : Code Disclosure Over HTTP | presentation, Video |
577 | 2010/08/01 : C0c0n : Talk : Concept, Methodology and Challenges in Computer Forensics | presentation, Video |
578 | 2010/08/01 : C0c0n : Talk : Dangers and Dynamic Malware Analysis | presentation, Video |
579 | 2010/08/01 : C0c0n : Talk : End Point Security | presentation, Video |
580 | 2010/08/01 : C0c0n : Talk : Hackers' Eco System in India | presentation, Video |
581 | 2010/08/01 : C0c0n : Talk : Horses, Rats and Bots | presentation, Video |
582 | 2010/08/01 : C0c0n : Talk : Last Line of Defense Host Intrusion Prevention and Secure Application Development. | presentation, Video |
583 | 2010/08/01 : C0c0n : Talk : Mobile Security | presentation, Video |
584 | 2010/08/01 : C0c0n : Talk : Overview of Cyber Legal Systems in India | presentation, Video |
585 | 2010/08/01 : C0c0n : Talk : Vo IP Security | presentation, Video |
586 | 2010/08/01 : C0c0n : Talk : Wireless Mitm | presentation, Video |
587 | 2010/08/01 : C0c0n : Talk : Writing X86 Shell Code & Secure Self Modifying Code and Cross Platform Programming a Security Angle | presentation, Video |
588 | 2010/07/01 : Hitb Sec Conf : Talk : The Travelling Hacksmith 2009 – 2010 | presentation, Video |
589 | 2010/06/18 : Syscan : Talk : Reverse Engineering Web 2.0 Applications | presentation, Video |
590 | 2010/02/25 : Nullcon : Talk : Imposter Ke Karnamey the Browser Phishing Tool. | presentation, Video |
591 | 2010/02/25 : Nullcon : Talk : Quantum Computing Challenges in the Field of Security | presentation, Video |
592 | 2009/12/04 : Clubhack : Talk : Facilitate Collaboration With Information Rights Management | presentation, Video |
593 | 2009/11/19 : Deepsec : Talk : Top 10 Security Issues Developers Don't Know About | presentation |
594 | 2009/11/18 : Securitybyte : Talk : Cloud Hacking – Distributed Attack & Exploit Platform | presentation, Video |
595 | 2009/11/17 : Securitybyte : Talk : Business Case Risk Management Compliance at Amity | presentation, Video |
596 | 2009/11/17 : Securitybyte : Talk : Business Continuity Case Study | presentation, Video |
597 | 2009/10/28 : Hacklu : Talk : Ownage 2.0 | presentation, Video |
598 | 2009/08/06 : C0c0n : Talk : Cyber Forensics | presentation, Video |
599 | 2009/08/06 : C0c0n : Talk : Cyber Victimisation | presentation, Video |
600 | 2009/08/06 : C0c0n : Talk : Information Security Audit | presentation, Video |
601 | 2009/08/06 : C0c0n : Talk : Information Security Management Practices Technical Issues and the Impact of Risk Management. | presentation, Video |
602 | 2009/08/06 : C0c0n : Talk : Information Warfare | presentation, Video |
603 | 2009/08/06 : C0c0n : Talk : Know Your Enemy, and Yourself Demystifying Threat Modelin | presentation, Video |
604 | 2009/08/06 : C0c0n : Talk : Management & Security of Large Scale Storage Devices | presentation, Video |
605 | 2009/08/06 : C0c0n : Talk : Microsoft Security Strategies | presentation, Video |
606 | 2009/08/06 : C0c0n : Talk : Network Intrusions and Hacking | presentation, Video |
607 | 2009/05/19 : Syscan : Talk : Securing Applications at Gateway With Web Application Firewalls | presentation, Video |
608 | 2009/05/19 : Syscan : Talk : Securing Enterprise Applications | presentation, Video |
609 | 2008/11/13 : Deepsec : Talk : Game of Web 2.0 Security Attacking Next Generation Apps | presentation, Video |
610 | 2008/10/29 : Hitb Sec Conf : Talk : Browser Exploits a New Model for Browser Security | presentation |
611 | 2008/10/22 : Hacklu : Talk : Browser Exploits a New Model for Browser Security | presentation, Video |
612 | 2008/08/21 : Owasp App Sec India : Talk : App Sec for Managers | presentation, Video |
613 | 2008/08/20 : Owasp App Sec India : Talk : Building Enterprise App Sec Program | presentation, Video |
614 | 2008/04/16 : Hitb Sec Conf : Talk : Securing Next Generation Applications  “ Scan, Detect and Mitigate | presentation, Video |
615 | 2008/03/28 : Blackhat : Talk : Spam Evolution | presentation, Video |
616 | 2008/03/26 : Can Sec West : Talk : Vulnerabilities Die Hard | presentation, Video |
617 | 2008/02/20 : Blackhat : Talk : Hacking Vo IP Through IP Sec Tunnels | presentation, Video |
618 | 2007/12/09 : Clubhack : Talk : Vulnerabilities in Vo IP Products and Services | presentation, Video |
619 | 2007/08/01 : Blackhat : Talk : Vulnerabilities in Wi Fi Dual Mode Vo IP Phones | presentation, Video |
620 | 2007/04/18 : Can Sec West : Talk : Low Rate Denial of Service Attacks | presentation, Video |
621 | 2007/03/30 : Blackhat : Talk : Web Service Vulnerabilities | presentation, Video |
622 | 2006/10/19 : Hacklu : Talk : Smashing Heap by Free Simulation | presentation, Video |
623 | 2006/08/05 : Defcon : Talk : Zulu a Command Line Wireless Frame Generator | presentation |
624 | 2005/09/29 : Hitb Sec Conf : Talk : Trends in Real World Attacks a Compilation of Case Studies | presentation |
625 | 2005/04/10 : Hitb Sec Conf : Talk : Whispers on the Wire Network Based Covert Channels, Exploitation and Detection | presentation, Video |
626 | 2004/07/28 : Blackhat : Talk : Defeating Automated Web Assessment Tools | presentation |
627 | 2003/12/12 : Hitb Sec Conf : Talk : Defending Web Applications Strategies, Methods and Practices | presentation, Video |
628 | 2003/12/12 : Hitb Sec Conf : Talk : New Generation Frauds | presentation, Video |
629 | 2003/12/12 : Hitb Sec Conf : Talk : Threats to Wireless Networks War Driving | presentation, Video |
630 | 2001/07/13 : Defcon : Talk : Security & Privacy Are Critically Important Issues in Todays Digitally Connected Age | presentation |
631 | 1998/07/29 : Blackhat : Talk : Security as an Enabler for New Business Opportunities the Business Value of Security | presentation, Video |