| 2025-04-04 | Tool demo | Blackhat |
Intro to CICDGuard - How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-pipeline#cicd-security#secure-development+3 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2025-03-02 | Panel | Nullcon |
From Code to Defense: Why Developers Are the New Security Leaders
| Vaibhav Gupta, Vikas Goyal, Hilal Lone, Gene Golovinsky | #secure-development#secure-coding#security-testing+3 |
| 2024-09-26 | Talk | Rootcon |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #ci-cd#application-hardening#cicd-pipeline+4 |
| 2024-08-29 | Tool demo | Hitbsecconf |
CICDGuard
| Pramod Rana | #ci-cd#cicd-pipeline#cicd-security+3 |
| 2024-04-18 | Tool demo | Blackhat |
Secure Local Vault - Git Based Secret Manager
| Sriram Krishnan, Shibly Meeran | #blueteam#application-hardening#secure-coding+2 |
| 2024-03-12 | Talk | Nullcon |
Secure Web Gateways are dead. Whatβs next?
| Vivek Ramachandran | #browser-security#application-hardening#security-strategy+2 |
| 2023-12-06 | Tool demo | Blackhat |
DetectiveSQ: A Extension Auditing Framework
| Jeswin Mathai, Shourya Pratap Singh | #threat-intelligence-analysis#application-pentesting#application-hardening+3 |
| 2023-09-23 | Talk | Nullcon |
How I hacked your bank account: A detailed look at UPI Security
| Abhay Rana | #hacking#application-hardening#input-validation+2 |
| 2023-09-23 | Talk | Nullcon |
Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities
| Nitesh Surana | #azure#cloud-pentesting#application-hardening+4 |
| 2023-08-06 | Talk | C0c0n |
The new way to be secure
| Sakshi Bhutani | #secure-development#devsecops#software-security+3 |
| 2022-12-08 | Tool demo | Blackhat |
Node Security Shield - A Lightweight RASP for NodeJS Applications
| Lavakumar Kuppan, Sukesh Pappu | #application-hardening#secure-development#security-testing+4 |
| 2022-09-28 | Talk | Rootcon |
AWSGoat : A Damn Vulnerable AWS Infrastructure
| Jeswin Mathai, Shantanu Kale, Sanjeev Mahunta | #aws#cloud-pentesting#cloud-workload-protection+4 |
| 2022-09-08 | Talk | Nullcon |
Pushing Security Left By Mutating Byte Code
| Gaurav Gogia | #secure-coding#application-hardening#static-analysis+1 |
| 2022-09-08 | Talk | Nullcon |
Web3.0 - Smart Contracts Could Be Leaky
| Riddhi Shree | #smart-contracts#web3#decentralized-systems+3 |
| 2022-09-07 | Talk | Nullcon |
Hacking Android Foreground Services Escalation Of Privileges
| Rony Das | #android#android-security#mobile-hacking+3 |
| 2022-09-07 | Talk | Nullcon |
Scale hacking to secure your cloud and beyond
| Anand Prakash | #cloud-pentesting#cloud-security-posture-management#container-security+4 |
| 2022-09-06 | Panel | Nullcon |
Consumer Tech Bug Bounty Panel: Hear from the Program Managers
| Sandeep Singh, Rishika Hooda, Omar Benbouazza | #bug-bounty#security-testing#application-hardening+3 |
| 2022-08-11 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#asset-inventory+4 |
| 2022-08-10 | Tool demo | Blackhat |
AWSGoat : A Damn Vulnerable AWS Infrastructure
| Nishant Sharma, Jeswin Mathai, Sanjeev Mahunta | #aws#cloud-pentesting#cloud-workload-protection+4 |
| 2022-08-10 | Tool demo | Blackhat |
Node Security Shield - A Lightweight RASP for NodeJS Applications
| Lavakumar Kuppan, Sukesh Pappu | #application-hardening#code-review#secure-development+4 |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 β We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | #reverse-engineering#dynamic-analysis#network-pentesting+4 |
| 2022-05-12 | Tool demo | Blackhat |
Node Security Shield
| Lavakumar Kuppan, Sukesh Pappu | #application-hardening#secure-development#security-testing+3 |
| 2021-03-06 | Talk | Nullcon |
Bug hunter adventures
| Shreyas Dighe, Yuvraj Dighe | #bug-hunting#application-pentesting#bug-bounty+3 |
| 2019-09-13 | Talk | 44con |
One Person Army β Playbook on how to be the first Security Engineer at a company
| Kashish Mittal | #devsecops#application-hardening#secure-development+4 |
| 2019-08-07 | Tool demo | Blackhat |
SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/
| Rushikesh D Nandedkar, Lalit Bhandari | #security-assessment#virtual-machine#application-hardening+4 |
| 2019-02-28 | Talk | Nullcon |
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases
| Lavakumar Kuppan, Ankit Gupta | #security-assessment#application-pentesting#application-hardening+3 |
| 2018-12-05 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli | #secure-coding#blueteam#application-hardening+4 |
| 2018-10-19 | Talk | Appsecdayaustralia |
Threat Modeling-as-Code & Automation for DevSecOps wins
| Abhay Bhargav | #threat-modeling#devsecops#application-hardening+4 |
| 2018-10-05 | Talk | C0c0n |
Pentesting GraphQL Applications
| Neelu Tripathy | #security-assessment#application-pentesting#dynamic-analysis+4 |
| 2018-08-16 | Talk | Usenix |
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
| Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura | #security-assessment#architecture#application-hardening+4 |
| 2018-05-13 | Talk | Defcon |
Androsia: Securing ‘Data in Process’ for your Android Apps
| Samit Anwer | #android#blueteam#android-security+4 |
| 2018-03-22 | Tool demo | Blackhat |
Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data
| Samit Anwer | #android#blueteam#application-hardening+4 |
| 2018-03-22 | Talk | Blackhat |
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot
| Ravi Sahita, Daiping Liu, Mingwei Zhang | #blueteam#application-hardening#code-review+4 |
| 2017-08-18 | Talk | C0c0n |
Case study: Security of Digital Wallet apps in India
| Ashwath Kumar, Sandesh Mysore Anand | #appsec#mobile-pentesting#application-hardening+4 |
| 2016-11-11 | Talk | Deepsec |
Human vs Artificial intelligence β Battle of Trust
| Hemil Shah | #ai#application-pentesting#application-hardening+4 |
| 2016-10-14 | Talk | Appsecusa |
DevOps to DevSecOps: a 2-dimensional view of security for DevOps
| Sanjeev Sharma | #application-hardening#secure-coding#security-development-lifecycle+3 |
| 2016-10-13 | Talk | Appsecusa |
Lightning Talk - Demystifying Windows Application
| Rupali Dash | #windows#application-hardening#secure-coding+4 |
| 2016-08-03 | Tool demo | Blackhat |
Android-InsecureBankv2
| Dinesh Shetty | #android#red-teaming#application-pentesting+4 |
| 2015-08-05 | Tool demo | Blackhat |
PixelCaptcha: A unicode based captcha scheme
| Gursev Singh Kalra | #secure-coding#application-hardening#input-validation+3 |
| 2015-05-26 | Talk | Phdays |
iOS Application Exploitation
| Prateek Gianchandani, Egor Tolstoy | #ios#red-teaming#application-pentesting+4 |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Web-Proxies like never before
| Ahamed Nafeez | #red-teaming#application-hardening#security-testing |
| 2014-06-23 | Talk | Hackinparis |
Pentesting NoSQL DB’s with NoSQL Exploitation Framework
| Francis Alexander | #secure-coding#security-assessment#application-pentesting+4 |
| 2014-02-14 | Talk | Nullcon |
Chrome - OS Security 2014: New and future hotness
| Sumit Gwalani | #blueteam#application-hardening#application-pentesting+4 |
| 2013-11-20 | Talk | Appsecusa |
Why is SCADA Security an Uphill Battle?
| Amol Sarwate | #scada#application-pentesting#application-hardening+4 |
| 2013-07-31 | Talk | Blackhat |
Javascript static security analysis made easy with JSPrime
| Nishant Das Patnaik, Sarathi Sabyasachi Sahoo | #web-security#blueteam#application-hardening+4 |
| 2011-10-07 | Talk | C0c0n |
Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications
| Riyaz Walikar | #red-teaming#application-pentesting#application-hardening+1 |
| 2011-09-07 | Talk | Securitybyte |
Mobile Devices β Boon or Curse?
| Kishor Sonawane, Oliver Ng | #mobile-device-management#mobile-application-management#application-hardening+4 |
| 2010-08-01 | Talk | C0c0n |
Code Disclosure over HTTP
| Anant Kochhar | #red-teaming#application-hardening#code-review+4 |
| 2010-08-01 | Talk | C0c0n |
Last line of defense - Host Intrusion Prevention and Secure application development.
| Avinash Shenoi | #blueteam#application-hardening#secure-coding+3 |
| 2010-04-21 | Talk | Hitbsecconf |
Web Security β Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2010-03-02 | Award | |
Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution
| Lavakumar Kuppan | #clickjacking#application-hardening#security-testing+1 |
| 2009-12-04 | Talk | Clubhack |
Facilitate Collaboration with Information Rights Management
| Abhijit Tannu | #information-rights-management#data-protection#application-hardening+4 |
| 2009-11-18 | Talk | Securitybyte |
Hacking Oracle From Web
| Sumit Siddharth | #red-teaming#sql-injection#application-hardening+1 |
| 2009-11-17 | Talk | Securitybyte |
Applications - The new cyber security frontier
| Mano Paul | #secure-development#devsecops#software-security+2 |
| 2009-07-31 | Talk | Defcon |
Advancing Video Application Attacks with Video Interception, Recording, and Replay
| Arjun Sambamoorthy, Jason Ostrom | #red-teaming#security-tools#application-hardening |
| 2008-10-22 | Talk | Hacklu |
Browser Exploits - A new model for Browser security
| Saumil Shah | #red-teaming#application-hardening#browser-security+4 |
| 2008-08-20 | Talk | Owaspappsecindia |
Web Application Security: Too Costly To Ignore
| Rajesh Nayak | #appsec#blueteam#application-hardening+4 |
| 2005-09-29 | Talk | Hitbsecconf |
Trends in Real World Attacks: A Compilation of Case Studies
| Rohyt Belani | #red-teaming#application-pentesting#application-hardening+4 |
| 2005-04-12 | Talk | Hitbsecconf |
Web Application Kung-Fu, The Art of Defense
| Shreeraj Shah | #blueteam#application-hardening#secure-coding+4 |
| 2004-07-28 | Talk | Blackhat |
Defeating Automated Web Assessment Tools
| Saumil Shah | #red-teaming#application-pentesting#application-hardening+2 |
| 2004-05-19 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#automated-scanning+2 |