| 2025-12-11 | Tool demo | Blackhat |
SupplyShield: Protecting Your Software Supply Chain
| Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar | #supply-chain#sbom#software-composition-analysis+3 |
| 2025-04-03 | Tool demo | Blackhat |
VulnScout
| Samaksh K, Nimit Jain | #automated-scanning#security-tools |
| 2024-10-23 | Tool demo | Blackhat |
Cyber Arsenal47
| Simardeep Singh | #automated-scanning#vulnerability-assessment#security-assessment+2 |
| 2023-12-06 | Tool demo | Blackhat |
Honeyscanner: a vulnerability analyzer for Honeypots
| Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben | #vulnerability-assessment#honeypot#security-testing+2 |
| 2023-09-23 | Talk | Nullcon |
The Curious Case Of The Rogue SOAR
| Mukesh Sai Kumar, Jaden Furtado | #blueteam#application-pentesting#dynamic-analysis+3 |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | #vulnerability-assessment#security-development-lifecycle#risk-management+3 |
| 2022-06-01 | Talk | Securityfest |
Exploitation and automated detection of threats to modern cloud infrastructure
| Krishnaa Srinivasa, Maithri Nadig | #aws#vulnerability-assessment#cloud-monitoring+4 |
| 2020-08-05 | Tool demo | Blackhat |
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…)
| Pramod Rana | #risk-analysis#blueteam#security-strategy+4 |
| 2019-09-28 | Talk | C0c0n |
Vulnerability Prioritization with Threat Intelligence
| Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja | #threat-intelligence-analysis#automated-scanning#security-assessment+3 |
| 2018-09-27 | Talk | Rootcon |
Bug Bounty Hunting on Steroids
| Anshuman Bhartiya | #bug-hunting#bug-bounty#security-tools+3 |
| 2018-08-09 | Tool demo | Blackhat |
Mafia: Mobile Security Automation Framework for Intelligent Auditing
| Ankur Bhargava, Sagar Popat, Mohan Kallepalli | #audit#security-testing#automated-scanning+4 |
| 2015-03-26 | Tool demo | Blackhat |
SecPod Saner
| Preeti Subramanian | #blueteam#security-tools#automated-scanning+2 |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | #automated-scanning#vulnerability-assessment#risk-management+1 |
| 2014-11-13 | Talk | Groundzerosummit |
Vulnerability Reproduction using Zest
| Deep Shah | #red-teaming#exploit-delivery#automated-scanning |
| 2014-08-22 | Talk | C0c0n |
Idle Machines doing Bounty Hunting (Behind your Back)
| Mrityunjay Gautam | #bug-hunting#red-teaming#automated-scanning+3 |
| 2013-09-27 | Talk | C0c0n |
The Art and Science of Anamoly based Vulnerability Detection
| Lavakumar Kuppan | #blueteam#security-analytics#automated-scanning+2 |
| 2009-03-16 | Talk | Cansecwest |
On Approaches and Tools for Automated Vulnerability Analysis
| Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert | #security-assessment#blueteam#automated-scanning+4 |
| 2005-03-31 | Talk | Blackhat |
Defeating Automated Web Assessment Tools
| Saumil Shah | #red-teaming#security-testing#application-pentesting+1 |
| 2004-05-19 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#automated-scanning+2 |
| 2004-01-29 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+3 |
| 2003-12-16 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#network-defense+3 |