Hackers of India
Blueteam
"keynote"
"talk"
"Tool Demo"
"workshop"
-
2025/03/02
Talk : Nullcon : Securing the chains: Building defensive layers for software supply chains -
Yadhu Krishna M
Akhil Mahendra
Hritik Vijay
-
2024/12/11
Talk : Blackhat : The CVSS Deception: How We’ve Been Misled on Vulnerability Severity -
Ankur Sand
-
2024/10/23
Tool Demo : Blackhat : eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security -
Sagar Bhure
-
2024/10/23
Talk : Blackhat : Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks -
Shruti Ranjit
Mangatas Tondang
-
2024/04/18
Tool Demo : Blackhat : eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security -
Sagar Bhure
-
2024/04/18
Tool Demo : Blackhat : Secure Local Vault - Git Based Secret Manager -
Sriram Krishnan
Shibly Meeran
-
2023/09/23
Talk : Nullcon : Secure Your Angular App Using JWT And GraphQL -
Ankit Sharma
-
2023/09/23
Talk : Nullcon : The Curious Case Of The Rogue SOAR -
Mukesh Sai Kumar
Jaden Furtado
-
2022/09/08
Talk : Nullcon : Handling A Bug Bounty program From A Blue Team Perspective -
Ashwath Kumar
Ankit Anurag
-
2021/05/06
Tool Demo : Blackhat : Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way -
Vasant Kumar
Rupali Dash
-
2021/05/06
Tool Demo : Blackhat : FalconEye: Windows Process Injection Techniques - Catch Them All -
Rajiv Kulkarni
Sushant Paithane
-
2021/05/06
Talk : Blackhat : Threat Hunting in Active Directory Environment -
Anurag Khanna
Thirumalai Natarajan Muthiah
-
2020/12/09
Tool Demo : Blackhat : ArcherySec 2.0 - Open Source Vulnerability Assessment and Management -
Anand Tiwari
-
2020/12/09
Tool Demo : Blackhat : HosTaGe: mobile honeypots for rapid deployment -
Shreyas Srinivasa
Emmanouil Vasilomanolakis
Eirini Lygerou
-
2020/12/09
Tool Demo : Blackhat : Strafer: A Tool to Detect Infections in Elasticsearch Instances -
Rohit Bansal
Aditya K Sood
-
2020/10/07
Talk : Rootcon : Blockchain Based OT Monitoring Solution (BBOTMS) -
Asif Hameed Khan
Gagan Jattana
-
2020/10/02
Tool Demo : Blackhat : MalViz.ai -
Vasu Sethia
Shivam Kataria
-
2020/10/02
Tool Demo : Blackhat : Phishing Simulation Assessment -
Jyoti Raval
-
2020/10/01
Tool Demo : Blackhat : Wi-Fi Access Point Rootkits -
Nishant Sharma
Jeswin Mathai
-
2020/09/18
Talk : C0c0n : Deep Learning for Intrusion Attempt Detection -
Varun Kohli
-
2020/08/05
Talk : Blackhat : Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic -
Harini Kannan
Nick Gregory
-
2020/08/05
Tool Demo : Blackhat : vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) -
Pramod Rana
-
2020/07/05
Tool Demo : Blackhat : Mobile Security Framework - MobSF -
Ajin Abraham
-
2020/04/25
Talk : Hitb Sec Conf : THE STATE OF ICS SECURITY: THEN AND NOW -
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
-
2020/04/24
Talk : Hitb Sec Conf : COMMSEC: The State of ICS Security : Then and Now -
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
-
2020/03/06
Tool Demo : Nullcon : F.R.I.D.A.Y -
Shyam Sundar Ramaswami
-
2020/03/06
Tool Demo : Nullcon : Hachi -
Parmanand Mishra
-
2020/03/06
Talk : Nullcon : InfoSec Deep Learning in Action -
Satnam Singh
-
2020/03/06
Tool Demo : Nullcon : Omniscient -
Pramod Rana
-
2020/03/06
Tool Demo : Nullcon : Phishing Simulation -
Jyoti Raval
-
2020/03/06
Tool Demo : Nullcon : Providence -
Swapnil Kumbhar
Akshay Shah
-
2020/03/06
Tool Demo : Nullcon : Wolverine -
Furqan Khan
Siddharth Anbalahan
-
2019/12/04
Talk : Blackhat : Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing -
Karthik Ramasamy
Eric Hampshire
-
2019/12/04
Tool Demo : Blackhat : Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit -
Jayesh Chauhan
-
2019/12/04
Talk : Blackhat : ClusterFuzz: Fuzzing at Google Scale -
Abhishek Arya
Oliver Chang
-
2019/12/04
Tool Demo : Blackhat : RTTM: Real Time Threat Monitoring Tool -
Naveen Rudrappa
Murali Krishna Segu
-
2019/11/01
Talk : App Sec Day Australia : A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
-
2019/11/01
Talk : App Sec Day Australia : Protecting the Damned: Deploying Insecure Applications at Scale -
Vivek Ramachandran
-
2019/10/14
Talk : Hitb Sec Conf : CALL OF DUTY: MODERN BROWSER WARFARE -
Dhiraj Mishra
-
2019/10/14
Talk : Hitb Sec Conf : ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES -
Harshit Agrawal
Himanshu Mehta
-
2019/09/27
Talk : C0c0n : Advanced Persistent Threat and counter measures -
A a Gafoor
-
2019/09/27
Talk : C0c0n : Block Chain for Secured Automation -
Sanat Bhat
-
2019/09/27
Talk : C0c0n : Building a cloud security monitoring and auditing framework -
Nirali Shah
Prasoon Dwivedi
-
2019/09/27
Talk : C0c0n : Defense in Depth for Embedded Systems -
Jiggyasu Sharma
-
2019/09/27
Talk : C0c0n : Demystifying HealthCare Security -
Ajay Pratap Singh
-
2019/09/27
Talk : C0c0n : Doing SecOps for the Cloud using Cloud Native Services -
Akash Mahajan
-
2019/09/27
Talk : C0c0n : Securing Payment Data with PCI Security Standards and Programs -
Nitin Bhatnagar
-
2019/09/23
Talk : Rootcon : Hunting Threats with Wireshark Plugins -
Nishant Sharma
Jeswin Mathai
Shivam Bathla
-
2019/09/23
Talk : Rootcon : Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) -
Arun Mane
Nikhil Bogam
-
2019/09/13
Talk : 44 Con : The CISO’s Dilemma -
Saumil Shah
-
2019/08/30
Talk : Hitb Sec Conf : COMMSEC: PErfidious: Make PE Backdooring Great Again! -
Shreyans Doshi
-
2019/08/29
Keynote : Hitb Sec Conf : The CISO’s Dilemma -
Saumil Shah
-
2019/08/29
Talk : Hitb Sec Conf : Understanding, Attacking & Securing Medical Devices -
Ajay Pratap Singh
-
2019/08/10
Tool Demo : Defcon : Local Sheriff -
Konark Modi
-
2019/08/09
Tool Demo : Defcon : EXPLIoT - IoT Security Testing and Exploitation Framework -
Aseem Jakhar
Murtuja Bharmal
-
2019/08/08
Tool Demo : Blackhat : Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit -
Jayesh Chauhan
-
2019/08/08
Tool Demo : Blackhat : CSF: Container Security Framework -
Vaibhav Gupta
-
2019/08/08
Talk : Blackhat : Death to the IOC: What’s Next in Threat Intelligence -
Bhavna Soman
-
2019/08/08
Tool Demo : Blackhat : EXPLIoT: IoT Security Testing and Exploitation Framework -
Aseem Jakhar
Murtuja Bharmal
-
2019/08/08
Tool Demo : Defcon : Hachi: An Intelligent threat mapper -
Parmanand Mishra
-
2019/08/08
Tool Demo : Defcon : Let’s Map Your Network -
Pramod Rana
-
2019/08/08
Tool Demo : Defcon : PcapXray -
Srinivas Piskala Ganesh Babu
-
2019/08/08
Tool Demo : Blackhat : RWDD: Remote Web Deface Detection Tool -
K v Prashant
Ade Yoseman Putra
-
2019/08/07
Talk : Blackhat : Defense Against Rapidly Morphing DDOS -
Mudit Tyagi
Mikhail Fedorov
-
2019/08/07
Tool Demo : Blackhat : RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting -
Sudhanshu Chauhan
Kunal Aggarwal
-
2019/05/21
Talk : Phdays : Active defense using Honeypots v2 -
Rahul Binjve
-
2019/03/28
Tool Demo : Blackhat : Archery - Open Source Vulnerability Assessment and Management- 2.0 -
Anand Tiwari
-
2019/03/28
Tool Demo : Blackhat : Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit -
Jayesh Chauhan
-
2019/03/28
Talk : Blackhat : Investigating Malware Using Memory Forensics - A Practical Approach -
Monnappa K A
-
2019/03/28
Tool Demo : Blackhat : Kurukshetra: Playground for Interactive Security Learning -
Anirudh Anand
Mohan Kallepalli
Ankur Bhargava
-
2019/03/28
Tool Demo : Blackhat : MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research -
Nilaksh Das
Evan Yang
Li Chen
-
2019/03/28
Tool Demo : Blackhat : RTS: Real Time Scrapper -
Naveen Rudrappa
-
2019/03/28
Tool Demo : Blackhat : VoIP Wireshark Attack-Defense Toolkit -
Nishant Sharma
Jeswin Mathai
Ashish Bhangale
-
2019/02/28
Talk : Nullcon : Attacking & Securing HealthCare Standards & hospital secured systems -
Ajay Pratap Singh
-
2019/02/28
Talk : Nullcon : Building Hardened IoT Implementations with LangSec -
Prashant Anantharaman
-
2018/12/06
Talk : Blackhat : AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace -
Vijay Thaware
Niranjan Agnihotri
-
2018/12/06
Tool Demo : Blackhat : Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit -
Jayesh Chauhan
-
2018/12/05
Tool Demo : Blackhat : Kurukshetra: Playground for Interactive Security Learning -
Anirudh Anand
Mohan Kallepalli
-
2018/11/27
Talk : Hitb Sec Conf : COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding -
Vikash Yadav
-
2018/11/02
Talk : Hitb Sec Conf : Defending The Enterprise in 2018 -
Saumil Shah
-
2018/10/19
Talk : App Sec Day Australia : Continuous Integration and Delivery with Docker Containers -
Vasant Kumar
-
2018/10/05
Talk : C0c0n : Defending Healthcare Base -
Jiggyasu Sharma
-
2018/10/05
Talk : C0c0n : How can we use machine learning to prevent Frauds and password breaches -
Tamaghna Basu
-
2018/10/05
Talk : C0c0n : Predictive policing using Big Data analytics. -
Tarun Wig
-
2018/10/05
Talk : C0c0n : Privacy And Data Protection: Stakeholders’ Perspectives -
Rahul Sharma
-
2018/09/27
Talk : Rootcon : Defending cloud Infrastructures with Cloud Security Suite -
Shivankar Madaan
-
2018/09/06
Talk : Grrcon : Analyzing Multi-Dimensional Malware Dataset -
Ankur Tyagi
-
2018/09/06
Talk : Grrcon : Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
Ankur Tyagi
-
2018/08/12
Tool Demo : Defcon : Expl-iot—IoT Security Testing and Exploitation framework -
Aseem Jakhar
-
2018/08/11
Tool Demo : Defcon : Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
Ankur Tyagi
-
2018/08/11
Tool Demo : Defcon : Archery—Open Source Vulnerability Assessment and Management -
Anand Tiwari
-
2018/08/11
Tool Demo : Defcon : Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit -
Jayesh Chauhan
-
2018/08/11
Tool Demo : Defcon : DejaVU—An Open Source Deception Framework -
Harish Ramadoss
Bhadreshkumar Patel
-
2018/08/11
Tool Demo : Defcon : Local Sheriff -
Konark Modi
-
2018/08/09
Talk : Blackhat : Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina -
Bhargava Shastry
Vincent Ulitzsch
Dominik Maier
-
2018/08/09
Talk : Defcon : 4G—Who is paying your cellular phone bill? -
Isha Singh
Dr Silke Holtmanns
-
2018/08/08
Tool Demo : Blackhat : ANWI (All New Wireless IDS): The $5 WIDS -
Rishikesh Bhide
Sanket Karpe
-
2018/08/08
Tool Demo : Blackhat : Archerysec Tool Demo -
Anand Tiwari
-
2018/08/08
Tool Demo : Blackhat : Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit -
Divya S John
Jayesh Chauhan
Shivankar Madaan
-
2018/08/08
Talk : Blackhat : Compression Oracle Attacks on VPN Networks -
Ahamed Nafeez
-
2018/08/08
Tool Demo : Blackhat : DejaVu: An Open Source Deception Framework -
Bhadreshkumar Patel
Harish Ramadoss
-
2018/08/08
Tool Demo : Blackhat : Expl-iot: IoT Security Testing and Exploitation Framework -
Aseem Jakhar
-
2018/08/08
Talk : Blackhat : LTE Network Automation Under Threat -
Ravishankar Borgaonkar
Altaf Shaik
-
2018/08/08
Tool Demo : Blackhat : RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting -
Sudhanshu Chauhan
-
2018/08/08
Tool Demo : Blackhat : SCoDA: Smart COntract Defender and Analyzer -
Ajit Hatti
-
2018/05/13
Talk : Defcon : Androsia: Securing ‘Data in Process’ for your Android Apps -
Samit Anwer
-
2018/03/23
Tool Demo : Blackhat : Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit -
Jayesh Chauhan
Shivankar Madaan
-
2018/03/22
Tool Demo : Blackhat : Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data -
Samit Anwer
-
2018/03/22
Tool Demo : Blackhat : Archery - Open Source Vulnerability Assessment and Management -
Anand Tiwari
-
2018/03/22
Tool Demo : Blackhat : Jackhammer - One Security Vulnerability Assessment/Management Tool -
Rajagopal Vr
Krishna Chaitanya Yarramsetty
-
2018/03/22
Tool Demo : Blackhat : Mobile Security Framework - MobSF -
Ajin Abraham
-
2018/03/22
Talk : Blackhat : Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables -
Sumanth Naropanth
Kavya Racharla
-
2018/03/22
Talk : Blackhat : XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot -
Ravi Sahita
Daiping Liu
Mingwei Zhang
-
2018/03/15
Talk : Troopers : Defending Microsoft Environments at Scale -
Vineet Bhatia
-
2018/03/01
Talk : Nullcon : A Game between Adversary and AI Scientist -
Satnam Singh
-
2018/03/01
Talk : Nullcon : SpotPhish: Zero-Hour Phishing Protection -
Ganesh Varadarajan
-
2018/03/01
Talk : Nullcon : Unleashing D* on Android Kernel Drivers -
Aravind Machiry
-
2017/12/30
Tool Demo : Blackhat : Cloud Security Suite - One Stop Tool for AWS Security Audit -
Shivankar Madaan
Prajal Kulkarni
Jayesh Chauhan
-
2017/12/06
Tool Demo : Blackhat : ANWI (All New Wireless IDS) - The £5 WIDS -
Sanket Karpe
-
2017/12/06
Tool Demo : Blackhat : EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK -
Aseem Jakhar
-
2017/11/20
Talk : Hackfest : How my SV Machine nailed your Malware -
Nikhil P Kulkarni
-
2017/11/17
Talk : Deepsec : Intel AMT: Using & Abusing The Ghost In The Machine -
Parth Shukla
-
2017/10/19
Talk : Hacklu : Intel AMT: Using & Abusing the Ghost in the Machine -
Parth Shukla
-
2017/08/18
Talk : C0c0n : Hunting Botnets with Analytics -
Shomiron Das Gupta
-
2017/08/18
Talk : C0c0n : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work -
Rahul Binjve
-
2017/08/18
Talk : C0c0n : Cloud_Security Suite - One stop tool for auditing cloud infrastructure -
Shivankar Madaan
Jayesh Chauhan
-
2017/08/18
Talk : C0c0n : Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! -
Illyas Kooliyankal
-
2017/08/18
Talk : C0c0n : iGoat – A Self Learning Tool for iOS App Pentesting and Security -
Swaroop Yermalkar
-
2017/08/18
Talk : C0c0n : Mobile Banking (In)Security -
Sneha Rajguru
-
2017/08/18
Talk : C0c0n : Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure -
Manas Pratim Sarma
-
2017/08/18
Talk : C0c0n : The card hack - Lessons from the Hitachi Payments Breach -
Saikat Datta
-
2017/08/18
Talk : C0c0n : The Internet Of Things: Essentials of Secur(IOT)y -
Arpit Bajpai
Ronald Michael
-
2017/08/18
Talk : C0c0n : The Internet Of Things: Essentials of Secur(IOT)y -
Ronald Michel
-
2017/08/18
Talk : C0c0n : Yarafying Android Malware: A Missing Step Before Malware Analysis -
Shivang Desai
-
2017/07/30
Tool Demo : Blackhat : Yasuo -
Saurabh Harit
-
2017/07/29
Tool Demo : Defcon : WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
-
2017/07/28
Tool Demo : Defcon : Android Tamer -
Anant Shrivastava
-
2017/07/27
Workshop : Defcon : Attacking and Defending 802.11ac Networks -
Vivek Ramachandran
Thomas D' Otreppe
-
2017/07/27
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava
-
2017/07/27
Tool Demo : Blackhat : Gibber Sense -
Ajit Hatti
-
2017/07/26
Talk : Blackhat : New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor -
Ravishankar Borgaonkar
Altaf Shaik
Shinjo Park
Lucca Hirschi
Andrew Martin
Jean Pierre Seifert
-
2017/06/23
Talk : Hackinparis : Injecting Security into Web apps with Runtime Patching and Context Learning -
Ajin Abraham
-
2017/05/23
Talk : Phdays : Injecting security into web apps in the runtime -
Ajin Abraham
-
2017/05/23
Talk : Phdays : Practical machine learning in infosecurity -
Anto Joseph
Clarence Chio
-
2017/04/13
Keynote : Hitb Sec Conf : Redefining Defense -
Saumil Shah
-
2017/03/31
Talk : Blackhat : The Seven Axioms of Security -
Saumil Shah
-
2017/03/30
Tool Demo : Blackhat : WiDy: WiFi 0wnage in Under $5 -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
-
2017/03/03
Talk : Nullcon : Agility with security mitigations in Windows 10 -
Swamy Shivaganga Nagaraju
-
2017/03/03
Talk : Nullcon : Case study of SS7/Sigtran assessment -
Akib Sayyed
-
2017/03/03
Talk : Nullcon : Injecting Security into Web apps with Runtime Patching and Context Learning -
Ajin Abraham
-
2016/11/11
Talk : Deepsec : AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That -
Nikhil Mittal
-
2016/11/04
Tool Demo : Blackhat : Yasuo -
Saurabh Harit
-
2016/09/14
Talk : 44 Con : 2016: The Infosec Crossroads -
Saumil Shah
-
2016/08/19
Talk : C0c0n : Backdooring my Enemies with a Proxy for Threat Intelligence -
Jovin Lobo
Aditya Vasekar
-
2016/08/06
Tool Demo : Defcon : Visual Network and File Forensics using Rudra -
Ankur Tyagi
-
2016/08/03
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava
-
2016/08/03
Tool Demo : Blackhat : Visual Network and File Forensics Using Rudra -
Ankur Tyagi
-
2016/05/17
Talk : Phdays : Security Automation Based on Artificial Intelligence -
Rahul Sasi
-
2016/04/01
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava
-
2016/04/01
Tool Demo : Blackhat : Rudra: The Destroyer of Evil -
Ankur Tyagi
-
2016/03/11
Talk : Nullcon : Attacking and defending healthcare - EMR solutions -
Anirudh Duggal
-
2016/03/11
Talk : Nullcon : Making Machines think about security for fun and profit -
Rahul Sasi
-
2016/03/11
Talk : Nullcon : Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day -
Pallav Jakhotiya
Vipul Sawant
-
2015/11/13
Tool Demo : Blackhat : Rudra - The Destroyer of Evil -
Ankur Tyagi
-
2015/11/12
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava
-
2015/11/05
Talk : Ground Zero Summit : Wolves Among Sheep: Defeating Targeted Attacks With Deception -
Sahir Hidayatullah
Raviraj Doshi
-
2015/08/08
Talk : Defcon : Chigula — a framework for Wi-Fi Intrusion Detection and Forensics -
Vivek Ramachandran
-
2015/08/08
Talk : Defcon : Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities -
Aditya K Sood
-
2015/08/08
Talk : Defcon : QARK: Android App Exploit and SCA Tool -
Tushar Dalvi
Tony Trummer
-
2015/08/08
Tool Demo : Defcon : Rudra -
Ankur Tyagi
-
2015/08/06
Tool Demo : Blackhat : Chellam -
Vivek Ramachandran
-
2015/08/06
Talk : Blackhat : Harnessing Intelligence from Malware Repositories -
Arun Lakhotia
Vivek Notani
-
2015/08/05
Tool Demo : Blackhat : QARK - Android Application SCA and Exploit Tool -
Tushar Dalvi
-
2015/08/05
Tool Demo : Blackhat : Rudra - The Destroyer of Evil -
Ankur Tyagi
-
2015/08/01
Talk : C0c0n : Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities -
Anant Shrivastava
-
2015/05/26
Talk : Phdays : Invisible Backdoors In Your Code -
Debasis Mohanty
-
2015/03/27
Talk : Blackhat : Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence -
Preeti Subramanian
-
2015/03/26
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2015/03/26
Tool Demo : Blackhat : SecPod Saner -
Preeti Subramanian
-
2015/02/06
Talk : Nullcon : Analyzing Chrome crash reports at scale -
Abhishek Arya
-
2015/02/06
Talk : Nullcon : Attack and Defence in Radio and Communication Warfare -
Akib Sayyed
-
2015/02/06
Talk : Nullcon : Generic Executable Unpacking using Dynamic Binary Instrumentation -
Shubham Bansal
-
2015/02/06
Talk : Nullcon : Hunting and Decrypting Ghost communications using Memory Forensics -
Monnappa K A
-
2014/11/13
Talk : Ground Zero Summit : APT protection for the Enterprise -
Deepak Singla
-
2014/11/13
Talk : Ground Zero Summit : Making and Breaking Embedded Security -
Yashin Mehaboobe
-
2014/10/16
Talk : Grrcon : Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design -
Aditya K Sood
Dr. Richard J Enbody
-
2014/08/22
Talk : C0c0n : Making and breaking security in embedded devices -
Yashin Mehaboobe
-
2014/08/22
Talk : C0c0n : Piracy Tracker -
Vargheese Babu
-
2014/08/07
Talk : Blackhat : Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies -
Vijay Balasubramaniyan
Raj Bandyopadhyay
Telvis Calhoun
-
2014/08/06
Talk : Blackhat : What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! -
Aditya K Sood
-
2014/02/15
Tool Demo : Nullcon : OWASP Xenotix XSS Exploit Framerwork -
Ajin Abraham
-
2014/02/14
Talk : Nullcon : 2014 The year in which we cannot ignore SCADA -
Amol Sarwate
-
2014/02/14
Talk : Nullcon : Attack of the setuid bit - pt_chown and pwning root terminals -
Siddhesh Poyarekar
-
2014/02/14
Talk : Nullcon : Chrome - OS Security 2014: New and future hotness -
Sumit Gwalani
-
2014/02/14
Talk : Nullcon : In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} -
Rushikesh D Nandedkar
Amrita C Iyer
-
2014/02/14
Talk : Nullcon : Multi-value W-Fi What the Heck is it -
Abhijeet Ghosh
-
2014/02/14
Talk : Nullcon : phoneypdf: A Virtual PDF Analysis Framework -
Kiran Bandla
-
2014/02/14
Talk : Nullcon : The Security Challenge -
Shantanu Ghosh
-
2013/11/07
Talk : Ground Zero Summit : Advanced security for advanced threats -
Kartik Shahani
-
2013/10/17
Talk : Hitb Sec Conf : Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis -
Rahul Sasi
-
2013/09/27
Talk : C0c0n : The Art and Science of Anamoly based Vulnerability Detection -
Lavakumar Kuppan
-
2013/08/01
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2013/08/01
Tool Demo : Blackhat : Sparty -
Aditya K Sood
-
2013/07/31
Talk : Blackhat : Clickjacking revisited: A perceptual view of UI security -
Devdatta Akhawe
-
2013/07/31
Talk : Blackhat : Javascript static security analysis made easy with JSPrime -
Nishant Das Patnaik
Sarathi Sabyasachi Sahoo
-
2013/07/31
Tool Demo : Blackhat : JMSDigger -
Gursev Singh Kalra
-
2013/03/15
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2013/03/15
Talk : Blackhat : The Sandbox Roulette- Are you ready for the gamble? -
Rahul Kashyap
Rafal Wojtczuk
-
2013/03/01
Talk : Nullcon : Automating JavaScript Static Analysis -
Lavakumar Kuppan
-
2013/03/01
Talk : Nullcon : BYOD: How will it shape your wireless network security in future? -
Kiran Deshpande
-
2013/03/01
Talk : Nullcon : CSRF Finder as a Mozilla Addon -
Piyush Pattanayak
-
2013/03/01
Talk : Nullcon : Mobile Code mining for discovery and exploits -
Hemil Shah
-
2013/03/01
Talk : Nullcon : Pawing the Droid: Twisting the ARM -
Divyanshu Shekhar
Anshul Kumar
-
2013/03/01
Talk : Nullcon : Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks -
Naga Rohit Samineni
-
2013/03/01
Talk : Nullcon : Sensitive Campus Security with Network -
Aravind Sitaraman
-
2013/03/01
Talk : Nullcon : Vulnerability research anyone? -
Omair
-
2012/12/01
Talk : Clubhack : Hacking and Securing iOS applications -
Satish Bommisetty
-
2012/12/01
Talk : Clubhack : Infrastructure Security -
Sivamurthy Hiremath
-
2012/12/01
Talk : Clubhack : Smart Grid Security -
Falgun Rathod
-
2012/09/26
Talk : Nullcon : Forensics Timeline Analysis -
Aashish Kunte
-
2012/08/03
Talk : C0c0n : Building Security Incident Detection & Handling Capabilities in Enterprises -
Sunil Varkey
-
2012/08/03
Talk : C0c0n : Enterprise server security -
Raghav Shandilya
-
2012/08/03
Talk : C0c0n : Security Incidents – Avoiding the Apocalypse in 2012 -
Ashish Chandra Mishra
-
2012/07/28
Talk : Defcon : Botnets Die Hard - Owned and Operated -
Aditya K Sood
Richard J Enbody
-
2012/02/15
Talk : Nullcon : Application security cost management -
Ketan Vyas
-
2012/02/15
Talk : Nullcon : Best practices to improve the security grading of your project -
Hemant Khandelwal
-
2012/02/15
Talk : Nullcon : Content sniffing Algorithm bypassing techniques and possible attack vectors -
Anil Aphale
Chaitany Kamble
-
2012/02/15
Talk : Nullcon : Friction in the machine -
Dinesh Shenoy
-
2012/02/15
Talk : Nullcon : Javascript static analysis with IronWASP -
Lavakumar Kuppan
-
2012/02/15
Talk : Nullcon : Node.js: The good, bad and ugly -
Bishan Singh
-
2012/02/15
Talk : Nullcon : Ra.2 Blackbox DOM-based XSS scanner -
Nishant Das Patnaik
Sarathi Sabyasachi Sahoo
-
2012/02/15
Talk : Nullcon : Sandboxing The deep truth -
Disha Agarwal
Manish Pali
-
2011/12/04
Talk : Clubhack : Android Tamer -
Anant Shrivastava
-
2011/11/25
Talk : Malcon : Exploit the Exploit kits -
Dhruv Soi
-
2011/10/08
Talk : C0c0n : Stratagemizing Security Against Perpetrators In Cloud Infrastructure -
K S Abhiraj
-
2011/10/07
Talk : C0c0n : Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network -
Bala Kumar S
Mohamed Emraanullah
-
2011/09/07
Talk : Securitybyte : Data Protection -
Dipankar Roy
-
2011/09/07
Talk : Securitybyte : Web Application Defender -
K v Prashant
Mohammed Imran
-
2011/08/07
Talk : Defcon : VDLDS — All Your Voice Are Belong To Us -
Ganesh Devarajan
Don Le Bert
-
2011/05/19
Talk : Hitb Sec Conf : Spying on SpyEye – What Lies Beneath? -
Aditya K Sood
-
2011/02/25
Talk : Nullcon : (secure) SiteHoster – Disable XSS & SQL Injection -
Abhishek Kumar
-
2011/02/25
Talk : Nullcon : Enterprise Paradigm for Controlling Data Leakage -
Deepak Rout
-
2011/02/25
Talk : Nullcon : Future of cyber crimes: Limitations and Challenges -
Pratap Reddy
-
2011/02/25
Talk : Nullcon : Protect infrastructure or protect information – Lessons from Wikileaks -
Vishal Gupta
-
2011/02/15
Talk : Nullcon : Botnet Detection approach by DNS behavior and clustering analysis -
Nilesh Sharma
Pulkit Mehndiratta
-
2010/12/04
Talk : Clubhack : Mantra – Free and Open Source security framework based on browser platform -
Abhi M Balakrishnan
-
2010/10/13
Talk : Hitb Sec Conf : Hacking a Browser’s DOM – Exploiting Ajax and RIA -
Shreeraj Shah
-
2010/08/01
Talk : C0c0n : End-point Security -
Laxi Eshwari
-
2010/08/01
Talk : C0c0n : Last line of defense - Host Intrusion Prevention and Secure application development. -
Avinash Shenoi
-
2010/07/31
Talk : Defcon : WPA Too! -
Md Sohail Ahmad
-
2010/02/25
Talk : Nullcon : Botnet mitigation, monitoring and management. -
Harshad Patil
-
2010/02/25
Talk : Nullcon : Malware Detection Tool for Websites: A Proof-Of-Concept -
Anant Kochhar
-
2009/12/05
Talk : Clubhack : Open source for securing data with advanced Crypto-Steganography technology -
Suhas Desai
-
2009/11/18
Talk : Securitybyte : Introduction to Web Protection Library -
Anil Chintala
-
2009/11/17
Talk : Securitybyte : Threat Modeling -
Varun Sharma
-
2009/08/06
Talk : C0c0n : Know Your Enemy, and Yourself: Demystifying Threat Modelin -
Meera Subbarao
-
2009/08/06
Talk : C0c0n : Management & Security of Large Scale Storage Devices -
Prashant Dinde
-
2009/08/06
Talk : C0c0n : Microsoft Security Strategies -
Binoy VC
-
2009/05/19
Talk : Syscan : Securing Applications at Gateway with Web Application Firewalls -
Shreeraj Shah
-
2009/05/19
Talk : Syscan : Securing Enterprise Applications -
Shreeraj Shah
-
2009/04/22
Talk : Hitb Sec Conf : Application Defense Tactics & Strategies - WAF at the Gateway -
Shreeraj Shah
-
2009/03/16
Talk : Can Sec West : On Approaches and Tools for Automated Vulnerability Analysis -
Tanmay Ganacharya
Abhishek Singh
Swapnil Bhalode
Nikola Livic
Scott Lambert
-
2009/02/19
Talk : Blackhat : Blinded by Flash: Widespread Security Risks Flash Developers Don’t See -
Prajakta Jagdale
-
2008/12/06
Talk : Clubhack : AntiSpam - Understanding the good, the bad and the ugly -
Aseem Jakhar
-
2008/12/06
Talk : Clubhack : Immune IT: Moving from Security to Immunity -
Ajit Hatti
-
2008/12/06
Talk : Clubhack : Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching -
Karmendra Kohli
-
2008/12/06
Talk : Clubhack : Reverse Engineering v/s Secure Coding -
Atul Alex
-
2008/10/29
Talk : Hitb Sec Conf : Top 10 Web 2.0 Attacks -
Shreeraj Shah
-
2008/08/21
Talk : Owasp App Sec India : AppSec For Managers -
Nish Bhalla
-
2008/08/20
Talk : Owasp App Sec India : Web 2.0 Attacks - Next Generation Threats on the Rise -
Shreeraj Shah
-
2008/08/20
Talk : Owasp App Sec India : Web Application Security: Too Costly To Ignore -
Rajesh Nayak
-
2008/04/16
Talk : Hitb Sec Conf : Securing Next Generation Applications – Scan, Detect and Mitigate -
Shreeraj Shah
-
2008/02/20
Talk : Blackhat : Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools -
Shreeraj Shah
-
2007/12/09
Talk : Clubhack : Subtle Security flaws: Why you must follow the basic principles of software security -
Varun Sharma
-
2007/11/20
Talk : Deepsec : Web 2.0 Application Kung-Fu - Securing Ajax & Web Services -
Shreeraj Shah
-
2007/08/01
Talk : Blackhat : PISA: Protocol Identification via Statistical Analysis -
Rohit Dhamankar
Rob King
-
2007/04/05
Talk : Hitb Sec Conf : WEB 2.0 Hacking – Defending Ajax and Web Services -
Shreeraj Shah
-
2007/03/30
Talk : Blackhat : Web Service Vulnerabilities -
Nish Bhalla
-
2006/01/26
Talk : Blackhat : Analysis of Adversarial Code: Problem, Challenges, Results -
Arun Lakhotia
-
2005/10/18
Talk : Blackhat : Adware/Spyware -
Saumil Shah
Dave Cole
-
2005/09/29
Talk : Hitb Sec Conf : Analyzing Code for Security Defects -
Nish Bhalla
-
2005/09/26
Talk : Hitb Sec Conf : Web hacking Kung-Fu and Art of Defense -
Shreeraj Shah
-
2005/04/12
Talk : Hitb Sec Conf : Web Application Kung-Fu, The Art of Defense -
Shreeraj Shah
-
2005/04/10
Talk : Hitb Sec Conf : Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection -
Pukhraj Singh
-
2004/10/06
Talk : Hitb Sec Conf : Web Services - Attacks and Defense Strategies, Methods and Tools -
Shreeraj Shah
-
2004/07/29
Talk : Blackhat : Evasion and Detection of Web Application Attacks -
K K Mookhey
-
2004/05/19
Talk : Blackhat : HTTP Fingerprinting and Advanced Assessment Techniques -
Saumil Shah
-
2004/01/29
Talk : Blackhat : HTTP Fingerprinting and Advanced Assessment Techniques -
Saumil Shah
-
2003/12/16
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2003/12/12
Talk : Hitb Sec Conf : Defending Web Applications: Strategies, methods and practices -
Shreeraj Shah
-
2003/10/01
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2003/07/31
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2003/02/26
Talk : Blackhat : HTTP: Advanced Assessment Techniques -
Saumil Shah
-
2002/10/03
Talk : Blackhat : Top Ten Web Attacks -
Saumil Shah
-
2001/07/13
Talk : Defcon : Security & Privacy are Critically Important Issues in Todays Digitally Connected Age -
Sharad Popli