Hackers of India
Blueteam
"keynote"
"talk"
"Tool Demo"
"workshop"
- 2024/04/18
Tool Demo : Blackhat : eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security -
Sagar Bhure

- 2024/04/18
Tool Demo : Blackhat : Secure Local Vault - Git Based Secret Manager -
Sriram Krishnan
Shibly Meeran
- 2023/09/23
Talk : Nullcon : Secure Your Angular App Using JWT And GraphQL -
Ankit Sharma

- 2023/09/23
Talk : Nullcon : The Curious Case Of The Rogue SOAR -
Mukesh Sai Kumar
Jaden Furtado

- 2022/09/08
Talk : Nullcon : Handling A Bug Bounty program From A Blue Team Perspective -
Ashwath Kumar
Ankit Anurag

- 2021/05/06
Tool Demo : Blackhat : Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way -
Vasant Kumar
Rupali Dash

- 2021/05/06
Tool Demo : Blackhat : FalconEye: Windows Process Injection Techniques - Catch Them All -
Rajiv Kulkarni
Sushant Paithane

- 2021/05/06
Talk : Blackhat : Threat Hunting in Active Directory Environment -
Anurag Khanna
Thirumalai Natarajan Muthiah

- 2020/12/09
Tool Demo : Blackhat : ArcherySec 2.0 - Open Source Vulnerability Assessment and Management -
Anand Tiwari

- 2020/12/09
Tool Demo : Blackhat : HosTaGe: mobile honeypots for rapid deployment -
Shreyas Srinivasa
Emmanouil Vasilomanolakis
Eirini Lygerou

- 2020/12/09
Tool Demo : Blackhat : Strafer: A Tool to Detect Infections in Elasticsearch Instances -
Rohit Bansal
Aditya K Sood

- 2020/10/07
Talk : Rootcon : Blockchain Based OT Monitoring Solution (BBOTMS) -
Asif Hameed Khan
Gagan Jattana

- 2020/10/02
Tool Demo : Blackhat : MalViz.ai -
Vasu Sethia
Shivam Kataria

- 2020/10/02
Tool Demo : Blackhat : Phishing Simulation Assessment -
Jyoti Raval

- 2020/10/01
Tool Demo : Blackhat : Wi-Fi Access Point Rootkits -
Nishant Sharma
Jeswin Mathai
- 2020/09/18
Talk : C0c0n : Deep Learning for Intrusion Attempt Detection -
Varun Kohli
- 2020/08/05
Talk : Blackhat : Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic -
Harini Kannan
Nick Gregory

- 2020/08/05
Tool Demo : Blackhat : vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) -
Pramod Rana

- 2020/07/05
Tool Demo : Blackhat : Mobile Security Framework - MobSF -
Ajin Abraham

- 2020/04/25
Talk : Hitb Sec Conf : THE STATE OF ICS SECURITY: THEN AND NOW -
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
- 2020/04/24
Talk : Hitb Sec Conf : COMMSEC: The State of ICS Security : Then and Now -
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
- 2020/03/06
Tool Demo : Nullcon : F.R.I.D.A.Y -
Shyam Sundar Ramaswami

- 2020/03/06
Tool Demo : Nullcon : Hachi -
Parmanand Mishra

- 2020/03/06
Talk : Nullcon : InfoSec Deep Learning in Action -
Satnam Singh

- 2020/03/06
Tool Demo : Nullcon : Omniscient -
Pramod Rana

- 2020/03/06
Tool Demo : Nullcon : Phishing Simulation -
Jyoti Raval

- 2020/03/06
Tool Demo : Nullcon : Providence -
Swapnil Kumbhar
Akshay Shah

- 2020/03/06
Tool Demo : Nullcon : Wolverine -
Furqan Khan
Siddharth Anbalahan

- 2019/12/04
Talk : Blackhat : Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing -
Karthik Ramasamy
Eric Hampshire

- 2019/12/04
Tool Demo : Blackhat : Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit -
Jayesh Chauhan

- 2019/12/04
Talk : Blackhat : ClusterFuzz: Fuzzing at Google Scale -
Abhishek Arya
Oliver Chang

- 2019/12/04
Tool Demo : Blackhat : RTTM: Real Time Threat Monitoring Tool -
Naveen Rudrappa
Murali Krishna Segu

- 2019/11/01
Talk : App Sec Day Australia : A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
- 2019/11/01
Talk : App Sec Day Australia : Protecting the Damned: Deploying Insecure Applications at Scale -
Vivek Ramachandran

- 2019/10/14
Talk : Hitb Sec Conf : CALL OF DUTY: MODERN BROWSER WARFARE -
Dhiraj Mishra

- 2019/10/14
Talk : Hitb Sec Conf : ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES -
Harshit Agrawal
Himanshu Mehta

- 2019/09/27
Talk : C0c0n : Advanced Persistent Threat and counter measures -
A a Gafoor
- 2019/09/27
Talk : C0c0n : Block Chain for Secured Automation -
Sanat Bhat
- 2019/09/27
Talk : C0c0n : Building a cloud security monitoring and auditing framework -
Nirali Shah
Prasoon Dwivedi
- 2019/09/27
Talk : C0c0n : Defense in Depth for Embedded Systems -
Jiggyasu Sharma

- 2019/09/27
Talk : C0c0n : Demystifying HealthCare Security -
Ajay Pratap Singh
- 2019/09/27
Talk : C0c0n : Doing SecOps for the Cloud using Cloud Native Services -
Akash Mahajan
- 2019/09/27
Talk : C0c0n : Securing Payment Data with PCI Security Standards and Programs -
Nitin Bhatnagar
- 2019/09/23
Talk : Rootcon : Hunting Threats with Wireshark Plugins -
Nishant Sharma
Jeswin Mathai
Shivam Bathla

- 2019/09/23
Talk : Rootcon : Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) -
Arun Mane
Nikhil Bogam

- 2019/09/13
Talk : 44 Con : The CISO’s Dilemma -
Saumil Shah

- 2019/08/30
Talk : Hitb Sec Conf : COMMSEC: PErfidious: Make PE Backdooring Great Again! -
Shreyans Doshi

- 2019/08/29
Keynote : Hitb Sec Conf : The CISO’s Dilemma -
Saumil Shah

- 2019/08/29
Talk : Hitb Sec Conf : Understanding, Attacking & Securing Medical Devices -
Ajay Pratap Singh

- 2019/08/10
Tool Demo : Defcon : Local Sheriff -
Konark Modi

- 2019/08/09
Tool Demo : Defcon : EXPLIoT - IoT Security Testing and Exploitation Framework -
Aseem Jakhar
Murtuja Bharmal

- 2019/08/08
Tool Demo : Blackhat : Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit -
Jayesh Chauhan

- 2019/08/08
Tool Demo : Blackhat : CSF: Container Security Framework -
Vaibhav Gupta

- 2019/08/08
Talk : Blackhat : Death to the IOC: What’s Next in Threat Intelligence -
Bhavna Soman

- 2019/08/08
Tool Demo : Blackhat : EXPLIoT: IoT Security Testing and Exploitation Framework -
Aseem Jakhar
Murtuja Bharmal

- 2019/08/08
Tool Demo : Defcon : Hachi: An Intelligent threat mapper -
Parmanand Mishra

- 2019/08/08
Tool Demo : Defcon : Let’s Map Your Network -
Pramod Rana

- 2019/08/08
Tool Demo : Defcon : PcapXray -
Srinivas Piskala Ganesh Babu

- 2019/08/08
Tool Demo : Blackhat : RWDD: Remote Web Deface Detection Tool -
K v Prashant
Ade Yoseman Putra

- 2019/08/07
Talk : Blackhat : Defense Against Rapidly Morphing DDOS -
Mudit Tyagi
Mikhail Fedorov

- 2019/08/07
Tool Demo : Blackhat : RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting -
Sudhanshu Chauhan
Kunal Aggarwal

- 2019/05/21
Talk : Phdays : Active defense using Honeypots v2 -
Rahul Binjve

- 2019/03/28
Tool Demo : Blackhat : Archery - Open Source Vulnerability Assessment and Management- 2.0 -
Anand Tiwari

- 2019/03/28
Tool Demo : Blackhat : Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit -
Jayesh Chauhan

- 2019/03/28
Talk : Blackhat : Investigating Malware Using Memory Forensics - A Practical Approach -
Monnappa K A

- 2019/03/28
Tool Demo : Blackhat : Kurukshetra: Playground for Interactive Security Learning -
Anirudh Anand
Mohan Kallepalli
Ankur Bhargava

- 2019/03/28
Tool Demo : Blackhat : MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research -
Nilaksh Das
Evan Yang
Li Chen

- 2019/03/28
Tool Demo : Blackhat : RTS: Real Time Scrapper -
Naveen Rudrappa

- 2019/03/28
Tool Demo : Blackhat : VoIP Wireshark Attack-Defense Toolkit -
Nishant Sharma
Jeswin Mathai
Ashish Bhangale

- 2019/02/28
Talk : Nullcon : Attacking & Securing HealthCare Standards & hospital secured systems -
Ajay Pratap Singh

- 2019/02/28
Talk : Nullcon : Building Hardened IoT Implementations with LangSec -
Prashant Anantharaman

- 2018/12/06
Talk : Blackhat : AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace -
Vijay Thaware
Niranjan Agnihotri

- 2018/12/06
Tool Demo : Blackhat : Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit -
Jayesh Chauhan

- 2018/12/05
Tool Demo : Blackhat : Kurukshetra: Playground for Interactive Security Learning -
Anirudh Anand
Mohan Kallepalli

- 2018/11/27
Talk : Hitb Sec Conf : COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding -
Vikash Yadav

- 2018/11/02
Talk : Hitb Sec Conf : Defending The Enterprise in 2018 -
Saumil Shah
- 2018/10/19
Talk : App Sec Day Australia : Continuous Integration and Delivery with Docker Containers -
Vasant Kumar

- 2018/10/05
Talk : C0c0n : Defending Healthcare Base -
Jiggyasu Sharma
- 2018/10/05
Talk : C0c0n : How can we use machine learning to prevent Frauds and password breaches -
Tamaghna Basu
- 2018/10/05
Talk : C0c0n : Predictive policing using Big Data analytics. -
Tarun Wig
- 2018/10/05
Talk : C0c0n : Privacy And Data Protection: Stakeholders’ Perspectives -
Rahul Sharma
- 2018/09/27
Talk : Rootcon : Defending cloud Infrastructures with Cloud Security Suite -
Shivankar Madaan

- 2018/09/06
Talk : Grrcon : Analyzing Multi-Dimensional Malware Dataset -
Ankur Tyagi

- 2018/09/06
Talk : Grrcon : Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
Ankur Tyagi

- 2018/08/12
Tool Demo : Defcon : Expl-iot—IoT Security Testing and Exploitation framework -
Aseem Jakhar

- 2018/08/11
Tool Demo : Defcon : Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
Ankur Tyagi

- 2018/08/11
Tool Demo : Defcon : Archery—Open Source Vulnerability Assessment and Management -
Anand Tiwari

- 2018/08/11
Tool Demo : Defcon : Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit -
Jayesh Chauhan

- 2018/08/11
Tool Demo : Defcon : DejaVU—An Open Source Deception Framework -
Harish Ramadoss
Bhadreshkumar Patel

- 2018/08/11
Tool Demo : Defcon : Local Sheriff -
Konark Modi

- 2018/08/09
Talk : Blackhat : Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina -
Bhargava Shastry
Vincent Ulitzsch
Dominik Maier

- 2018/08/09
Talk : Defcon : 4G—Who is paying your cellular phone bill? -
Isha Singh
Dr Silke Holtmanns

- 2018/08/08
Tool Demo : Blackhat : ANWI (All New Wireless IDS): The $5 WIDS -
Rishikesh Bhide
Sanket Karpe

- 2018/08/08
Tool Demo : Blackhat : Archerysec Tool Demo -
Anand Tiwari

- 2018/08/08
Tool Demo : Blackhat : Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit -
Divya S John
Jayesh Chauhan
Shivankar Madaan

- 2018/08/08
Talk : Blackhat : Compression Oracle Attacks on VPN Networks -
Ahamed Nafeez

- 2018/08/08
Tool Demo : Blackhat : DejaVu: An Open Source Deception Framework -
Bhadreshkumar Patel
Harish Ramadoss

- 2018/08/08
Tool Demo : Blackhat : Expl-iot: IoT Security Testing and Exploitation Framework -
Aseem Jakhar

- 2018/08/08
Talk : Blackhat : LTE Network Automation Under Threat -
Ravishankar Borgaonkar
Altaf Shaik

- 2018/08/08
Tool Demo : Blackhat : RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting -
Sudhanshu Chauhan

- 2018/08/08
Tool Demo : Blackhat : SCoDA: Smart COntract Defender and Analyzer -
Ajit Hatti
- 2018/05/13
Talk : Defcon : Androsia: Securing ‘Data in Process’ for your Android Apps -
Samit Anwer

- 2018/03/23
Tool Demo : Blackhat : Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit -
Jayesh Chauhan
Shivankar Madaan

- 2018/03/22
Tool Demo : Blackhat : Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data -
Samit Anwer

- 2018/03/22
Tool Demo : Blackhat : Archery - Open Source Vulnerability Assessment and Management -
Anand Tiwari

- 2018/03/22
Tool Demo : Blackhat : Jackhammer - One Security Vulnerability Assessment/Management Tool -
Rajagopal Vr
Krishna Chaitanya Yarramsetty

- 2018/03/22
Tool Demo : Blackhat : Mobile Security Framework - MobSF -
Ajin Abraham

- 2018/03/22
Talk : Blackhat : Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables -
Sumanth Naropanth
Kavya Racharla

- 2018/03/22
Talk : Blackhat : XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot -
Ravi Sahita
Daiping Liu
Mingwei Zhang

- 2018/03/15
Talk : Troopers : Defending Microsoft Environments at Scale -
Vineet Bhatia

- 2018/03/01
Talk : Nullcon : A Game between Adversary and AI Scientist -
Satnam Singh

- 2018/03/01
Talk : Nullcon : SpotPhish: Zero-Hour Phishing Protection -
Ganesh Varadarajan

- 2018/03/01
Talk : Nullcon : Unleashing D* on Android Kernel Drivers -
Aravind Machiry

- 2017/12/30
Tool Demo : Blackhat : Cloud Security Suite - One Stop Tool for AWS Security Audit -
Shivankar Madaan
Prajal Kulkarni
Jayesh Chauhan

- 2017/12/06
Tool Demo : Blackhat : ANWI (All New Wireless IDS) - The £5 WIDS -
Sanket Karpe

- 2017/12/06
Tool Demo : Blackhat : EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK -
Aseem Jakhar

- 2017/11/20
Talk : Hackfest : How my SV Machine nailed your Malware -
Nikhil P Kulkarni
- 2017/11/17
Talk : Deepsec : Intel AMT: Using & Abusing The Ghost In The Machine -
Parth Shukla

- 2017/10/19
Talk : Hacklu : Intel AMT: Using & Abusing the Ghost in the Machine -
Parth Shukla

- 2017/08/18
Talk : C0c0n : Hunting Botnets with Analytics -
Shomiron Das Gupta
- 2017/08/18
Talk : C0c0n : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work -
Rahul Binjve
- 2017/08/18
Talk : C0c0n : Cloud_Security Suite - One stop tool for auditing cloud infrastructure -
Shivankar Madaan
Jayesh Chauhan

- 2017/08/18
Talk : C0c0n : Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! -
Illyas Kooliyankal
- 2017/08/18
Talk : C0c0n : iGoat – A Self Learning Tool for iOS App Pentesting and Security -
Swaroop Yermalkar

- 2017/08/18
Talk : C0c0n : Mobile Banking (In)Security -
Sneha Rajguru
- 2017/08/18
Talk : C0c0n : Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure -
Manas Pratim Sarma
- 2017/08/18
Talk : C0c0n : The card hack - Lessons from the Hitachi Payments Breach -
Saikat Datta
- 2017/08/18
Talk : C0c0n : The Internet Of Things: Essentials of Secur(IOT)y -
Arpit Bajpai
Ronald Michael
- 2017/08/18
Talk : C0c0n : The Internet Of Things: Essentials of Secur(IOT)y -
Ronald Michel
- 2017/08/18
Talk : C0c0n : Yarafying Android Malware: A Missing Step Before Malware Analysis -
Shivang Desai
- 2017/07/30
Tool Demo : Blackhat : Yasuo -
Saurabh Harit

- 2017/07/29
Tool Demo : Defcon : WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
- 2017/07/28
Tool Demo : Defcon : Android Tamer -
Anant Shrivastava

- 2017/07/27
Workshop : Defcon : Attacking and Defending 802.11ac Networks -
Vivek Ramachandran
Thomas D' Otreppe
- 2017/07/27
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava

- 2017/07/27
Tool Demo : Blackhat : Gibber Sense -
Ajit Hatti

- 2017/07/26
Talk : Blackhat : New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor -
Ravishankar Borgaonkar
Altaf Shaik
Shinjo Park
Lucca Hirschi
Andrew Martin
Jean Pierre Seifert

- 2017/06/23
Talk : Hackinparis : Injecting Security into Web apps with Runtime Patching and Context Learning -
Ajin Abraham

- 2017/05/23
Talk : Phdays : Injecting security into web apps in the runtime -
Ajin Abraham

- 2017/05/23
Talk : Phdays : Practical machine learning in infosecurity -
Anto Joseph
Clarence Chio

- 2017/04/13
Keynote : Hitb Sec Conf : Redefining Defense -
Saumil Shah

- 2017/03/31
Talk : Blackhat : The Seven Axioms of Security -
Saumil Shah

- 2017/03/30
Tool Demo : Blackhat : WiDy: WiFi 0wnage in Under $5 -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
- 2017/03/03
Talk : Nullcon : Agility with security mitigations in Windows 10 -
Swamy Shivaganga Nagaraju
- 2017/03/03
Talk : Nullcon : Case study of SS7/Sigtran assessment -
Akib Sayyed

- 2017/03/03
Talk : Nullcon : Injecting Security into Web apps with Runtime Patching and Context Learning -
Ajin Abraham

- 2016/11/11
Talk : Deepsec : AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That -
Nikhil Mittal

- 2016/11/04
Tool Demo : Blackhat : Yasuo -
Saurabh Harit

- 2016/09/14
Talk : 44 Con : 2016: The Infosec Crossroads -
Saumil Shah

- 2016/08/19
Talk : C0c0n : Backdooring my Enemies with a Proxy for Threat Intelligence -
Jovin Lobo
Aditya Vasekar
- 2016/08/06
Tool Demo : Defcon : Visual Network and File Forensics using Rudra -
Ankur Tyagi

- 2016/08/03
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava

- 2016/08/03
Tool Demo : Blackhat : Visual Network and File Forensics Using Rudra -
Ankur Tyagi

- 2016/05/17
Talk : Phdays : Security Automation Based on Artificial Intelligence -
Rahul Sasi

- 2016/04/01
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava

- 2016/04/01
Tool Demo : Blackhat : Rudra: The Destroyer of Evil -
Ankur Tyagi

- 2016/03/11
Talk : Nullcon : Attacking and defending healthcare - EMR solutions -
Anirudh Duggal

- 2016/03/11
Talk : Nullcon : Making Machines think about security for fun and profit -
Rahul Sasi

- 2016/03/11
Talk : Nullcon : Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day -
Pallav Jakhotiya
Vipul Sawant

- 2015/11/13
Tool Demo : Blackhat : Rudra - The Destroyer of Evil -
Ankur Tyagi

- 2015/11/12
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava

- 2015/11/05
Talk : Ground Zero Summit : Wolves Among Sheep: Defeating Targeted Attacks With Deception -
Sahir Hidayatullah
Raviraj Doshi
- 2015/08/08
Talk : Defcon : Chigula — a framework for Wi-Fi Intrusion Detection and Forensics -
Vivek Ramachandran

- 2015/08/08
Talk : Defcon : Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities -
Aditya K Sood

- 2015/08/08
Talk : Defcon : QARK: Android App Exploit and SCA Tool -
Tushar Dalvi
Tony Trummer

- 2015/08/08
Tool Demo : Defcon : Rudra -
Ankur Tyagi

- 2015/08/06
Tool Demo : Blackhat : Chellam -
Vivek Ramachandran
- 2015/08/06
Talk : Blackhat : Harnessing Intelligence from Malware Repositories -
Arun Lakhotia
Vivek Notani

- 2015/08/05
Tool Demo : Blackhat : QARK - Android Application SCA and Exploit Tool -
Tushar Dalvi

- 2015/08/05
Tool Demo : Blackhat : Rudra - The Destroyer of Evil -
Ankur Tyagi

- 2015/08/01
Talk : C0c0n : Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities -
Anant Shrivastava

- 2015/05/26
Talk : Phdays : Invisible Backdoors In Your Code -
Debasis Mohanty
- 2015/03/27
Talk : Blackhat : Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence -
Preeti Subramanian

- 2015/03/26
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham

- 2015/03/26
Tool Demo : Blackhat : SecPod Saner -
Preeti Subramanian

- 2015/02/06
Talk : Nullcon : Analyzing Chrome crash reports at scale -
Abhishek Arya

- 2015/02/06
Talk : Nullcon : Attack and Defence in Radio and Communication Warfare -
Akib Sayyed

- 2015/02/06
Talk : Nullcon : Generic Executable Unpacking using Dynamic Binary Instrumentation -
Shubham Bansal

- 2015/02/06
Talk : Nullcon : Hunting and Decrypting Ghost communications using Memory Forensics -
Monnappa K A

- 2014/11/13
Talk : Ground Zero Summit : APT protection for the Enterprise -
Deepak Singla
- 2014/11/13
Talk : Ground Zero Summit : Making and Breaking Embedded Security -
Yashin Mehaboobe

- 2014/10/16
Talk : Grrcon : Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design -
Aditya K Sood
Dr. Richard J Enbody
- 2014/08/22
Talk : C0c0n : Making and breaking security in embedded devices -
Yashin Mehaboobe

- 2014/08/22
Talk : C0c0n : Piracy Tracker -
Vargheese Babu
- 2014/08/07
Talk : Blackhat : Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies -
Vijay Balasubramaniyan
Raj Bandyopadhyay
Telvis Calhoun

- 2014/08/06
Talk : Blackhat : What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! -
Aditya K Sood

- 2014/02/15
Tool Demo : Nullcon : OWASP Xenotix XSS Exploit Framerwork -
Ajin Abraham

- 2014/02/14
Talk : Nullcon : 2014 The year in which we cannot ignore SCADA -
Amol Sarwate

- 2014/02/14
Talk : Nullcon : Attack of the setuid bit - pt_chown and pwning root terminals -
Siddhesh Poyarekar

- 2014/02/14
Talk : Nullcon : Chrome - OS Security 2014: New and future hotness -
Sumit Gwalani

- 2014/02/14
Talk : Nullcon : In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} -
Rushikesh D Nandedkar
Amrita C Iyer

- 2014/02/14
Talk : Nullcon : Multi-value W-Fi What the Heck is it -
Abhijeet Ghosh

- 2014/02/14
Talk : Nullcon : phoneypdf: A Virtual PDF Analysis Framework -
Kiran Bandla

- 2014/02/14
Talk : Nullcon : The Security Challenge -
Shantanu Ghosh

- 2013/11/07
Talk : Ground Zero Summit : Advanced security for advanced threats -
Kartik Shahani
- 2013/10/17
Talk : Hitb Sec Conf : Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis -
Rahul Sasi

- 2013/09/27
Talk : C0c0n : The Art and Science of Anamoly based Vulnerability Detection -
Lavakumar Kuppan
- 2013/08/01
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham

- 2013/08/01
Tool Demo : Blackhat : Sparty -
Aditya K Sood

- 2013/07/31
Talk : Blackhat : Clickjacking revisited: A perceptual view of UI security -
Devdatta Akhawe

- 2013/07/31
Talk : Blackhat : Javascript static security analysis made easy with JSPrime -
Nishant Das Patnaik
Sarathi Sabyasachi Sahoo

- 2013/07/31
Tool Demo : Blackhat : JMSDigger -
Gursev Singh Kalra

- 2013/03/15
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham

- 2013/03/15
Talk : Blackhat : The Sandbox Roulette- Are you ready for the gamble? -
Rahul Kashyap
Rafal Wojtczuk

- 2013/03/01
Talk : Nullcon : Automating JavaScript Static Analysis -
Lavakumar Kuppan
- 2013/03/01
Talk : Nullcon : BYOD: How will it shape your wireless network security in future? -
Kiran Deshpande

- 2013/03/01
Talk : Nullcon : CSRF Finder as a Mozilla Addon -
Piyush Pattanayak

- 2013/03/01
Talk : Nullcon : Mobile Code mining for discovery and exploits -
Hemil Shah

- 2013/03/01
Talk : Nullcon : Pawing the Droid: Twisting the ARM -
Divyanshu Shekhar
Anshul Kumar
- 2013/03/01
Talk : Nullcon : Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks -
Naga Rohit Samineni

- 2013/03/01
Talk : Nullcon : Sensitive Campus Security with Network -
Aravind Sitaraman

- 2013/03/01
Talk : Nullcon : Vulnerability research anyone? -
Omair
- 2012/12/01
Talk : Clubhack : Hacking and Securing iOS applications -
Satish Bommisetty

- 2012/12/01
Talk : Clubhack : Infrastructure Security -
Sivamurthy Hiremath

- 2012/12/01
Talk : Clubhack : Smart Grid Security -
Falgun Rathod

- 2012/09/26
Talk : Nullcon : Forensics Timeline Analysis -
Aashish Kunte

- 2012/08/03
Talk : C0c0n : Building Security Incident Detection & Handling Capabilities in Enterprises -
Sunil Varkey
- 2012/08/03
Talk : C0c0n : Enterprise server security -
Raghav Shandilya
- 2012/08/03
Talk : C0c0n : Security Incidents – Avoiding the Apocalypse in 2012 -
Ashish Chandra Mishra
- 2012/07/28
Talk : Defcon : Botnets Die Hard - Owned and Operated -
Aditya K Sood
Richard J Enbody

- 2012/02/15
Talk : Nullcon : Application security cost management -
Ketan Vyas

- 2012/02/15
Talk : Nullcon : Best practices to improve the security grading of your project -
Hemant Khandelwal

- 2012/02/15
Talk : Nullcon : Content sniffing Algorithm bypassing techniques and possible attack vectors -
Anil Aphale
Chaitany Kamble

- 2012/02/15
Talk : Nullcon : Friction in the machine -
Dinesh Shenoy
- 2012/02/15
Talk : Nullcon : Javascript static analysis with IronWASP -
Lavakumar Kuppan

- 2012/02/15
Talk : Nullcon : Node.js: The good, bad and ugly -
Bishan Singh

- 2012/02/15
Talk : Nullcon : Ra.2 Blackbox DOM-based XSS scanner -
Nishant Das Patnaik
Sarathi Sabyasachi Sahoo

- 2012/02/15
Talk : Nullcon : Sandboxing The deep truth -
Disha Agarwal
Manish Pali

- 2011/12/04
Talk : Clubhack : Android Tamer -
Anant Shrivastava

- 2011/11/25
Talk : Malcon : Exploit the Exploit kits -
Dhruv Soi
- 2011/10/08
Talk : C0c0n : Stratagemizing Security Against Perpetrators In Cloud Infrastructure -
K S Abhiraj
- 2011/10/07
Talk : C0c0n : Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network -
Bala Kumar S
Mohamed Emraanullah
- 2011/09/07
Talk : Securitybyte : Data Protection -
Dipankar Roy
- 2011/09/07
Talk : Securitybyte : Web Application Defender -
K v Prashant
Mohammed Imran

- 2011/08/07
Talk : Defcon : VDLDS — All Your Voice Are Belong To Us -
Ganesh Devarajan
Don Le Bert

- 2011/05/19
Talk : Hitb Sec Conf : Spying on SpyEye – What Lies Beneath? -
Aditya K Sood

- 2011/02/25
Talk : Nullcon : (secure) SiteHoster – Disable XSS & SQL Injection -
Abhishek Kumar

- 2011/02/25
Talk : Nullcon : Enterprise Paradigm for Controlling Data Leakage -
Deepak Rout

- 2011/02/25
Talk : Nullcon : Future of cyber crimes: Limitations and Challenges -
Pratap Reddy
- 2011/02/25
Talk : Nullcon : Protect infrastructure or protect information – Lessons from Wikileaks -
Vishal Gupta

- 2011/02/15
Talk : Nullcon : Botnet Detection approach by DNS behavior and clustering analysis -
Nilesh Sharma
Pulkit Mehndiratta

- 2010/12/04
Talk : Clubhack : Mantra – Free and Open Source security framework based on browser platform -
Abhi M Balakrishnan

- 2010/10/13
Talk : Hitb Sec Conf : Hacking a Browser’s DOM – Exploiting Ajax and RIA -
Shreeraj Shah

- 2010/08/01
Talk : C0c0n : End-point Security -
Laxi Eshwari
- 2010/08/01
Talk : C0c0n : Last line of defense - Host Intrusion Prevention and Secure application development. -
Avinash Shenoi
- 2010/07/31
Talk : Defcon : WPA Too! -
Md Sohail Ahmad

- 2010/02/25
Talk : Nullcon : Botnet mitigation, monitoring and management. -
Harshad Patil

- 2010/02/25
Talk : Nullcon : Malware Detection Tool for Websites: A Proof-Of-Concept -
Anant Kochhar

- 2009/12/05
Talk : Clubhack : Open source for securing data with advanced Crypto-Steganography technology -
Suhas Desai

- 2009/11/18
Talk : Securitybyte : Introduction to Web Protection Library -
Anil Chintala

- 2009/11/17
Talk : Securitybyte : Threat Modeling -
Varun Sharma

- 2009/08/06
Talk : C0c0n : Know Your Enemy, and Yourself: Demystifying Threat Modelin -
Meera Subbarao
- 2009/08/06
Talk : C0c0n : Management & Security of Large Scale Storage Devices -
Prashant Dinde
- 2009/08/06
Talk : C0c0n : Microsoft Security Strategies -
Binoy VC
- 2009/05/19
Talk : Syscan : Securing Applications at Gateway with Web Application Firewalls -
Shreeraj Shah
- 2009/05/19
Talk : Syscan : Securing Enterprise Applications -
Shreeraj Shah
- 2009/04/22
Talk : Hitb Sec Conf : Application Defense Tactics & Strategies - WAF at the Gateway -
Shreeraj Shah

- 2009/03/16
Talk : Can Sec West : On Approaches and Tools for Automated Vulnerability Analysis -
Tanmay Ganacharya
Abhishek Singh
Swapnil Bhalode
Nikola Livic
Scott Lambert

- 2009/02/19
Talk : Blackhat : Blinded by Flash: Widespread Security Risks Flash Developers Don’t See -
Prajakta Jagdale

- 2008/12/06
Talk : Clubhack : AntiSpam - Understanding the good, the bad and the ugly -
Aseem Jakhar

- 2008/12/06
Talk : Clubhack : Immune IT: Moving from Security to Immunity -
Ajit Hatti

- 2008/12/06
Talk : Clubhack : Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching -
Karmendra Kohli

- 2008/12/06
Talk : Clubhack : Reverse Engineering v/s Secure Coding -
Atul Alex

- 2008/10/29
Talk : Hitb Sec Conf : Top 10 Web 2.0 Attacks -
Shreeraj Shah

- 2008/08/21
Talk : Owasp App Sec India : AppSec For Managers -
Nish Bhalla
- 2008/08/20
Talk : Owasp App Sec India : Web 2.0 Attacks - Next Generation Threats on the Rise -
Shreeraj Shah

- 2008/08/20
Talk : Owasp App Sec India : Web Application Security: Too Costly To Ignore -
Rajesh Nayak

- 2008/04/16
Talk : Hitb Sec Conf : Securing Next Generation Applications – Scan, Detect and Mitigate -
Shreeraj Shah
- 2008/02/20
Talk : Blackhat : Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools -
Shreeraj Shah

- 2007/12/09
Talk : Clubhack : Subtle Security flaws: Why you must follow the basic principles of software security -
Varun Sharma

- 2007/11/20
Talk : Deepsec : Web 2.0 Application Kung-Fu - Securing Ajax & Web Services -
Shreeraj Shah

- 2007/08/01
Talk : Blackhat : PISA: Protocol Identification via Statistical Analysis -
Rohit Dhamankar
Rob King

- 2007/04/05
Talk : Hitb Sec Conf : WEB 2.0 Hacking – Defending Ajax and Web Services -
Shreeraj Shah

- 2007/03/30
Talk : Blackhat : Web Service Vulnerabilities -
Nish Bhalla

- 2006/01/26
Talk : Blackhat : Analysis of Adversarial Code: Problem, Challenges, Results -
Arun Lakhotia

- 2005/10/18
Talk : Blackhat : Adware/Spyware -
Saumil Shah
Dave Cole

- 2005/09/29
Talk : Hitb Sec Conf : Analyzing Code for Security Defects -
Nish Bhalla

- 2005/09/26
Talk : Hitb Sec Conf : Web hacking Kung-Fu and Art of Defense -
Shreeraj Shah

- 2005/04/12
Talk : Hitb Sec Conf : Web Application Kung-Fu, The Art of Defense -
Shreeraj Shah

- 2005/04/10
Talk : Hitb Sec Conf : Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection -
Pukhraj Singh
- 2004/10/06
Talk : Hitb Sec Conf : Web Services - Attacks and Defense Strategies, Methods and Tools -
Shreeraj Shah

- 2004/07/29
Talk : Blackhat : Evasion and Detection of Web Application Attacks -
K K Mookhey

- 2004/05/19
Talk : Blackhat : HTTP Fingerprinting and Advanced Assessment Techniques -
Saumil Shah

- 2004/01/29
Talk : Blackhat : HTTP Fingerprinting and Advanced Assessment Techniques -
Saumil Shah

- 2003/12/16
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah

- 2003/12/12
Talk : Hitb Sec Conf : Defending Web Applications: Strategies, methods and practices -
Shreeraj Shah
- 2003/10/01
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah

- 2003/07/31
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah

- 2003/02/26
Talk : Blackhat : HTTP: Advanced Assessment Techniques -
Saumil Shah

- 2002/10/03
Talk : Blackhat : Top Ten Web Attacks -
Saumil Shah

- 2001/07/13
Talk : Defcon : Security & Privacy are Critically Important Issues in Todays Digitally Connected Age -
Sharad Popli
