| 2025-03-01 | Talk | Nullcon |
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
| Anto Joseph | #bug-bounty#secure-development#security-testing+2 |
| 2024-12-11 | Tool demo | Blackhat |
Agneyastra - Firebase Misconfiguration Detection Toolkit
| Bhavarth Karmarkar, Devang Solanki | #cloud-pentesting#misconfiguration#bug-bounty |
| 2024-08-09 | Talk | Defcon |
Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways
| Nikhil Shrivastava, Charles Waterhouse | #bug-hunting#bug-bounty#security-training+3 |
| 2024-05-09 | Talk | Rsac |
The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft
| Aanchal Gupta, Katie Moussouris | #bug-bounty#risk-management#security-governance |
| 2023-08-10 | Talk | Blackhat |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?
| Amit Deokar, Ali Ahmed, Brian Lee | #bug-hunting#incident-management#security-strategy+4 |
| 2022-09-08 | Talk | Nullcon |
Hack the Source: Securing Open Source Software โ One bug at a time
| Sandeep Singh, Laurie Mercer | #open-source-security#supply-chain#code-review+4 |
| 2022-09-07 | Talk | Nullcon |
Scale hacking to secure your cloud and beyond
| Anand Prakash | #cloud-pentesting#cloud-security-posture-management#container-security+4 |
| 2022-09-06 | Panel | Nullcon |
Consumer Tech Bug Bounty Panel: Hear from the Program Managers
| Sandeep Singh, Rishika Hooda, Omar Benbouazza | #bug-bounty#security-testing#application-hardening+3 |
| 2021-03-06 | Talk | Nullcon |
Bug hunter adventures
| Shreyas Dighe, Yuvraj Dighe | #bug-hunting#application-pentesting#bug-bounty+3 |
| 2020-09-18 | Talk | C0c0n |
Automation in Bug Bounties to Work Smarter
| Prerak Mittal | #bug-hunting#bug-bounty#security-tools+4 |
| 2020-09-18 | Talk | C0c0n |
My top 3 findings in bug Bounty journey | Aiming for high impact issues
| Ankit Giri | #bug-hunting#bug-bounty#security-testing+3 |
| 2019-09-23 | Talk | Rootcon |
Identity crisis: war stories from authentication failures
| Vishal Chauhan | #authentication#identity-management#vulnerability-assessment+3 |
| 2018-09-27 | Talk | Rootcon |
Bug Bounty Hunting on Steroids
| Anshuman Bhartiya | #bug-hunting#bug-bounty#security-tools+3 |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fameโ within their organizations
| Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay | #security-training#cybersecurity-strategy#bug-bounty+1 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | #vulnerability-assessment#bug-bounty#network-pentesting+1 |
| 2015-08-07 | Talk | Defcon |
Hacker’s Practice Ground
| Lokesh Pidawekar | #security-assessment#ethical-hacking#vulnerability-assessment+2 |
| 2013-11-07 | Talk | Groundzerosummit |
How I built a pentest lab in under 70 USD
| Swaroop Yermalkar | #security-assessment#ethical-hacking#bug-bounty+1 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-09-13 | Talk | Rootcon |
My Experiments with truth: a different route to bug hunting
| Devesh Bhatt | #bug-hunting#bug-bounty#security-testing+3 |
| 2013-08-15 | Talk | Usenix |
An Empirical Study of Vulnerability Rewards Programs
| Devdatta Akhawe, David Wagner, Matthew Finifter | #bug-bounty#software-security#risk-management+2 |
| 2013-05-28 | Talk | Confidence |
My Experiments with truth: a different route to bug hunting
| Devesh Bhatt | #security-assessment#vulnerability-assessment#secure-development+2 |
| 2012-08-03 | Talk | C0c0n |
Easy Money with UI-Redressing
| Amol Naik | #bug-hunting#application-pentesting#dynamic-analysis+4 |