| 2025-08-07 | Talk | Blackhat |
Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale
| Vedang Parasnis | #dns#data-leak#kernel+1 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2024-09-20 | Talk | 44con |
Unveiling the ghosts of mobile networks: When will old bugs die?
| Altaf Shaik | #5g#authentication#encryption+3 |
| 2024-08-07 | Tool demo | Blackhat |
BucketLoot - An Automated S3 Bucket Inspector
| Kunal Aggarwal, Umair Nehri | #aws#cloud-pentesting#reconnaissance+1 |
| 2024-04-19 | Tool demo | Blackhat |
BucketLoot - An Automated S3 Bucket Inspector
| Umair Nehri | #aws#cloud-pentesting#reconnaissance+1 |
| 2024-04-19 | Tool demo | Blackhat |
Monitoring and Detecting Leaks with GitAlerts
| Nikhil Mittal 1 | #osint#data-leak#reconnaissance+1 |
| 2023-12-06 | Tool demo | Blackhat |
BucketLoot - An Automated S3-compatible Bucket Inspector
| Owais Shaikh, Umair Nehri | #aws#cloud-pentesting#reconnaissance+1 |
| 2023-12-06 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh, Umair Nehri | #ai#data-protection#nlp+4 |
| 2023-10-13 | Talk | Hackfest |
Exploring RAM Forensic Analysis for Effective Digital Investigations
| Sneha Banerjee | #forensics#memory-forensics#digital-forensics+2 |
| 2023-08-09 | Tool demo | Blackhat |
BucketLoot - An Automated S3 Bucket Inspector
| Owais Shaikh, Umair Nehri | #aws#cloud-pentesting#reconnaissance+1 |
| 2023-05-10 | Talk | Auscert |
Insights into Deakin University’s Data Breach
| Dushyant Sattiraju | #incident-management#data-leak#digital-forensics |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | #incident-management#mobile-hacking#phishing+4 |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | #forensics#iot-device-management#iot-pentesting+4 |
| 2019-12-04 | Tool demo | Blackhat |
DumpTheGit
| Malkit Singh | #reconnaissance#data-leak#data-protection+1 |
| 2019-09-27 | Talk | C0c0n |
Demystifying HealthCare Security
| Ajay Pratap Singh | #blueteam#data-protection#identity-theft+4 |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-08-10 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+3 |
| 2019-03-28 | Tool demo | Blackhat |
RTS: Real Time Scrapper
| Naveen Rudrappa | #blueteam#application-pentesting#security-monitoring+4 |
| 2019-03-01 | Panel | Nullcon |
Clash of the Titans; who will survive?
| Burgess Cooper, Durga Dube, Vasanthika Srinath, Jaya Baloo, Shan Lee | #ethical-hacking#exploit-delivery#data-leak+1 |
| 2018-08-11 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+4 |
| 2018-05-29 | Award | |
Data Exfiltration via Formula Injection #Part1
| Ajay Prashar, Balaji Gopal | #data-leak#exploitation#web-security+1 |
| 2018-03-03 | Panel | Nullcon |
Forensic Challenges and Road Ahead
| Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov | #data-leak#data-protection#forensics+4 |
| 2018-03-01 | Talk | Nullcon |
Looting your bank savings using Digital India
| Indrajeet Bhuyan | #red-teaming#application-pentesting#api-security+4 |
| 2017-12-07 | Tool demo | Blackhat |
DataSploit - OSINT Framework
| Shubham Mittal | #osint#reconnaissance#security-tools+2 |
| 2017-12-06 | Talk | Blackhat |
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES
| Saurabh Harit | #red-teaming#data-leak#identity-theft+1 |
| 2017-08-18 | Talk | C0c0n |
OSINT and Privacy
| Rohit Srivastwa | #osint#data-leak#surveillance+4 |
| 2017-03-30 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Shubham Mittal | #osint#reconnaissance#security-tools+3 |
| 2016-11-05 | Talk | Hackfest |
LockPicker: Leaking data from live LUKS partition
| Adhokshaj Mishra | #linux#red-teaming#data-leak |
| 2016-11-03 | Tool demo | Blackhat |
DataSploit
| Shubham Mittal, Nutan Kumar Panda | #osint#reconnaissance#security-tools+3 |
| 2016-08-19 | Talk | C0c0n |
SSD Forensics : A Nightmare for Forensic Investigators
| Santosh Khadsare | #forensics#memory-forensics#incident-management+2 |
| 2016-08-06 | Tool demo | Defcon |
Datasploit
| Shubham Mittal | #osint#reconnaissance#data-leak+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Authentication flaw in Automatic Bank Passbook printing machine.
| Indrajeet Bhuyan | #authentication#identity-management#application-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Credit Card Frauds β The money making Ecosystem for Cyber criminals
| Abhinav Singh | #identity-theft#cyber-crime#data-leak+1 |
| 2015-11-05 | Talk | Groundzerosummit |
OSINT Black Magic: Listen who whispers your name in the dark!!!
| Sudhanshu Chauhan, Nutan Kumar Panda | #osint#deep-web#data-leak+4 |
| 2015-03-26 | Talk | Blackhat |
The underground Ecosystem of Credit Card frauds
| Abhinav Singh | #red-teaming#data-leak#identity-theft+1 |
| 2014-02-15 | Tool demo | Nullcon |
NoSQL Exploitation Framework
| Francis Alexander | #red-teaming#application-pentesting#security-tools+3 |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-08-03 | Talk | C0c0n |
Security Incidents β Avoiding the Apocalypse in 2012
| Ashish Chandra Mishra | #blueteam#phishing#social-engineering+1 |
| 2011-12-04 | Talk | Clubhack |
Android Forensics
| Manish Chasta | #android#forensics#android-security+4 |
| 2011-08-07 | Talk | Defcon |
VDLDS β All Your Voice Are Belong To Us
| Ganesh Devarajan, Don Le Bert | #blueteam#data-leak#cyber-crime |
| 2011-02-25 | Talk | Nullcon |
Enterprise Paradigm for Controlling Data Leakage
| Deepak Rout | #data-leak#blueteam#data-loss-prevention+3 |
| 2011-02-25 | Talk | Nullcon |
Incident Management and Beyond
| Dinesh O Bareja | #incident-management#data-leak#phishing+2 |
| 2011-02-25 | Talk | Nullcon |
Protect infrastructure or protect information β Lessons from Wikileaks
| Vishal Gupta | #data-leak#blueteam#data-protection+2 |
| 2010-12-04 | Talk | Clubhack |
Data theft in India
| K K Mookhey | #data-leak#red-teaming#cyber-crime |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test β Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2010-08-01 | Talk | C0c0n |
Client Side Exploits using PDF
| Ankur Bhargava, Tamaghna Basu | #red-teaming#pdf#data-leak+2 |
| 2009-12-05 | Talk | Clubhack |
India Cyber Crime Scene - Caught in the Crossfire
| Vinoo Thomas, Rahul Mohandas | #cyber-crime#data-leak#pdf+3 |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | #forensics#digital-forensics#data-leak+4 |
| 2009-07-29 | Talk | Blackhat |
Psychotronica: Exposure, Control, and Deceit
| Nitesh Dhanjani | #red-teaming#reconnaissance#social-engineering+3 |
| 2007-08-02 | Talk | Blackhat |
Smoke ’em Out!
| Rohyt Belani | #forensics#incident-management#digital-forensics+4 |