🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Endpoint Protection

Focus Areas: 🛡️ Security Operations & Defense 💻 Endpoint Security
49
Total Entries
48
Contributors

Top Contributors

Nikhil Mittal(4) Ravishankar Borgaonkar(3) Sagar Bhure(3) Aditi Bhatnagar(2) Rahul Sasi(2)

All Entries (49 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-03-14TalkInsomnihack The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) Dhiraj Mishra#endpoint-protection#security-testing#malware-distribution
2025-03-01TalkNullcon MacOS Lockdown Mode: A Forensic Deep Dive Video Bhargav Rathod#macos#digital-forensics#endpoint-protection+3
2024-11-15TalkC0c0n Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques Adrip Mukherjee, Vinay Kumar#machine-learning#endpoint-protection#edr+1
2024-11-06TalkBlackalps IDAT Loader: The Malware’s Camouflaged Weapon Niranjan Jayanand#endpoint-protection#dynamic-analysis#security-testing
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#endpoint-protection+2
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#security-analytics+3
2023-08-11TalkDefcon Getting a Migraine - uncovering a unique SIP bypass on macOS Presentation Video Anurag Bohra#macos#endpoint-protection#bypassing+2
2023-08-09Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. Source Code Sagar Bhure#kernel#machine-learning#forensics+4
2023-06-01TalkSecurityfest Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#reverse-engineering#appsec#endpoint-protection+4
2023-05-11TalkBlackhat Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#hacking#bypassing#mobile-hacking+1
2022-09-08TalkNullcon Automate Your Whatsapp Chats Presentation Video Aditi Bhatnagar#android#application-pentesting#ai-security+2
2021-11-12PanelC0c0n Stopping Breaches with CrowdStrike Sandeep Rao#endpoint-protection#incident-management#security-monitoring+2
2021-08-05TalkBlackhat PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors Presentation Hareesh Khattri, Nagaraju N Kodalapura#hardware-embedded#endpoint-protection#incident-management+1
2020-12-09Tool demoBlackhat HosTaGe: mobile honeypots for rapid deployment Source Code Shreyas Srinivasa#honeypot#blueteam#endpoint-protection+2
2020-08-22TalkThe Diana Initiative Hacking into Android Ecosystem Video Aditi Bhatnagar#android#android-security#application-pentesting+3
2018-09-06TalkGrrcon Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI Presentation Video Pranshu Bajpai#encryption#ransomware#dynamic-analysis+1
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao#security-assessment#architecture#application-hardening+4
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatia#blueteam#windows#azure+4
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittal#blueteam#amsi#endpoint-protection+1
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-05TalkVirus Bulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand#reverse-engineering#incident-management#endpoint-protection+3
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittal#windows#red-teaming#endpoint-protection+1
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanian#blueteam#security-tools#automated-scanning+2
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwate#red-teaming#application-pentesting#data-protection+1
2014-10-23TalkT2 Darshak: how to turn your phone into a low cost IMSI catcher device Ravishankar Borgaonkar, Swapnil Udar#android#endpoint-protection
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-09-11Talk44 Con Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#imsi#endpoint-protection#security-tools
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalani#blueteam#application-hardening#application-pentesting+4
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeez#red-teaming#network-pentesting#endpoint-protection+1
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyap#blueteam#application-pentesting#dynamic-analysis+3
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasi#red-teaming#fuzzing#network-pentesting+2
2012-12-01TalkClubhack Real Time Event Recording System, the tool for Digital Forensics Investigation Presentation Video Madhav Limaye#digital-forensics#endpoint-protection#endpoint-hardening+4
2012-09-20TalkEkoparty Dirty use of USSD Codes in Cellular Network Whitepaper Video Ravishankar Borgaonkar#red-teaming#android-security#endpoint-protection+1
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittal#hid#red-teaming#endpoint-protection+3
2011-12-04TalkClubhack Android Forensics Presentation Manish Chasta#android#forensics#android-security+4
2011-10-07TalkC0c0n Security Threats in Custom ROM’s (Android) Presentation Whitepaper Anant Shrivastava#android#android-security#application-pentesting+3
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandran#wifi#red-teaming#endpoint-protection+3
2011-09-07TalkSecuritybyte Mobile Devices – Boon or Curse? Presentation Kishor Sonawane#mobile-device-management#mobile-application-management#application-hardening+4
2011-05-19TalkHitb Sec Conf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Sood#blueteam#botnet#endpoint-protection+4
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-12-04TalkClubhack Windows Memory Forensic Analysis Presentation Aashish Kunte#windows#forensics#memory-forensics+3
2010-10-14TalkHitb Sec Conf Exploit Delivery Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+2
2010-08-01TalkC0c0n End-point Security Laxi Eshwari#blueteam#endpoint-protection#endpoint-hardening+3
2007-04-04TalkHitb Sec Conf Vboot Kit: Compromising Windows Vista Security Presentation Vipin Kumar, Nitin Kumar#windows#boot-sector#endpoint-protection+1