| 2025-04-04 | Tool demo | Blackhat |
Decoy Mutex
| Madhukar Raina | #ransomware#endpoint-protection#malware-prevention+3 |
| 2025-03-14 | Talk | Insomnihack |
The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques)
| Dhiraj Mishra | #endpoint-protection#security-testing#malware-distribution |
| 2025-03-01 | Talk | Nullcon |
MacOS Lockdown Mode: A Forensic Deep Dive
| Bhargav Rathod | #macos#digital-forensics#endpoint-protection+3 |
| 2024-11-15 | Talk | C0c0n |
Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques
| Adrip Mukherjee, Vinay Kumar | #machine-learning#endpoint-protection#edr+1 |
| 2024-11-06 | Talk | Blackalps |
IDAT Loader: The Malware’s Camouflaged Weapon
| Niranjan Jayanand | #endpoint-protection#dynamic-analysis#security-testing |
| 2024-10-23 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#endpoint-protection+2 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-04-18 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#security-analytics+3 |
| 2023-08-11 | Talk | Defcon |
Getting a Migraine - uncovering a unique SIP bypass on macOS
| Anurag Bohra | #macos#endpoint-protection#bypassing+2 |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-06-01 | Talk | Securityfest |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #reverse-engineering#appsec#endpoint-protection+4 |
| 2023-05-11 | Talk | Blackhat |
Bypassing Anti-Cheats & Hacking Competitive Games
| Rohan Aggarwal | #hacking#bypassing#mobile-hacking+1 |
| 2022-09-08 | Talk | Nullcon |
Automate Your Whatsapp Chats
| Aditi Bhatnagar | #android#application-pentesting#ai-security+2 |
| 2021-11-12 | Panel | C0c0n |
Stopping Breaches with CrowdStrike
| Sandeep Rao | #endpoint-protection#incident-management#security-monitoring+2 |
| 2021-08-05 | Talk | Blackhat |
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors
| Hareesh Khattri, Nagaraju N Kodalapura | #hardware-embedded#endpoint-protection#incident-management+1 |
| 2020-12-09 | Tool demo | Blackhat |
HosTaGe: mobile honeypots for rapid deployment
| Shreyas Srinivasa | #honeypot#blueteam#endpoint-protection+2 |
| 2020-08-22 | Talk | The Diana Initiative |
Hacking into Android Ecosystem
| Aditi Bhatnagar | #android#android-security#application-pentesting+3 |
| 2018-09-06 | Talk | Grrcon |
Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI
| Pranshu Bajpai | #encryption#ransomware#dynamic-analysis+1 |
| 2018-08-16 | Talk | Usenix |
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
| Siddharth Rao | #security-assessment#architecture#application-hardening+4 |
| 2018-03-15 | Talk | Troopers |
Defending Microsoft Environments at Scale
| Vineet Bhatia | #blueteam#windows#azure+4 |
| 2016-11-11 | Talk | Deepsec |
AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That
| Nikhil Mittal | #blueteam#amsi#endpoint-protection+1 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | #reverse-engineering#evil-twin-attack#network-monitoring+3 |
| 2016-10-05 | Talk | Virus Bulletin |
One-Click Fileless Infection
| Himanshu Anand | #reverse-engineering#incident-management#endpoint-protection+3 |
| 2015-11-13 | Talk | Blackhat |
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX
| Monnappa K A | #linux#security-assessment#malware-research+4 |
| 2015-11-12 | Tool demo | Blackhat |
Nishang - Tracking A Windows User
| Nikhil Mittal | #windows#red-teaming#endpoint-protection+1 |
| 2015-03-26 | Tool demo | Blackhat |
SecPod Saner
| Preeti Subramanian | #blueteam#security-tools#automated-scanning+2 |
| 2015-02-06 | Talk | Nullcon |
Anatomy of a credit card stealing POS malware
| Amol Sarwate | #red-teaming#application-pentesting#data-protection+1 |
| 2014-10-23 | Talk | T2 |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #android#endpoint-protection |
| 2014-09-16 | Talk | Deepsec |
Advanced Powershell Threat – Lethal Client Side Attacks
| Nikhil Mittal | #powershell#red-teaming#endpoint-protection+4 |
| 2014-09-11 | Talk | 44 Con |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #imsi#endpoint-protection#security-tools |
| 2014-02-14 | Talk | Nullcon |
Chrome - OS Security 2014: New and future hotness
| Sumit Gwalani | #blueteam#application-hardening#application-pentesting+4 |
| 2014-02-14 | Talk | Nullcon |
Hacking YOu’r Cable TV Network.
| Rahul Sasi, Ahamed Nafeez | #red-teaming#network-pentesting#endpoint-protection+1 |
| 2013-09-12 | Talk | Grrcon |
The Droid Exploitation Saga – All Over Again!
| Aditya Gupta, Subho Halder | #android#red-teaming#android-security+4 |
| 2013-03-15 | Talk | Blackhat |
The Sandbox Roulette- Are you ready for the gamble?
| Rahul Kashyap | #blueteam#application-pentesting#dynamic-analysis+3 |
| 2013-03-01 | Talk | Nullcon |
SMS to Meterpreter - Fuzzing USB Modems
| Rahul Sasi | #red-teaming#fuzzing#network-pentesting+2 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-09-20 | Talk | Ekoparty |
Dirty use of USSD Codes in Cellular Network
| Ravishankar Borgaonkar | #red-teaming#android-security#endpoint-protection+1 |
| 2011-12-15 | Talk | Blackhat |
Kautilya: Teensy Beyond Shell
| Nikhil Mittal | #hid#red-teaming#endpoint-protection+3 |
| 2011-12-04 | Talk | Clubhack |
Android Forensics
| Manish Chasta | #android#forensics#android-security+4 |
| 2011-10-07 | Talk | C0c0n |
Security Threats in Custom ROM’s (Android)
| Anant Shrivastava | #android#android-security#application-pentesting+3 |
| 2011-09-19 | Talk | Brucon |
Wifi malware for fun and profit
| Vivek Ramachandran | #wifi#red-teaming#endpoint-protection+3 |
| 2011-09-07 | Talk | Securitybyte |
Mobile Devices – Boon or Curse?
| Kishor Sonawane | #mobile-device-management#mobile-application-management#application-hardening+4 |
| 2011-05-19 | Talk | Hitb Sec Conf |
Spying on SpyEye – What Lies Beneath?
| Aditya K Sood | #blueteam#botnet#endpoint-protection+4 |
| 2011-02-25 | Talk | Nullcon |
Chupa Rustam
| Abhijeet Hatekar | #surveillance#red-teaming#application-pentesting+2 |
| 2010-12-04 | Talk | Clubhack |
Mantra – Free and Open Source security framework based on browser platform
| Abhi M Balakrishnan | #blueteam#endpoint-protection#application-pentesting+3 |
| 2010-12-04 | Talk | Clubhack |
Windows Memory Forensic Analysis
| Aashish Kunte | #windows#forensics#memory-forensics+3 |
| 2010-10-14 | Talk | Hitb Sec Conf |
Exploit Delivery
| Saumil Shah | #red-teaming#exploit#exploit-delivery+2 |
| 2010-08-01 | Talk | C0c0n |
End-point Security
| Laxi Eshwari | #blueteam#endpoint-protection#endpoint-hardening+3 |
| 2007-04-04 | Talk | Hitb Sec Conf |
Vboot Kit: Compromising Windows Vista Security
| Vipin Kumar, Nitin Kumar | #windows#boot-sector#endpoint-protection+1 |