| 2025-03-01 | Panel | Nullcon |
Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking
| Krishna Pandey | #ai-security#ai#ml+1 |
| 2024-12-12 | Tool demo | Blackhat |
MPT: Pentest In Action!
| Jyoti Raval | #penetration-testing-tools#security-assessment#ethical-hacking |
| 2024-11-16 | Talk | C0c0n |
Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides
| Rakesh Seal, Diptisha Samanta | #exploitation#ethical-hacking#network-pentesting+1 |
| 2024-11-15 | Talk | C0c0n |
[Yodha] Nightingale: Docker for Pentesters
| Raja Nagori | #docker#security-assessment#container-security+3 |
| 2024-08-07 | Tool demo | Blackhat |
DarkWidow: Dropper/PostExploitation Tool targeting Windows
| Soumyanil Biswas, Chirag Savla | #red-teaming#malware-research#post-exploitation+2 |
| 2024-05-27 | Talk | Confidence |
Hacker’s Story from Reader to Global Admin in Azure
| Raunak Parmar | #cloud-pentesting#azure#ethical-hacking+4 |
| 2023-06-05 | Talk | Confidence |
Evading modern day security defenses in corporate environments
| Himanshu Sharma, Rahul Vashista | #red-teaming#evasion#bypassing+4 |
| 2021-11-13 | Talk | C0c0n |
Painting Your Organizations with Shades of Red, Blue & Purple
| Hidayath Khan | #red-teaming#ethical-hacking#threat-modeling+2 |
| 2021-09-07 | Talk | Confidence |
Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical
| Aman Sachdev, Himanshu Sharma | #red-teaming#ethical-hacking#security-assessment+2 |
| 2021-08-08 | Talk | Defcon |
AppSec 101: A Journey from Engineer to Hacker
| Arjun Gopalakrishna | #secure-coding#security-assessment#ethical-hacking+2 |
| 2021-08-06 | Talk | Defcon |
Adversary village Kick-off
| Abhijith B R | #red-teaming#ethical-hacking#vulnerability-assessment+2 |
| 2021-08-04 | Tool demo | Blackhat |
Automated Attack Path Planning and Validation (A2P2V)
| Subir Das, Fukutomo Nakanishi, Jason Youzwak, Michael Hylkema, Santoshi Aoki | #ethical-hacking#exploitation#cyber-physical-systems |
| 2020-09-18 | Talk | C0c0n |
My top 3 findings in bug Bounty journey | Aiming for high impact issues
| Ankit Giri | #bug-hunting#bug-bounty#security-testing+3 |
| 2020-09-18 | Talk | C0c0n |
Supercharging your initial foothold in Red Team engagements
| Sachin S Kamath | #red-teaming#ethical-hacking#exploit-delivery+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Deploying discreet infrastructure for targeted phishing campaigns
| Sreehari Haridas | #phishing#application-pentesting#social-engineering+3 |
| 2020-03-06 | Tool demo | Nullcon |
PivotSuite
| Manish Gupta | #red-teaming#security-assessment#network-architecture+2 |
| 2019-09-27 | Talk | C0c0n |
Hacking ICS devices for Fun
| Arun Mane | #red-teaming#ics-security#exploit-delivery+1 |
| 2019-03-01 | Panel | Nullcon |
Clash of the Titans; who will survive?
| Burgess Cooper, Durga Dube, Vasanthika Srinath, Jaya Baloo, Shan Lee | #ethical-hacking#exploit-delivery#data-leak+1 |
| 2018-10-04 | Talk | Confidence |
Hacking 50 Million users using 123456
| Aman Sachdev, Himanshu Sharma | #web-security#authentication#ethical-hacking+2 |
| 2018-06-04 | Talk | Confidence |
From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days
| Himanshu Sharma, Aman Sachdev | #red-teaming#ethical-hacking#security-assessment+2 |
| 2018-03-01 | Talk | Nullcon |
DARWIN (A parasite covert wireless network)
| Rushikesh D Nandedkar | #wifi#red-teaming#network-architecture+1 |
| 2017-08-18 | Talk | C0c0n |
The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/
| Rushikesh D Nandedkar | #wifi#network-pentesting#security-tools+1 |
| 2016-08-19 | Talk | C0c0n |
Breaking into Gas stations!
| Suraj Pratap | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh, Lea Paul | #security-assessment#ethical-hacking#privilege-escalation+2 |
| 2015-08-07 | Talk | Defcon |
Hacker’s Practice Ground
| Lokesh Pidawekar | #security-assessment#ethical-hacking#vulnerability-assessment+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-11-13 | Talk | Groundzerosummit |
How I won Browser Fuzzing
| Amol Naik | #fuzzing#red-teaming#security-testing+4 |
| 2014-08-22 | Talk | C0c0n |
Cryptographic Backdoors: Subverting the RSA
| Adhokshaj Mishra | #encryption#red-teaming#security-strategy+3 |
| 2013-11-07 | Talk | Groundzerosummit |
How I built a pentest lab in under 70 USD
| Swaroop Yermalkar | #security-assessment#ethical-hacking#bug-bounty+1 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-09-27 | Talk | C0c0n |
Infiltrating the Intranet with Skanda
| Jayesh Chauhan | #red-teaming#secure-coding#ethical-hacking+1 |
| 2013-09-13 | Talk | Rootcon |
My Experiments with truth: a different route to bug hunting
| Devesh Bhatt | #bug-hunting#bug-bounty#security-testing+3 |
| 2013-03-01 | Talk | Nullcon |
Bug Bounty Hunter’s confession
| Amol Naik | #bug-hunting#security-training#ethical-hacking+3 |
| 2012-09-26 | Talk | Nullcon |
Nullcon_delhi_2012
| Prasanna Kanagasabai | #ethical-hacking#social-engineering#security-training+1 |
| 2012-07-22 | Tool demo | Blackhat |
Kautilya and Nishang
| Nikhil Mittal | #post-exploitation#ethical-hacking#security-assessment+1 |
| 2012-03-16 | Talk | Blackhat |
The Pwnage Saga Continues
| Nikhil Mittal | #hid#red-teaming#buffer-underflow+2 |
| 2011-09-19 | Talk | Hacklu |
The travelling hacksmith
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2010-10-27 | Talk | Hacklu |
Exploit Delivery - Tricks and Techniques
| Saumil Shah | #red-teaming#exploit#exploit-delivery+4 |
| 2009-11-19 | Talk | Deepsec |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+1 |
| 2009-11-18 | Talk | Securitybyte |
Risk based Penetration Testing
| K K Mookhey | #security-assessment#risk-management#ethical-hacking+3 |
| 2009-10-28 | Talk | Hacklu |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2008-12-06 | Talk | Clubhack |
Introduction to backtrack
| Kunal Sehgal | #security-assessment#linux#ethical-hacking+1 |
| 2008-03-27 | Talk | Blackhat |
Iron Chef Black Hat: John Henry Challenge
| Pravir Chandra, Jacob West, Brian Chess, Sean Fay | #ethical-hacking#secure-development#devsecops |
| 2008-03-26 | Talk | Cansecwest |
Vulnerabilities Die Hard
| Kowsik Guruswamy | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2003-12-12 | Talk | Hitbsecconf |
Threats to Wireless Networks - War Driving
| Anurana Saluja | #wifi#network-architecture#threat-modeling+1 |