| 2024-11-16 | Talk | C0c0n |
Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape
| Dharani Sanjaiy | #bug-hunting#exploit-delivery#security-strategy+1 |
| 2024-11-15 | Talk | C0c0n |
[Yodha] Nightingale: Docker for Pentesters
| Raja Nagori | #docker#security-assessment#container-security+3 |
| 2024-10-23 | Tool demo | Blackhat |
DarkWidow: Customizable Dropper Tool Targeting Windows
| Soumyanil Biswas | #darkwidow#windows#exploit-delivery+4 |
| 2024-08-10 | Talk | Defcon |
Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming
| Shiva Shashank, Bramwell Brizendine | #process-injection#dynamic-analysis#exploit-delivery+1 |
| 2023-08-25 | Talk | Hitbsecconf |
Hacking into iOS’s VOLTE implementation
| Hardik Mehta, Rajanish Pathak | #ios#sip#exploit-delivery |
| 2023-08-11 | Talk | Defcon |
Getting a Migraine - uncovering a unique SIP bypass on macOS
| Anurag Bohra, Jonathan Bar Or, Michael Pearse | #macos#endpoint-protection#bypassing+2 |
| 2022-12-08 | Talk | Blackhat |
Exploring a New Class of Kernel Exploit Primitive
| Rohit Mothe, Andrew Ruddick | #kernel#exploit-delivery#privilege-escalation |
| 2020-09-18 | Talk | C0c0n |
My top 3 findings in bug Bounty journey | Aiming for high impact issues
| Ankit Giri | #bug-hunting#bug-bounty#security-testing+3 |
| 2020-09-18 | Talk | C0c0n |
Supercharging your initial foothold in Red Team engagements
| Sachin S Kamath | #red-teaming#ethical-hacking#exploit-delivery+3 |
| 2019-10-16 | Tool demo | Hitbsecconf |
Introducing ARM-X - The ARM IoT Firmware Emulation Framework
| Saumil Shah | #arm#linux#firmware-analysis+4 |
| 2019-09-27 | Talk | C0c0n |
Hacking ICS devices for Fun
| Arun Mane | #red-teaming#ics-security#exploit-delivery+1 |
| 2019-08-08 | Talk | Blackhat |
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
| Jatin Kataria, Richard Housley, Ang Cui | #reverse-engineering#hardware-embedded#exploit-delivery+3 |
| 2019-03-01 | Panel | Nullcon |
Clash of the Titans; who will survive?
| Burgess Cooper, Durga Dube, Vasanthika Srinath, Jaya Baloo, Shan Lee | #ethical-hacking#exploit-delivery#data-leak+1 |
| 2017-08-18 | Talk | C0c0n |
Anti-Virus Bypassing for Fun and Profit
| Vanshit Malhotra | #red-teaming#malware-research#bypassing+2 |
| 2017-08-18 | Talk | C0c0n |
Exploiting the smartness of BLE Stack
| Apoorva Gupta | #bluetooth#red-teaming#mobile-hacking+3 |
| 2017-03-15 | Talk | Cansecwest |
Inside Stegosploit
| Saumil Shah | #steganography#red-teaming#exploit-delivery |
| 2016-08-19 | Talk | C0c0n |
Abusing Digital Certificates : Malware Style
| Ajit Hatti | #red-teaming#exploit-delivery#threat-modeling |
| 2016-08-19 | Talk | C0c0n |
Breaking into Gas stations!
| Suraj Pratap | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2016-08-19 | Talk | C0c0n |
Esoteric XSS Payloads
| Riyaz Walikar | #xss#red-teaming#code-injection+3 |
| 2015-11-12 | Talk | Blackhat |
Stegosploit - Exploit Delivery with Steganography and Polyglots
| Saumil Shah | #red-teaming#steganography#exploit-delivery |
| 2015-09-11 | Talk | 44con |
Stegosploit – Drive-by Browser Exploits using only Images
| Saumil Shah | #steganography#red-teaming#web-security+1 |
| 2015-08-01 | Talk | C0c0n |
Attack chaining for web exploitation- From Information leakage to gaining Root access
| Abhijeth Dugginapeddi | #red-teaming#application-pentesting#attack-surface+2 |
| 2015-08-01 | Talk | C0c0n |
Demystifying and Breaking BLE
| Yashin Mehaboobe | #bluetooth#mobile-hacking#exploit-delivery+1 |
| 2015-08-01 | Talk | C0c0n |
Hacking RFIDs under 2000 INR
| Jayesh Chauhan, Divya S John | #rfid#hardware-embedded#embedded-systems+3 |
| 2015-03-27 | Talk | Syscan |
Stegosploit - Hacking with Pictures
| Saumil Shah | #steganography#red-teaming#web-security+1 |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-11-13 | Talk | Groundzerosummit |
How I won Browser Fuzzing
| Amol Naik | #fuzzing#red-teaming#security-testing+4 |
| 2014-11-13 | Talk | Groundzerosummit |
SCADA Exploitation through Firmware
| Ashish Saxena | #red-teaming#firmware-analysis#ics-security+3 |
| 2014-11-13 | Talk | Groundzerosummit |
Vulnerability Reproduction using Zest
| Deep Shah | #red-teaming#exploit-delivery#automated-scanning |
| 2014-10-23 | Talk | Hacklu |
Hacking with Images - Evil Pictures
| Saumil Shah | #red-teaming#steganography#application-pentesting+3 |
| 2014-08-22 | Talk | C0c0n |
Cryptographic Backdoors: Subverting the RSA
| Adhokshaj Mishra | #encryption#red-teaming#security-strategy+3 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-09-27 | Talk | C0c0n |
Infiltrating the Intranet with Skanda
| Jayesh Chauhan | #red-teaming#secure-coding#ethical-hacking+1 |
| 2013-09-27 | Talk | C0c0n |
Pwning WiFi Devices!
| Swaroop Yermalkar | #wifi#red-teaming#network-pentesting+2 |
| 2013-09-13 | Talk | Rootcon |
My Experiments with truth: a different route to bug hunting
| Devesh Bhatt | #bug-hunting#bug-bounty#security-testing+3 |
| 2012-12-05 | Talk | Blackhat |
Droid Exploitation Saga
| Aditya Gupta, Subho Halder | #android#red-teaming#android-security+3 |
| 2012-12-01 | Talk | Clubhack |
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
| Ajin Abraham | #xss#red-teaming#application-pentesting+4 |
| 2012-11-29 | Talk | Deepsec |
Bad Things in Good Packages - Creative Exploit Delivery
| Saumil Shah | #red-teaming#exploit-delivery#security-testing |
| 2012-11-23 | Talk | Malcon |
Advances in ROP attacks
| Raashid Bhat | #red-teaming#bypassing#exploit-delivery+3 |
| 2012-10-10 | Talk | Hitbsecconf |
Innovative Approaches to Exploit Delivery
| Saumil Shah | #red-teaming#exploit-delivery#browser-security |
| 2012-02-15 | Talk | Nullcon |
Your phone is your phone but your calls are now my calls
| Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwal | #red-teaming#gsm#exploit-delivery+1 |
| 2011-12-04 | Talk | Clubhack |
Wi-Fi malware for Fun and Profit
| Vivek Ramachandran | #wifi#malware-distribution#exploit-delivery |
| 2011-10-13 | Talk | Hitbsecconf |
Web Wars 3
| Saumil Shah | #cyber-war#exploit-delivery#application-pentesting+1 |
| 2011-10-07 | Talk | C0c0n |
Runtime thread injection and execution in Linux processes
| Aseem Jakhar | #linux#red-teaming#code-injection+1 |
| 2011-10-07 | Talk | C0c0n |
Wi-Fi Malware for Fun and Profit
| Vivek Ramachandran | #red-teaming#network-pentesting#malware-distribution+2 |
| 2011-09-19 | Talk | Hacklu |
The travelling hacksmith
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2011-09-19 | Talk | Brucon |
Wifi malware for fun and profit
| Vivek Ramachandran | #wifi#red-teaming#endpoint-protection+3 |
| 2011-08-03 | Talk | Blackhat |
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
| Jatin Kataria, Ang Cui, Salvatore Stolfo | #cisco-ios#hardware-embedded#firmware-analysis+4 |
| 2011-02-25 | Talk | Nullcon |
Jugaad Beta: Linux Thread Injection malware PoC
| Aseem Jakhar | #linux#red-teaming#malware-research+2 |
| 2011-02-25 | Talk | Nullcon |
Lessons Learned From 2010
| Saumil Shah | #red-teaming#exploit-delivery#social-engineering+2 |
| 2010-10-27 | Talk | Hacklu |
Exploit Delivery - Tricks and Techniques
| Saumil Shah | #red-teaming#exploit#exploit-delivery+4 |
| 2010-10-14 | Talk | Hitbsecconf |
Exploit Delivery
| Saumil Shah | #red-teaming#exploit#exploit-delivery+2 |
| 2009-11-19 | Talk | Deepsec |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+1 |
| 2009-11-18 | Talk | Securitybyte |
Cloud Hacking – Distributed Attack & Exploit Platform
| Shreeraj Shah | #red-teaming#cloud-pentesting#cloud-workload-protection+1 |
| 2009-11-18 | Talk | Securitybyte |
Risk based Penetration Testing
| K K Mookhey | #security-assessment#risk-management#ethical-hacking+3 |
| 2009-10-28 | Talk | Hacklu |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2009-04-22 | Talk | Hitbsecconf |
Pwnage 2.0
| Saumil Shah | #hid#red-teaming#exploit-delivery |
| 2008-12-06 | Talk | Clubhack |
Introduction to backtrack
| Kunal Sehgal | #security-assessment#linux#ethical-hacking+1 |
| 2008-03-26 | Talk | Cansecwest |
Vulnerabilities Die Hard
| Kowsik Guruswamy | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2008-02-20 | Talk | Blackhat |
Hacking VoIP through IPSec Tunnels
| Sachin Joglekar, Sudeep Patwardhan | #voip#red-teaming#gsm+2 |
| 2006-11-29 | Talk | Pacsec |
Smashing Heap by Free Simulation
| Sandip Chaudhari | #heap#red-teaming#exploit-delivery+4 |