🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Exploit Delivery

Focus Area: 🎯 Penetration Testing
61
Total Entries
49
Contributors

Top Contributors

Saumil Shah(16) Vivek Ramachandran(3) Ajit Hatti(2) Aseem Jakhar(2) Jatin Kataria(2)

All Entries (61 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-11-16TalkC0c0n Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape Dharani Sanjaiy#bug-hunting#exploit-delivery#security-strategy+1
2024-11-15TalkC0c0n [Yodha] Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#security-assessment#container-security+3
2024-10-23Tool demoBlackhat DarkWidow: Customizable Dropper Tool Targeting Windows Source Code Soumyanil Biswas#darkwidow#windows#exploit-delivery+4
2024-08-10TalkDefcon Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming Presentation Whitepaper Video Shiva Shashank, Bramwell Brizendine#process-injection#dynamic-analysis#exploit-delivery+1
2023-08-25TalkHitbsecconf Hacking into iOS’s VOLTE implementation Presentation Video Hardik Mehta, Rajanish Pathak#ios#sip#exploit-delivery
2023-08-11TalkDefcon Getting a Migraine - uncovering a unique SIP bypass on macOS Presentation Video Anurag Bohra, Jonathan Bar Or, Michael Pearse#macos#endpoint-protection#bypassing+2
2022-12-08TalkBlackhat Exploring a New Class of Kernel Exploit Primitive Presentation Rohit Mothe, Andrew Ruddick#kernel#exploit-delivery#privilege-escalation
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giri#bug-hunting#bug-bounty#security-testing+3
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamath#red-teaming#ethical-hacking#exploit-delivery+3
2019-10-16Tool demoHitbsecconf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shah#arm#linux#firmware-analysis+4
2019-09-27TalkC0c0n Hacking ICS devices for Fun Arun Mane#red-teaming#ics-security#exploit-delivery+1
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-03-01PanelNullcon Clash of the Titans; who will survive? Video Burgess Cooper, Durga Dube, Vasanthika Srinath, Jaya Baloo, Shan Lee#ethical-hacking#exploit-delivery#data-leak+1
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotra#red-teaming#malware-research#bypassing+2
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Gupta#bluetooth#red-teaming#mobile-hacking+3
2017-03-15TalkCansecwest Inside Stegosploit Presentation Saumil Shah#steganography#red-teaming#exploit-delivery
2016-08-19TalkC0c0n Abusing Digital Certificates : Malware Style Ajit Hatti#red-teaming#exploit-delivery#threat-modeling
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratap#red-teaming#ethical-hacking#exploit-delivery+2
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikar#xss#red-teaming#code-injection+3
2015-11-12TalkBlackhat Stegosploit - Exploit Delivery with Steganography and Polyglots Presentation Source Code Video Saumil Shah#red-teaming#steganography#exploit-delivery
2015-09-11Talk44con Stegosploit – Drive-by Browser Exploits using only Images Presentation Source Code Video Saumil Shah#steganography#red-teaming#web-security+1
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddi#red-teaming#application-pentesting#attack-surface+2
2015-08-01TalkC0c0n Demystifying and Breaking BLE Yashin Mehaboobe#bluetooth#mobile-hacking#exploit-delivery+1
2015-08-01TalkC0c0n Hacking RFIDs under 2000 INR Jayesh Chauhan, Divya S John#rfid#hardware-embedded#embedded-systems+3
2015-03-27TalkSyscan Stegosploit - Hacking with Pictures Presentation Video Saumil Shah#steganography#red-teaming#web-security+1
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-11-13TalkGroundzerosummit How I won Browser Fuzzing Amol Naik#fuzzing#red-teaming#security-testing+4
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-11-13TalkGroundzerosummit Vulnerability Reproduction using Zest Deep Shah#red-teaming#exploit-delivery#automated-scanning
2014-10-23TalkHacklu Hacking with Images - Evil Pictures Presentation Saumil Shah#red-teaming#steganography#application-pentesting+3
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhan#red-teaming#secure-coding#ethical-hacking+1
2013-09-27TalkC0c0n Pwning WiFi Devices! Swaroop Yermalkar#wifi#red-teaming#network-pentesting+2
2013-09-13TalkRootcon My Experiments with truth: a different route to bug hunting Presentation Devesh Bhatt#bug-hunting#bug-bounty#security-testing+3
2012-12-05TalkBlackhat Droid Exploitation Saga Presentation Whitepaper Source Code Aditya Gupta, Subho Halder#android#red-teaming#android-security+3
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+4
2012-11-29TalkDeepsec Bad Things in Good Packages - Creative Exploit Delivery Presentation Saumil Shah#red-teaming#exploit-delivery#security-testing
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhat#red-teaming#bypassing#exploit-delivery+3
2012-10-10TalkHitbsecconf Innovative Approaches to Exploit Delivery Video Saumil Shah#red-teaming#exploit-delivery#browser-security
2012-02-15TalkNullcon Your phone is your phone but your calls are now my calls Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwal#red-teaming#gsm#exploit-delivery+1
2011-12-04TalkClubhack Wi-Fi malware for Fun and Profit Vivek Ramachandran#wifi#malware-distribution#exploit-delivery
2011-10-13TalkHitbsecconf Web Wars 3 Saumil Shah#cyber-war#exploit-delivery#application-pentesting+1
2011-10-07TalkC0c0n Runtime thread injection and execution in Linux processes Aseem Jakhar#linux#red-teaming#code-injection+1
2011-10-07TalkC0c0n Wi-Fi Malware for Fun and Profit Vivek Ramachandran#red-teaming#network-pentesting#malware-distribution+2
2011-09-19TalkHacklu The travelling hacksmith Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandran#wifi#red-teaming#endpoint-protection+3
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakhar#linux#red-teaming#malware-research+2
2011-02-25TalkNullcon Lessons Learned From 2010 Presentation Video Saumil Shah#red-teaming#exploit-delivery#social-engineering+2
2010-10-27TalkHacklu Exploit Delivery - Tricks and Techniques Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+4
2010-10-14TalkHitbsecconf Exploit Delivery Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+2
2009-11-19TalkDeepsec Ownage 2.0 Presentation Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+1
2009-11-18TalkSecuritybyte Cloud Hacking – Distributed Attack & Exploit Platform Shreeraj Shah#red-teaming#cloud-pentesting#cloud-workload-protection+1
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookhey#security-assessment#risk-management#ethical-hacking+3
2009-10-28TalkHacklu Ownage 2.0 Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2009-04-22TalkHitbsecconf Pwnage 2.0 Presentation Saumil Shah#hid#red-teaming#exploit-delivery
2008-12-06TalkClubhack Introduction to backtrack Presentation Kunal Sehgal#security-assessment#linux#ethical-hacking+1
2008-03-26TalkCansecwest Vulnerabilities Die Hard Kowsik Guruswamy#red-teaming#ethical-hacking#exploit-delivery+2
2008-02-20TalkBlackhat Hacking VoIP through IPSec Tunnels Whitepaper Sachin Joglekar, Sudeep Patwardhan#voip#red-teaming#gsm+2
2006-11-29TalkPacsec Smashing Heap by Free Simulation Presentation Sandip Chaudhari#heap#red-teaming#exploit-delivery+4