| 2025-08-06 | Tool demo | Blackhat |
ProcessInjection
| Chirag Savla | #security-assessment#red-teaming#reverse-engineering+1 |
| 2025-08-06 | Tool demo | Blackhat |
ROP ROCKET: Advanced Framework for Return-Oriented Programming
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#exploitation#security-assessment+2 |
| 2024-11-16 | Talk | C0c0n |
Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides
| Rakesh Seal, Diptisha Samanta | #exploitation#ethical-hacking#network-pentesting+1 |
| 2024-10-02 | Talk | Virusbulletin |
From code to crime: exploring threats in GitHub Codespaces
| Nitesh Surana, Jaromir Horejsi | #cloud-pentesting#supply-chain-security#exploitation |
| 2024-08-30 | Talk | Hitbsecconf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | #web-security#security-assessment#exploitation+2 |
| 2023-12-06 | Tool demo | Blackhat |
Docker Exploitation Framework
| Rohit Pitke, Emmanuel Law | #exploitation#container-security#docker+4 |
| 2023-11-17 | Talk | Deepsec |
Nostalgic Memory β Remembering All the Wins and Losses for Protecting Memory Corruption
| Shubham Dubey | #reverse-engineering#exploitation#architecture |
| 2023-08-13 | Tool demo | Blackhat |
Advanced ROP Framework: Pushing ROP to Its Limits
| Shiva Shashank, Bramwell Brizendine | #reverse-engineering#security-assessment#exploitation+2 |
| 2022-09-07 | Talk | Nullcon |
Hack The Bridge
| Anto Joseph | #smart-contracts#web3#cryptocurrency+1 |
| 2022-09-07 | Talk | Nullcon |
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls
| Shyam Sundar Ramaswami, Rakesh Mahanthi | #vulnerability-assessment#hmi#data-protection+1 |
| 2021-08-04 | Tool demo | Blackhat |
Automated Attack Path Planning and Validation (A2P2V)
| Subir Das, Fukutomo Nakanishi, Jason Youzwak, Michael Hylkema, Santoshi Aoki | #ethical-hacking#exploitation#cyber-physical-systems |
| 2020-03-06 | Talk | Nullcon |
Cloud As an Attack vector
| Ashwin Vamshi, Rushikesh Vishwakarma | #cloud-pentesting#exploitation#aws |
| 2019-10-22 | Talk | Hacklu |
Intro to Dark Arts: Getting Started with CTFs
| Geethna T K, Shruti Dixit, Sowmya Potluri | #reverse-engineering#binary-analysis#exploitation+1 |
| 2018-05-29 | Award | |
Data Exfiltration via Formula Injection #Part1
| Ajay Prashar, Balaji Gopal | #data-leak#exploitation#web-security+1 |
| 2017-08-18 | Talk | C0c0n |
Your friendly neighbourhood exploit
| Aseem Jakhar | #exploitation#security-assessment#reverse-engineering |
| 2017-03-24 | Talk | Insomnihack |
How we hacked Distributed Configuration Management Systems
| Francis Alexander, Bharadwaj Machiraju | #security-assessment#application-pentesting#vulnerability-assessment+4 |
| 2017-03-23 | Talk | Troopers |
How we hacked Distributed Configuration Management Systems
| Bharadwaj Machiraju, Francis Alexander | #security-assessment#application-pentesting#vulnerability-assessment+4 |
| 2017-03-23 | Talk | Troopers |
How we hacked Distributed Configuration Management Systems
| Francis Alexander, Bharadwaj Machiraju | #security-assessment#application-pentesting#vulnerability-assessment+4 |
| 2016-10-07 | Talk | Deepsec |
Inside Stegosploit
| Saumil Shah | #web-security#exploitation#security-assessment |
| 2016-08-05 | Talk | Defcon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2016-06-18 | Talk | Recon |
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
| Jatin Kataria, Ang Cui, Francois Charbonneau | #reverse-engineering#hardware-reverse-engineering#firmware-analysis+2 |
| 2015-08-08 | Talk | Defcon |
Powershell for Penetraton Testers
| Nikhil Mittal | #security-assessment#red-teaming#exploitation+3 |
| 2014-09-12 | Talk | 44con |
Pentesting NoSQL DB’s Using NoSQL Exploitation Framework
| Francis Alexander | #exploitation#web-pentesting#penetration-testing-tools |
| 2014-05-29 | Talk | Hitbsecconf |
Exploiting NoSQL Like Never Before
| Francis Alexander | #exploitation#web-pentesting#code-injection |
| 2014-02-15 | Tool demo | Nullcon |
XMLChor
| Harshal Jamdade | #exploitation#web-pentesting#security-tools |
| 2012-08-03 | Talk | C0c0n |
Contemporary Transcription and Resource Parasitism
| Arpit Patel | #exploitation#firewall#network-monitoring+1 |
| 2012-08-03 | Talk | C0c0n |
Cyber Weapons
| Sameer Saxena | #security-assessment#exploitation#cyber-war+3 |
| 2012-05-13 | Talk | Carolinacon |
Attacking CAPTCHAs for Fun and Profit
| Gursev Singh Kalra | #web-security#bypassing#exploitation |
| 2011-10-07 | Talk | Virusbulletin |
Browser exploit packs - exploitation paradigm
| Aditya K Sood, Richard J Enbody | #exploit-kit#malware-research#browser-security+1 |