πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Exploitation

Focus Area: 🎯 Penetration Testing
17
Total Entries
18
Contributors

Top Contributors

Jatin Kataria(2) Shiva Shashank(2) Aseem Jakhar(1) Bharadwaj Machiraju(1) Chirag Savla(1)

All Entries (17 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat ProcessInjection Chirag Savlapentestingred-teamingreverse-engineering+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashankreverse-engineeringexploitationpentesting+3
2024-11-16TalkC0c0n Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides Rakesh Seal, Diptisha Samantaexploitation
2024-08-30TalkHitb Sec Conf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajputweb-securitypentestingexploitation+4
2023-12-06Tool demoBlackhat Docker Exploitation Framework Source Code Rohit Pitkeexploitation
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Shubham Dubeyvulnerability-managementreverse-engineeringexploitation+1
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashankreverse-engineeringpentestingexploitation+3
2021-08-04Tool demoBlackhat Automated Attack Path Planning and Validation (A2P2V) Source Code Subir Dasethical-hackingexploitation
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potlurireverse-engineeringbinary-analysisexploitation+1
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakharexploitationpentestingreverse-engineering+1
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Bharadwaj Machirajupentestingapplication-pentestingvulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Francis Alexanderpentestingapplication-pentestingvulnerability-assessment+4
2016-10-07TalkDeepsec Inside Stegosploit Presentation Video Saumil Shahweb-securityexploitationpentesting+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittalpentestingred-teamingexploitation+3
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxenapentestingexploitationmalware+1