| 2023-10-13 | Talk | Hackfest |
Exploring RAM Forensic Analysis for Effective Digital Investigations
| Sneha Banerjee | forensic |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | malwareforensic |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | iotforensic |
| 2019-12-04 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | macossecure-codingforensic+1 |
| 2019-08-08 | Tool demo | Defcon |
PcapXray
| Srinivas Piskala Ganesh Babu | forensicwiresharkblueteam |
| 2019-08-07 | Tool demo | Blackhat |
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan, Kunal Aggarwal | virtual-machineblueteamforensic+2 |
| 2019-03-28 | Talk | Blackhat |
Investigating Malware Using Memory Forensics - A Practical Approach
| Monnappa K A | forensicblueteam |
| 2018-10-05 | Talk | C0c0n |
Using Fault Injection for Forensics
| Yashin Mehaboobe | forensic |
| 2018-09-06 | Talk | Grrcon |
Angad: A Malware Detection Framework using Multi-Dimensional Visualization
| Ankur Tyagi | blueteampentestforensic |
| 2018-08-11 | Tool demo | Defcon |
Angad: A Malware Detection Framework using Multi-Dimensional Visualization
| Ankur Tyagi | blueteampentestforensic |
| 2018-08-09 | Tool demo | Blackhat |
rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | incident-responserest-apiforensic |
| 2018-08-08 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | macossecure-codingforensic+1 |
| 2018-08-08 | Tool demo | Blackhat |
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan | virtual-machineblueteamforensic+2 |
| 2016-08-19 | Talk | C0c0n |
SSD Forensics : A Nightmare for Forensic Investigators
| Santosh Khadsare | forensic |
| 2016-08-06 | Tool demo | Defcon |
Visual Network and File Forensics using Rudra
| Ankur Tyagi | blueteamreconnaissanceforensic |
| 2016-08-03 | Tool demo | Blackhat |
Visual Network and File Forensics Using Rudra
| Ankur Tyagi | blueteamforensic |
| 2016-04-01 | Tool demo | Blackhat |
Rudra: The Destroyer of Evil
| Ankur Tyagi | blueteamreconnaissanceforensic |
| 2015-11-13 | Tool demo | Blackhat |
Rudra - The Destroyer of Evil
| Ankur Tyagi | blueteamreconnaissanceforensic |
| 2015-08-08 | Talk | Defcon |
Chigula β a framework for Wi-Fi Intrusion Detection and Forensics
| Vivek Ramachandran | wifiintrusion-detectionforensic+1 |
| 2015-08-08 | Tool demo | Defcon |
Rudra
| Ankur Tyagi | blueteamreconnaissanceforensic |
| 2015-08-05 | Tool demo | Blackhat |
Rudra - The Destroyer of Evil
| Ankur Tyagi | blueteamreconnaissanceforensic |
| 2015-02-06 | Talk | Nullcon |
Hunting and Decrypting Ghost communications using Memory Forensics
| Monnappa K A | forensicblueteam |
| 2013-11-07 | Talk | Ground Zero Summit |
Understanding the anatomy of advanced targeted attacks β The Trend Micro approach
| Tarun Gupta | forensic |
| 2012-09-26 | Talk | Nullcon |
Forensics Timeline Analysis
| Aashish Kunte | forensicblueteam |
| 2012-08-03 | Talk | C0c0n |
I haz you and pwn your maal
| Harsimran Singh Walia | androidmobilereverse-engineering+1 |
| 2011-12-04 | Talk | Clubhack |
Android Forensics
| Manish Chasta | mobileandroidforensic |
| 2011-10-07 | Talk | C0c0n |
Digital Evidence
| Sushanth Samudrala | forensic |
| 2010-12-04 | Talk | Clubhack |
Windows Memory Forensic Analysis
| Aashish Kunte | windowsforensic |
| 2010-08-01 | Talk | C0c0n |
Concept, Methodology and Challenges in Computer Forensics
| Sebastian Edassery | forensic |
| 2010-08-01 | Talk | C0c0n |
Dangers and dynamic Malware analysis
| Chandrasekar | forensic |
| 2009-12-05 | Talk | Clubhack |
Advance Computer Forensic concepts (windows)
| Kush Wadhwa | forensicwindows |
| 2009-12-05 | Talk | Clubhack |
Incident Handling and Log Analysis for Web Based Incidents
| Manindra Kishore | incident-responseforensic |
| 2009-11-17 | Talk | Securitybyte |
Behind the scenes at the MSRC
| Suresh Venkateswaran | incident-responseforensic |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | forensic |
| 2007-12-09 | Talk | Clubhack |
Mining Digital Evidence in Microsoft Windows β Answering Who, When, Why and How?
| Chetan Gupta | forensicwindows |
| 2007-08-02 | Talk | Blackhat |
Smoke ’em Out!
| Rohyt Belani | forensicincident-response |
| 2004-04-21 | Talk | Can Sec West |
Cisco PSIRT TCP/BGP
| Sharad Ahlawat | incident-responseforensic |