| 2024-08-29 | Tool demo | Hitbsecconf |
eBPFShield
| Sagar Bhure | #ids#incident-management#network-monitoring+1 |
| 2024-04-18 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#security-analytics+3 |
| 2023-10-13 | Talk | Hackfest |
Exploring RAM Forensic Analysis for Effective Digital Investigations
| Sneha Banerjee | #forensics#memory-forensics#digital-forensics+2 |
| 2023-09-24 | Panel | Nullcon |
ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT
| Shomiron Das Gupta, Yogi Kapur, Manish Tiwari | #incident-management#incident-detection#forensics+3 |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-08-07 | Talk | C0c0n |
Cellibrite Premium Mobile Forensic tool iPhone analysis
| Vaibhav Kumar | #mobile-forensics#reverse-engineering#forensics+2 |
| 2022-09-24 | Talk | C0c0n |
Cryptocurrency Forensics
| Bhushan Gulabrao Borase | #forensics#digital-forensics#cryptocurrency+1 |
| 2021-11-13 | Talk | C0c0n |
Case Study - Cyber Heist in a Bank and Recovery of Systems and Money
| Prashant Choudhary | #incident-management#forensics#security-assessment |
| 2021-11-13 | Talk | C0c0n |
Emerging trends in cyber crimes : Investigation tools & techniques
| Triveni Singh | #incident-management#digital-forensics#forensics+3 |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | #forensics#network-forensics#data-protection |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | #forensics#iot-device-management#iot-pentesting+4 |
| 2019-12-04 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | #macos#secure-coding#forensics+1 |
| 2019-10-12 | Talk | Texascybersummit |
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+3 |
| 2019-08-08 | Tool demo | Defcon |
PcapXray
| Srinivas Piskala Ganesh Babu | #forensics#wireshark#blueteam |
| 2019-08-07 | Tool demo | Blackhat |
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan, Kunal Aggarwal | #virtual-machine#blueteam#forensics+2 |
| 2019-03-28 | Talk | Blackhat |
Investigating Malware Using Memory Forensics - A Practical Approach
| Monnappa K A | #forensics#blueteam#malware-detection+1 |
| 2019-03-01 | Panel | Nullcon |
Breached? β Here is how I responded!
| Muslim Koser, Mrudul Uchil, Sachin Burman, Venkata Satish Guttula, Vijay K Verma | #incident-management#digital-forensics#forensics+1 |
| 2018-10-05 | Talk | C0c0n |
Using Fault Injection for Forensics
| Yashin Mehaboobe | #forensics#digital-forensics#security-testing+2 |
| 2018-09-06 | Talk | Grrcon |
Angad: A Malware Detection Framework using Multi-Dimensional Visualization
| Ankur Tyagi | #blueteam#security-assessment#forensics |
| 2018-08-11 | Tool demo | Defcon |
Angad: A Malware Detection Framework using Multi-Dimensional Visualization
| Ankur Tyagi | #blueteam#security-assessment#forensics |
| 2018-08-09 | Tool demo | Blackhat |
rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat, Ismael Valenzuela | #incident-management#rest-api#forensics |
| 2018-08-08 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | #macos#secure-coding#forensics+1 |
| 2018-08-08 | Tool demo | Blackhat |
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan | #virtual-machine#blueteam#forensics+2 |
| 2018-03-03 | Panel | Nullcon |
Forensic Challenges and Road Ahead
| Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov | #data-leak#data-protection#forensics+4 |
| 2017-03-31 | Talk | Blackhat |
WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION
| Monnappa K A | #code-injection#red-teaming#malware-research+4 |
| 2016-08-19 | Talk | C0c0n |
SSD Forensics : A Nightmare for Forensic Investigators
| Santosh Khadsare | #forensics#memory-forensics#incident-management+2 |
| 2016-08-06 | Tool demo | Defcon |
Visual Network and File Forensics using Rudra
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2016-08-04 | Tool demo | Blackhat |
rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+1 |
| 2016-08-03 | Tool demo | Blackhat |
Visual Network and File Forensics Using Rudra
| Ankur Tyagi | #blueteam#forensics#network-forensics+2 |
| 2016-04-01 | Tool demo | Blackhat |
Rudra: The Destroyer of Evil
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2015-11-13 | Tool demo | Blackhat |
Rudra - The Destroyer of Evil
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | #network-forensics#packet-analysis#network-monitoring+3 |
| 2015-08-08 | Talk | Defcon |
Chigula β a framework for Wi-Fi Intrusion Detection and Forensics
| Vivek Ramachandran | #wifi#intrusion-detection#forensics+1 |
| 2015-08-08 | Tool demo | Defcon |
Rudra
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2015-08-05 | Tool demo | Blackhat |
Rudra - The Destroyer of Evil
| Ankur Tyagi | #blueteam#reconnaissance#forensics |
| 2015-02-06 | Talk | Nullcon |
Hunting and Decrypting Ghost communications using Memory Forensics
| Monnappa K A | #forensics#blueteam#memory-forensics+2 |
| 2013-11-07 | Talk | Groundzerosummit |
Understanding the anatomy of advanced targeted attacks β The Trend Micro approach
| Tarun Gupta | #forensics#malware-research#attack-surface |
| 2013-09-13 | Talk | Grrcon |
Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution
| Prajwal Panchmahalkar | #security-assessment#forensics#digital-forensics+1 |
| 2012-09-29 | Talk | Nullcon |
Next-gen Forensics
| K K Mookhey | #forensics#digital-forensics#incident-management+2 |
| 2012-09-26 | Talk | Nullcon |
Forensics Timeline Analysis
| Aashish Kunte | #forensics#blueteam#digital-forensics+3 |
| 2012-08-03 | Talk | C0c0n |
I haz you and pwn your maal
| Harsimran Singh Walia | #android#reverse-engineering#forensics |
| 2011-12-04 | Talk | Clubhack |
Android Forensics
| Manish Chasta | #android#forensics#android-security+4 |
| 2011-10-07 | Talk | C0c0n |
Digital Evidence
| Sushanth Samudrala | #forensics#digital-forensics#incident-management+2 |
| 2010-12-04 | Talk | Clubhack |
Windows Memory Forensic Analysis
| Aashish Kunte | #windows#forensics#memory-forensics+3 |
| 2010-08-01 | Talk | C0c0n |
Concept, Methodology and Challenges in Computer Forensics
| Sebastian Edassery | #forensics#digital-forensics#incident-management+2 |
| 2010-08-01 | Talk | C0c0n |
Dangers and dynamic Malware analysis
| Chandrasekar | #forensics#dynamic-analysis#malware-detection+4 |
| 2009-12-05 | Talk | Clubhack |
Advance Computer Forensic concepts (windows)
| Kush Wadhwa | #forensics#windows#data-protection |
| 2009-12-05 | Talk | Clubhack |
Incident Handling and Log Analysis for Web Based Incidents
| Manindra Kishore | #incident-management#forensics#application-pentesting+2 |
| 2009-11-17 | Talk | Securitybyte |
Behind the scenes at the MSRC
| Suresh Venkateswaran, Dave Midturi | #incident-management#forensics#memory-forensics+1 |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | #forensics#digital-forensics#data-leak+4 |
| 2007-12-09 | Talk | Clubhack |
Mining Digital Evidence in Microsoft Windows β Answering Who, When, Why and How?
| Chetan Gupta | #forensics#windows#data-loss-prevention+4 |
| 2007-08-02 | Talk | Blackhat |
Smoke ’em Out!
| Rohyt Belani | #forensics#incident-management#digital-forensics+4 |
| 2006-08-02 | Talk | Blackhat |
Web Application Incident Response & Forensics: A Whole New Ball Game!
| Rohyt Belani, Chuck Willis | #application-pentesting#code-review#incident-management+3 |
| 2004-04-21 | Talk | Cansecwest |
Cisco PSIRT TCP/BGP
| Sharad Ahlawat | #incident-management#forensics#network-forensics |