Hackers of India
Home
Timeline
Tools
About
RoadMap
Infrastructure
"keynote" "talk" "Tool Demo"
2021/05/06
Tool Demo
:
Blackhat
:
Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way
-
Vasant Kumar
Rupali Dash
2021/05/06
Talk
:
Blackhat
:
Threat Hunting in Active Directory Environment
-
Anurag Khanna
Thirumalai Natarajan Muthiah
2020/12/09
Tool Demo
:
Blackhat
:
ArcherySec 2.0 - Open Source Vulnerability Assessment and Management
-
Anand Tiwari
2020/10/07
Talk
:
Rootcon
:
Blockchain Based OT Monitoring Solution (BBOTMS)
-
Asif Hameed Khan
Gagan Jattana
2020/10/07
Talk
:
Rootcon
:
Zero Trust in the Era of Cloud
-
Vandana Verma Sehgal
2020/10/02
Tool Demo
:
Blackhat
:
Phishing Simulation Assessment
-
Jyoti Raval
2020/09/18
Talk
:
C0c0n
:
Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment
-
Madhu Akula
2020/08/05
Tool Demo
:
Blackhat
:
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…)
-
Pramod Rana
2020/04/25
Talk
:
Hitb Sec Conf
:
THE STATE OF ICS SECURITY: THEN AND NOW
-
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
2020/04/24
Talk
:
Hitb Sec Conf
:
COMMSEC: The State of ICS Security : Then and Now
-
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
2020/03/06
Tool Demo
:
Nullcon
:
Phishing Simulation
-
Jyoti Raval
2019/12/04
Tool Demo
:
Blackhat
:
Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit
-
Jayesh Chauhan
2019/11/01
Talk
:
App Sec Day Australia
:
Protecting the Damned: Deploying Insecure Applications at Scale
-
Vivek Ramachandran
2019/09/27
Talk
:
C0c0n
:
Building a cloud security monitoring and auditing framework
-
Nirali Shah
Prasoon Dwivedi
2019/09/27
Talk
:
C0c0n
:
Cyber Hygiene from Enterprise point of view
-
Noorul Haq
2019/09/27
Talk
:
C0c0n
:
Securing Payment Data with PCI Security Standards and Programs
-
Nitin Bhatnagar
2019/09/23
Talk
:
Rootcon
:
APAD: An EDR Grade Agent for Wi-Fi Access Points
-
Vivek Ramachandran
2019/09/13
Talk
:
44 Con
:
One Person Army – Playbook on how to be the first Security Engineer at a company
-
Kashish Mittal
2019/09/13
Talk
:
44 Con
:
The CISO’s Dilemma
-
Saumil Shah
2019/08/29
Keynote
:
Hitb Sec Conf
:
The CISO’s Dilemma
-
Saumil Shah
2019/08/08
Tool Demo
:
Blackhat
:
Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit
-
Jayesh Chauhan
2019/08/08
Tool Demo
:
Blackhat
:
CSF: Container Security Framework
-
Vaibhav Gupta
2019/08/07
Tool Demo
:
Blackhat
:
Medaudit: Auditing Medical Devices and Healthcare Infrastructure
-
Anirudh Duggal
2019/05/21
Talk
:
Phdays
:
Active defense using Honeypots v2
-
Rahul Binjve
2019/03/28
Tool Demo
:
Blackhat
:
Archery - Open Source Vulnerability Assessment and Management- 2.0
-
Anand Tiwari
2019/02/28
Talk
:
Nullcon
:
A Hacker Walks into a Co-working Space
-
Rahul Binjve
2018/12/06
Tool Demo
:
Blackhat
:
Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit
-
Jayesh Chauhan
2018/09/27
Talk
:
Rootcon
:
Defending cloud Infrastructures with Cloud Security Suite
-
Shivankar Madaan
2018/08/11
Tool Demo
:
Defcon
:
Archery—Open Source Vulnerability Assessment and Management
-
Anand Tiwari
2018/08/11
Tool Demo
:
Defcon
:
Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit
-
Jayesh Chauhan
2018/08/11
Tool Demo
:
Defcon
:
DejaVU—An Open Source Deception Framework
-
Harish Ramadoss
Bhadreshkumar Patel
2018/08/08
Tool Demo
:
Blackhat
:
ANWI (All New Wireless IDS): The $5 WIDS
-
Rishikesh Bhide
Sanket Karpe
2018/08/08
Tool Demo
:
Blackhat
:
Archerysec Tool Demo
-
Anand Tiwari
2018/08/08
Tool Demo
:
Blackhat
:
DejaVu: An Open Source Deception Framework
-
Bhadreshkumar Patel
Harish Ramadoss
2018/03/23
Tool Demo
:
Blackhat
:
Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit
-
Jayesh Chauhan
Shivankar Madaan
2018/03/22
Tool Demo
:
Blackhat
:
Archery - Open Source Vulnerability Assessment and Management
-
Anand Tiwari
2018/03/22
Tool Demo
:
Blackhat
:
Jackhammer - One Security Vulnerability Assessment/Management Tool
-
Rajagopal Vr
Krishna Chaitanya Yarramsetty
2017/12/06
Tool Demo
:
Blackhat
:
ANWI (All New Wireless IDS) - The £5 WIDS
-
Sanket Karpe
2017/08/18
Talk
:
C0c0n
:
10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work
-
Rahul Binjve
2017/08/18
Talk
:
C0c0n
:
Cloud_Security Suite - One stop tool for auditing cloud infrastructure
-
Shivankar Madaan
Jayesh Chauhan
2017/08/18
Talk
:
C0c0n
:
Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure
-
Manas Pratim Sarma
2017/08/18
Talk
:
C0c0n
:
The need for Teachers to cope with Technology
-
Resmi Rajan
2017/08/18
Talk
:
C0c0n
:
What Security Managers can learn from story tellers?
-
Anup Narayanan
2017/05/23
Talk
:
Phdays
:
How we hacked distributed configuration management systems
-
Bharadwaj Machiraju
Francis Alexander
2017/03/03
Talk
:
Nullcon
:
Case Study on RFID (proximity cards) hacking
-
Sarwar Jahan
Ashwath Kumar
2017/03/03
Talk
:
Nullcon
:
Hacking medical devices and infrastructure
-
Anirudh Duggal
2016/08/19
Talk
:
C0c0n
:
Evading Corporate Security – You’re as secure as the weakest link
-
Prajwal Panchmahalkar
2016/03/11
Talk
:
Nullcon
:
Attacking and defending healthcare - EMR solutions
-
Anirudh Duggal
2015/08/08
Talk
:
Defcon
:
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
-
Aditya K Sood
2015/08/01
Talk
:
C0c0n
:
Medical device security and critical infrastructure inside hospitals
-
Anirudh Duggal
2014/11/13
Talk
:
Ground Zero Summit
:
APT protection for the Enterprise
-
Deepak Singla
2014/11/13
Talk
:
Ground Zero Summit
:
Enterprise Security
-
Mano Paul
2014/08/07
Talk
:
Blackhat
:
Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies
-
Vijay Balasubramaniyan
Raj Bandyopadhyay
Telvis Calhoun
2014/02/14
Talk
:
Nullcon
:
2014 The year in which we cannot ignore SCADA
-
Amol Sarwate
2014/02/14
Talk
:
Nullcon
:
Multi-value W-Fi What the Heck is it
-
Abhijeet Ghosh
2013/11/07
Talk
:
Ground Zero Summit
:
Evolution of network security around Software Defined Networking (SDN) – The intelligent network
-
Diwakar Dayal
2013/11/07
Talk
:
Ground Zero Summit
:
Securing government Critical Information Infrastructure
-
Kapil Awasthi
2013/10/17
Talk
:
Hitb Sec Conf
:
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis
-
Rahul Sasi
2013/09/27
Talk
:
C0c0n
:
The Art and Science of Anamoly based Vulnerability Detection
-
Lavakumar Kuppan
2013/08/03
Talk
:
Defcon
:
PowerPreter: Post Exploitation Like a Boss
-
Nikhil Mittal
2013/08/01
Tool Demo
:
Blackhat
:
Sparty
-
Aditya K Sood
2013/03/15
Talk
:
Blackhat
:
The Sandbox Roulette- Are you ready for the gamble?
-
Rahul Kashyap
Rafal Wojtczuk
2013/03/01
Talk
:
Nullcon
:
BYOD: How will it shape your wireless network security in future?
-
Kiran Deshpande
2013/03/01
Talk
:
Nullcon
:
Inception of graphical passwords
-
Rishi Narang
2013/03/01
Talk
:
Nullcon
:
Sensitive Campus Security with Network
-
Aravind Sitaraman
2013/03/01
Talk
:
Nullcon
:
Vulnerability research anyone?
-
Omair
2012/12/01
Talk
:
Clubhack
:
Infrastructure Security
-
Sivamurthy Hiremath
2012/12/01
Talk
:
Clubhack
:
Smart Grid Security
-
Falgun Rathod
2012/09/20
Talk
:
Ekoparty
:
Fuzzing DTMF Input Processing Algorithms
-
Rahul Sasi
2012/09/05
Talk
:
44 Con
:
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves?
-
Jitender Arora
2012/08/03
Talk
:
C0c0n
:
Building Security Incident Detection & Handling Capabilities in Enterprises
-
Sunil Varkey
2012/08/03
Talk
:
C0c0n
:
Contemporary Transcription and Resource Parasitism
-
Arpit Patel
2012/08/03
Talk
:
C0c0n
:
Enterprise server security
-
Raghav Shandilya
2012/08/03
Talk
:
C0c0n
:
Gathering security requirements
-
K v Prashant
Saleem Ahamed
2012/02/15
Talk
:
Nullcon
:
Application security cost management
-
Ketan Vyas
2012/02/15
Talk
:
Nullcon
:
SCADA Security: Why is it so hard
-
Amol Sarwate
2011/12/14
Talk
:
Blackhat
:
SCADA Security - Why Is It So Hard?
-
Amol Sarwate
2011/10/08
Talk
:
C0c0n
:
Stratagemizing Security Against Perpetrators In Cloud Infrastructure
-
K S Abhiraj
2011/10/07
Talk
:
C0c0n
:
Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network
-
Bala Kumar S
Mohamed Emraanullah
2011/09/07
Talk
:
Securitybyte
:
Data Protection
-
Dipankar Roy
2011/02/25
Talk
:
Nullcon
:
Enterprise Paradigm for Controlling Data Leakage
-
Deepak Rout
2011/02/25
Talk
:
Nullcon
:
Incident Management and Beyond
-
Dinesh O Bareja
2011/02/25
Talk
:
Nullcon
:
Protect infrastructure or protect information – Lessons from Wikileaks
-
Vishal Gupta
2010/08/01
Talk
:
C0c0n
:
End-point Security
-
Laxi Eshwari
2010/08/01
Talk
:
C0c0n
:
Last line of defense - Host Intrusion Prevention and Secure application development.
-
Avinash Shenoi
2010/08/01
Talk
:
C0c0n
:
Wireless MITM
-
Prashant Mahajan
2010/02/25
Talk
:
Nullcon
:
Botnet mitigation, monitoring and management.
-
Harshad Patil
2009/11/17
Talk
:
Securitybyte
:
Threat Modeling
-
Varun Sharma
2009/08/06
Talk
:
C0c0n
:
Information security management practices - Technical issues and the impact of risk management.
-
Kp Paulson
2009/08/06
Talk
:
C0c0n
:
Management & Security of Large Scale Storage Devices
-
Prashant Dinde
2009/08/06
Talk
:
C0c0n
:
Network Intrusions and Hacking
-
Manu Zacharia
2009/08/02
Talk
:
Defcon
:
Wi-Fish Finder: Who Will Bite the Bait
-
Md Sohail Ahmad
Prabhash Dhyani