| 2025-03-14 | Talk | Insomnihack |
The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques)
| Dhiraj Mishra | malware |
| 2024-11-06 | Talk | Blackalps |
IDAT Loader: The Malware’s Camouflaged Weapon
| Niranjan Jayanand | malware |
| 2024-04-19 | Tool demo | Blackhat |
Malware clustering using unsupervised ML : CalMal
| Himanshu Anand | malware |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | malwaresecurity-awarenessrisk-management+2 |
| 2022-08-25 | Talk | Hitb Sec Conf |
Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle
| Rahul Sasi, Vishal Singh | social-engineeringpentestingmalware+2 |
| 2021-11-12 | Talk | C0c0n |
Dissecting Malicious Software and Analysis
| Shrutirupa Banerjiee | malwarereverse-engineeringdynamic-analysis+1 |
| 2021-11-11 | Tool demo | Blackhat |
DejaVu ++
| Bhadreshkumar Patel, Harish Ramadoss | malwaredefense |
| 2021-11-10 | Tool demo | Blackhat |
RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot
| Abhimanyu Rawat, Shreyas Srinivasa | malwaredefense |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | malwareforensic |
| 2020-11-20 | Talk | Deepsec |
What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis
| Shyam Sundar Ramaswami | malware |
| 2019-11-01 | Talk | Hackfest |
The Mechanics of Malware’s Darkside
| Yagnesh Waran P | malware |
| 2019-10-12 | Talk | Texas Cyber Summit |
HX-3012 PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | reverse-engineeringmalwarebinary-analysis+3 |
| 2018-10-05 | Talk | C0c0n |
SCANDA: To Unbosom Malware Behavior
| Rajesh Nikam, Parmanand Mishra | malwarereverse-engineeringdynamic-analysis+2 |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | malware |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | malwarereverse-engineering |
| 2016-03-15 | Talk | Groundzerosummit |
r00tKidz and Hacking
| Triveni Singh | pentestingethical-hackingprivilege-escalation+3 |
| 2015-11-05 | Talk | Ground Zero Summit |
Browser based Malware attacks
| Harsh Daftary | malwareredteam |
| 2015-11-05 | Talk | Ground Zero Summit |
Dissecting Android Malware
| Anto Joseph | mobileandroidmalware |
| 2014-05-21 | Talk | Phdays |
Android Exploitation
| Aditya Gupta | mobileandroidredteam+3 |
| 2013-10-19 | Talk | Toor Con |
Static Malware Analysis with PyTriage
| Yashin Mehaboobe | malware |
| 2012-11-23 | Talk | Malcon |
Advanced Malware Engine
| Mohit Kumar | malwareandroidmobile+1 |
| 2012-11-23 | Talk | Malcon |
Surprise paper!
| Atul Alex | malwarereverse-engineeringmobile-security |
| 2012-11-23 | Talk | Malcon |
Windows Phone 8 Malware Prototype
| Shantanu Gawde | windows-phoneredteammalware |
| 2012-08-03 | Talk | C0c0n |
Cyber Weapons
| Sameer Saxena | pentestingexploitationmalware+1 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | malwarebotnetweb-security+2 |
| 2011-11-25 | Talk | Malcon |
Advanced Malware for Apple Products
| Atul Alex | malwareredteammac-os+1 |
| 2011-11-25 | Talk | Malcon |
Mareech : Look it’s a HID made up of gold
| Nikhil Mittal | hidredteammalware |
| 2011-11-17 | Talk | Deepsec |
FakeAntiVirus - Journey from Trojan to a Persisent Threat
| Jagadeesh Chandraiah | malwaretrojanreverse-engineering+1 |
| 2011-05-19 | Talk | Hitb Sec Conf |
Spying on SpyEye – What Lies Beneath?
| Aditya K Sood | malwareblueteam |
| 2011-02-25 | Talk | Nullcon |
Jugaad Beta: Linux Thread Injection malware PoC
| Aseem Jakhar | linuxmalwareredteam |
| 2010-08-01 | Talk | C0c0n |
Horses, Rats and Bots
| Jairam Ramesh | malwarebotnetreverse-engineering+1 |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | malwareblueteam |
| 2009-11-18 | Talk | Securitybyte |
Rumbling Infections – Web Malware Ontology
| Aditya K Sood | malware |