| 2025-03-02 | Panel | Nullcon |
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
| Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur | #security-monitoring#network-defense#threat-modeling+3 |
| 2023-05-12 | Tool demo | Blackhat |
eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF
| Sagar Bhure | #dns#machine-learning#network-monitoring+2 |
| 2022-12-07 | Tool demo | Blackhat |
h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot.
| Subhash Popuri | #honeypot#ids#ips+3 |
| 2022-09-24 | Talk | C0c0n |
Deep Learning to detect Network Attacks
| Varun Kohli | #ids#network-monitoring#threat-detection+2 |
| 2022-09-24 | Talk | C0c0n |
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks
| Manesh Thankappan | #ids#network-monitoring#network-pentesting+3 |
| 2021-11-11 | Tool demo | Blackhat |
DejaVu ++
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#cloud-access-security-broker#cloud-compliance+4 |
| 2021-11-10 | Tool demo | Blackhat |
RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot
| Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis | #blueteam#honeypot#network-defense+1 |
| 2021-08-04 | Tool demo | Blackhat |
Attack Surface Framework
| Prajwal Panchmahalkar, Mauricio Espinosa | #network-defense#application-pentesting#attack-surface+1 |
| 2019-09-27 | Talk | C0c0n |
Advanced Persistent Threat and counter measures
| A a Gafoor | #blueteam#apt#network-defense+4 |
| 2019-08-08 | Tool demo | Blackhat |
RWDD: Remote Web Deface Detection Tool
| K v Prashant, Ade Yoseman Putra | #blueteam#application-pentesting#security-monitoring+1 |
| 2019-05-21 | Talk | Phdays |
Active defense using Honeypots v2
| Rahul Binjve | #blueteam#honeypot#network-defense+4 |
| 2019-03-28 | Tool demo | Blackhat |
RTS: Real Time Scrapper
| Naveen Rudrappa | #blueteam#application-pentesting#security-monitoring+4 |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#wireshark#network-defense+4 |
| 2018-11-02 | Talk | Hitbsecconf |
Defending The Enterprise in 2018
| Saumil Shah | #blueteam#security-strategy#threat-modeling+3 |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-08-11 | Tool demo | Defcon |
DejaVU—An Open Source Deception Framework
| Harish Ramadoss, Bhadreshkumar Patel | #blueteam#network-defense#honeypot+4 |
| 2018-08-08 | Tool demo | Blackhat |
DejaVu: An Open Source Deception Framework
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#network-defense#honeypot+4 |
| 2016-08-03 | Tool demo | Blackhat |
DataSploit
| Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda | #security-assessment#threat-hunting#osint+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Western Air Command
| B S Singh Deo | #network-defense#network-monitoring#network-pentesting+3 |
| 2014-08-22 | Talk | C0c0n |
Idle Machines doing Bounty Hunting (Behind your Back)
| Mrityunjay Gautam | #bug-hunting#red-teaming#automated-scanning+3 |
| 2014-02-14 | Talk | Nullcon |
Multi-value W-Fi What the Heck is it
| Abhijeet Ghosh | #wifi#blueteam#network-defense+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Advanced security for advanced threats
| Kartik Shahani | #blueteam#security-strategy#threat-modeling+4 |
| 2011-10-07 | Talk | C0c0n |
Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network
| Bala Kumar S, Mohamed Emraanullah | #blueteam#intrusion-detection#ids+3 |
| 2011-09-06 | Talk | Securitybyte |
Private Internet Circuits - Towards A Next Generation Internet
| Sanjay Deshpande | #network-architecture#encryption#network-defense |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | #blueteam#malware-detection#application-pentesting+3 |
| 2007-08-01 | Talk | Blackhat |
PISA: Protocol Identification via Statistical Analysis
| Rohit Dhamankar, Rob King | #blueteam#network-defense#intrusion-detection |
| 2007-04-18 | Talk | Cansecwest |
Low-Rate Denial-of-Service attacks
| Anil Kumar | #red-teaming#dos#network-defense+2 |
| 2003-12-16 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#network-defense+3 |