| 2025-04-04 | Tool demo | Blackhat |
SHIVA Spampot: Actionable Spam and Phishing Intelligence
| Rahul Binjve, Viren Kapadia | #honeypot#network-monitoring#incident-management+1 |
| 2025-04-03 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Hitesh Thakur, Praveen Kanniah, Prateek Thakare | #asset-inventory#cloud-workload-protection#security-tools+4 |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | #network-architecture#network-hardening#network-monitoring+2 |
| 2024-11-16 | Talk | C0c0n |
Who is holding the Marauders map?
| Maya R Nair | #network-pentesting#network-monitoring#network-traffic-analysis+1 |
| 2024-08-29 | Tool demo | Hitbsecconf |
eBPFShield
| Sagar Bhure | #ids#incident-management#network-monitoring+1 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2023-08-07 | Talk | C0c0n |
Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux
| Pranav Sivvam | #red-teaming#linux#memory-forensics+2 |
| 2023-05-12 | Tool demo | Blackhat |
eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF
| Sagar Bhure | #dns#machine-learning#network-monitoring+2 |
| 2022-09-24 | Talk | C0c0n |
Deep Learning to detect Network Attacks
| Varun Kohli | #ids#network-monitoring#threat-detection+2 |
| 2022-09-24 | Talk | C0c0n |
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks
| Manesh Thankappan | #ids#network-monitoring#network-pentesting+3 |
| 2020-12-09 | Tool demo | Blackhat |
HosTaGe: mobile honeypots for rapid deployment
| Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou | #honeypot#blueteam#endpoint-protection+2 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-03-06 | Tool demo | Nullcon |
Omniscient
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-12-04 | Tool demo | Blackhat |
RTTM: Real Time Threat Monitoring Tool
| Naveen Rudrappa, Murali Krishna Segu | #blueteam#network-monitoring#security-analytics+2 |
| 2019-09-23 | Talk | Rootcon |
Hunting Threats with Wireshark Plugins
| Nishant Sharma, Jeswin Mathai, Shivam Bathla | #blueteam#network-monitoring#security-analytics+2 |
| 2019-08-10 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+3 |
| 2019-08-08 | Tool demo | Defcon |
Let’s Map Your Network
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-08-08 | Talk | Defcon |
YOUR PHONE IS USING TOR AND LEAKING YOUR PII
| Milind Bhargava, Adam Podgorski | #data-protection#security-assessment#tor+1 |
| 2019-05-21 | Talk | Phdays |
Active defense using Honeypots v2
| Rahul Binjve | #blueteam#honeypot#network-defense+4 |
| 2018-08-11 | Tool demo | Defcon |
DejaVU—An Open Source Deception Framework
| Harish Ramadoss, Bhadreshkumar Patel | #blueteam#network-defense#honeypot+4 |
| 2018-08-08 | Tool demo | Blackhat |
DejaVu: An Open Source Deception Framework
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#network-defense#honeypot+4 |
| 2018-03-03 | Panel | Nullcon |
Managing Cyber Risk in the Connected Environment
| Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani | #security-strategy#threat-modeling#network-monitoring+1 |
| 2017-08-18 | Talk | C0c0n |
Hunting Botnets with Analytics
| Shomiron Das Gupta | #botnet#blueteam#security-analytics+2 |
| 2017-08-18 | Talk | C0c0n |
10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work
| Rahul Binjve | #honeypot#blueteam#network-monitoring+3 |
| 2017-08-18 | Talk | C0c0n |
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!
| Abhinav Biswas | #tor#network-monitoring#incident-detection+1 |
| 2017-08-18 | Talk | C0c0n |
Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them!
| Illyas Kooliyankal | #blueteam#cyber-crime#intelligence-sharing+3 |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | #reverse-engineering#evil-twin-attack#network-monitoring+3 |
| 2016-03-11 | Talk | Nullcon |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day
| Pallav Jakhotiya, Vipul Sawant | #secure-development#blueteam#data-analytics+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Western Air Command
| B S Singh Deo | #network-defense#network-monitoring#network-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Wolves Among Sheep: Defeating Targeted Attacks With Deception
| Sahir Hidayatullah, Raviraj Doshi | #blueteam#incident-detection#honeypot+2 |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | #network-forensics#packet-analysis#network-monitoring+3 |
| 2015-08-07 | Talk | Defcon |
Chellam – a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | #wifi#firewall#ids+4 |
| 2015-03-15 | Talk | Hitbsecconf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | #network-pentesting#packet-analysis#network-monitoring+2 |
| 2014-08-22 | Talk | C0c0n |
Piracy Tracker
| Vargheese Babu | #blueteam#network-monitoring#security-analytics+3 |
| 2014-08-06 | Tool demo | Blackhat |
Flowinspect: Yet another network inspection tool
| Ankur Tyagi | #security-assessment#network-monitoring#ids+2 |
| 2014-02-14 | Talk | Nullcon |
Flowinspect - A Network Inspection Tool
| Ankur Tyagi | #security-assessment#malware-detection#network-monitoring+2 |
| 2013-03-01 | Talk | Nullcon |
CSRF Finder as a Mozilla Addon
| Piyush Pattanayak | #csrf#blueteam#application-pentesting+4 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2012-08-03 | Talk | C0c0n |
Contemporary Transcription and Resource Parasitism
| Arpit Patel | #exploitation#firewall#network-monitoring+1 |
| 2012-08-03 | Talk | C0c0n |
Enterprise server security
| Raghav Shandilya | #blueteam#security-tools#network-monitoring+2 |
| 2011-08-03 | Talk | Blackhat |
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
| Jatin Kataria, Ang Cui, Salvatore Stolfo | #cisco-ios#hardware-embedded#firmware-analysis+4 |
| 2010-02-25 | Talk | Nullcon |
Botnet mitigation, monitoring and management.
| Harshad Patil | #botnet#blueteam#malware-detection+4 |
| 2007-12-09 | Talk | Clubhack |
Legiment Techniques of IPS/IDS Evasion
| Ajit Hatti | #red-teaming#network-monitoring#ids+2 |