🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Pentesting

88
Total Entries
103
Contributors

Top Contributors

Arun Mane(3) Aditya Gupta(2) Anamika Singh(2) Jatin Kataria(2) Nikhil Mittal(2)

All Entries (88 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjarattack-surfacevulnerability-assessmentasset-management+2
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Spentestingapplication-pentestingvulnerability-assessment+2
2025-08-07TalkBlackhat Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing Kanika Guptareverse-engineeringfirmware-analysismobile-security+2
2025-08-06Tool demoBlackhat CloudLens Gaurav Joshi, Hare Krishna Rai, Prashant Venkateshawscloud-pentestingred-teaming+2
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chagantiweb-securitysecure-codingpentesting+3
2025-08-06Tool demoBlackhat ProcessInjection Chirag Savlapentestingred-teamingreverse-engineering+1
2025-08-06Tool demoBlackhat Realtic Sohan Simha Prabhakar, Samarth Bhaskar Bhatpentestingvulnerability-assessmentstatic-analysis+3
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashankreverse-engineeringexploitationpentesting+3
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-27Tool demoBlackhat Varunastra: Securing the Depths of Docker Source Code Kunal Aggarwalcontainer-securitydockerpentesting+3
2024-11-26TalkBlackhat Critical Exposures: Lessons from a Decade of Vulnerability Research Nikhil Shrivastavavulnerability-managementsql-injectionpentesting+2
2024-11-26Tool demoBlackhat Halberd: Multi-Cloud Security Testing Tool Source Code Arpan Abani Sarkarcloud-pentestingcloud-compliancepentesting+1
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Kartik Lalanautomotive-cybersecurityvulnerability-managementreverse-engineering+2
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2024-08-30TalkHitb Sec Conf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajputweb-securitypentestingexploitation+4
2024-08-29TalkHitb Sec Conf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasadreverse-engineeringpentestingincident-response
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayreverse-engineeringvulnerability-managementsecurity-architecture+1
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Vivek Ramachandran, Shourya Pratap Singhweb-securitypentestingvulnerability-management
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nainics-securityscadaplc+3
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigammobile-securitypentestingapi-security+2
2024-03-21TalkCan Sec West Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Arif Hussainvulnerability-managementpentestingsecurity-architecture+1
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Suranacontainer-securitydockerthreat-hunting+1
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashankreverse-engineeringpentestingexploitation+3
2023-08-11TalkDefcon Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications Ankur Chowdharyweb-securityxssapplication-pentesting+3
2023-08-07TalkC0c0n Serverless Siege: AWS Lambda Pentesting Video Anjali Singh Shukla, Divyanshu Shuklaawsserverlesscloud-pentesting+2
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogismart-contractsblockchain-securityphishing+3
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastavapentestingnetwork-pentestingsecurity-architecture+1
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kuriensocial-engineeringpentestingsecurity-awareness+1
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojanembedded-securityfirmware-analysishardware-security+3
2022-09-23TalkC0c0n A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Suranapentesting
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanandvulnerability-managementpentestingapt
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwalandroid-securitymobile-securitymobile-pentesting+3
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharmareverse-engineeringvulnerability-managementpentesting
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Rahul Sasi, Vishal Singhsocial-engineeringpentestingmalware+2
2021-11-13TalkC0c0n Case Study - Cyber Heist in a Bank and Recovery of Systems and Money Prashant Choudharyincident-responseforensicsrecovery+1
2021-11-13TalkC0c0n Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application Gayatri Nayakweb-securityauthenticationauthorization+2
2021-11-12TalkC0c0n “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhailsocial-engineeringpentestingsecurity-awareness
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singhapentestingpost-exploitationprivilege-escalation+2
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishnasecure-codingpentestingethical-hacking+2
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Vermapentestingvulnerability-assessmentapplication-pentesting+1
2020-11-21TalkApp Sec Indonesia Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory Abhi M Balakrishnanweb-securityowaspapplication-pentesting+2
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2020-10-01Tool demoBlackhat OWASP Python Honeypot Source Code Sri Harsha Gajavalliweb-securityowasppentesting+1
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Guptapentestingvulnerability-assessmentAutomation+1
2020-09-18TalkC0c0n Web Application hacking with WebZGround Video Parveen Yadav, Narendra Kumarweb-securityweb-pentestingpentesting+3
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potlurireverse-engineeringbinary-analysisexploitation+1
2019-10-12TalkTexas Cyber Summit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshireverse-engineeringmalwarebinary-analysis+3
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkarmobile-securityios-securityapplication-pentesting+4
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Maneautomotive-cybersecuritycan-busics-security+3
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singhphishingapi-securityweb-security+2
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargavamobile-securityprivacypentesting
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Raopentestingvulnerability-managementsecurity-architecture+1
2018-08-09TalkDefcon Backdooring DVR/NVR devices Arun Manehardware-reverse-engineeringembedded-securitypentesting+3
2018-01-31TalkOwasp App Sec California Hunter – Optimize your Pentesters time Video Kiran Shiraliapplication-pentestingpentestingvulnerability-management+2
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Guptaiot-pentestingembedded-securitypentesting+3
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkarvulnerability-assessmentpentestingsecure-coding+2
2017-10-05TalkVirus Bulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anandvulnerability-managementreverse-engineeringpentesting+1
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakharexploitationpentestingreverse-engineering+1
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Maneics-securityindustrial-control-systems-securitypentesting+2
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Bharadwaj Machirajupentestingapplication-pentestingvulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Francis Alexanderpentestingapplication-pentestingvulnerability-assessment+4
2016-11-06TalkGround Zero Summit Hacking The Droids Anto Josephandroid-securitymobile-securityreverse-engineering+3
2016-10-07TalkDeepsec Inside Stegosploit Presentation Video Saumil Shahweb-securityexploitationpentesting+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Pandapentestingvulnerability-managementthreat-hunting
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singhpentestingethical-hackingprivilege-escalation+3
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkarpentestingreverse-engineeringvulnerability-management+1
2015-11-05TalkGround Zero Summit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jainincident-responsereverse-engineeringpentesting
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittalpentestingred-teamingexploitation+3
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekarpentestingethical-hackingvulnerability-assessment+2
2015-03-15TalkDefcon TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER Anamika Singhnetwork-pentestingvulnerability-assessmentvulnerability-management+2
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomaspentestingnetwork-pentestingvulnerability-assessment+2
2014-08-21TalkUsenix The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhaweweb-securityxsscsrf+3
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwatereverse-engineeringpentestingvulnerability-management
2014-03-08TalkDefcon WI-Hawk Source Code Anamika Singhnetwork-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandrandevsecopssecure-developmentpentesting+2
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkarpentestingforensicsdigital-forensics+2
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halderandroid-securitymobile-securityreverse-engineering+2
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxenapentestingexploitationmalware+1
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goelsocial-engineeringpentestingsecurity-awareness+1
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittalpost-exploitationethical-hackingpentesting+2
2012-03-15TalkNullcon An App(le) a day keeps the wallet away Antriksh Shahpentestingweb-securityapi-security+1
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Jagadeesh Chandraiahmalwaretrojanreverse-engineering+1
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwapentestingsecurity-awarenessrisk-management+1
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Rameshmalwarebotnetreverse-engineering+1
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shahsecure-codingdevsecopsvulnerability-management+3
2007-03-15TalkBlackhat Exploit-Me Series – Free Firefox Application Penetration Testing Suite Launch Presentation Video Nish Bhalla, Rohit Sethiweb-securityxsssql-injection+4