| 2021-05-06 | Talk | Blackhat |
Threat Hunting in Active Directory Environment
| Anurag Khanna, Thirumalai Natarajan Muthiah | blueteamredteampurpleteam |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | linuxsecure-codingweb-application-security+3 |
| 2019-12-04 | Talk | Blackhat |
ClusterFuzz: Fuzzing at Google Scale
| Abhishek Arya | fuzzingredteamblueteam+1 |
| 2019-11-01 | Talk | App Sec Day Australia |
A Purple Team View of Serverless and GraphQL Applications
| Abhay Bhargav | redteamblueteampurpleteam+1 |
| 2019-10-14 | Talk | Hitb Sec Conf |
CALL OF DUTY: MODERN BROWSER WARFARE
| Dhiraj Mishra | blueteamredteampurpleteam |
| 2019-10-14 | Talk | Hitb Sec Conf |
ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES
| Harshit Agrawal, Himanshu Mehta | wifiredteamblueteam+1 |
| 2019-09-23 | Talk | Rootcon |
Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking)
| Arun Mane, Nikhil Bogam | redteamcar-hackingblueteam+1 |
| 2019-09-13 | Talk | Global App Sec |
A Purple Team View of Serverless and GraphQL Applications
| Abhay Bhargav | purpleteam |
| 2019-08-30 | Talk | Hitb Sec Conf |
COMMSEC: PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | secure-codingredteamblueteam+1 |
| 2019-08-29 | Talk | Hitb Sec Conf |
Understanding, Attacking & Securing Medical Devices
| Ajay Pratap Singh | redteamblueteampurpleteam |
| 2019-08-09 | Tool demo | Defcon |
EXPLIoT - IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | iotpentestredteam+2 |
| 2019-08-08 | Tool demo | Blackhat |
EXPLIoT: IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | iotpentestredteam+2 |
| 2019-08-07 | Tool demo | Blackhat |
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan, Kunal Aggarwal | virtual-machineblueteamforensic+2 |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | voipwiresharknetwork-security+4 |
| 2019-02-28 | Talk | Nullcon |
Attacking & Securing HealthCare Standards & hospital secured systems
| Ajay Pratap Singh | redteamblueteampurpleteam |
| 2018-08-12 | Tool demo | Defcon |
Expl-iot—IoT Security Testing and Exploitation framework
| Aseem Jakhar | iotpentestredteam+2 |
| 2018-08-09 | Talk | Defcon |
4G—Who is paying your cellular phone bill?
| Isha Singh | 4gipxredteam+2 |
| 2018-08-08 | Talk | Blackhat |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | redteamvpnblueteam+1 |
| 2018-08-08 | Tool demo | Blackhat |
Expl-iot: IoT Security Testing and Exploitation Framework
| Aseem Jakhar | iotpentestredteam+2 |
| 2018-08-08 | Talk | Blackhat |
LTE Network Automation Under Threat
| Ravishankar Borgaonkar, Altaf Shaik | lte4gredteam+2 |
| 2018-08-08 | Tool demo | Blackhat |
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan | virtual-machineblueteamforensic+2 |
| 2018-03-22 | Tool demo | Blackhat |
Archery - Open Source Vulnerability Assessment and Management
| Anand Tiwari | pentestredteamblueteam+1 |
| 2018-03-22 | Tool demo | Blackhat |
Jackhammer - One Security Vulnerability Assessment/Management Tool
| Rajagopal Vr, Krishna Chaitanya Yarramsetty | pentestredteamblueteam+6 |
| 2018-03-22 | Talk | Blackhat |
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables
| Sumanth Naropanth, Kavya Racharla | wearablesblueteamredteam+2 |
| 2018-03-01 | Talk | Nullcon |
Unleashing D* on Android Kernel Drivers
| Aravind Machiry | androidmobilefuzzing+4 |
| 2017-12-06 | Tool demo | Blackhat |
EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK
| Aseem Jakhar | iotpentestredteam+2 |
| 2017-11-17 | Talk | Deepsec |
Intel AMT: Using & Abusing The Ghost In The Machine
| Parth Shukla | redteamblueteampurpleteam |
| 2017-10-19 | Talk | Hacklu |
Intel AMT: Using & Abusing the Ghost in the Machine
| Parth Shukla | redteamblueteampurpleteam |
| 2017-08-18 | Talk | C0c0n |
Mobile Banking (In)Security
| Sneha Rajguru | mobile-securityapplication-securitypurpleteam+2 |
| 2017-08-18 | Talk | C0c0n |
The card hack - Lessons from the Hitachi Payments Breach
| Saikat Datta | redteamblueteampurpleteam |
| 2017-07-30 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | secure-codingredteamblueteam+3 |
| 2017-07-29 | Tool demo | Defcon |
WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | wifiredteamblueteam+1 |
| 2017-07-28 | Tool demo | Defcon |
Android Tamer
| Anant Shrivastava | mobileandroidpentest+3 |
| 2017-07-27 | Workshop | Defcon |
Attacking and Defending 802.11ac Networks
| Vivek Ramachandran | 802.11wifiredteam+2 |
| 2017-07-27 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | mobileandroidpentest+3 |
| 2017-07-27 | Tool demo | Blackhat |
Gibber Sense
| Ajit Hatti | secure-codingreconnaissancecryptography+3 |
| 2017-07-26 | Talk | Blackhat |
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
| Ravishankar Borgaonkar, Altaf Shaik | redteamspyingmobile+4 |
| 2017-05-23 | Talk | Phdays |
Practical machine learning in infosecurity
| Anto Joseph | machine-learningredteamblueteam+1 |
| 2017-03-30 | Tool demo | Blackhat |
WiDy: WiFi 0wnage in Under $5
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | wifiredteamblueteam+1 |
| 2017-03-03 | Talk | Nullcon |
Case study of SS7/Sigtran assessment
| Akib Sayyed | ss7pentestblueteam+2 |
| 2016-11-04 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | secure-codingredteamblueteam+3 |
| 2016-08-19 | Talk | C0c0n |
Backdooring my Enemies with a Proxy for Threat Intelligence
| Jovin Lobo, Aditya Vasekar | purpleteamredteamblueteam |
| 2016-08-03 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | mobileandroidpentest+3 |
| 2016-04-01 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | mobileandroidpentest+3 |
| 2015-11-12 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | mobileandroidpentest+3 |
| 2015-08-08 | Talk | Defcon |
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
| Aditya K Sood | scadahmipentest+4 |
| 2015-08-08 | Talk | Defcon |
QARK: Android App Exploit and SCA Tool
| Tushar Dalvi | mobileandroidmetasploit+4 |
| 2015-08-05 | Tool demo | Blackhat |
QARK - Android Application SCA and Exploit Tool
| Tushar Dalvi | androidredteampentest+2 |
| 2015-03-27 | Talk | Blackhat |
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
| Preeti Subramanian | threat-intelligenceblueteamredteam+1 |
| 2015-03-26 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | owaspxssblueteam+3 |
| 2015-02-06 | Talk | Nullcon |
Attack and Defence in Radio and Communication Warfare
| Akib Sayyed | redteamblueteampurpleteam+2 |
| 2014-11-13 | Talk | Ground Zero Summit |
Making and Breaking Embedded Security
| Yashin Mehaboobe | redteamblueteampurpleteam |
| 2014-10-16 | Talk | Grrcon |
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design
| Aditya K Sood | redteamreverse-engineeringblueteam+1 |
| 2014-08-22 | Talk | C0c0n |
Breaking and Securing Mobile Apps - Automagically
| Aditya Gupta | mobilepurpleteam |
| 2014-08-22 | Talk | C0c0n |
Making and breaking security in embedded devices
| Yashin Mehaboobe | purpleteamredteamblueteam |
| 2014-08-06 | Talk | Blackhat |
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels!
| Aditya K Sood | botnetredteamblueteam+1 |
| 2014-02-15 | Tool demo | Nullcon |
OWASP Xenotix XSS Exploit Framerwork
| Ajin Abraham | owaspxssblueteam+3 |
| 2014-02-14 | Talk | Nullcon |
Attack of the setuid bit - pt_chown and pwning root terminals
| Siddhesh Poyarekar | glibcredteamblueteam+2 |
| 2014-02-14 | Talk | Nullcon |
phoneypdf: A Virtual PDF Analysis Framework
| Kiran Bandla | pdfweb-application-securityredteam+2 |
| 2013-08-01 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | owaspxssblueteam+3 |
| 2013-07-31 | Tool demo | Blackhat |
JMSDigger
| Gursev Singh Kalra | pentestredteamblueteam+1 |
| 2013-03-15 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | owaspxssblueteam+3 |
| 2013-03-01 | Talk | Nullcon |
Pawing the Droid: Twisting the ARM
| Divyanshu Shekhar, Anshul Kumar | androidmobilearm+8 |
| 2013-03-01 | Talk | Nullcon |
Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks
| Naga Rohit Samineni | ipv4mitmblueteam+2 |
| 2013-03-01 | Talk | Nullcon |
Vulnerability research anyone?
| Omair | redteamblueteampurpleteam |
| 2012-12-01 | Talk | Clubhack |
Hacking and Securing iOS applications
| Satish Bommisetty | redteamblueteampurpleteam+2 |
| 2012-09-27 | Talk | Grrcon |
Reversing Patches for Exploit Creation, Pen-Testing or Just Fun!
| Bharat Jogi | pentestredteamblueteam+2 |
| 2012-02-15 | Talk | Nullcon |
Content sniffing Algorithm bypassing techniques and possible attack vectors
| Anil Aphale, Chaitany Kamble | redteamxssweb-application-security+2 |
| 2012-02-15 | Talk | Nullcon |
Friction in the machine
| Dinesh Shenoy | redteamblueteampurpleteam |
| 2012-02-15 | Talk | Nullcon |
Node.js: The good, bad and ugly
| Bishan Singh | web-application-securityredteamblueteam+1 |
| 2011-12-04 | Talk | Clubhack |
Android Tamer
| Anant Shrivastava | mobileandroidpentest+3 |
| 2011-10-07 | Talk | C0c0n |
Web Application Backdoor Attack,Evasion and Detection
| Rahul Sasi | purpleteam |
| 2011-02-25 | Talk | Nullcon |
Future of cyber crimes: Limitations and Challenges
| Pratap Reddy | blueteamredteampurpleteam+1 |
| 2010-10-13 | Talk | Hitb Sec Conf |
Hacking a Browser’s DOM – Exploiting Ajax and RIA
| Shreeraj Shah | redteamweb-application-securityajax+3 |
| 2010-08-01 | Talk | C0c0n |
VoIP Security
| Mukund Krishnamurthy | purpleteamvoip |
| 2010-07-31 | Talk | Defcon |
WPA Too!
| Md Sohail Ahmad | wifiredteamblueteam+1 |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | secure-codingreverse-engineeringredteam+2 |
| 2008-08-20 | Talk | Owasp App Sec India |
Web 2.0 Attacks - Next Generation Threats on the Rise
| Shreeraj Shah | redteamblueteampurpleteam+3 |
| 2008-02-20 | Talk | Blackhat |
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
| Shreeraj Shah | redteamblueteampurpleteam+3 |
| 2007-04-05 | Talk | Hitb Sec Conf |
WEB 2.0 Hacking – Defending Ajax and Web Services
| Shreeraj Shah | redteamblueteampurpleteam+2 |
| 2007-03-30 | Talk | Blackhat |
Web Service Vulnerabilities
| Nish Bhalla | blueteampurpleteam |
| 2005-04-10 | Talk | Hitb Sec Conf |
Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection
| Pukhraj Singh | redteamblueteampurpleteam+1 |
| 2004-10-06 | Talk | Hitb Sec Conf |
Web Services - Attacks and Defense Strategies, Methods and Tools
| Shreeraj Shah | redteamblueteampurpleteam |
| 2002-10-03 | Talk | Blackhat |
Top Ten Web Attacks
| Saumil Shah | redteamblueteampurpleteam |