| 2021-08-06 | Panel | Defcon |
Adversary simulation, emulation or purple teaming - How would you define it?
| Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest | #security-testing#incident-management#red-teaming+3 |
| 2021-05-06 | Talk | Blackhat |
Threat Hunting in Active Directory Environment
| Anurag Khanna, Thirumalai Natarajan Muthiah | #blueteam#red-teaming#purpleteam |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | #linux#secure-coding#web-security+3 |
| 2019-12-04 | Talk | Blackhat |
ClusterFuzz: Fuzzing at Google Scale
| Abhishek Arya, Oliver Chang | #fuzzing#red-teaming#blueteam+1 |
| 2019-11-01 | Talk | Appsecdayaustralia |
A Purple Team View of Serverless and GraphQL Applications
| Abhay Bhargav | #red-teaming#blueteam#purpleteam+1 |
| 2019-10-14 | Talk | Hitbsecconf |
CALL OF DUTY: MODERN BROWSER WARFARE
| Dhiraj Mishra | #blueteam#red-teaming#purpleteam |
| 2019-10-14 | Talk | Hitbsecconf |
ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES
| Harshit Agrawal, Himanshu Mehta | #wifi#red-teaming#blueteam+1 |
| 2019-09-23 | Talk | Rootcon |
Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking)
| Arun Mane, Nikhil Bogam | #red-teaming#car-hacking#blueteam+1 |
| 2019-09-13 | Talk | Globalappsec |
A Purple Team View of Serverless and GraphQL Applications
| Abhay Bhargav | #purpleteam#cloud-workload-protection#serverless+3 |
| 2019-08-30 | Talk | Hitbsecconf |
COMMSEC: PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | #secure-coding#red-teaming#blueteam+1 |
| 2019-08-29 | Talk | Hitbsecconf |
Understanding, Attacking & Securing Medical Devices
| Ajay Pratap Singh | #red-teaming#blueteam#purpleteam |
| 2019-08-09 | Tool demo | Defcon |
EXPLIoT - IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | #security-assessment#red-teaming#blueteam+1 |
| 2019-08-08 | Tool demo | Blackhat |
EXPLIoT: IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | #security-assessment#red-teaming#blueteam+1 |
| 2019-08-07 | Tool demo | Blackhat |
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan, Kunal Aggarwal | #virtual-machine#blueteam#forensics+2 |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#wireshark#network-defense+4 |
| 2019-02-28 | Talk | Nullcon |
Attacking & Securing HealthCare Standards & hospital secured systems
| Ajay Pratap Singh | #red-teaming#blueteam#purpleteam |
| 2018-08-12 | Tool demo | Defcon |
Expl-iot—IoT Security Testing and Exploitation framework
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2018-08-09 | Talk | Defcon |
4G—Who is paying your cellular phone bill?
| Isha Singh, Dr Silke Holtmanns | #4g#ipx#red-teaming+2 |
| 2018-08-08 | Talk | Blackhat |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #red-teaming#vpn#blueteam+1 |
| 2018-08-08 | Tool demo | Blackhat |
Expl-iot: IoT Security Testing and Exploitation Framework
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2018-08-08 | Talk | Blackhat |
LTE Network Automation Under Threat
| Ravishankar Borgaonkar, Altaf Shaik | #lte#4g#red-teaming+2 |
| 2018-08-08 | Tool demo | Blackhat |
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan | #virtual-machine#blueteam#forensics+2 |
| 2018-03-22 | Tool demo | Blackhat |
Archery - Open Source Vulnerability Assessment and Management
| Anand Tiwari | #security-assessment#red-teaming#blueteam+1 |
| 2018-03-22 | Tool demo | Blackhat |
Jackhammer - One Security Vulnerability Assessment/Management Tool
| Rajagopal Vr, Krishna Chaitanya Yarramsetty | #security-assessment#red-teaming#blueteam+4 |
| 2018-03-22 | Talk | Blackhat |
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables
| Sumanth Naropanth, Kavya Racharla | #wearables#blueteam#red-teaming+1 |
| 2018-03-01 | Talk | Nullcon |
Unleashing D* on Android Kernel Drivers
| Aravind Machiry | #android#fuzzing#red-teaming+3 |
| 2017-12-06 | Tool demo | Blackhat |
EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2017-11-17 | Talk | Deepsec |
Intel AMT: Using & Abusing The Ghost In The Machine
| Parth Shukla | #red-teaming#blueteam#purpleteam |
| 2017-10-19 | Talk | Hacklu |
Intel AMT: Using & Abusing the Ghost in the Machine
| Parth Shukla | #red-teaming#blueteam#purpleteam |
| 2017-08-18 | Talk | C0c0n |
Mobile Banking (In)Security
| Sneha Rajguru | #appsec#purpleteam#red-teaming+1 |
| 2017-08-18 | Talk | C0c0n |
The card hack - Lessons from the Hitachi Payments Breach
| Saikat Datta | #red-teaming#blueteam#purpleteam |
| 2017-07-30 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | #secure-coding#red-teaming#blueteam+3 |
| 2017-07-29 | Tool demo | Defcon |
WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #wifi#red-teaming#blueteam+1 |
| 2017-07-28 | Tool demo | Defcon |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2017-07-27 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2017-07-27 | Tool demo | Blackhat |
Gibber Sense
| Ajit Hatti | #secure-coding#reconnaissance#encryption+3 |
| 2017-07-26 | Talk | Blackhat |
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
| Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert | #red-teaming#spying#3g+3 |
| 2017-05-23 | Talk | Phdays |
Practical machine learning in infosecurity
| Anto Joseph, Clarence Chio | #machine-learning#red-teaming#blueteam+1 |
| 2017-03-30 | Tool demo | Blackhat |
WiDy: WiFi 0wnage in Under $5
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #wifi#red-teaming#blueteam+1 |
| 2017-03-03 | Talk | Nullcon |
Case study of SS7/Sigtran assessment
| Akib Sayyed | #ss7#security-assessment#blueteam+2 |
| 2016-11-04 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | #secure-coding#red-teaming#blueteam+3 |
| 2016-08-19 | Talk | C0c0n |
Backdooring my Enemies with a Proxy for Threat Intelligence
| Jovin Lobo, Aditya Vasekar | #purpleteam#red-teaming#blueteam |
| 2016-08-03 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2016-04-01 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2015-11-12 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2015-08-08 | Talk | Defcon |
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
| Aditya K Sood | #scada#hmi#security-assessment+4 |
| 2015-08-08 | Talk | Defcon |
QARK: Android App Exploit and SCA Tool
| Tushar Dalvi, Tony Trummer | #android#metasploit#red-teaming+3 |
| 2015-08-05 | Tool demo | Blackhat |
QARK - Android Application SCA and Exploit Tool
| Tushar Dalvi | #android#red-teaming#security-assessment+2 |
| 2015-03-27 | Talk | Blackhat |
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
| Preeti Subramanian | #threat-intelligence-analysis#blueteam#red-teaming+1 |
| 2015-03-26 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2015-02-06 | Talk | Nullcon |
Attack and Defence in Radio and Communication Warfare
| Akib Sayyed | #red-teaming#blueteam#purpleteam+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Making and Breaking Embedded Security
| Yashin Mehaboobe | #red-teaming#blueteam#purpleteam |
| 2014-10-16 | Talk | Grrcon |
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#reverse-engineering#blueteam+1 |
| 2014-08-22 | Talk | C0c0n |
Breaking and Securing Mobile Apps - Automagically
| Aditya Gupta | #purpleteam#mobile-application-management#mobile-hacking+4 |
| 2014-08-22 | Talk | C0c0n |
Making and breaking security in embedded devices
| Yashin Mehaboobe | #purpleteam#red-teaming#blueteam |
| 2014-08-06 | Talk | Blackhat |
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels!
| Aditya K Sood | #botnet#red-teaming#blueteam+1 |
| 2014-02-15 | Tool demo | Nullcon |
OWASP Xenotix XSS Exploit Framerwork
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2014-02-14 | Talk | Nullcon |
Attack of the setuid bit - pt_chown and pwning root terminals
| Siddhesh Poyarekar | #glibc#red-teaming#blueteam+2 |
| 2014-02-14 | Talk | Nullcon |
phoneypdf: A Virtual PDF Analysis Framework
| Kiran Bandla | #pdf#web-security#red-teaming+2 |
| 2013-08-01 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2013-07-31 | Tool demo | Blackhat |
JMSDigger
| Gursev Singh Kalra | #security-assessment#red-teaming#blueteam+1 |
| 2013-03-15 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2013-03-01 | Talk | Nullcon |
Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks
| Naga Rohit Samineni | #ipv4#mitm#blueteam+2 |
| 2013-03-01 | Talk | Nullcon |
Vulnerability research anyone?
| Omair | #red-teaming#blueteam#purpleteam |
| 2012-12-01 | Talk | Clubhack |
Hacking and Securing iOS applications
| Satish Bommisetty | #red-teaming#blueteam#purpleteam+1 |
| 2012-02-15 | Talk | Nullcon |
Content sniffing Algorithm bypassing techniques and possible attack vectors
| Anil Aphale, Chaitany Kamble | #red-teaming#xss#web-security+2 |
| 2012-02-15 | Talk | Nullcon |
Friction in the machine
| Dinesh Shenoy | #red-teaming#blueteam#purpleteam |
| 2012-02-15 | Talk | Nullcon |
Node.js: The good, bad and ugly
| Bishan Singh | #web-security#red-teaming#blueteam+1 |
| 2011-12-04 | Talk | Clubhack |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2011-10-07 | Talk | C0c0n |
Web Application Backdoor Attack,Evasion and Detection
| Rahul Sasi | #purpleteam#application-pentesting#backdoor-detection+4 |
| 2011-02-25 | Talk | Nullcon |
Future of cyber crimes: Limitations and Challenges
| Pratap Reddy | #blueteam#red-teaming#purpleteam+1 |
| 2010-10-13 | Talk | Hitbsecconf |
Hacking a Browser’s DOM – Exploiting Ajax and RIA
| Shreeraj Shah | #red-teaming#web-security#ajax+3 |
| 2010-08-01 | Talk | C0c0n |
VoIP Security
| Mukund Krishnamurthy | #purpleteam#voip#sip+4 |
| 2010-07-31 | Talk | Defcon |
WPA Too!
| Md Sohail Ahmad | #wifi#red-teaming#blueteam+1 |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | #secure-coding#reverse-engineering#red-teaming+2 |
| 2008-08-20 | Talk | Owaspappsecindia |
Web 2.0 Attacks - Next Generation Threats on the Rise
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+3 |
| 2008-02-20 | Talk | Blackhat |
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+3 |
| 2007-04-05 | Talk | Hitbsecconf |
WEB 2.0 Hacking – Defending Ajax and Web Services
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+2 |
| 2007-03-30 | Talk | Blackhat |
Web Service Vulnerabilities
| Nish Bhalla | #blueteam#purpleteam#application-pentesting+4 |
| 2005-04-10 | Talk | Hitbsecconf |
Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection
| Pukhraj Singh | #red-teaming#blueteam#purpleteam+1 |
| 2004-10-06 | Talk | Hitbsecconf |
Web Services - Attacks and Defense Strategies, Methods and Tools
| Shreeraj Shah | #red-teaming#blueteam#purpleteam |
| 2002-10-03 | Talk | Blackhat |
Top Ten Web Attacks
| Saumil Shah | #red-teaming#blueteam#purpleteam |