🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Purpleteam

Focus Areas: 🛡️ Security Operations & Defense 🎯 Penetration Testing
84
Total Entries
69
Contributors

Top Contributors

Anant Shrivastava(6) Aseem Jakhar(5) Shreeraj Shah(5) Ajin Abraham(4) Aditya K Sood(3)

All Entries (84 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiahblueteamredteampurpleteam
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahanlinuxsecure-codingweb-application-security+3
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Aryafuzzingredteamblueteam+1
2019-11-01TalkApp Sec Day Australia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavredteamblueteampurpleteam+1
2019-10-14TalkHitb Sec Conf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishrablueteamredteampurpleteam
2019-10-14TalkHitb Sec Conf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehtawifiredteamblueteam+1
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil Bogamredteamcar-hackingblueteam+1
2019-09-13TalkGlobal App Sec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavpurpleteam
2019-08-30TalkHitb Sec Conf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshisecure-codingredteamblueteam+1
2019-08-29TalkHitb Sec Conf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singhredteamblueteampurpleteam
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwalvirtual-machineblueteamforensic+2
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangalevoipwiresharknetwork-security+4
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singhredteamblueteampurpleteam
2018-08-12Tool demoDefcon Expl-iot—IoT Security Testing and Exploitation framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-09TalkDefcon 4G—Who is paying your cellular phone bill? Presentation Video Isha Singh4gipxredteam+2
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeezredteamvpnblueteam+1
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaiklte4gredteam+2
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhanvirtual-machineblueteamforensic+2
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestredteamblueteam+1
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsettypentestredteamblueteam+6
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharlawearablesblueteamredteam+2
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiryandroidmobilefuzzing+4
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhariotpentestredteam+2
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shuklaredteamblueteampurpleteam
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shuklaredteamblueteampurpleteam
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajgurumobile-securityapplication-securitypurpleteam+2
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Dattaredteamblueteampurpleteam
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+3
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifiredteamblueteam+1
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-27WorkshopDefcon Attacking and Defending 802.11ac Networks Vivek Ramachandran802.11wifiredteam+2
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hattisecure-codingreconnaissancecryptography+3
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaikredteamspyingmobile+4
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Josephmachine-learningredteamblueteam+1
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifiredteamblueteam+1
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyedss7pentestblueteam+2
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+3
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekarpurpleteamredteamblueteam
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Soodscadahmipentest+4
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvimobileandroidmetasploit+4
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalviandroidredteampentest+2
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanianthreat-intelligenceblueteamredteam+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abrahamowaspxssblueteam+3
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyedredteamblueteampurpleteam+2
2014-11-13TalkGround Zero Summit Making and Breaking Embedded Security Presentation Yashin Mehabooberedteamblueteampurpleteam
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Soodredteamreverse-engineeringblueteam+1
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Guptamobilepurpleteam
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobepurpleteamredteamblueteam
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Soodbotnetredteamblueteam+1
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abrahamowaspxssblueteam+3
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekarglibcredteamblueteam+2
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandlapdfweb-application-securityredteam+2
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalrapentestredteamblueteam+1
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumarandroidmobilearm+8
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineniipv4mitmblueteam+2
2013-03-01TalkNullcon Vulnerability research anyone? Omairredteamblueteampurpleteam
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisettyredteamblueteampurpleteam+2
2012-09-27TalkGrrcon Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! Bharat Jogipentestredteamblueteam+2
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kambleredteamxssweb-application-security+2
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoyredteamblueteampurpleteam
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singhweb-application-securityredteamblueteam+1
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasipurpleteam
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddyblueteamredteampurpleteam+1
2010-10-13TalkHitb Sec Conf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shahredteamweb-application-securityajax+3
2010-08-01TalkC0c0n VoIP Security Mukund Krishnamurthypurpleteamvoip
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmadwifiredteamblueteam+1
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2008-08-20TalkOwasp App Sec India Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shahredteamblueteampurpleteam+3
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shahredteamblueteampurpleteam+3
2007-04-05TalkHitb Sec Conf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shahredteamblueteampurpleteam+2
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhallablueteampurpleteam
2005-04-10TalkHitb Sec Conf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singhredteamblueteampurpleteam+1
2004-10-06TalkHitb Sec Conf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shahredteamblueteampurpleteam
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shahredteamblueteampurpleteam