πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Redteam

Focus Area: 🎯 Penetration Testing
406
Total Entries
216
Contributors

Top Contributors

Saumil Shah(30) Nikhil Mittal(22) Shreeraj Shah(16) Rahul Sasi(14) Aseem Jakhar(11)

All Entries (406 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat RedInfraCraft : Automate Complex Red Team Infra Source Code Yash Bharadwaj, Manish Guptaredteam
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikhredteam
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savlaredteam
2024-04-18Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows Source Code Soumyanil Biswasredteam
2023-12-07Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Prateek Thakare, Bharath Kumar, Praveen Kanniahredteam
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvamredteam
2022-09-07TalkNullcon ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron Video Mohan Sri Rama Krishna Pedhapatiredteam
2022-08-11TalkBlackhat ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron Presentation Mohan Sri Rama Krishna Pedhapatiredteam
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiahblueteamredteampurpleteam
2020-10-07TalkRootcon Automating Threat Hunting on the Dark Web and other nitty-gritty thingso Presentation Video Apurv Singh Gautamdeep-webredteam
2020-10-07TalkRootcon How I Pwned the ICS data during my internship Presentation Shail Patelicsredteam
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwadiotredteampentest+1
2020-10-07TalkRootcon ReconPal: Leveraging NLP for Infosec Source Code Video Nishant Sharma, Jeswin Mathaireconredteamnlp+1
2020-09-18TalkC0c0n Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment Source Code Video Madhu Akulakubernetesredteam
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwadredteamiotpentest
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamathredteam
2020-08-22TalkThe Diana Initiative Internal Red Team Operations Framework - Building your practical internal Red Team Abhijith B Rredteam
2020-07-26TalkHitb Sec Conf Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company Himanshu Sharma, Aman Sachdevredteam
2020-03-18TalkCan Sec West The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shahredteamarmfirmware+5
2020-03-06Tool demoNullcon Callidus Source Code Chirag Savlaredteamcloud
2020-03-06Tool demoNullcon FRISPY Source Code Tejas Girme, Parmanand Mishraspywareredteam
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Guptaredteampentest
2020-03-06TalkNullcon Putting it all together: building an iOS jailbreak from scratch Presentation Video Umang Raghuvanshiiosmobilejailbreak+1
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shreesecure-codingawsamazon-cognito+5
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahanlinuxsecure-codingweb-application-security+3
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Aryafuzzingredteamblueteam+1
2019-11-01TalkApp Sec Day Australia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargavredteamblueteampurpleteam+1
2019-10-15TalkHitb Sec Conf Car Hacking: Practical Guide to Automotive Security Presentation Video Yogesh Ojharedteamcar-hacking
2019-10-14TalkHitb Sec Conf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishrablueteamredteampurpleteam
2019-10-14TalkHitb Sec Conf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehtawifiredteamblueteam+1
2019-09-27TalkC0c0n Detection of TOR Sources using Artificial Intelligence Roshy Johntorairedteam
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastavapentestredteamsecure-coding
2019-09-27TalkC0c0n Hacking ICS devices for Fun Arun Maneredteam
2019-09-27TalkC0c0n Offensive Machine Learning for Pentesters and Red Teams Tamaghna Basumachine-learningpentestredteam
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shreesecure-codingawsamazon-cognito+5
2019-09-23TalkRootcon Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking Video Arun Maneiotredteamics
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil Bogamredteamcar-hackingblueteam+1
2019-08-30TalkHitb Sec Conf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshisecure-codingredteamblueteam+1
2019-08-29TalkHitb Sec Conf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singhredteamblueteampurpleteam
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittalactive-directoryredteamwindows
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-09Tool demoDefcon PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Guptaredteampentest
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmaliotpentestredteam+2
2019-08-07TalkBlackhat New Vulnerabilities in 5G Networks Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik5gredteam4g+2
2019-08-07Tool demoBlackhat PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Guptaredteampentest
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwalvirtual-machineblueteamforensic+2
2019-05-21TalkPhdays Fuzzing 101 Dhiraj Mishra, Zubin Devnanifuzzingredteam
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshiredteammachine-learning
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Mageshredteamhardware
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Mageshhardwareredteamiot
2019-05-10TalkHitb Sec Conf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawalrfiotredteam
2019-05-09TalkHitb Sec Conf GDALR: Duplicating Black Box Machine Learning Models Presentation Video Rewanth Tammana, Nikhil Joshimachine-learningredteamcloud
2019-05-09TalkHitb Sec Conf HAXPO: WiCy: Monitoring 802.11AC Networks at Scale Presentation Video Vivek Ramachandranredteamwifi802.11ac
2019-03-29Tool demoBlackhat Halcyon IDE: Nmap Script Development IDE Source Code Sanoop Thomasreconnaissanceredteamnmap
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhunisecure-codingthreat_modelingredteam
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangalevoipwiresharknetwork-security+4
2019-03-21TalkTroopers Evolution of kernel fuzzers in NetBSD Presentation Video Siddharth Mredteamfuzzing
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjveredteam
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singhredteamblueteampurpleteam
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkarussdredteammobile
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokanredteamcryptography
2018-11-29TalkDeepsec DNS Exfiltration and Out-of-Band Attacks Video Nitesh Shilpkardnsredteam
2018-11-27TalkHitb Sec Conf BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit Presentation Source Code Video Rewanth Tammanaredteam
2018-11-27TalkHitb Sec Conf COMMSEC: Taking Over Telecom Networks Presentation Video Hardik Mehtaarchitectureredteamss7+2
2018-11-27TalkHitb Sec Conf Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit Presentation Video Himanshu Mehta, Sachine Waghmobileredteam
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Haritredteamiotwearables
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittalwindowsactive-directoryredteam
2018-10-05TalkC0c0n DNS Exfiltration and Out of Band Attacks Nitesh Shilpkarredteam
2018-10-05TalkC0c0n Unconventional vulnerabilities in Google Cloud Platform Pranav Venkatcloudgcpredteam
2018-09-27TalkRootcon Expl-iot: Hacking IoT like a boss Presentation Video Aseem Jakhariotredteam
2018-08-30TalkHitb Sec Conf Exploiting Automation in LTE Mobile Networks Presentation Whitepaper Video Ravishankar Borgaonkarmobile4glte+1
2018-08-12Tool demoDefcon Expl-iotβ€”IoT Security Testing and Exploitation framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Raocryptographyauthenticationipc+1
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-08-11Tool demoDefcon BLEMystiqueβ€”Affordable custom BLE target Source Code Nishant Sharma, Jeswin Mathaibleredteamwearables+1
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-09TalkDefcon 4Gβ€”Who is paying your cellular phone bill? Presentation Video Isha Singh4gipxredteam+2
2018-08-09Tool demoBlackhat OWASP Offensive Web Testing Framework Source Code Viyat Bhalodiaowasppentestredteam
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-08-08TalkBlackhat Back to the Future: A Radical Insecure Design of KVM on ARM Presentation Whitepaper Video Baibhav Singh, Rahul Kashyapredteamlinuxvirtual-machine+1
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeezredteamvpnblueteam+1
2018-08-08Tool demoBlackhat Damn Vulnerable iOS App: Swift Edition Source Code Prateek Gianchandaniiosmobilepentest+1
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhariotpentestredteam+2
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaiklte4gredteam+2
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhanvirtual-machineblueteamforensic+2
2018-08-08Tool demoBlackhat V2X Validation Tool Source Code Raashid Ansaripentestautomobileredteam
2018-06-29TalkHackinparis Hunting PBX for Vulnerabilities Presentation Video Himanshu Mehta, Sachin Waghmobileredteam
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwaripentestredteamblueteam+1
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsettypentestredteamblueteam+6
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharlawearablesblueteamredteam+2
2018-03-01TalkNullcon Abusing and Attacking Content Sharing Solutions Presentation Pratap Chandra Allenaredteammobilewifi+3
2018-03-01TalkNullcon Breaking Into Container Orchestrators Presentation Nadeem Hussainredteam
2018-03-01TalkNullcon DARWIN (A parasite covert wireless network) Video Rushikesh D Nandedkarwifiredteam
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyanredteam
2018-03-01TalkNullcon Software Supply Chain Cyberattack Presentation Samiran Ghatakredteamcyberattack
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiryandroidmobilefuzzing+4
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Haritredteamiot
2017-12-06TalkBlackhat DIFUZZING ANDROID KERNEL DRIVERS Presentation Whitepaper Video Aravind Machiryandroidredteammobile+3
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhariotpentestredteam+2
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shuklaredteamblueteampurpleteam
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shuklaredteamblueteampurpleteam
2017-09-13Talk44 Con Red Team Revenge : Attacking Microsoft ATA Presentation Video Nikhil Mittalwindowsredteam
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotraredteam
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Guptabluetoothredteam
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharmaiotredteam
2017-08-18TalkC0c0n Hunting the Hunters – Fighting CyberCrime at the Source Valan Sivasubramanianredteam
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajgurumobile-securityapplication-securitypurpleteam+2
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Dattaredteamblueteampurpleteam
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+3
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifiredteamblueteam+1
2017-07-29Tool demoDefcon WiMonitor - an OpenWRT package for remote WiFi sniffing Vivek Ramachandran, Nishant Sharma, Ashish Bhangaleopenwrtredteamsniffing+1
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-28Tool demoDefcon GibberSense Source Code Ajit Hatticryptographyredteampentest
2017-07-27WorkshopDefcon Attacking and Defending 802.11ac Networks Vivek Ramachandran802.11wifiredteam+2
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteampentest+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hattisecure-codingreconnaissancecryptography+3
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaikredteamspyingmobile+4
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thawaremachine-learningredteam
2017-05-23TalkPhdays How we hacked distributed configuration management systems Presentation Bharadwaj Machiraju, Francis Alexanderredteamfingerprinting
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Josephmachine-learningredteamblueteam+1
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteamwindows
2017-04-14TalkHitb Sec Conf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhariotredteam
2017-04-14TalkHitb Sec Conf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggalredteam
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Guptaredteam
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K Acode-injectionredteam
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangalewifiredteamblueteam+1
2017-03-15TalkCan Sec West Inside Stegosploit Presentation Saumil Shahsteganographyredteamexploit-delivery
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyedss7pentestblueteam+2
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumarrfidredteam
2017-03-03TalkNullcon Hacking medical devices and infrastructure Presentation Video Anirudh Duggalredteam
2016-11-05TalkHackfest LockPicker: Leaking data from live LUKS partition Adhokshaj Mishralinuxredteamhardware
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kottedosredteam
2016-11-04TalkBlackhat Randomization Can’t Stop BPF JIT Spray Presentation Whitepaper Video N Asokanlinuxredteam
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+3
2016-09-23TalkRootcon Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomassecure-codingreconnaissanceredteam+1
2016-08-19TalkC0c0n Abusing Digital Certificates : Malware Style Ajit Hattiredteam
2016-08-19TalkC0c0n Attacking and crashing IOT devices via Bluetooth LE Protocol Presentation Pratap Chandra Allena, Ajay Pratap Singhiotbluetoothredteam
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekarpurpleteamredteamblueteam
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratapredteam
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikarxssredteam
2016-08-19TalkC0c0n Evading Corporate Security – You’re as secure as the weakest link Prajwal Panchmahalkarredteam
2016-08-06Tool demoDefcon Android-InsecureBank Source Code Dinesh Shettyandroidredteammobile
2016-08-04Tool demoBlackhat Droid-FF: Android Fuzzing Framework Source Code Anto Josephandroidfuzzingsecure-coding+2
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-08-03Tool demoBlackhat Android-InsecureBankv2 Source Code Dinesh Shettyandroidredteammobile
2016-08-03TalkBlackhat AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It Presentation Nikhil Mittalwindowsamsipowershell+1
2016-08-03Tool demoBlackhat Nishang: The Goodness of Offensive PowerShell Source Code Nikhil Mittalwindowsredteampowershell
2016-05-26TalkHitb Sec Conf HITB Lab: Droid-FF: The First Android Fuzzing Framework Presentation Source Code Anto Josephmobileandroidfuzzing+1
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggalredteamfingerprinting
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2016-04-01Tool demoBlackhat HackSys Extreme Vulnerable Driver Presentation Whitepaper Source Code Ashfaq Ansariredteampentestwindows
2016-04-01Tool demoBlackhat Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Sanoop Thomasreconnaissanceredteamnmap
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggalredteamblueteam
2016-03-11TalkNullcon Hitchhiker’s guide to hacking Industrial Control systems (ICS) Arun Maneredteamicshid
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiryredteampentest
2016-03-11TalkNullcon Privacy leaks on 4G-LTE networks Presentation Altaf Shaikredteam4glte+1
2015-11-19TalkDeepsec Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. Video Nikhil Mittalredteam
2015-11-13TalkBlackhat LTE & IMSI Catcher Myths Presentation Whitepaper Video Ravishankar Borgaonkar, N Asokan, Altaf Shaiklteredteamimsi
2015-11-13TalkBlackhat Continuous Intrusion: Why CI tools are an Attacker’s Best Friends Presentation Video Nikhil Mittalredteamci
2015-11-12Tool demoBlackhat Android InsecureBank Source Code Dinesh Shettyandroidredteammobile
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastavamobileandroidpentest+3
2015-11-12Tool demoBlackhat Kautilya: Fastest shells you will ever get Source Code Nikhil Mittalhidredteamwindows
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittalwindowsredteam
2015-11-12TalkBlackhat Stegosploit - Exploit Delivery with Steganography and Polyglots Presentation Source Code Video Saumil Shahredteamsteganography
2015-11-05TalkGround Zero Summit Browser based Malware attacks Harsh Daftarymalwareredteam
2015-11-05TalkGround Zero Summit Hacking RFIDs under 2000INR Jayesh Chauhanrfidredteam
2015-11-05TalkGround Zero Summit Thanks for the free cookies Anshul Saxena, Nishant Yadavredteam
2015-10-21TalkHacklu Stegosploit - Delivering Drive-By Exploits With Only Images Presentation Saumil Shahredteam
2015-09-11Talk44 Con Stegosploit – Drive-by Browser Exploits using only Images Presentation Source Code Video Saumil Shahsteganographyredteamweb-application-security+1
2015-08-28Tool demoBlackhat Damn Vulnerable iOS App (DVIA) Source Code Prateek Gianchandaniiosmobilepentest+1
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Soodscadahmipentest+4
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvimobileandroidmetasploit+4
2015-08-06Tool demoBlackhat Kautilya Source Code Nikhil Mittalhidredteamwindows
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalviandroidredteampentest+2
2015-08-01TalkC0c0n A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. Riyaz Walikarwindowsredteampentest
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddiredteam
2015-07-06TalkBlackhat DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS Presentation Video Ahamed Nafeezredteam
2015-05-29TalkHitb Sec Conf Hacking Samsung’s Tizen: The OS of Everything Presentation Whitepaper Ajin Abrahamosmobilewearables+1
2015-05-29TalkHitb Sec Conf PowerShell for Penetration Testers Presentation Nikhil Mittalredteamwindowspowershell+1
2015-05-28TalkHitb Sec Conf Stegosploit: Hacking With Pictures Presentation Saumil Shahredteamsteganographyweb-application-security
2015-05-26TalkPhdays iOS Application Exploitation Presentation Prateek Gianchandanimobileiosredteam
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanianthreat-intelligenceblueteamredteam+1
2015-03-27TalkSyscan Stegosploit - Hacking with Pictures Presentation Video Saumil Shahsteganographyredteamweb-application-security+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abrahamowaspxssblueteam+3
2015-03-26TalkBlackhat The underground Ecosystem of Credit Card frauds Presentation Whitepaper Video Abhinav Singhredteam
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwateredteam
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyedredteamblueteampurpleteam+2
2015-02-06TalkNullcon Drone Attacks: How I hijacked a drone Presentation Video Rahul Sasiredteamdronegps+3
2015-02-06TalkNullcon Hacking Tizen: The OS of Everything Presentation Video Ajin Abrahamosmobilewearables+1
2014-11-13TalkGround Zero Summit Attacking Cryptography & PKI Implementations Ajit Hatticryptographyredteam
2014-11-13TalkGround Zero Summit Security vulnerabilities in DVB-C networks: Hacking Cable TV network Rahul Sasiredteamdvb-c
2014-11-13TalkGround Zero Summit Attacking Web-Proxies like never before Ahamed Nafeezredteam
2014-11-13TalkGround Zero Summit Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF Bhaumik Merchantredteam
2014-11-13TalkGround Zero Summit Fuzzing Asynchronous Protocols built over Websockets Lavakumar Kuppanfuzzingredteam
2014-11-13TalkGround Zero Summit Hacking consumer electronics for Fun Atul Alexredteam
2014-11-13TalkGround Zero Summit How I won Browser Fuzzing Amol Naikfuzzingredteam
2014-11-13TalkGround Zero Summit Making and Breaking Embedded Security Presentation Yashin Mehabooberedteamblueteampurpleteam
2014-11-13TalkGround Zero Summit SCADA Exploitation through Firmware Ashish Saxenaredteam
2014-11-13TalkGround Zero Summit Vulnerability Reproduction using Zest Deep Shahredteam
2014-10-29TalkEkoparty Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 Presentation Video Rahul Sasiredteamdvb-c
2014-10-23TalkHacklu Hacking with Images - Evil Pictures Presentation Saumil Shahredteamsteganography
2014-10-23TalkHacklu WiHawk - Router Vulnerability Scanner Source Code Anamika Singhwifiredteam
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Soodredteamreverse-engineeringblueteam+1
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkarimsimobileredteam
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittalpowershellredteam
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasiredteam
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishracryptographyredteam
2014-08-22TalkC0c0n Exploiting NoSQL Like Never Before Francis Alexanderredteam
2014-08-22TalkC0c0n Hacking Communication Akib Sayyedredteam
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautambug-huntingredteam
2014-08-22TalkC0c0n Lesser Known Attack - XML Injection Amol Naikredteam
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobepurpleteamredteamblueteam
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Soodredteampentest
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Soodbotnetredteamblueteam+1
2014-05-29TalkHitb Sec Conf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasiredteamiptvreverse-engineering
2014-05-29TalkHitb Sec Conf LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit Presentation Rahul Kashyapredteamwindowskernel
2014-05-21TalkPhdays Android Exploitation Video Aditya Guptamobileandroidredteam+3
2014-03-27TalkBlackhat JS Suicide: Using JavaScript Security Features to Kill JS Security Presentation Video Ahamed Nafeezweb-application-securityredteamcsrfguard+1
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexanderredteam
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abrahamowaspxssblueteam+3
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekarglibcredteamblueteam+2
2014-02-14TalkNullcon Attacking WPA/WPA2 in the Cloud Presentation Video Vivek Ramachandranwifiwpa2cloud+1
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeezredteam
2014-02-14TalkNullcon Hardware Attack Vectors Presentation Video Yashin Mehaboobehardwareredteamhid+1
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandlapdfweb-application-securityredteam+2
2014-02-14TalkNullcon Wi-Hawk Password Auditing Tool Presentation Source Code Anamika Singhwifiredteam
2013-11-07TalkGround Zero Summit Abusing Google Apps: Google is my command and control center Presentation Ajin Abrahamandroidmobileredteam
2013-11-07TalkGround Zero Summit Setting the Data Center on fire Ajit Hattiredteam
2013-09-27TalkC0c0n Blur Captcha Anirudh Duggal, Abhinav Mohantyredteam
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil P Kulkarniredteam
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhanredteamsecure-coding
2013-09-27TalkC0c0n Lets Play - Applanting on new Grounds Ajit Hattiandroidredteamcsrf+1
2013-09-27TalkC0c0n Pwning WiFi Devices! Swaroop Yermalkarwifiredteam
2013-09-27TalkC0c0n SSRF / XSPA - Real World Attacks and Mitigations Riyaz Walikarssrfxsparedteam
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Haldermobileandroidredteam
2013-08-03TalkDefcon PowerPreter: Post Exploitation Like a Boss Presentation Source Code Video Nikhil Mittalredteampowershellwindows
2013-08-01TalkBlackhat Hot knives through butter: Bypassing automated analysis systems Presentation Whitepaper Video Abhishek Singhredteam
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-07-31TalkBlackhat Clickjacking revisited: A perceptual view of UI security Presentation Video Devdatta Akhaweclickjackingblueteamredteam
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalrapentestredteamblueteam+1
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abrahamowaspxssblueteam+3
2013-03-15Tool demoBlackhat Prasadhak (And Offensive Powershell) Source Code Nikhil Mittalpowershellwindowsredteam
2013-03-14TalkBlackhat Lets play - Applanting Presentation Whitepaper Video Ajit Hattimobileredteamcsrf+2
2013-03-12TalkTroopers Dirty use of USSD Codes in Cellular Network Presentation Ravishankar Borgaonkarredteam
2013-03-07TalkCan Sec West SMS to Meterpreter - Fuzzing USB Modems Presentation Whitepaper Rahul Sasiredteamfuzzing
2013-03-01TalkNullcon Capturing Zero-Day Information Video Dinesh O Bareja, Sumit Sharmazero-dayredteam
2013-03-01TalkNullcon Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework Presentation Video Ajin Abrahamxssredteam
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumarandroidmobilearm+8
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineniipv4mitmblueteam+2
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasiredteamfuzzing
2013-03-01TalkNullcon Vulnerability research anyone? Omairredteamblueteampurpleteam
2012-12-06TalkBlackhat Attacking ODATA Presentation Whitepaper Source Code Gursev Singh Kalraredteam
2012-12-06TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Shreeraj Shahredteam
2012-12-06TalkBlackhat Poking servers with Facebook(and other web applications) Presentation Whitepaper Source Code Riyaz Walikarxsparedteam
2012-12-06TalkBlackhat The art of exploiting logical flaws in web apps Presentation Whitepaper Sumit Siddharthredteamsecure-coding
2012-12-05TalkBlackhat Droid Exploitation Saga Presentation Whitepaper Source Code Aditya Gupta, Subho Haldermobileandroidredteam
2012-12-01TalkClubhack Content-Type attack -Dark hole in the secure environment Presentation Video Raman Guptaredteam
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abrahamxssredteam
2012-12-01TalkClubhack FatCat Web Based SQL Injector Presentation Source Code Video Sandeep Kamblesqliredteam
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisettyredteamblueteampurpleteam+2
2012-12-01TalkClubhack Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Haldermobilenfcredteam
2012-11-29TalkDeepsec Bad Things in Good Packages - Creative Exploit Delivery Presentation Saumil Shahredteam
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumarmalwareandroidmobile+1
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhatredteam
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawdewindows-phoneredteammalware
2012-10-11TalkHitb Sec Conf XSS & CSRF strike back – Powered by HTML5 Presentation Shreeraj Shahredteamcsrfcors+1
2012-10-10TalkHitb Sec Conf Innovative Approaches to Exploit Delivery Video Saumil Shahredteamexploit-delivery
2012-09-27TalkGrrcon Isn’t it all just SMS-sending trojans?: Real advances in Android Malware Presentation Video Jimmy Shahmobileandroidredteam
2012-09-27TalkGrrcon Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! Bharat Jogipentestredteamblueteam+2
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Soodredteambotnet
2012-09-26TalkNullcon Highly Harmful Audio Waves aka DTMF Fuzzing Video Rahul Sasidtmfredteam
2012-09-20TalkEkoparty Dirty use of USSD Codes in Cellular Network Whitepaper Video Ravishankar Borgaonkarredteam
2012-09-20TalkEkoparty Fuzzing DTMF Input Processing Algorithms Source Code Rahul Sasifuzzingredteamdtmf
2012-08-03TalkC0c0n Evil JavaScript Bishan Singhredteamweb-application-security
2012-08-03TalkC0c0n WebApp Remote Code Execution using Server Side Scripting Engines Presentation Rahul Sasiredteampentest
2012-07-26TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Video Shreeraj Shahredteamcorscsrf+3
2012-03-21TalkTroopers More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard Presentation Source Code Nikhil Mittalpentestredteam
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasiredteamivrs
2012-03-16TalkBlackhat The Pwnage Saga Continues Presentation Video Nikhil Mittalhidredteam
2012-03-14TalkBlackhat Hacking XPATH 2.0 Presentation Whitepaper Video Sumit Siddharthredteam
2012-03-14TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Video Shreeraj Shahredteamcorscsrf+3
2012-02-15TalkNullcon Attacking Backup Software Video Nibin Vargheseredteam
2012-02-15TalkNullcon Binary God Presentation Video Atul Alexredteamemulatorassembler+2
2012-02-15TalkNullcon CAPTCHAs for fun and Profit Video Gursev Singh Kalraredteam
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kambleredteamxssweb-application-security+2
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoyredteamblueteampurpleteam
2012-02-15TalkNullcon Haxdroid: Empowering Android Handset Video Anant Shrivastava, Prashant Mahajan, Pardhasaradhi Chandroidmobilepentest+1
2012-02-15TalkNullcon IVR Security: Internal Network attacks via phone lines Video Rahul Sasiivrsredteam
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singhweb-application-securityredteamblueteam+1
2012-02-15TalkNullcon Your phone is your phone but your calls are now my calls Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwalmobileredteam
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittalhidredteam
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastavamobileandroidpentest+3
2011-12-04TalkClubhack DOM XSS – Encounters of the 3rd Kind Presentation Video Bishan Singhxssredteam
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soiredteamexploit-kit
2011-12-04TalkClubhack Hacking your Droid Presentation Aditya Guptaredteamandroidmobile
2011-12-04TalkClubhack Handle Exploitation of Remote System From Email Account Presentation Bhaumik Merchantredteam
2011-12-04TalkClubhack Mere paas Teensy hai Presentation Nikhil Mittalhidredteampentest
2011-12-04TalkClubhack One Link Facebook Presentation Anand Pandeyredteam
2011-11-25TalkMalcon Advanced Malware for Apple Products Atul Alexmalwareredteammac-os+1
2011-11-25TalkMalcon Mareech : Look it’s a HID made up of gold Nikhil Mittalhidredteammalware
2011-11-04TalkHackfest Here are your keystrokes Nikhil Mittalredteamkeyloggingpentest+1
2011-10-13TalkHitb Sec Conf Femtocells: A Poisonous Needle in the Operator’s Hay Stack Presentation Video Ravishankar Borgaonkar3gredteam
2011-10-07TalkC0c0n Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications Riyaz Walikarredteam
2011-10-07TalkC0c0n Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution Presentation Ahamed Nafeezredteam
2011-10-07TalkC0c0n Runtime thread injection and execution in Linux processes Aseem Jakharlinuxredteam
2011-10-07TalkC0c0n Wi-Fi Malware for Fun and Profit Vivek Ramachandranredteam
2011-09-19TalkBrucon Botnets and Browsers, Brothers in a Ghost Shell Presentation Aditya K Soodbotnetredteam
2011-09-19TalkHacklu Linux thread injection - The jugaad way Source Code Aseem Jakharlinuxthread-injectionredteam
2011-09-19TalkHacklu The travelling hacksmith Saumil Shahredteam
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandranwifiredteam
2011-09-16TalkGrrcon Mobile App Moolah: Profit taking with Mobile Malware Presentation Video Jimmy Shahmobileredteam
2011-09-07TalkSecuritybyte Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit Presentation Vivek Ramachandranwifiwormbotnet+1
2011-09-06TalkSecuritybyte Botnets at Application+ layer Presentation Raj Shastrakarbotredteam
2011-08-05TalkDefcon Jugaad – Linux Thread Injection Kit Presentation Source Code Video Aseem Jakharlinuxthread-injectionredteam
2011-05-20TalkHitb Sec Conf Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) Presentation Shreeraj Shahredteamcorscsrf+3
2011-03-30TalkTroopers Femtocell: Femtostep to the Holy Grail Presentation Ravishankar Borgaonkarredteam
2011-02-25TalkNullcon Buffer Under Run Exploits Presentation Saurabh Sharma, Chinmaya Kamalbuffer-underrunbuffer-underflowredteam
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekarsurveillanceredteam
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddyblueteamredteampurpleteam+1
2011-02-25TalkNullcon Fuzzing with complexities Presentation Whitepaper Video Vishwas Sharmafuzzingredteam
2011-02-25TalkNullcon JSON Fuzzing: New approach to old problems Presentation Whitepaper K v Prashant, Tamaghna Basufuzzingredteam
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakharlinuxmalwareredteam
2011-02-25TalkNullcon Lessons Learned From 2010 Presentation Video Saumil Shahredteamexploit-delivery
2011-02-25TalkNullcon Penetration Testing a Biometric System Presentation Whitepaper Video Rahul Sasipentestbiometrichid+1
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuruevmredteam
2010-12-04TalkClubhack Attacking with HTML5 Presentation Lavakumar Kuppanredteam
2010-12-04TalkClubhack Data theft in India Presentation K K Mookheydata-leakredteamcyber-crime
2010-10-27TalkHacklu Exploit Delivery - Tricks and Techniques Presentation Saumil Shahredteamexploit
2010-10-14TalkHitb Sec Conf Exploit Delivery Presentation Saumil Shahredteamexploit
2010-10-13TalkHitb Sec Conf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shahredteamweb-application-securityajax+3
2010-08-01TalkC0c0n Client Side Exploits using PDF Presentation Ankur Bhargava, Tamaghna Basuredteam
2010-08-01TalkC0c0n Code Disclosure over HTTP Anant Kochharredteam
2010-08-01TalkC0c0n Wireless MITM Prashant Mahajanredteam
2010-08-01TalkC0c0n Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle Praseed Paiwindowsredteam
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmadwifiredteamblueteam+1
2010-07-29TalkBlackhat Hacking Browser’s DOM - Exploiting Ajax and RIA Presentation Whitepaper Shreeraj Shahredteamajax
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharthredteam
2010-07-01TalkHitb Sec Conf The Travelling Hacksmith 2009 – 2010 Saumil Shahredteam
2010-07-01TalkHitb Sec Conf Top 10 Web 2.0 Attacks and Exploits Presentation Shreeraj Shahredteamcorscsrf+3
2010-04-21TalkHitb Sec Conf Web Security – Going Nowhere? Presentation Saumil Shahredteam
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindanesecure-codingredteampentest
2010-02-25TalkNullcon Software Fuzzing with Wireplay. Presentation Whitepaper Source Code Abhisek Dattafuzzingredteam
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppanphishingredteam
2010-02-25TalkNullcon Intelligent debugging and in memory fuzzing. Presentation Vishwas Sharma, Amandeep Bhartifuzzingdebuggingredteam
2010-02-25TalkNullcon Steganography & Stegananalysis: A Technical & Psychological Perspective Presentation Prince Komal Boonlia, Reena Bhansalisteganographysteganalysisredteam
2010-02-03TalkBlackhat Beware of Serialized GUI Objects Bearing Data Presentation Rohini Sulatyckiapache-myfacessun-mojarraredteam+1
2009-12-05TalkClubhack Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppanwifiredteam
2009-11-19TalkDeepsec Ownage 2.0 Presentation Saumil Shahredteam
2009-11-18TalkSecuritybyte Cloud Hacking – Distributed Attack & Exploit Platform Shreeraj Shahcloudredteam
2009-11-18TalkSecuritybyte Hacking Oracle From Web Presentation Sumit Siddharthredteam
2009-11-17TalkSecuritybyte Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumarwindowsredteam
2009-10-28TalkHacklu Ownage 2.0 Saumil Shahredteam
2009-10-07TalkHitb Sec Conf How to Own the World – One Desktop at a Time Presentation Video Saumil Shahsocial-engineeringredteamfirewall
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyaniwifihoneypotphishing+1
2009-08-01TalkDefcon The Making of the second SQL injection Worm Presentation Source Code Video Sumit Siddharthsqliredteamworm
2009-07-31TalkDefcon Advancing Video Application Attacks with Video Interception, Recording, and Replay Presentation Video Arjun Sambamoorthyredteam
2009-07-29TalkBlackhat Psychotronica: Exposure, Control, and Deceit Presentation Nitesh Dhanjaniredteamreconnaissance
2009-04-22TalkTroopers Browser Design Flaws – Hacking by Breaking in Architectures Presentation Aditya K Soodredteam
2009-04-22TalkHitb Sec Conf Pwnage 2.0 Presentation Saumil Shahhidredteam
2009-04-22TalkTroopers SQL Injections: More Fun and Profit Presentation Sumit Siddharthredteam
2009-04-22TalkHitb Sec Conf Vbootkit 2.0: Attacking Windows 7 via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumarwindowsredteamboot-sector
2008-12-06TalkClubhack Hacking Client Side Insecurities Presentation Aditya K Soodredteam
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohlisecure-developmentsecure-codingblueteam+1
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Vargheseredteamreverse-engineeringexploit-development
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2008-11-13TalkDeepsec Game of Web 2.0 Security - Attacking Next Generation Apps Shreeraj Shahredteam
2008-10-29TalkHitb Sec Conf Browser Exploits - A New Model for Browser Security Video Saumil Shahredteam
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Saumil Shahredteam
2008-08-20TalkOwasp App Sec India Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shahredteamblueteampurpleteam+3
2008-08-09TalkDefcon Autoimmunity Disorder in Wireless LAN Presentation Video Jvr Murthy, Amit Vartak, Md Sohail Ahmadwifilanredteam
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Guptaredteamrdp
2008-03-26TalkCan Sec West Vulnerabilities Die Hard Kowsik Guruswamyredteam
2008-02-20TalkBlackhat Hacking VoIP through IPSec Tunnels Whitepaper Sachin Joglekar, Sudeep Patwardhanvoipredteam
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shahredteamblueteampurpleteam+3
2007-12-19TalkClubhack Backdoor 2.0: Hacking Firefox to steal his web secrets Presentation Sunil Aroraredteam
2007-12-09TalkClubhack Analysis of Adversarial Code: The Role of Malware Kits! Presentation Rahul Mohandasredteam
2007-12-09TalkClubhack Hacking Web 2.0 Art and Science of Vulnerability Detection Presentation Shreeraj Shahredteam
2007-12-09TalkClubhack Legiment Techniques of IPS/IDS Evasion Presentation Ajit Hattiredteam
2007-12-09TalkClubhack Vulnerabilities in VoIP Products and Services Whitepaper Gaurav Sahavoipredteam
2007-09-06TalkHitb Sec Conf Hacking Ajax and Web Services Γ’β‚¬β€œ Next Generation Web Attacks on the Rise Presentation Video Shreeraj Shahredteamajaxweb-application-security
2007-08-04TalkDefcon The Emperor Has No Cloak - WEP Cloaking Exposed Presentation Whitepaper Video Vivek Ramachandranwifiredteamaircrack
2007-08-02TalkBlackhat Breaking C++ Applications Whitepaper Neel Mehtaredteamsecure-coding
2007-08-01TalkBlackhat Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones Whitepaper Krishna Kurapatiwifivoipmobile+1
2007-04-18TalkCan Sec West Low-Rate Denial-of-Service attacks Anil Kumarredteamdos
2007-04-05TalkHitb Sec Conf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shahredteamblueteampurpleteam+2
2007-03-29TalkBlackhat Vboot Kit: Compromising Windows Vista Security Presentation Whitepaper Nitin Kumar, Vipin Kumarwindowsredteamkernel
2006-11-29TalkPac Sec Smashing Heap by Free Simulation Presentation Sandip Chaudhariheapredteam
2006-10-19TalkHacklu Smashing Heap by Free Simulation: Sandip Chaudhariheapredteam
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shahmetasploitredteam
2006-09-21TalkHitb Sec Conf Smashing the Stack for Profit - Period Presentation Video Rohyt Belaniredteam
2006-04-13TalkHitb Sec Conf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shahmetasploitredteam
2005-09-29TalkHitb Sec Conf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belaniredteam
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwalthreat_modelingredteam
2005-07-27TalkBlackhat iSCSI Security (Insecure SCSI) Presentation Himanshu Dwivediredteamiscsinetwork-storage
2005-04-10TalkHitb Sec Conf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singhredteamblueteampurpleteam+1
2005-03-31TalkBlackhat Defeating Automated Web Assessment Tools Presentation Saumil Shahredteam
2004-10-06TalkHitb Sec Conf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shahredteamblueteampurpleteam
2004-07-28TalkBlackhat Defeating Automated Web Assessment Tools Video Saumil Shahredteam
2003-12-12TalkHitb Sec Conf New Generation Frauds Yerra Ravi Kiran Rajufraudredteammoney-laundering
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shahredteamblueteampurpleteam
2001-11-21TalkBlackhat One-Way SQL Hacking : Futility of Firewalls in Web Hacking Presentation Video Saumil Shahfirewallredteam
2001-04-26TalkBlackhat Web Hacking Presentation Saumil Shahredteam
2001-02-14TalkBlackhat Web Hacking Presentation Video Saumil Shahredteam