🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Reverse Engineering

Focus Area: 🦠 Malware Analysis
97
Total Entries
79
Contributors

Top Contributors

Jatin Kataria(6) Atul Alex(4) Amol Sarwate(3) Arun Mane(3) Parbati Kumar Manna(3)

All Entries (97 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat ARC – Artifact Reuse Comparator Rushikesh D Nandedkar#static-analysis#reverse-engineering#binary-analysis+3
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Manna#reverse-engineering#binary-analysis#code-analysis+4
2025-08-06Tool demoBlackhat ProcessInjection Source Code Chirag Savla#security-assessment#red-teaming#reverse-engineering+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashank, Bramwell Brizendine#reverse-engineering#exploitation#security-assessment+2
2025-08-06Tool demoBlackhat ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis Source Code Mohammed Tanveer#reverse-engineering#binary-analysis#static-analysis+3
2025-04-04TalkBlackhat Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM Presentation Vikas Gupta, Peter Garba#reverse-engineering#code-analysis#software-security
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Video Kartik Lalan#automotive-cybersecurity#reverse-engineering#security-assessment+1
2024-10-02TalkVirusbulletin Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study Presentation Whitepaper Video Sathwik RAM Prakki#reverse-engineering#apt#malware-reverse-engineering
2024-08-30TalkHitbsecconf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajput#web-security#security-assessment#exploitation+2
2024-08-29TalkHitbsecconf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasad, Joey Chen#reverse-engineering#security-assessment#incident-management
2024-08-15TalkUsenix TYGR: Type Inference on Stripped Binaries using Graph Neural Networks Presentation Whitepaper Video Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik#binary-analysis#reverse-engineering#deep-learning+1
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#reverse-engineering#architecture#security-assessment
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Presentation Shubham Dubey#reverse-engineering#exploitation#architecture
2023-09-23TalkNullcon Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers Presentation Video Rishit Bansal#reverse-engineering#linux#firmware-analysis
2023-09-23TalkNullcon The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis Presentation Video Nikhil Ashok Hegde#malware-detection#linux#dynamic-analysis+2
2023-08-24TalkHitbsecconf Hardware Backdooring an eScooter Video Arun Mane#reverse-engineering#ics-security#automotive-cybersecurity
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashank, Bramwell Brizendine#reverse-engineering#security-assessment#exploitation+2
2023-08-10TalkDefcamp Hardware Backdooring an e-Scooter Video Arun Mane#reverse-engineering#ics-security#automotive-cybersecurity
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwar#firmware-analysis#reverse-engineering#automotive-cybersecurity
2023-08-07TalkC0c0n Cellibrite Premium Mobile Forensic tool iPhone analysis Vaibhav Kumar#mobile-forensics#reverse-engineering#forensics+2
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakki#apt#reverse-engineering#incident-management
2023-08-07TalkC0c0n Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos Video Nikhil Prabhakar#android-security#reverse-engineering#dynamic-analysis
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Saini#architecture#security-training#reverse-engineering
2023-06-01TalkSecurityfest Bypassing Anti-Cheats & Hacking Competitive Games Video Rohan Aggarwal#reverse-engineering#appsec#endpoint-protection+4
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojan#embedded-security#firmware-analysis#security-assessment+1
2022-09-23TalkC0c0n Hacking SmartContracts Anto Joseph#smart-contracts#reverse-engineering#secure-coding
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwal#android-security#mobile-pentesting#reverse-engineering+2
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharma, Noushin Shabab#reverse-engineering#security-assessment#iot-pentesting
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Manna#reverse-engineering#dynamic-analysis#network-pentesting+4
2022-05-18TalkCansecwest Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shah#firmware-analysis#reverse-engineering#embedded-security
2021-11-13TalkC0c0n Decoding new age hackers and Criminal Investigation Amit Dubey#incident-management#digital-forensics#reverse-engineering
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgal#code-review#static-analysis#reverse-engineering+2
2021-11-12TalkC0c0n Dissecting Malicious Software and Analysis Shrutirupa Banerjiee#reverse-engineering#dynamic-analysis#static-analysis
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgal#threat-hunting#threat-modeling#architecture+1
2021-08-04Tool demoBlackhat ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing Source Code Parbati Kumar Manna#reverse-engineering#application-pentesting#code-review+4
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwad#red-teaming#security-assessment#reverse-engineering
2020-10-01Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jm, Akhil Mahendra#android#code-analysis#reverse-engineering+1
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Shelia#reverse-engineering#firmware-analysis#embedded-systems+4
2020-03-18TalkCansecwest The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shah#red-teaming#arm#firmware+4
2019-11-09TalkToorcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Ang Cui#reverse-engineering#hardware-reverse-engineering#architecture+2
2019-11-07TalkPowerofcommunity Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’?? Kushal Shah#vulnerability-assessment#fuzzing#reverse-engineering+2
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potluri#reverse-engineering#binary-analysis#exploitation+1
2019-10-12TalkTexascybersummit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshi#reverse-engineering#binary-analysis#executable-analysis+1
2019-10-03TalkVirusbulletin Curious tale of 8.t used by multiple campaigns against South Asia Niranjan Jayanand, Ivan Macalintal, Debalina Ghosh#reverse-engineering#apt#malware-reverse-engineering
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Rick Housley, Ang Cui#reverse-engineering#architecture#hardware-reverse-engineering+1
2019-08-09Award Thrangrycat - Pwnie Award for Most Under-Hyped Research Source Code Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#firmware-analysis+2
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Mane#automotive-cybersecurity#can-bus#ics-security+2
2018-10-10TalkBrucon Simplifying the art of instrumentation Krishnakant Patil, Rushikesh D Nandedkar#reverse-engineering#static-analysis#dynamic-analysis+2
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishra#reverse-engineering#dynamic-analysis#malware-research+1
2017-10-05TalkVirusbulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#security-assessment#firmware-analysis
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogi#dynamic-analysis#reverse-engineering#binary-analysis+1
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakhar#exploitation#security-assessment#reverse-engineering
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Video Praveen Vadnala, Lukasz Chmielewski#reverse-engineering#architecture#embedded-security
2016-11-06TalkGroundzerosummit Hacking The Droids Anto Joseph#android-security#reverse-engineering#security-assessment+2
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-10-05TalkVirusbulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#incident-management#endpoint-protection+3
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen#automated-exploit-detection#reverse-engineering#vulnerability-assessment+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-05-26TalkHitbsecconf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvi, Tony Trummer#android#ios#security-assessment+2
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singh, Lea Paul#security-assessment#ethical-hacking#privilege-escalation+2
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkar#security-assessment#reverse-engineering#hardware-hacking
2015-11-05TalkGroundzerosummit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jain#incident-management#reverse-engineering#security-assessment
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hatti#reverse-engineering#architecture#security-strategy
2015-08-01TalkC0c0n Reversing and Deciphering the Cyber Espionage Malware Communications Monnappa K A#reverse-engineering#decipher#malware-research+3
2015-03-15TalkHitbsecconf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobe#network-pentesting#packet-analysis#network-monitoring+2
2015-01-27TalkOwaspappseccalifornia Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#incident-management#architecture
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Sood, Dr. Richard J Enbody#red-teaming#reverse-engineering#blueteam+1
2014-09-26TalkVirusbulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiah, Anna Szalay#android-security#static-analysis#reverse-engineering
2014-09-18TalkAppsecusa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwate#reverse-engineering#memory-forensics#incident-management
2014-05-29TalkHitbsecconf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasi#red-teaming#iptv#reverse-engineering
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwate#reverse-engineering#security-assessment#security-testing
2014-01-28TalkOwaspappseccalifornia Application Sandboxes: Know thy limits Video Rahul Kashyap#application-pentesting#reverse-engineering#exploit-development
2013-10-19TalkToorcon Static Malware Analysis with PyTriage Presentation Yashin Mehaboobe#malware-detection#static-analysis#malware-research+1
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakhar#reverse-engineering#binary-analysis#assembly-analysis+2
2013-09-27TalkC0c0n Sandy - The Malicious Analysis Whitepaper Source Code Rahul Sasi#reverse-engineering#static-analysis#dynamic-analysis
2013-03-22TalkInsomnihack Guns and Smoke to fight Mobile Malware Ruchna Nigam#android-security#malware-research#reverse-engineering+2
2012-11-23TalkMalcon Surprise paper! Atul Alex#reverse-engineering#ios-security#mobile-hacking
2012-10-25TalkAppsecusa Cracking the Code of Mobile Application Video Sreenarayan Ashokkumar#reverse-engineering#mobile-pentesting#android-security+2
2012-10-23TalkHacklu Buster: Android Security Buster Atul Alex#android-security#reverse-engineering#mobile-malware
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halder#android-security#reverse-engineering#security-assessment+1
2012-08-03TalkC0c0n Cracking the Mobile Application Source Code Presentation Sreenarayan Ashokkumar#android#ios#blackberry+2
2012-08-03TalkC0c0n I haz you and pwn your maal Presentation Harsimran Singh Walia#android#reverse-engineering#forensics
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittal#post-exploitation#ethical-hacking#security-assessment+1
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Sood#botnet#web-security#reverse-engineering+1
2012-02-15TalkNullcon Binary God Presentation Video Atul Alex#red-teaming#emulator#assembler+2
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Presentation Jagadeesh Chandraiah#trojan#reverse-engineering#security-assessment
2011-08-03TalkBlackhat Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex Presentation Whitepaper Video Shreeraj Shah#reverse-engineering#ajax#web-security+1
2011-02-25TalkNullcon Reversing microsoft patches to reveal vulnerable code Presentation Whitepaper Harsimran Singh Walia#reverse-engineering#code-review#static-analysis+1
2010-10-29TalkT2 Hacking Femtocells Presentation Ravishankar Borgaonkar, Kevin Redon#reverse-engineering#device-security#hardware-embedded+3
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Ramesh#botnet#reverse-engineering#security-assessment
2010-06-18TalkSyscan REVERSE ENGINEERING WEB 2.0 APPLICATIONS Shreeraj Shah#reverse-engineering#ajax#web-security+1
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Varghese#red-teaming#reverse-engineering#exploit-development
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alex#secure-coding#reverse-engineering#red-teaming+2
2006-09-21TalkHitbsecconf Finding Secrets in ISAPI Presentation Nish Bhalla#secure-coding#reverse-engineering#application-pentesting+4