🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Reverse Engineering

Focus Areas: 🦠 Malware Analysis 🔬 Reverse Engineering
91
Total Entries
77
Contributors

Top Contributors

Jatin Kataria(5) Atul Alex(4) Amol Sarwate(3) Parbati Kumar Manna(3) Rushikesh D Nandedkar(3)

All Entries (91 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07TalkBlackhat Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing Kanika Guptareverse-engineeringfirmware-analysismobile-security+2
2025-08-06Tool demoBlackhat ARC – Artifact Reuse Comparator Rushikesh D Nandedkarstatic-analysisreverse-engineeringbinary-analysis+3
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Mannareverse-engineeringbinary-analysiscode-analysis+4
2025-08-06Tool demoBlackhat ProcessInjection Chirag Savlapentestingred-teamingreverse-engineering+1
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashankreverse-engineeringexploitationpentesting+3
2025-08-06Tool demoBlackhat ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis Mohammed Tanveerreverse-engineeringbinary-analysisstatic-analysis+3
2025-04-04TalkBlackhat Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM Presentation Vikas Guptareverse-engineeringcode-analysissoftware-security
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Kartik Lalanautomotive-cybersecurityvulnerability-managementreverse-engineering+2
2024-10-02TalkVirus Bulletin Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study Presentation Whitepaper Video Sathwik RAM Prakkireverse-engineeringvulnerability-managementapt+1
2024-08-30TalkHitb Sec Conf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajputweb-securitypentestingexploitation+4
2024-08-29TalkHitb Sec Conf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasadreverse-engineeringpentestingincident-response
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayreverse-engineeringvulnerability-managementsecurity-architecture+1
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Shubham Dubeyvulnerability-managementreverse-engineeringexploitation+1
2023-09-23TalkNullcon Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers Presentation Video Rishit Bansalreverse-engineering
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashankreverse-engineeringpentestingexploitation+3
2023-08-10TalkDefcon Hardware Backdooring an e-Scooter Arun Manereverse-engineeringindustrial-control-systems-securityvulnerability-management+2
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwarfirmware-analysisreverse-engineeringautomotive-cybersecurity+1
2023-08-07TalkC0c0n Cellibrite Premium Mobile Forensic tool iPhone analysis Vaibhav Kumarmobile-securitymobile-forensicsreverse-engineering+3
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakkiaptreverse-engineeringincident-response
2023-08-07TalkC0c0n Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos Video Nikhil Prabhakarandroid-securitymobile-securityreverse-engineering+1
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojanembedded-securityfirmware-analysishardware-security+3
2022-09-23TalkC0c0n Hacking SmartContracts Anto Josephblockchain-securitysmart-contractsvulnerability-management+2
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwalandroid-securitymobile-securitymobile-pentesting+3
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharmareverse-engineeringvulnerability-managementpentesting
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Mannareverse-engineering
2022-05-18TalkCan Sec West Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shahfirmware-analysisreverse-engineeringembedded-security+1
2021-11-13TalkC0c0n Decoding new age hackers and Criminal Investigation Amit Dubeyincident-responsedigital-forensicsreverse-engineering
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgalcode-reviewstatic-analysisreverse-engineering+2
2021-11-12TalkC0c0n Dissecting Malicious Software and Analysis Shrutirupa Banerjieemalwarereverse-engineeringdynamic-analysis+1
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2021-08-04Tool demoBlackhat ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing Video Parbati Kumar Mannareverse-engineering
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwadiotredteampentest+1
2020-10-01Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jm, Akhil Mahendraandroidcode-analysisreverse-engineering+2
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Sheliareverse-engineeringiot
2020-03-18TalkCan Sec West The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shahredteamarmfirmware+5
2019-11-09TalkToor Con 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware-reverse-engineeringvulnerability-management+3
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potlurireverse-engineeringbinary-analysisexploitation+1
2019-10-12TalkTexas Cyber Summit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshireverse-engineeringmalwarebinary-analysis+3
2019-10-03TalkVirus Bulletin Curious tale of 8.t used by multiple campaigns against South Asia Niranjan Jayanandreverse-engineeringvulnerability-managementapt+1
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringvulnerability-managementsecurity-architecture+2
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware/embedded
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Maneautomotive-cybersecuritycan-busics-security+3
2018-10-10TalkBrucon Simplifying the art of instrumentation Krishnakant Patil, Rushikesh D Nandedkarreverse-engineeringstatic-analysisdynamic-analysis+2
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishramalwarereverse-engineeringdynamic-analysis+2
2017-10-05TalkVirus Bulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anandvulnerability-managementreverse-engineeringpentesting+1
2017-08-18TalkC0c0n Dynamic Binary Instrumentation Vivek Arora, Bhaskar Rastogidynamic-analysisreverse-engineeringbinary-analysis+1
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakharexploitationpentestingreverse-engineering+1
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Praveen Vadnalareverse-engineeringvulnerability-managementsecurity-architecture+1
2016-11-06TalkGround Zero Summit Hacking The Droids Anto Josephandroid-securitymobile-securityreverse-engineering+3
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patilmalwarereverse-engineering
2016-10-13TalkApp Sec Usa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharlamobile-securityvulnerability-managementreverse-engineering+1
2016-10-05TalkVirus Bulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anandreverse-engineeringincident-responsevulnerability-management
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiryautomated-exploit-detectionreverse-engineeringvulnerability-assessment+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-05-26TalkHitb Sec Conf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvimobileandroidios+3
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singhpentestingethical-hackingprivilege-escalation+3
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkarpentestingreverse-engineeringvulnerability-management+1
2015-11-05TalkGround Zero Summit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jainincident-responsereverse-engineeringpentesting
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hattireverse-engineeringsecurity-architecturevulnerability-management
2015-08-01TalkC0c0n Reversing and Deciphering the Cyber Espionage Malware Communications Monnappa K Areverse-engineeringdecipher
2015-03-15TalkHitb Sec Conf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobenetwork-pentestingpacket-analysisnetwork-monitoring+2
2015-01-27TalkOwasp App Sec California Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringvulnerability-managementincident-response+1
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Soodredteamreverse-engineeringblueteam+1
2014-09-26TalkVirus Bulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiahandroid-securitystatic-analysisvulnerability-management+2
2014-09-18TalkApp Sec Usa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringmemory-forensicsincident-response+1
2014-05-29TalkHitb Sec Conf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasiredteamiptvreverse-engineering
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwatereverse-engineeringpentestingvulnerability-management
2014-01-28TalkOwasp App Sec California Application Sandboxes: Know thy limits Video Rahul Kashyapapplication-pentestingreverse-engineeringvulnerability-management+1
2013-09-27TalkC0c0n ARM, Thumb and the Finger Aseem Jakharreverse-engineeringbinary-analysisassembly-analysis+2
2013-09-27TalkC0c0n Sandy - The Malicious Analysis Whitepaper Source Code Rahul Sasireverse-engineeringstatic-analysisdynamic-analysis
2012-11-23TalkMalcon Surprise paper! Atul Alexmalwarereverse-engineeringmobile-security
2012-10-25TalkApp Sec Usa Cracking the Code of Mobile Application Video Sreenarayan Ashokkumarmobile-securityreverse-engineeringmobile-pentesting+3
2012-10-23TalkHacklu Buster: Android Security Buster Atul Alexandroid-securitymobile-securityreverse-engineering+1
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halderandroid-securitymobile-securityreverse-engineering+2
2012-09-27TalkGrrcon Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! Bharat Jogipentestredteamblueteam+2
2012-08-03TalkC0c0n Cracking the Mobile Application Source Code Presentation Sreenarayan Ashokkumarmobileandroidios+3
2012-08-03TalkC0c0n I haz you and pwn your maal Presentation Harsimran Singh Waliaandroidmobilereverse-engineering+1
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittalpost-exploitationethical-hackingpentesting+2
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Soodmalwarebotnetweb-security+2
2012-02-15TalkNullcon Binary God Presentation Video Atul Alexredteamemulatorassembler+2
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Jagadeesh Chandraiahmalwaretrojanreverse-engineering+1
2011-08-03TalkBlackhat Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex Presentation Whitepaper Video Shreeraj Shahreverse-engineeringajaxweb-application-security+1
2011-02-25TalkNullcon Reversing microsoft patches to reveal vulnerable code Presentation Whitepaper Harsimran Singh Waliareverse-engineering
2010-10-29TalkT2 Hacking Femtocells Ravishankar Borgaonkarmobile-securityreverse-engineeringvulnerability-management
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Rameshmalwarebotnetreverse-engineering+1
2010-06-18TalkSyscan REVERSE ENGINEERING WEB 2.0 APPLICATIONS Shreeraj Shahreverse-engineeringajaxweb-application-security+1
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Vargheseredteamreverse-engineeringexploit-development
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2006-09-21TalkHitb Sec Conf Finding Secrets in ISAPI Presentation Nish Bhallasecure-codingreverse-engineering