πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Sast

Focus Area: πŸ” Application Security
41
Total Entries
52
Contributors

Top Contributors

Akhil Mahendra(3) Akshansh Jaiswal(3) Ashwin Shenoi(3) Shreeraj Shah(3) Ankita Gupta 1(2)

All Entries (41 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solanki#container-security#docker#static-analysis+3
2024-08-29Tool demoHitbsecconf AI Assisted Code Reviewer Rajanish Pathak, Hardik Mehta#ai#ai-security#code-review+4
2024-08-08Tool demoBlackhat Open Source LLM Security Source Code Ankita Gupta 1, Ankush Jain#ai-security#application-pentesting#security-testing+3
2024-04-19Tool demoBlackhat AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs Source Code Asankhaya Sharma#static-analysis#ai#vulnerability-assessment+1
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-08-12Tool demoDefcon Open Source API Security for devsecops Source Code Ankush Jain, Ankita Gupta 1#api-security#devsecops#ci-cd+2
2023-08-10Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#sast#secure-development+4
2023-05-12Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#static-analysis#sast+2
2023-05-11Tool demoBlackhat APKHunt | OWASP MASVS Static Analyzer Source Code Mrunal Chawda, Sumit Kalaria#owasp#application-pentesting#code-review+4
2023-01-26TalkUsenix Building an Automated Machine for Discovering Privacy Violations at Scale Video Suchakra Sharma#static-analysis#secure-coding#data-protection+2
2022-12-07Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+1
2022-12-07Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#application-pentesting#secure-development+4
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Ali#web-security#static-analysis#sast+1
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software – One bug at a time Video Sandeep Singh, Laurie Mercer#open-source-security#supply-chain#code-review+4
2022-08-11TalkBlackhat ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron Presentation Mohan Sri Rama Krishna Pedhapati, Aaditya Purani, Max Garrett, William Bowling#red-teaming#application-pentesting#code-review+4
2022-08-11Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+4
2022-08-10Tool demoBlackhat ArcherySec - Manage and Automate your Vulnerability Assessment Source Code Anand Tiwari#application-pentesting#ci-cd#dynamic-analysis+3
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Source Code Ajit Hatti#secure-coding#secure-development#security-tools+3
2022-05-12Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#secure-development+1
2021-11-11Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10) Source Code Tushar Kulkarni#api-security#application-pentesting#security-testing+4
2021-11-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jaiswal, Abhishek Jm, Rahul Sani#android#application-pentesting#code-review+4
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2019-03-02PanelNullcon The Myth of Sisyphus Secure Product Development Video Bipin Upadhyay, Minatee Mishra, Neelu Tripathy, Vaibhav Gupta, Vishal Sahani#secure-development#secure-coding#security-testing+3
2019-02-28TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Video Lavakumar Kuppan, Ankit Gupta#security-assessment#application-pentesting#application-hardening+3
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli#secure-coding#blueteam#application-hardening+4
2017-08-18TalkUsenix DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Presentation Whitepaper Video Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna#linux#kernel#static-analysis+4
2017-03-04PanelNullcon Application Security Opportunities and Challenges in a DevOps World Video Abhay Bhargav, Ajay Bongirwar, Arun Jadhav, Pravesh Sharma, Adam Leaonard#secure-development#security-testing#dynamic-analysis+3
2016-11-11TalkDeepsec Human vs Artificial intelligence – Battle of Trust Video Hemil Shah#ai#application-pentesting#application-hardening+4
2016-10-14TalkAppsecusa Automating API Penetration Testing using fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi#fuzzing#api-security#application-pentesting+4
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul Sasi#blueteam#ml#application-pentesting+4
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohanty#blueteam#code-review#secure-coding+4
2014-11-13TalkGroundzerosummit Cyber ‘BrahMos’ - Static analysis driven secure coding Joy Sen#secure-coding#static-analysis#sast+4
2013-07-31TalkBlackhat Javascript static security analysis made easy with JSPrime Presentation Whitepaper Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#web-security#blueteam#application-hardening+4
2012-12-06TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2011-09-07TalkSecuritybyte IronWASP - A Web Application Security Testing Platform Presentation Source Code Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2008-08-20TalkOwaspappsecindia Building Enterprise AppSec Program Nish Bhalla#appsec#secure-development#security-testing+4
2008-08-20TalkOwaspappsecindia Case Study: Testing 200+ applications in a $10 Billion Enterprise Presentation Roshen Chandran#security-assessment#application-pentesting#security-testing+4
2008-08-20TalkOwaspappsecindia Web Application Security: Too Costly To Ignore Presentation Rajesh Nayak#appsec#blueteam#application-hardening+4
2007-12-09TalkClubhack Hacking Web 2.0 Art and Science of Vulnerability Detection Presentation Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2005-04-12TalkHitbsecconf Web Application Kung-Fu, The Art of Defense Presentation Shreeraj Shah#blueteam#application-hardening#secure-coding+4