πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Sca

Focus Area: πŸ“¦ Software Supply Chain Security
9
Total Entries
10
Contributors

Top Contributors

Akhil Mahendra(3) Gaurav Joshi(3) Hare Krishna Rai(3) Hritik Vijay(3) K v Prashant(2)

All Entries (9 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-03TalkBlackhat Determining Exploitability of Vulnerabilities with SBOM and VEX Presentation Anusha Penumacha, Srinija Kammari#sbom#supply-chain#sca+1
2025-04-03Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#supply-chain-attack#sca+1
2025-04-03Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#supply-chain#sbom#sca+2
2025-03-02TalkNullcon Securing the chains: Building defensive layers for software supply chains Video Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#blueteam#container-security#sbom+3
2024-12-11Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#sca#software-composition-analysis
2024-11-15TalkC0c0n [Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool Source Code Gaurav Joshi, Hare Krishna Rai#supply-chain#sca#software-composition-analysis
2024-04-19Tool demoBlackhat vet: Policy Driven vetting of Open Source Software Components Source Code Abhisek Datta#supply-chain-security#open-source-security#dependency-management+1
2023-12-06Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Akhil Mahendra, Hritik Vijay#aws#supply-chain#sbom+2
2015-09-24TalkAppsecusa QARK: Android App Exploit and SCA Tool Video Tushar Dalvi, Tony Trummer#android-security#sca#software-composition-analysis