πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Secure Coding

Focus Areas: πŸ” Application Security βš™οΈ DevSecOps
92
Total Entries
86
Contributors

Top Contributors

Ajit Hatti(4) Shreeraj Shah(4) Anant Shrivastava(3) Sanoop Thomas(3) Anirudh Anand(2)

All Entries (92 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chagantiweb-securitysecure-codingpentesting+3
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Mannareverse-engineeringbinary-analysiscode-analysis+4
2025-04-03TalkBlackhat ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! Vivek Balachandransecure-coding
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishnaembedded-securityfirmware-analysishardware-security+3
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Kumar Ashwinvulnerability-managementsecure-codingdevsecops+1
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2023-09-23TalkNullcon Secure Coding: Fix From The Root Presentation Saddam Hussain, Gopika Subramaniansecure-coding
2023-08-09Tool demoBlackhat CASPR - Code Trust Auditing Framework Ajit Hattisecure-coding
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogismart-contractsblockchain-securityphishing+3
2023-08-06TalkC0c0n Mitigating SSRF at scale the right way with IMDSv2! Video Ayush Priyaweb-securityapi-securityaws+3
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutanisecure-developmentdevsecopssoftware-security+3
2023-05-11Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Atharva Chincholkar, Srishti Chaubeysecure-coding
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Aliweb-securitystatic-analysissast+2
2022-09-23TalkC0c0n Hacking SmartContracts Anto Josephblockchain-securitysmart-contractsvulnerability-management+2
2022-09-08TalkNullcon Pushing Security Left By Mutating Byte Code Presentation Video Gaurav Gogiasecure-coding
2022-08-12TalkDefcon Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years Video Vivek Ponnadasecure-codingvulnerability-managementdevsecops+1
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Ajit Hattisecure-coding
2021-11-13TalkC0c0n Server-side javascript Injection Presentation Kavisha Shethweb-securitysecure-codingweb-pentesting
2021-10-15TalkRootcon The Curious case of knowing the unknown Video Vandana Verma Sehgalvulnerability-managementsecure-codingdevsecops+1
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishnasecure-codingpentestingethical-hacking+2
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnadaindustrial-control-systems-securitysecure-codingvulnerability-management+3
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dashkubernetescloudaudit+2
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithanewindowsprocess-injectionblueteam+1
2020-09-18TalkC0c0n Web Application hacking with WebZGround Video Parveen Yadav, Narendra Kumarweb-securityweb-pentestingpentesting+3
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shreesecure-codingawsamazon-cognito+5
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahanlinuxsecure-codingweb-application-security+3
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Kshitij Kumar, Jai Musunurimacossecure-codingforensic+1
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singhcode-reviewsecure-codingstatic-analysis+3
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastavapentestredteamsecure-coding
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharmasecure-codingpentest
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shreesecure-codingawsamazon-cognito+5
2019-08-30TalkHitb Sec Conf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshisecure-codingredteamblueteam+1
2019-03-28TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastavadevsecopssecure-coding
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargavasecure-codingblueteam
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhunisecure-codingthreat_modelingredteam
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desaisecure-codingpentest
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepallisecure-codingblueteam
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaancloudawssecure-coding+3
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-11Tool demoDefcon Sh00tβ€”An open platform for manual security testers & bug hunters Source Code Pavan Mohanpentestbug-huntingsecure-coding+1
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Kshitij Kumar, Jai Musunurimacossecure-codingforensic+1
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hattiblueteamsecure-coding
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkarvulnerability-assessmentpentestingsecure-coding+2
2017-09-21TalkApp Sec Usa Androsia: A tool for securing in memory sensitive data Video Samit Anwerandroid-securitymobile-securitystatic-analysis+1
2017-08-18TalkC0c0n Androsia: A tool for securing in memory sensitive data Source Code Samit Anwersecure-codingandroidmobile+1
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhancloudawssecure-coding+3
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkariosmobilepentest+2
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+3
2017-07-27Tool demoBlackhat Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday Source Code Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Raofuzzingrest-apipentest+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hattisecure-codingreconnaissancecryptography+3
2017-07-26Tool demoBlackhat Devknox - Autocorrect Security Issues from Android Studio Source Code Subho Halderandroidmobilecode-analysis+1
2017-03-30Tool demoBlackhat Devknox - Autocorrect Security Issues from Android Studio Source Code Subho Halderandroidmobilecode-analysis+1
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Haritsecure-codingredteamblueteam+3
2016-09-23TalkRootcon Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomassecure-codingreconnaissanceredteam+1
2016-08-04Tool demoBlackhat Droid-FF: Android Fuzzing Framework Source Code Anto Josephandroidfuzzingsecure-coding+2
2016-08-04Tool demoBlackhat Maltese (Malware Traffic Emulating Software) Source Code Sasi Siddharthdnssecure-coding
2016-05-26TalkHitb Sec Conf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvimobileandroidios+3
2016-03-15TalkGroundzerosummit Web App Security Harpreet Singh, Himanshu Sharma, Nipun Jaswalweb-securityapi-securitysecure-coding+3
2015-08-05Tool demoBlackhat PixelCaptcha: A unicode based captcha scheme Whitepaper Source Code Gursev Singh Kalrasecure-coding
2015-08-01TalkC0c0n NoPo - The NoSQL HoneyPot Framework Source Code Francis Alexandersecure-coding
2014-11-13TalkGround Zero Summit Cyber ‘BrahMos’ - Static analysis driven secure coding Joy Sensecure-coding
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexandersecure-codingpentest
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekarglibcredteamblueteam+2
2013-11-21TalkAppsec Usa Wassup MOM? Owning the Message Oriented Middleware Video Gursev Singh Kalraapi-securityvulnerability-managementsecure-coding+1
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhanredteamsecure-coding
2013-09-27TalkC0c0n Snake Bites Presentation Anant Shrivastavasecure-codingpentestxss
2013-09-27TalkC0c0n Static analysis of malware with PyTriage Presentation Yashin Mehaboobesecure-coding
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Soodsecure-codingauditblueteam
2013-08-01Tool demoBlackhat XENOTIX xBOT Source Code Ajin Abrahambotnetlinuxwindows+3
2012-12-06TalkBlackhat The art of exploiting logical flaws in web apps Presentation Whitepaper Sumit Siddharthredteamsecure-coding
2012-10-26TalkApp Sec Usa The 7 Qualities of Highly Secure Software Video Mano Paulsecure-developmentsoftware-securitysecure-coding+3
2012-09-28TalkNullcon Alert(/xss/) - How to catch an XSS before someone exploits / reports it? Ahamed Nafeezweb-securityxsssecure-coding+2
2012-03-15TalkNullcon An App(le) a day keeps the wallet away Antriksh Shahpentestingweb-securityapi-security+1
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookheysecure-codingsecure-developmentweb-security+3
2011-09-06TalkSecuritybyte Enabling Un-trusted Mashups Presentation Bishan Singhweb-securityxsscsrf+4
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shahcompliancegovernancerisk-management+4
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindanesecure-codingredteampentest
2009-12-05TalkClubhack Revealing the Secrets: Source Code Disclosure, Techniques and Impacts Presentation Anant Kochharsecure-developmentsecure-coding
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shahsecure-codingdevsecopsvulnerability-management+3
2009-11-17TalkSecuritybyte Applications - The new cyber security frontier Presentation Mano Paulsecure-developmentdevsecopssoftware-security+2
2009-05-19TalkSyscan Securing Enterprise Applications Shreeraj Shahblueteamweb-application-securityajax+8
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohlisecure-developmentsecure-codingblueteam+1
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alexsecure-codingreverse-engineeringredteam+2
2008-10-29TalkHitb Sec Conf Top 10 Web 2.0 Attacks Presentation Video Shreeraj Shahblueteamweb-application-securityajax+5
2008-04-16TalkHitb Sec Conf Securing Next Generation Applications Γ’β‚¬β€œ Scan, Detect and Mitigate Shreeraj Shahblueteamweb-application-securityajax+5
2007-08-02TalkBlackhat Breaking C++ Applications Whitepaper Neel Mehtaredteamsecure-coding
2006-09-21TalkHitb Sec Conf Finding Secrets in ISAPI Presentation Nish Bhallasecure-codingreverse-engineering
2006-08-02TalkBlackhat SQL Injections by Truncation Presentation Bala Neerumallaweb-securitysql-injectionsecure-coding+1
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotiasecure-codingblueteam
2005-09-29TalkHitb Sec Conf Analyzing Code for Security Defects Presentation Nish Bhallacode-analysisblueteamsecure-coding
2003-12-12TalkHitb Sec Conf Defending Web Applications: Strategies, methods and practices Shreeraj Shahblueteamsecure-codingfirewall+1