๐Ÿงช Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Secure Development

Focus Areas: ๐Ÿ” Application Security โš™๏ธ DevSecOps
201
Total Entries
206
Contributors

Top Contributors

Vandana Verma Sehgal(7) Abhishek Jm(6) Amrudesh Balakrishnan(6) Himanshu Das(6) Lavakumar Kuppan(5)

All Entries (201 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Kubernetes Goat - A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+3
2025-08-07Tool demoBlackhat Kubernetes Security Scanner Source Code Video Krishna Priya#kubernetes#cloud-workload-protection#container-security+4
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chaganti#web-security#secure-coding#security-assessment+2
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Datta#static-analysis#software-security#devsecops+2
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Whitepaper Video Akash Mukherjee, Saurabh Shintre#secure-development#devsecops#data-protection+1
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-04-04Tool demoBlackhat Intro to CICDGuard - How to have visibility and security OF CICD ecosystem Source Code Pramod Rana#cicd-pipeline#cicd-security#secure-development+3
2025-04-04Tool demoBlackhat Kubernetes Goat: A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2025-04-04Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2025-04-04Tool demoBlackhat RedInfraCraft : Automate Complex Red Team Infra Source Code Yash Bharadwaj, Manish Gupta#cloud-access-security-broker#cloud-compliance#cloud-pentesting+1
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-03-02PanelNullcon From Code to Defense: Why Developers Are the New Security Leaders Vaibhav Gupta, Vikas Goyal, Hilal Lone, Gene Golovinsky#secure-development#secure-coding#security-testing+3
2025-03-01TalkNullcon The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties Video Anto Joseph#bug-bounty#secure-development#security-testing+2
2024-12-12Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#application-pentesting#code-review#secure-development+3
2024-12-11Tool demoBlackhat Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel Source Code Amit Parjapat, Vedant Wayal#android#application-pentesting#mobile-application-management+4
2024-12-11Tool demoBlackhat Open Source Tool to Shift Left Security Testing by Leveraging AI Shivam Rawat, Shivansh Agrawal#ai-security#secure-development#security-testing+2
2024-11-21TalkSecurityfest Wheels of Wonder Video Hrishikesh Somchatwar#automotive-cybersecurity#car-hacking#embedded-systems+4
2024-08-29Tool demoHitbsecconf CICDGuard Source Code Pramod Rana#ci-cd#cicd-pipeline#cicd-security+3
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#swg#cloud-access-security-broker#application-pentesting+4
2024-08-08Tool demoBlackhat Open Source LLM Security Source Code Ankita Gupta 1, Ankush Jain#ai-security#application-pentesting#security-testing+3
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket โ€“ Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigam#security-assessment#api-security#secure-development
2024-04-19Tool demoBlackhat AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud Source Code Sherin Stephen, Nishant Sharma, Rishappreet Singh Moonga#aws#ai-security#ai+4
2024-04-18Tool demoBlackhat BinderAPI Scanner & BASS Source Code Krishnaprasad Subramaniam, Jeffrey Gaor, Valen Sai, Eric Tee Hock Nian#api-security#application-pentesting#dynamic-analysis+3
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2024-03-12TalkNullcon Secure Web Gateways are dead. Whatโ€™s next? Vivek Ramachandran#browser-security#application-hardening#security-strategy+2
2023-12-07Tool demoBlackhat Akto - Open Source API Security Tool Source Code Ankush Jain#api-security#secure-development#security-testing+3
2023-12-06TalkBlackhat AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers Presentation Video Ankit Gangwal, Shubham Singh, Abhijeet Srivastava#mobile-hacking#android-security#application-pentesting+2
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-12-06Tool demoBlackhat SSH into any device from anywhere with ZERO Open Network ports Source Code Anthony Prakash, Colin Constable#ssh#zero-trust#secure-development+1
2023-09-23TalkNullcon Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In iOS Presentation Shubham Sharma#ios#ios-security#application-pentesting+3
2023-09-23TalkNullcon Secure Coding: Fix From The Root Presentation Saddam Hussain, Gopika Subramanian#secure-coding#application-pentesting#code-review+4
2023-09-23TalkNullcon Secure Your Angular App Using JWT And GraphQL Presentation Ankit Sharma#blueteam#api-security#secure-development+1
2023-09-23PanelNullcon SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAMโ€™S JOURNEY TO EXCELLENCE Dinesh Varma, Satish Kumar Dwibhashi, Manoj Kumar#secure-development#security-tools#cicd-security+2
2023-09-23TalkNullcon Your App Is Probably A Spyware…Or Is It? Presentation Gaurav Gogia, Pandurang Patil#spyware#secure-development#security-testing+3
2023-08-24Tool demoHitbsecconf Vajra Source Code Raunak Parmar#aws#azure#cloud-pentesting+3
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Video Vandana Verma Sehgal, Viraj Gandhi#secure-development#devsecops#risk-management+2
2023-08-12Tool demoDefcon Open Source API Security for devsecops Source Code Ankush Jain, Ankita Gupta 1#api-security#devsecops#ci-cd+2
2023-08-10TalkBlackhat AI Assisted Decision Making of Security Review Needs for New Features Presentation Mrityunjay Gautam, Pavan Kolachoor#ai#ai-security#deep-learning+3
2023-08-10Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#sast#secure-development+4
2023-08-10Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#authorization#security-testing+3
2023-08-09Tool demoBlackhat Akto - Open Source API Security Tool Source Code Ankush Jain, Ankita Gupta 1#api-security#application-pentesting#security-testing+3
2023-08-09Tool demoBlackhat ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections Video Ankit Anurag, Ashwath Kumar, Manikandan Rajappan#cloud-access-security-broker#incident-management#security-tools+2
2023-08-09Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Ajit Hatti#secure-coding#code-review#secure-development+1
2023-08-09Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android-security#application-pentesting#dynamic-analysis+3
2023-08-09Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2023-08-07TalkC0c0n Shifting left blockchain development for safer DApps Video Dhanith Krishna#smart-contracts#secure-development#devsecops+2
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M G#devsecops#secure-development#static-analysis+3
2023-08-06TalkC0c0n Surviving In Dependency Hell Video Kumar Ashwin#secure-development#devsecops#software-security
2023-08-06TalkC0c0n The new way to be secure Video Sakshi Bhutani#secure-development#devsecops#software-security+3
2023-05-11Tool demoBlackhat APKHunt | OWASP MASVS Static Analyzer Source Code Mrunal Chawda, Sumit Kalaria#owasp#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Atharva Chincholkar, Srishti Chaubey#secure-coding#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat KernelGoat Source Code Shivankar Madaan#kernel#secure-development#security-training
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-05-11Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhure, Shain Singh#encryption#quantum-computing#secure-development+3
2023-04-26TalkRsac Designing Product Security for a Brighter Smile and a Healthier Tomorrow Presentation Video Lokesh Pidawekar, Apoorva Phadke#secure-development#devsecops#software-security+2
2023-03-23TalkInsomnihack How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#devsecops#supply-chain-security+3
2023-03-09PanelNullcon Elements of a Successful Security Strategy: A Comprehensive Approach Video Sheetal Joseph, Sybe Izzak Rispens, Travis Carelock#security-strategy#security-testing#secure-development+4
2023-03-09PanelNullcon How to make security easier for your developers Video Santosh Yadav, Frida Kiriakos, Marie Theresa Brosig, Xavier Rene Corail#secure-development#security-testing#secure-coding+3
2022-12-08Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+4
2022-12-07Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#application-pentesting#secure-development+4
2022-09-28TalkRootcon AWSGoat : A Damn Vulnerable AWS Infrastructure Presentation Video Jeswin Mathai, Shantanu Kale, Sanjeev Mahunta#aws#cloud-pentesting#cloud-workload-protection+4
2022-09-23TalkC0c0n Building a Safer and Innovative Digital Ecosystem Vijay Pamarathi#secure-development#devsecops#software-security+2
2022-09-23TalkC0c0n Collaborative efforts for safe digital banking Biju K#secure-development#risk-management#architecture
2022-09-23TalkC0c0n Common Misconfigurations in your Kubernetes Cluster and What can you do about it? Kumar Ashwin#kubernetes#cloud-workload-protection#container-security+4
2022-09-23TalkC0c0n Hyperledger Fabric & Ethereum Apps: Security Deep Dive Alex Devassy, Dhanith Krishna#smart-contracts#solidity#decentralized-systems+2
2022-09-23TalkC0c0n Securing your APIs for a cloud native future Navendu Pottekkat#api-security#secure-development#devsecops
2022-09-08TalkNullcon Pushing Security Left By Mutating Byte Code Presentation Video Gaurav Gogia#secure-coding#application-hardening#static-analysis+1
2022-09-07TalkNullcon Scale hacking to secure your cloud and beyond Video Anand Prakash#cloud-pentesting#cloud-security-posture-management#container-security+4
2022-09-06PanelNullcon Securing the Software Video Mrudul Uchil, Abhisek Datta, Harish Goel, Matthew Bohne#software-security#secure-development#security-testing+3
2022-09-06PanelNullcon Consumer Tech Bug Bounty Panel: Hear from the Program Managers Video Sandeep Singh, Rishika Hooda, Omar Benbouazza#bug-bounty#security-testing#application-hardening+3
2022-08-12PanelDefcon Agility Broke AppSec. Now It’s Going to Fix It. Video Vandana Verma Sehgal, Roy Erlich, Emil Vaagland, Seth Kirschner#security-testing#secure-development#cicd-pipeline
2022-08-11TalkBlackhat Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol Presentation Whitepaper Subhechha Subudhi, Clara Maine, Akke Toeter, Victoria Bosch#zero-day#smart-contracts#security-development-lifecycle+2
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikh#ai#ai-security#data-protection+4
2022-08-10Tool demoBlackhat ArcherySec - Manage and Automate your Vulnerability Assessment Source Code Anand Tiwari#application-pentesting#ci-cd#dynamic-analysis+3
2022-08-10TalkBlackhat Attacks From a New Front Door in 4G & 5G Mobile Networks Presentation Video Altaf Shaik, Shinjo Park, Matteo Strada#api-security#access-management#identity-theft+4
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Source Code Ajit Hatti#secure-coding#secure-development#security-tools+3
2022-08-10Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#code-review#secure-development+4
2022-06-07TalkRsac Continuous Security - Integrating Pipeline Security Presentation Vandana Verma Sehgal#ci-cd#cicd-pipeline#cicd-security+3
2022-05-12Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2022-05-12Tool demoBlackhat Node Security Shield Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+3
2022-05-12Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#secure-development+1
2022-04-08TalkNullcon Bheem OS - A next-generation reasonably secure OS using Rust MicroVM Video Akram Ansari, Subash Sn#os#virtual-machine#container-security+3
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgal#code-review#static-analysis#reverse-engineering+2
2021-11-11Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10) Source Code Tushar Kulkarni#api-security#application-pentesting#security-testing+4
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishna#secure-coding#security-assessment#ethical-hacking+2
2021-08-05TalkDefcon The Bug Hunterโ€™s Recon Methodology Video Tushar Verma#security-assessment#vulnerability-assessment#application-pentesting+1
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giri#bug-hunting#bug-bounty#security-testing+3
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgal#owasp#secure-development#devsecops+3
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2020-03-06Tool demoNullcon Talisman Source Code Suhas Vishwanath#secure-development#macos#linux+3
2019-11-01TalkAppsecdayaustralia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singh#code-review#secure-coding#static-analysis+3
2019-09-27TalkC0c0n Practical Approach to Cyber Security for financial institutions Georgie Kurien#financial-institutions#secure-development#risk-management+2
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2019-09-27TalkC0c0n Security @scale for startups Shivanath Somanathan#devsecops#secure-development#software-security+2
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharma#secure-coding#security-assessment#serverless+4
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hatti#authentication#identity-management#secure-development+1
2019-09-13Talk44con One Person Army โ€“ Playbook on how to be the first Security Engineer at a company Video Kashish Mittal#devsecops#application-hardening#secure-development+4
2019-09-12KeynoteGlobalappsec Making a Change, One at a time - Diversity: More than just Gender Vandana Verma Sehgal#security-training#human-factor#cybersecurity-strategy+3
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkar#ios-security#application-pentesting#security-assessment+3
2019-08-11TalkDefcon Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants Presentation Vandana Verma Sehgal#devsecops#secure-development#ci-cd+2
2019-08-08TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#ci-cd#cicd-pipeline+4
2019-05-04TalkThotcon What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing Priyank Nigam#frida#application-pentesting#dynamic-analysis+3
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargava#secure-coding#blueteam#application-pentesting+4
2019-03-02PanelNullcon Navigating Risk in the Changing Business and Technology Landscape Video Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil#risk-management#cybersecurity-strategy#business-resilience+4
2019-03-02PanelNullcon The Myth of Sisyphus Secure Product Development Video Bipin Upadhyay, Minatee Mishra, Neelu Tripathy, Vaibhav Gupta, Vishal Sahani#secure-development#secure-coding#security-testing+3
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjve#red-teaming#application-pentesting#network-architecture+2
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desai#secure-coding#security-assessment#dynamic-analysis+4
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharaman#blueteam#secure-development#input-validation+4
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli#secure-coding#blueteam#application-hardening+4
2018-12-05Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Mohan Kallepalli#audit#security-testing#secure-development+4
2018-10-19TalkAppsecdayaustralia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargav#threat-modeling#devsecops#application-hardening+4
2018-08-09Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Sagar Popat, Mohan Kallepalli#audit#security-testing#automated-scanning+4
2018-08-08Tool demoBlackhat ThreatPlaybook Source Code Abhay Bhargav, Sharath Kumar#threat-modeling#ci-cd#security-development-lifecycle+4
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumar#secure-development#architecture#devsecops
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharla#secure-development#data-protection#architecture
2018-03-01TalkNullcon Security through obscurity and fear Presentation Video Abhinav Srivastava#application-pentesting#secure-development#security-testing+3
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-08-19TalkC0c0n Building Trust for Digital Transactions in India’s COD Culture Parry Aftab, Betsy Broder, Sridhara R Sidhu, Mirza Faizan#secure-development#risk-management#architecture
2017-08-19PanelC0c0n Security in Banking - Being one step aheadt Sunil Varkey, Rajesh Hemrajani, Biju K, Bhavin Bhansali, B R Nath, V George Antony#financial-institutions#secure-development#security-strategy
2017-08-18TalkC0c0n Case study: Security of Digital Wallet apps in India Ashwath Kumar, Sandesh Mysore Anand#appsec#mobile-pentesting#application-hardening+4
2017-08-18TalkUsenix DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Presentation Whitepaper Video Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna#linux#kernel#static-analysis+4
2017-07-27Tool demoBlackhat Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes Source Code Anshuman Bhartiya#security-assessment#bug-hunting#cloud-workload-protection+3
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abraham#blueteam#secure-development#sqli+4
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-03-04PanelNullcon Application Security Opportunities and Challenges in a DevOps World Video Abhay Bhargav, Ajay Bongirwar, Arun Jadhav, Pravesh Sharma, Adam Leaonard#secure-development#security-testing#dynamic-analysis+3
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Presentation Swamy Shivaganga Nagaraju#windows#blueteam#security-development-lifecycle+2
2017-03-03TalkNullcon DevOpSec: Rapid Security in the Cloud with AWS and CIS Presentation Video Mikhail Advani, Rajesh Tamhane#devsecops#aws#cloud-compliance+4
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-01-25TalkOwaspappseccalifornia DASTProxy: Donโ€™t let your automated security testing program stall on crawlInstead focus on business context Presentation Video Kiran Shirali, Srinivasa Rao Chirathanagandla#dynamic-analysis#dast#devsecops+2
2016-11-11TalkDeepsec Human vs Artificial intelligence โ€“ Battle of Trust Video Hemil Shah#ai#application-pentesting#application-hardening+4
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-08-19TalkC0c0n App Sec in the Time of Docker Containers Akash Mahajan#docker#application-pentesting#container-security+4
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2015-11-05TalkGroundzerosummit Elliptical Curve Cryptography Aneesha S#encryption#elliptic-curve-cryptography#secure-development+1
2015-08-05Tool demoBlackhat PixelCaptcha: A unicode based captcha scheme Whitepaper Source Code Gursev Singh Kalra#secure-coding#application-hardening#input-validation+3
2015-08-01TalkC0c0n NoPo - The NoSQL HoneyPot Framework Source Code Francis Alexander#secure-coding#application-pentesting#security-testing+2
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastava#owasp#blueteam#security-testing+4
2015-05-26TalkPhdays iOS Application Exploitation Presentation Prateek Gianchandani, Egor Tolstoy#ios#red-teaming#application-pentesting+4
2015-02-06TalkNullcon Building security and compliance into the software delivery process Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay#secure-development#devsecops#security-compliance+3
2015-01-27TalkOwaspappseccalifornia The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Video Devdatta Akhawe#web-security#xss#csrf+2
2014-11-13TalkGroundzerosummit Cyber ‘BrahMos’ - Static analysis driven secure coding Joy Sen#secure-coding#static-analysis#sast+4
2014-08-22TalkC0c0n Breaking and Securing Mobile Apps - Automagically Aditya Gupta#purpleteam#mobile-application-management#mobile-hacking+4
2014-08-22TalkC0c0n Still Single with a bleeding heart (Tool Release) Tamaghna Basu#secure-development#application-pentesting#secure-coding+1
2014-08-21TalkUsenix The Emperorโ€™s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhawe, Zhiwei Li, Warren He, Dawn Song#web-security#xss#csrf+2
2014-03-15TalkHitbsecconf JS Suicide: Using Javascript Security Features to Kill Itself Presentation Ahamed Nafeez#web-security#application-pentesting#code-review+3
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalani#blueteam#application-hardening#application-pentesting+4
2013-11-21TalkDeepsec Automation In Android & iOS Application Security Review Presentation Hemil Shah#android#ios#application-pentesting+4
2013-11-20PanelAppsecusa Aim-Ready-Fire Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather#appsec#secure-development#security-strategy
2013-11-20TalkAppsecusa Project Talk: OWASP OpenSAMM Project Presentation Pravir Chandra, Seba Deleersnyder#software-security#secure-development#devsecops+4
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandran#devsecops#secure-development#security-assessment+2
2013-08-02TalkDefcon Interactive Web Security Testing with IronWASP Lavakumar Kuppan#application-pentesting#dynamic-analysis#security-testing+3
2013-05-28TalkConfidence My Experiments with truth: a different route to bug hunting Video Devesh Bhatt#security-assessment#vulnerability-assessment#secure-development+2
2013-03-01TalkNullcon Inception of graphical passwords Video Rishi Narang#authentication#application-pentesting#secure-development+3
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shah#code-analysis#secure-development#blueteam+4
2012-12-01TalkClubhack Anatomy of a Responsible Disclosure โ€“ Zero Day Vulnerability in Oracle BI Publisher Presentation Video Vishal Kalro#zero-day#application-pentesting#secure-development+1
2012-12-01TalkClubhack HAWAS โ€“ Hybrid Analyzer for Web Application Security Presentation Video Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2012-10-26TalkAppsecusa The 7 Qualities of Highly Secure Software Video Mano Paul#secure-development#software-security#secure-coding+3
2012-09-05Talk44con Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Video Jitender Arora#data-protection#security-strategy#threat-modeling+3
2012-08-03TalkC0c0n Gathering security requirements K v Prashant, Saleem Ahamed#security-testing#secure-development#security-development-lifecycle+2
2012-02-15TalkNullcon Application security cost management Video Ketan Vyas#blueteam#application-pentesting#secure-development+2
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwal#blueteam#threat-modeling#secure-development
2011-10-07TalkC0c0n Paranoid Android Ankur Bhargava, Mrigesh#android#android-security#mobile-hacking+3
2011-10-07TalkC0c0n Secure HTTP Headers or How I can finally convince management to let go of IE6 Presentation Akash Mahajan#application-pentesting#secure-development#security-testing+1
2011-10-07TalkC0c0n Security Threats in Custom ROM’s (Android) Presentation Whitepaper Anant Shrivastava#android#android-security#application-pentesting+3
2011-10-07TalkC0c0n Web Application Backdoor Attack,Evasion and Detection Presentation Rahul Sasi#purpleteam#application-pentesting#backdoor-detection+4
2011-09-19TalkBrucon Step-by-Step for Software Security (that anyone can follow) Pravir Chandra#software-security#secure-development#devsecops+4
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imran#blueteam#application-pentesting#secure-development+4
2011-09-06TalkSecuritybyte Application Security Strategies Presentation K K Mookhey#secure-coding#secure-development#web-security+3
2011-02-25TalkNullcon (secure) SiteHoster โ€“ Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumar#xss#sqli#blueteam+1
2011-02-25TalkNullcon JSON Fuzzing: New approach to old problems Presentation Whitepaper K v Prashant, Tamaghna Basu#fuzzing#red-teaming#application-pentesting+4
2010-12-04TalkClubhack Firefox Security! Presentation Prasanna Kanagasabai#application-pentesting#secure-development#security-testing+4
2010-12-04TalkClubhack Mantra โ€“ Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-11-25TalkDeepsec Developers are from Mars, Compliance Auditors are from Venus Video Neelay S Shah#security-compliance#security-governance#risk-management+4
2010-08-01TalkC0c0n Last line of defense - Host Intrusion Prevention and Secure application development. Avinash Shenoi#blueteam#application-hardening#secure-coding+3
2009-12-05TalkClubhack Revealing the Secrets: Source Code Disclosure, Techniques and Impacts Presentation Anant Kochhar#secure-development#secure-coding#code-review+2
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shah#secure-coding#devsecops#software-security+2
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintala#blueteam#application-pentesting#secure-development+4
2009-11-17TalkSecuritybyte Applications - The new cyber security frontier Presentation Mano Paul#secure-development#devsecops#software-security+2
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkHitbsecconf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkTroopers Browser Design Flaws โ€“ Hacking by Breaking in Architectures Presentation Aditya K Sood#red-teaming#application-pentesting#secure-development+1
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohli#secure-development#secure-coding#blueteam+1
2008-11-13TalkDeepsec Game of Web 2.0 Security - Attacking Next Generation Apps Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+2
2008-08-20TalkOwaspappsecindia Application Security Trends & Challenges Presentation Kamlesh Bajaj#owasp#appsec#secure-development+4
2008-08-20TalkOwaspappsecindia Building Enterprise AppSec Program Nish Bhalla#appsec#secure-development#security-testing+4
2008-08-20TalkOwaspappsecindia Case Study: Testing 200+ applications in a $10 Billion Enterprise Presentation Roshen Chandran#security-assessment#application-pentesting#security-testing+4
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandra, Jacob West, Brian Chess, Sean Fay#ethical-hacking#secure-development#devsecops
2007-12-09TalkClubhack The future of automated web application testing Presentation Amish Shah, Umesh Nagori#security-assessment#application-pentesting#security-testing+3
2006-08-02TalkBlackhat Web Application Incident Response & Forensics: A Whole New Ball Game! Presentation Whitepaper Rohyt Belani, Chuck Willis#application-pentesting#code-review#incident-management+3
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4
2003-12-12TalkHitbsecconf Defending Web Applications: Strategies, methods and practices Video Shreeraj Shah#blueteam#secure-coding#firewall+1
2001-04-26TalkBlackhat Web Hacking Presentation Saumil Shah#red-teaming#application-pentesting#security-testing+4