πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Assessment

Focus Areas: 🎯 Penetration Testing πŸ” Vulnerability Management
248
Total Entries
203
Contributors

Top Contributors

Anant Shrivastava(10) Lavakumar Kuppan(9) Nikhil Mittal(8) Ajin Abraham(7) Aseem Jakhar(6)

All Entries (248 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjar#attack-surface#vulnerability-assessment#asset-management+2
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Subramanian#security-assessment#application-pentesting#vulnerability-assessment+1
2025-08-06Tool demoBlackhat CloudLens Gaurav Joshi, Hare Krishna Rai, K v Prashant#aws#cloud-pentesting#red-teaming+2
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chaganti#web-security#secure-coding#security-assessment+2
2025-08-06Tool demoBlackhat ProcessInjection Source Code Chirag Savla#security-assessment#red-teaming#reverse-engineering+1
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashank, Bramwell Brizendine#reverse-engineering#exploitation#security-assessment+2
2024-12-12Tool demoBlackhat MPT: Pentest In Action! Source Code Jyoti Raval#penetration-testing-tools#security-assessment#ethical-hacking
2024-11-16TalkC0c0n Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac Ajay Sk#security-assessment#linux#macos
2024-11-15TalkC0c0n [Yodha] Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#security-assessment#container-security+3
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Video Kartik Lalan#automotive-cybersecurity#reverse-engineering#security-assessment+1
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singh#automated-scanning#vulnerability-assessment#security-assessment+2
2024-08-30TalkHitbsecconf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajput#web-security#security-assessment#exploitation+2
2024-08-29TalkHitbsecconf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasad, Joey Chen#reverse-engineering#security-assessment#incident-management
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#reverse-engineering#architecture#security-assessment
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Video Vivek Ramachandran, Shourya Pratap Singh#web-security#security-assessment#application-pentesting+4
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nain#ics-security#scada#plc-security+2
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigam#security-assessment#api-security#secure-development
2024-05-27TalkConfidence Hacker’s Story from Reader to Global Admin in Azure Video Raunak Parmar#cloud-pentesting#azure#ethical-hacking+4
2024-03-21TalkCansecwest Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Video Arif Hussain, George Hughey#security-assessment#architecture#incident-management
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#container-security#docker#threat-hunting+1
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashank, Bramwell Brizendine#reverse-engineering#security-assessment#exploitation+2
2023-08-11TalkDefcon Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications Video Ankur Chowdhary#web-security#xss#application-pentesting+3
2023-08-07TalkC0c0n Serverless Siege: AWS Lambda Pentesting Video Anjali Singh Shukla, Divyanshu Shukla#aws#serverless#cloud-pentesting+2
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogi#smart-contracts#phishing#secure-coding+1
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastava#security-assessment#network-pentesting#architecture
2023-06-05TalkConfidence Evading modern day security defenses in corporate environments Himanshu Sharma, Rahul Vashista#red-teaming#evasion#bypassing+4
2023-05-11Tool demoBlackhat Kubernetes Goat: Interactive Kubernetes Security Learning Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kurien#social-engineering#security-assessment#security-training
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojan#embedded-security#firmware-analysis#security-assessment+1
2022-09-23TalkC0c0n A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#security-assessment#cloud-pentesting#cloud-workload-protection+2
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanand#security-assessment#apt#exploit-kit+1
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwal#android-security#mobile-pentesting#reverse-engineering+2
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharma, Noushin Shabab#reverse-engineering#security-assessment#iot-pentesting
2022-08-25TalkHitbsecconf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Video Rahul Sasi, Vishal Singh#social-engineering#security-assessment#botnet+1
2022-08-25TalkHitbsecconf MPT: Pentest In Action Presentation Video Jyoti Raval#security-assessment#application-pentesting#asset-management+2
2022-03-24TalkInsomnihack Practical exploitation of zigbee-class networks with USB-based RF transceivers & open source software Video Nitin Lakshmanan, Sunil Kumar 1#iot-pentesting#wireless-security#hardware-hacking+3
2021-11-13TalkC0c0n Case Study - Cyber Heist in a Bank and Recovery of Systems and Money Prashant Choudhary#incident-management#forensics#security-assessment
2021-11-13TalkC0c0n Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application Gayatri Nayak#web-security#authentication#authorization+2
2021-11-12TalkC0c0n β€œLet’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhail#social-engineering#security-assessment#security-training
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singha#security-assessment#post-exploitation#privilege-escalation+2
2021-09-07TalkConfidence Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical Aman Sachdev, Himanshu Sharma#red-teaming#ethical-hacking#security-assessment+2
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishna#secure-coding#security-assessment#ethical-hacking+2
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B R#red-teaming#ethical-hacking#vulnerability-assessment+2
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Verma#security-assessment#vulnerability-assessment#application-pentesting+1
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwari#blueteam#security-assessment#ci-cd
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Sood#blueteam#security-assessment#threat-intelligence-analysis
2020-11-21TalkAppsecindonesia Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory Abhi M Balakrishnan#web-security#owasp#application-pentesting+1
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwad#red-teaming#security-assessment#reverse-engineering
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan#security-assessment#vulnerability-assessment#network-pentesting+3
2020-10-01Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jm, Akhil Mahendra#android#code-analysis#reverse-engineering+1
2020-10-01Tool demoBlackhat Mobexler: An All-in-One Mobile Pentest VM Source Code Abhinav Mishra#android#ios#security-assessment+2
2020-10-01Tool demoBlackhat OWASP Python Honeypot Source Code Sri Harsha Gajavalli, Ali Razmjoo#web-security#owasp#security-assessment+1
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Gupta#security-assessment#vulnerability-assessment#devsecops
2020-09-18TalkC0c0n Web Application hacking with WebZGround Video Parveen Yadav, Narendra Kumar#web-security#web-pentesting#security-assessment+3
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwad#red-teaming#security-assessment#iot-device-management+4
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Rana#risk-analysis#blueteam#security-strategy+4
2020-04-25TalkHitbsecconf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#vulnerability-assessment#security-assessment#blueteam
2020-04-24TalkHitbsecconf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#scada#blueteam#security-assessment
2020-03-18TalkCansecwest The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shah#red-teaming#arm#firmware+4
2020-03-06Tool demoNullcon Mobexler Source Code Abhinav Mishra, Abhishek Jaiswal#android#ios#security-assessment+2
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Gupta#red-teaming#security-assessment#network-architecture+2
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2019-11-28TalkDeepsec Mastering AWS Pentesting and Methodology Video Ankit Giri#aws#security-assessment#cloud-pentesting+1
2019-10-22TalkHacklu Intro to Dark Arts: Getting Started with CTFs Geethna T K, Shruti Dixit, Sowmya Potluri#reverse-engineering#binary-analysis#exploitation+1
2019-10-12TalkTexascybersummit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshi#reverse-engineering#binary-analysis#executable-analysis+1
2019-09-28TalkC0c0n Vulnerability Prioritization with Threat Intelligence Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja#threat-intelligence-analysis#automated-scanning#security-assessment+3
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastava#security-assessment#red-teaming#secure-coding
2019-09-27TalkC0c0n Offensive Machine Learning for Pentesters and Red Teams Tamaghna Basu#machine-learning#security-assessment#red-teaming
2019-09-27TalkC0c0n Serverless SOAR Source Code Sabyasachi Dhal, Suresh Sharma#secure-coding#security-assessment#serverless+4
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkar#ios-security#application-pentesting#security-assessment+3
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-09Tool demoDefcon PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Gupta#red-teaming#security-assessment#network-pentesting
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Mane#automotive-cybersecurity#can-bus#ics-security+2
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singh#phishing#api-security#web-security+2
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargava, Adam Podgorski#data-protection#security-assessment#tor+1
2019-08-07Tool demoBlackhat Medaudit: Auditing Medical Devices and Healthcare Infrastructure Source Code Anirudh Duggal#security-assessment#application-pentesting#network-architecture+1
2019-08-07Tool demoBlackhat PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Gupta#red-teaming#security-assessment#network-pentesting
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Presentation Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#application-hardening+4
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desai#secure-coding#security-assessment#dynamic-analysis+4
2019-02-28TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Video Lavakumar Kuppan, Ankit Gupta#security-assessment#application-pentesting#application-hardening+3
2018-12-06Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Sagar Popat, Harsh Grover#security-assessment#rest-api#ci-cd
2018-11-08TalkDefcamp Backdooring DVR/NVR devices Video Arun Mane#hardware-reverse-engineering#embedded-security#security-assessment+2
2018-10-05TalkC0c0n Pentesting GraphQL Applications Presentation Source Code Neelu Tripathy#security-assessment#application-pentesting#dynamic-analysis+4
2018-10-04TalkConfidence Hacking 50 Million users using 123456 Aman Sachdev, Himanshu Sharma#web-security#authentication#ethical-hacking+2
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaan#aws#secure-coding#web-security+2
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Rao, Thanh Bui, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura#security-assessment#architecture#application-hardening+4
2018-08-12Tool demoDefcon Expl-iotβ€”IoT Security Testing and Exploitation framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-11Tool demoDefcon Archeryβ€”Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-11Tool demoDefcon BLEMystiqueβ€”Affordable custom BLE target Source Code Nishant Sharma, Jeswin Mathai#ble#red-teaming#wearables+1
2018-08-11Tool demoDefcon PA Toolkitβ€”Wireshark plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#reconnaissance+4
2018-08-11Tool demoDefcon Sh00tβ€”An open platform for manual security testers & bug hunters Source Code Pavan Mohan#security-assessment#bug-hunting#secure-coding+1
2018-08-09TalkBlackhat Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina Presentation Source Code Video Bhargava Shastry, Vincent Ulitzsch, Dominik Maier#security-assessment#blueteam#linux+1
2018-08-09Tool demoBlackhat BLEMystique: Affordable Custom BLE Target Source Code Nishant Sharma, Jeswin Mathai#ble#wearables#security-assessment
2018-08-09Tool demoBlackhat Jackhammer: One Security Vulnerability Assessment/Management Tool Source Code Madhusudhan Konda, Rajagopal Vr, Shreyas Chidambara#azure#aws#gcp+3
2018-08-09Tool demoBlackhat OWASP Offensive Web Testing Framework Source Code Viyat Bhalodia#owasp#security-assessment#red-teaming
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-08Tool demoBlackhat Astra: Automated Security Testing For REST APIs Source Code Ankur Bhargava, Prajal Kulkarni, Sagar Popat#security-assessment#rest-api#api-security+4
2018-08-08Tool demoBlackhat Damn Vulnerable iOS App: Swift Edition Source Code Prateek Gianchandani#ios#security-assessment#red-teaming
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-08Tool demoBlackhat PA Toolkit: Wireshark Plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#network-architecture+2
2018-08-08Tool demoBlackhat V2X Validation Tool Source Code Raashid Ansari, Jonathan Petit#security-assessment#automobile#red-teaming
2018-06-04TalkConfidence From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days Himanshu Sharma, Aman Sachdev#red-teaming#ethical-hacking#security-assessment+2
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#red-teaming#blueteam+1
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsetty#security-assessment#red-teaming#blueteam+4
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiry#android#fuzzing#red-teaming+3
2018-01-31TalkOwaspappseccalifornia Hunter – Optimize your Pentesters time Video Kiran Shirali#application-pentesting#security-assessment#devsecops
2017-12-06TalkBlackhat DIFUZZING ANDROID KERNEL DRIVERS Presentation Whitepaper Video Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Jake Corina, Shuang Hao#android#red-teaming#linux+2
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Gupta#iot-pentesting#embedded-security#security-assessment+2
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkar#vulnerability-assessment#security-assessment#secure-coding+1
2017-10-05TalkVirusbulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#security-assessment#firmware-analysis
2017-08-18TalkC0c0n Androsia: A tool for securing in memory sensitive data Source Code Samit Anwer#secure-coding#android#security-assessment
2017-08-18TalkC0c0n CoAP versus MQTT: IoT Protocol Vulnerability analysis Rajiv Pandey#security-assessment#iot-pentesting#embedded-systems+1
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkar#ios#security-assessment#blueteam+1
2017-08-18TalkC0c0n Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis Furqan Khan, Siddharth Anbalahan#machine-learning#security-assessment#nlp+4
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakhar#exploitation#security-assessment#reverse-engineering
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2017-07-29Tool demoDefcon Fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi, Srinivas Rao#fuzzing#rest-api#security-assessment
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-28Tool demoDefcon GibberSense Source Code Ajit Hatti#encryption#red-teaming#security-assessment
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shah#encryption#security-assessment#audit+1
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#security-assessment+1
2017-07-27Tool demoBlackhat Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday Source Code Lalith Rallabhandi, Abhijeth Dugginapeddi, Srinivas Rao#fuzzing#rest-api#security-assessment+1
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Mane#ics-security#security-assessment#embedded-systems+4
2017-07-27Tool demoBlackhat Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes Source Code Anshuman Bhartiya#security-assessment#bug-hunting#cloud-workload-protection+3
2017-06-26Tool demoBlackhat DiffDroid Source Code Anto Joseph#android#security-assessment#web-security
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-03-30Tool demoBlackhat DAMN VULNERABLE SS7 NETWORK Source Code Akib Sayyed#security-assessment#dos#ss7
2017-03-24TalkInsomnihack How we hacked Distributed Configuration Management Systems Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Bharadwaj Machiraju, Francis Alexander#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyed#ss7#security-assessment#blueteam+2
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machiraju#ml#security-assessment#application-pentesting+4
2016-11-06TalkGroundzerosummit Hacking The Droids Anto Joseph#android-security#reverse-engineering#security-assessment+2
2016-11-04Tool demoBlackhat AppMon: Runtime Security Testing & Profiling Framework for Native Apps Source Code Nishant Das Patnaik#security-assessment#ios#macos+1
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Gupta#firmware#security-assessment#embedded-systems+3
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2016-10-07TalkDeepsec Inside Stegosploit Presentation Video Saumil Shah#web-security#exploitation#security-assessment
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-08-04Tool demoBlackhat AppMon Source Code Nishant Das Patnaik#ios#macos#android+1
2016-08-04TalkBlackhat DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes Presentation Whitepaper Video Rohit Mothe, Rodrigo Rubira Branco#security-assessment#application-pentesting#dynamic-analysis+3
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda#security-assessment#threat-hunting#osint+1
2016-07-01TalkHackinparis DIFFDroid - Dynamic Analysis Made Easier for Android Source Code Video Anto Joseph#android#security-assessment#web-security
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-05-26TalkHitbsecconf HITB Lab: Mobile Application Security for iOS and Android Source Code Tushar Dalvi, Tony Trummer#android#ios#security-assessment+2
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-04-01Tool demoBlackhat HackSys Extreme Vulnerable Driver Presentation Whitepaper Source Code Ashfaq Ansari#red-teaming#security-assessment#windows
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singh, Lea Paul#security-assessment#ethical-hacking#privilege-escalation+2
2016-03-11TalkNullcon Automated Mobile Application Security Assessment with MobSF Presentation Source Code Ajin Abraham#android#ios#security-assessment
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkar#security-assessment#reverse-engineering#hardware-hacking
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2015-11-05TalkGroundzerosummit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jain#incident-management#reverse-engineering#security-assessment
2015-08-28Tool demoBlackhat Damn Vulnerable iOS App (DVIA) Source Code Prateek Gianchandani#ios#security-assessment#red-teaming
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Sood#scada#hmi#security-assessment+4
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittal#security-assessment#red-teaming#exploitation+3
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvi, Tony Trummer#android#metasploit#red-teaming+3
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekar#security-assessment#ethical-hacking#vulnerability-assessment+2
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalvi#android#red-teaming#security-assessment+2
2015-08-01TalkC0c0n A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. Riyaz Walikar#windows#red-teaming#security-assessment
2015-08-01TalkC0c0n Automated Security Analysis of Android & iOS Applications with Mobile Security Framework Presentation Source Code Ajin Abraham#android#ios#security-assessment
2015-05-29TalkHitbsecconf PowerShell for Penetration Testers Presentation Nikhil Mittal#red-teaming#windows#powershell+1
2015-05-28TalkHitbsecconf The Savage Curtain: Mobile SSL Failures Presentation Whitepaper Tushar Dalvi, Tony Trummer#ssl#security-assessment#mobile-application-management+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abraham#owasp#xss#blueteam+3
2015-03-26Tool demoBlackhat YSO Mobile Security Framework Source Code Ajin Abraham#android#ios#security-assessment
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomas#security-assessment#network-pentesting#vulnerability-assessment+1
2015-02-06TalkNullcon Pentesting a website with million lines of Javascript Presentation Lavakumar Kuppan, Ahamed Nafeez#web-security#security-assessment#application-pentesting+2
2015-02-06TalkNullcon Toliman, a Hadoop Pentesting Tool Source Code Jitendra Chauhan#security-assessment#security-tools#cloud-workload-protection+2
2014-10-17TalkBlackhat Android Kernel and OS Security Assessment with Iron Crow Video Akhil Arora, Sumanth Naropanth#android#kernel#android-security+1
2014-09-24TalkBrucon OWASP: OWTF Source Code Video Bharadwaj Machiraju#security-assessment#application-pentesting#dynamic-analysis+2
2014-08-21TalkUsenix The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhawe, Zhiwei Li, Warren He, Dawn Song#web-security#xss#csrf+2
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Sood#red-teaming#security-assessment#ics-security+3
2014-08-06Tool demoBlackhat Flowinspect: Yet another network inspection tool Source Code Ankur Tyagi#security-assessment#network-monitoring#ids+2
2014-06-23TalkHackinparis Pentesting NoSQL DB’s with NoSQL Exploitation Framework Presentation Video Francis Alexander#secure-coding#security-assessment#application-pentesting+4
2014-05-21TalkPhdays Android Exploitation Video Aditya Gupta#android#red-teaming#security-assessment+1
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwate#reverse-engineering#security-assessment#security-testing
2014-02-15Tool demoNullcon DrupSnipe Ranjeet Sengar, Sukesh Pappu#drupal#security-assessment#application-pentesting+2
2014-02-15Tool demoNullcon OWASP OWTF - The Offensive (Web) Testing Framework Source Code Bharadwaj Machiraju, Abraham Aranguren#security-assessment#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abraham#owasp#xss#blueteam+3
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyagi#security-assessment#malware-detection#network-monitoring+2
2014-02-14TalkNullcon o’Dea Assertions - Untwining the Security of the SAML Protocol Video Achin Kulshrestha#authentication#saml#sso+2
2014-02-14TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Presentation Video Ankita Gupta, Lavakumar Kuppan#security-assessment#application-pentesting#security-development-lifecycle+3
2013-11-07TalkGroundzerosummit How I built a pentest lab in under 70 USD Swaroop Yermalkar#security-assessment#ethical-hacking#bug-bounty+1
2013-11-07TalkGroundzerosummit IronWASP Source Code Lavakumar Kuppan#security-assessment#application-pentesting#security-tools+2
2013-09-27TalkC0c0n From Bedroom to Boardroom - Taking your Weekend Infosec Project Global Vivek Ramachandran#devsecops#secure-development#security-assessment+2
2013-09-27TalkC0c0n Snake Bites Presentation Anant Shrivastava#secure-coding#security-assessment#xss
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkar#security-assessment#forensics#digital-forensics+1
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalra#security-assessment#red-teaming#blueteam+1
2013-05-28TalkConfidence My Experiments with truth: a different route to bug hunting Video Devesh Bhatt#security-assessment#vulnerability-assessment#secure-development+2
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-03-01TalkNullcon Automating JavaScript Static Analysis Lavakumar Kuppan#web-security#security-assessment#blueteam
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shah#code-analysis#secure-development#blueteam+4
2012-12-01TalkClubhack HAWAS – Hybrid Analyzer for Web Application Security Presentation Video Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halder#android-security#reverse-engineering#security-assessment+1
2012-09-26TalkNullcon The art of Passive Web Vul Analysis with IronWASP Video Lavakumar Kuppan#security-assessment#application-pentesting#security-testing+2
2012-08-03TalkC0c0n Cracking the Mobile Application Source Code Presentation Sreenarayan Ashokkumar#android#ios#blackberry+2
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxena#security-assessment#exploitation#cyber-war+3
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goel#social-engineering#security-assessment#security-training+1
2012-08-03TalkC0c0n WebApp Remote Code Execution using Server Side Scripting Engines Presentation Rahul Sasi#red-teaming#security-assessment#application-pentesting+4
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittal#post-exploitation#ethical-hacking#security-assessment+1
2012-05-24TalkHitbsecconf CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants Presentation Video Rahul Sasi#security-assessment#ivr#application-pentesting+2
2012-03-21TalkTroopers More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard Presentation Source Code Nikhil Mittal#security-assessment#red-teaming#keylogging
2012-03-15TalkNullcon An App(le) a day keeps the wallet away Antriksh Shah#security-assessment#web-security#api-security+1
2012-02-15TalkNullcon Haxdroid: Empowering Android Handset Video Anant Shrivastava, Prashant Mahajan, Pardhasaradhi Ch#android#security-assessment#red-teaming
2012-02-15TalkNullcon Javascript static analysis with IronWASP Presentation Video Lavakumar Kuppan#web-security#security-assessment#blueteam
2012-02-15TalkNullcon Ra.2 Blackbox DOM-based XSS scanner Presentation Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#xss#blueteam#security-assessment
2011-12-04TalkClubhack Pen testing Mobile Applications Presentation Prashant Verma#security-assessment#android#ios
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2011-12-04TalkClubhack Mere paas Teensy hai Presentation Nikhil Mittal#hid#red-teaming#security-assessment
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Presentation Jagadeesh Chandraiah#trojan#reverse-engineering#security-assessment
2011-11-04TalkHackfest Here are your keystrokes Nikhil Mittal#red-teaming#keylogging#security-assessment+1
2011-10-07TalkC0c0n Automated Malware Analysis - Setting up the Environment Presentation K v Prashant, Pushkar Pashupat#security-assessment#dynamic-analysis#malware-research+1
2011-10-07TalkC0c0n Pentesting iPhone Applications Presentation Satish Bommisetty#ios#security-assessment#application-pentesting+4
2011-09-07TalkSecuritybyte IronWASP - A Web Application Security Testing Platform Presentation Source Code Lavakumar Kuppan#security-assessment#application-pentesting#dynamic-analysis+4
2011-02-25TalkNullcon Penetration Testing a Biometric System Presentation Whitepaper Video Rahul Sasi#security-assessment#biometric#hid+1
2011-02-25TalkNullcon SSLSmart – Smart SSL Cipher Enumeration Presentation Gursev Singh Kalra#encryption#ssl#security-assessment
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwa#security-assessment#security-training#risk-management
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Ramesh#botnet#reverse-engineering#security-assessment
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindane#secure-coding#red-teaming#security-assessment
2010-02-25TalkNullcon Penetration Testing versus Source Code Presentation Nikhil Wagholikar#security-assessment#code-analysis#application-pentesting+4
2009-12-05TalkClubhack Mobile Application Security Testing Presentation Gursev Singh Kalra#security-assessment#mobile-pentesting#application-pentesting+4
2009-12-05TalkClubhack Risk Based Penetration Testing Presentation Nikhil Wagholikar, K K Mookhey#security-assessment#incident-management#cybersecurity-strategy+1
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shah#secure-coding#devsecops#software-security+2
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookhey#security-assessment#risk-management#ethical-hacking+3
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2008-12-06TalkClubhack Introduction to backtrack Presentation Kunal Sehgal#security-assessment#linux#ethical-hacking+1
2008-08-20TalkOwaspappsecindia Case Study: Testing 200+ applications in a $10 Billion Enterprise Presentation Roshen Chandran#security-assessment#application-pentesting#security-testing+4
2008-08-20TalkOwaspappsecindia Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2007-12-09TalkClubhack The future of automated web application testing Presentation Amish Shah, Umesh Nagori#security-assessment#application-pentesting#security-testing+3
2007-03-15TalkBlackhat Exploit-Me Series – Free Firefox Application Penetration Testing Suite Launch Presentation Video Nish Bhalla, Rohit Sethi#web-security#xss#sql-injection+4
2005-04-10TalkHitbsecconf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singh#red-teaming#blueteam#purpleteam+1
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Popli#security-assessment#data-protection#blueteam