🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Security Tools

Focus Area: ⚙️ DevSecOps
125
Total Entries
132
Contributors

Top Contributors

Saumil Shah(7) Shubham Mittal(5) Ajit Hatti(3) Gursev Singh Kalra(3) Madhu Akula(3)

All Entries (125 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-10Tool demoBlackhat EKSi-lite: Simple & Lightweight EKS Cluster Listing & Security Tool Source Code Divyanshu Shukla, Anjali Singh Shukla#aws#kubernetes#cloud-security-posture-management+4
2025-08-07Tool demoBlackhat Kubernetes Security Scanner Source Code Video Krishna Priya#kubernetes#cloud-workload-protection#container-security+4
2025-08-07Tool demoBlackhat Spotter – Universal Kubernetes Security Scanner & Policy Enforcer Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishra#web-security#malware-detection#browser-security+2
2025-04-04Tool demoBlackhat Agneyastra - Firebase Misconfiguration Detection Toolkit V2 Source Code Bhavarth Karmarkar, Devang Solanki#misconfiguration#cloud-pentesting#security-tools+1
2025-04-04Tool demoBlackhat Decoy Mutex Source Code Madhukar Raina#ransomware#endpoint-protection#malware-prevention+3
2025-04-04Tool demoBlackhat Intro to CICDGuard - How to have visibility and security OF CICD ecosystem Source Code Pramod Rana#cicd-pipeline#cicd-security#secure-development+3
2025-04-04Tool demoBlackhat Kubernetes Goat: A Hands-on Interactive Kubernetes Security Playground Source Code Madhu Akula#kubernetes#cloud-workload-protection#container-security+4
2025-04-03Tool demoBlackhat Halberd : Multi-Cloud Security Testing Tool Source Code Arpan Abani Sarkar#cloud-access-security-broker#cloud-pentesting#security-tools+2
2025-04-03Tool demoBlackhat KubeSF V1.2 - Kubernetes Security Posture Audit Suite Abhishek S, Ajith Prabhu#kubernetes#cloud-workload-protection#container-security+4
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-04-03Tool demoBlackhat VulnScout Samaksh K, Nimit Jain#automated-scanning#security-tools
2025-03-01PanelNullcon AI in SecOps: Enhancing Incident Response with Intelligence Mrudul Uchil, Parag Deodhar, Felix Mohan#ai-security#ai#machine-learning+3
2025-03-01TalkNullcon MacOS Lockdown Mode: A Forensic Deep Dive Video Bhargav Rathod#macos#digital-forensics#endpoint-protection+3
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2024-04-19Tool demoBlackhat Monitoring and Detecting Leaks with GitAlerts Source Code Nikhil Mittal 1#osint#data-leak#reconnaissance+1
2024-04-18Tool demoBlackhat findmytakeover - find dangling domains in a multi cloud environment Source Code Aniruddha Biyani#dns#cloud-workload-protection#cloud-pentesting+1
2024-04-18Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#cloud-pentesting+3
2023-12-07Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Prateek Thakare, Bharath Kumar, Praveen Kanniah#red-teaming#asset-inventory#asset-management+2
2023-12-07Tool demoBlackhat Route53Sweep: Empowering AWS Route53 Security with Automated Scanning & Comprehensive Inventory Management Source Code Divyanshu Shukla, Anjali Singh Shukla#aws#cloud-access-security-broker#cloud-monitoring+2
2023-12-06Tool demoBlackhat AndroCop: One Click Forensic Investigation & Data Extraction Tool Abhinand N, Aswin M Guptha, Varun Nair#android#android-security#mobile-forensics+4
2023-12-06Tool demoBlackhat HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services Source Code Rohit Kumar#bug-hunting#data-loss-prevention#data-protection+4
2023-12-06Tool demoBlackhat SSH into any device from anywhere with ZERO Open Network ports Source Code Anthony Prakash, Colin Constable#ssh#zero-trust#secure-development+1
2023-10-13TalkHackfest Exploring RAM Forensic Analysis for Effective Digital Investigations Video Sneha Banerjee#forensics#memory-forensics#digital-forensics+2
2023-09-23PanelNullcon SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAM’S JOURNEY TO EXCELLENCE Dinesh Varma, Satish Kumar Dwibhashi, Manoj Kumar#secure-development#security-tools#cicd-security+2
2023-08-25Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#dns#machine-learning#security-tools+1
2023-08-24Tool demoHitbsecconf Vajra Source Code Raunak Parmar#aws#azure#cloud-pentesting+3
2023-08-10Tool demoBlackhat MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments Source Code Aditya K Sood#ransomware#malware-detection#security-tools
2023-08-10Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#sast#secure-development+4
2023-08-09Tool demoBlackhat ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections Video Ankit Anurag, Ashwath Kumar, Manikandan Rajappan#cloud-access-security-broker#incident-management#security-tools+2
2023-05-12Tool demoBlackhat eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF Source Code Sagar Bhure#dns#machine-learning#network-monitoring+2
2023-05-12Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#static-analysis#sast+2
2023-05-11Tool demoBlackhat CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2023-05-11Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhure, Shain Singh#encryption#quantum-computing#secure-development+3
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansari#threat-hunting#windows#security-tools
2023-04-20TalkHitbsecconf BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES Presentation Video Rohan Aggarwal#hacking#hardware-hacking#bypassing+3
2022-12-07Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+1
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-09-06PanelNullcon Consumer Tech Bug Bounty Panel: Hear from the Program Managers Video Sandeep Singh, Rishika Hooda, Omar Benbouazza#bug-bounty#security-testing#application-hardening+3
2022-08-25TalkHitbsecconf MPT: Pentest In Action Presentation Video Jyoti Raval#security-assessment#application-pentesting#asset-management+2
2022-08-13PanelDefcon Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs Niru Ragupathy#security-development-lifecycle#security-tools#incident-management+2
2022-08-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Amrudesh Balakrishnan, Rahul Sani, Abhishek Jm#android#android-security#application-pentesting+4
2022-08-10Tool demoBlackhat ArcherySec - Manage and Automate your Vulnerability Assessment Source Code Anand Tiwari#application-pentesting#ci-cd#dynamic-analysis+3
2022-08-10Tool demoBlackhat CANalyse (2.0): A vehicle network analysis and attack tool Source Code Kartheek Lade, Rahul Jeyasingh#automobile#car-hacking#iot-device-management+4
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Source Code Ajit Hatti#secure-coding#secure-development#security-tools+3
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Manna#reverse-engineering#dynamic-analysis#network-pentesting+4
2022-08-10Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+3
2022-06-07TalkRsac Continuous Security - Integrating Pipeline Security Presentation Vandana Verma Sehgal#ci-cd#cicd-pipeline#cicd-security+3
2022-05-12Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singh#incident-management#digital-forensics#forensics+3
2021-11-10Tool demoBlackhat Kubestriker: A Blazing Fast Security Auditing Tool Source Code Vasant Kumar#kubernetes#cloud-workload-protection#container-security+3
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkar, Mauricio Espinosa#network-defense#application-pentesting#attack-surface+1
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2021-08-04Tool demoBlackhat Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool Source Code Pralhad Chaskar, Vasant Kumar#kubernetes#cloud-workload-protection#container-security+4
2020-09-18TalkC0c0n Introducing SniperPhish: A Web-Email Spear Phishing Toolkit Source Code Video Sreehari Haridas, Gem George#phishing#application-pentesting#security-development-lifecycle+4
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-08-06Tool demoBlackhat MSTICpy: The Security Analysis Swiss Army Knife Source Code Ashwin Patil, Pete Bryan, Ian Hellen#digital-forensics#incident-management#data-analytics+3
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Gupta#red-teaming#security-assessment#network-architecture+2
2019-09-13Talk44con One Person Army – Playbook on how to be the first Security Engineer at a company Video Kashish Mittal#devsecops#application-hardening#secure-development+4
2019-08-08Tool demoBlackhat CSF: Container Security Framework Source Code Vaibhav Gupta#blueteam#container-security#docker+2
2019-08-08TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#ci-cd#cicd-pipeline+4
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hatti#incident-management#threat-hunting#ssl+1
2019-06-02Tool demoDefcon VoIPShark: Open Source VoIP Analysis Platform Presentation Source Code Video Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#sip#network-pentesting+1
2019-03-28TalkBlackhat DevSecOps : What, Why and How Presentation Video Anant Shrivastava#devsecops#secure-coding#ci-cd+3
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargava#secure-coding#blueteam#application-pentesting+4
2019-02-28TalkNullcon Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida Source Code Video Shivang Desai#secure-coding#security-assessment#dynamic-analysis+4
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli#secure-coding#blueteam#application-hardening+4
2018-10-19TalkAppsecdayaustralia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargav#threat-modeling#devsecops#application-hardening+4
2018-09-27TalkRootcon Bug Bounty Hunting on Steroids Presentation Video Anshuman Bhartiya#bug-hunting#bug-bounty#security-tools+3
2018-09-12Talk44con Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#security-tools+3
2018-08-11Tool demoDefcon HealthyPi—Connected Health Source Code Ashwin Whitchurch#raspberry-pi#hardware-embedded#embedded-systems+4
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hatti#blueteam#secure-coding#smart-contracts+4
2018-03-22TalkBlackhat XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Presentation Video Ravi Sahita, Daiping Liu, Mingwei Zhang#blueteam#application-hardening#code-review+4
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajan#phishing#blueteam#anti-phishing+1
2017-12-07Tool demoBlackhat DataSploit - OSINT Framework Source Code Shubham Mittal#osint#reconnaissance#security-tools+2
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhan#aws#blueteam#cloud-monitoring+4
2017-08-18TalkC0c0n The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ Rushikesh D Nandedkar#wifi#network-pentesting#security-tools+1
2017-07-27Tool demoBlackhat Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes Source Code Anshuman Bhartiya#security-assessment#bug-hunting#cloud-workload-protection+3
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-03-30Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Shubham Mittal#osint#reconnaissance#security-tools+3
2016-11-03Tool demoBlackhat DataSploit Presentation Source Code Shubham Mittal, Nutan Kumar Panda#osint#reconnaissance#security-tools+3
2016-10-14TalkAppsecusa Automating API Penetration Testing using fuzzapi Source Code Video Abhijeth Dugginapeddi, Lalith Rallabhandi#fuzzing#api-security#application-pentesting+4
2016-10-14TalkAppsecusa DevOps to DevSecOps: a 2-dimensional view of security for DevOps Presentation Sanjeev Sharma#application-hardening#secure-coding#security-development-lifecycle+3
2016-08-19TalkC0c0n SSD Forensics : A Nightmare for Forensic Investigators Santosh Khadsare#forensics#memory-forensics#incident-management+2
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2015-11-05TalkGroundzerosummit chellam – a Wi-Fi IDS/Firewall for Windows Vivek Ramachandran#wifi#firewall#ids+3
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-11-05TalkGroundzerosummit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Panda#osint#deep-web#data-leak+4
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanian#blueteam#security-tools#automated-scanning+2
2015-02-06TalkNullcon Toliman, a Hadoop Pentesting Tool Source Code Jitendra Chauhan#security-assessment#security-tools#cloud-workload-protection+2
2014-09-24TalkBrucon OWASP: OWTF Source Code Video Bharadwaj Machiraju#security-assessment#application-pentesting#dynamic-analysis+2
2014-09-11Talk44con Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#imsi#endpoint-protection#security-tools
2014-08-22TalkC0c0n Still Single with a bleeding heart (Tool Release) Tamaghna Basu#secure-development#application-pentesting#secure-coding+1
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon OWASP OWTF - The Offensive (Web) Testing Framework Source Code Bharadwaj Machiraju, Abraham Aranguren#security-assessment#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon XMLChor Source Code Harshal Jamdade#exploitation#web-pentesting#security-tools
2013-11-07TalkGroundzerosummit How I built a pentest lab in under 70 USD Swaroop Yermalkar#security-assessment#ethical-hacking#bug-bounty+1
2013-11-07TalkGroundzerosummit IronWASP Source Code Lavakumar Kuppan#security-assessment#application-pentesting#security-tools+2
2013-09-27TalkC0c0n Blur Captcha Anirudh Duggal, Abhinav Mohanty#red-teaming#security-testing#application-pentesting+1
2013-09-27TalkC0c0n Pwning WiFi Devices! Swaroop Yermalkar#wifi#red-teaming#network-pentesting+2
2013-09-27TalkC0c0n Static analysis of malware with PyTriage Presentation Yashin Mehaboobe#secure-coding#static-analysis#dynamic-analysis+2
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayak#csrf#blueteam#application-pentesting+4
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+4
2012-08-15Award Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select) Source Code Gursev Singh Kalra#api-security#web-pentesting#security-tools
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2012-07-26Tool demoBlackhat Bypassing Every CAPTCHA provider with clipcaptcha Source Code Gursev Singh Kalra#web-security#bypassing#security-tools
2012-07-25Tool demoBlackhat Oyedata for OData Assessments Source Code Gursev Singh Kalra#api-security#web-pentesting#security-tools
2011-09-06TalkSecuritybyte Runtime thread injection and execution in Linux processes Presentation Aseem Jakhar#thread-injection#linux#process-injection+2
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-08-01TalkC0c0n Wireless MITM Prashant Mahajan#red-teaming#network-pentesting#security-tools
2009-07-31TalkDefcon Advancing Video Application Attacks with Video Interception, Recording, and Replay Presentation Video Arjun Sambamoorthy, Jason Ostrom#red-teaming#security-tools#application-hardening
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-08-05TalkDefcon Zulu A Command Line Wireless Frame Generator Whitepaper Source Code Video Anmol Sheth, Damon Mccoy#debugging#network-pentesting#linux+1
2006-04-13TalkHitbsecconf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shah#metasploit#red-teaming#exploit-development+3
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#automated-scanning+2
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#application-pentesting+3
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shah#fingerprinting#blueteam#application-pentesting+2