| 2025-12-10 | Tool demo | Blackhat |
EKSi-lite: Simple & Lightweight EKS Cluster Listing & Security Tool
| Divyanshu Shukla, Anjali Singh Shukla | #aws#kubernetes#cloud-security-posture-management+4 |
| 2025-08-07 | Tool demo | Blackhat |
Kubernetes Security Scanner
| Krishna Priya | #kubernetes#cloud-workload-protection#container-security+4 |
| 2025-08-07 | Tool demo | Blackhat |
Spotter – Universal Kubernetes Security Scanner & Policy Enforcer
| Madhu Akula | #kubernetes#cloud-workload-protection#container-security+4 |
| 2025-08-06 | Tool demo | Blackhat |
Realtic
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage | #security-assessment#vulnerability-assessment#static-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
SmuggleShield - Protection Against HTML Smuggling
| Dhiraj Mishra | #web-security#malware-detection#browser-security+2 |
| 2025-04-04 | Tool demo | Blackhat |
Agneyastra - Firebase Misconfiguration Detection Toolkit V2
| Bhavarth Karmarkar, Devang Solanki | #misconfiguration#cloud-pentesting#security-tools+1 |
| 2025-04-04 | Tool demo | Blackhat |
Decoy Mutex
| Madhukar Raina | #ransomware#endpoint-protection#malware-prevention+3 |
| 2025-04-04 | Tool demo | Blackhat |
Intro to CICDGuard - How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-pipeline#cicd-security#secure-development+3 |
| 2025-04-04 | Tool demo | Blackhat |
Kubernetes Goat: A Hands-on Interactive Kubernetes Security Playground
| Madhu Akula | #kubernetes#cloud-workload-protection#container-security+4 |
| 2025-04-03 | Tool demo | Blackhat |
Halberd : Multi-Cloud Security Testing Tool
| Arpan Abani Sarkar | #cloud-access-security-broker#cloud-pentesting#security-tools+2 |
| 2025-04-03 | Tool demo | Blackhat |
KubeSF V1.2 - Kubernetes Security Posture Audit Suite
| Abhishek S, Ajith Prabhu | #kubernetes#cloud-workload-protection#container-security+4 |
| 2025-04-03 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Hitesh Thakur, Praveen Kanniah, Prateek Thakare | #asset-inventory#cloud-workload-protection#security-tools+4 |
| 2025-04-03 | Tool demo | Blackhat |
VulnScout
| Samaksh K, Nimit Jain | #automated-scanning#security-tools |
| 2025-03-01 | Panel | Nullcon |
AI in SecOps: Enhancing Incident Response with Intelligence
| Mrudul Uchil, Parag Deodhar, Felix Mohan | #ai-security#ai#machine-learning+3 |
| 2025-03-01 | Talk | Nullcon |
MacOS Lockdown Mode: A Forensic Deep Dive
| Bhargav Rathod | #macos#digital-forensics#endpoint-protection+3 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-04-19 | Tool demo | Blackhat |
Malware clustering using unsupervised ML : CalMal
| Himanshu Anand | #machine-learning#ai-security#malware-detection+3 |
| 2024-04-19 | Tool demo | Blackhat |
Monitoring and Detecting Leaks with GitAlerts
| Nikhil Mittal 1 | #osint#data-leak#reconnaissance+1 |
| 2024-04-18 | Tool demo | Blackhat |
findmytakeover - find dangling domains in a multi cloud environment
| Aniruddha Biyani | #dns#cloud-workload-protection#cloud-pentesting+1 |
| 2024-04-18 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #docker#application-pentesting#cloud-pentesting+3 |
| 2023-12-07 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Prateek Thakare, Bharath Kumar, Praveen Kanniah | #red-teaming#asset-inventory#asset-management+2 |
| 2023-12-07 | Tool demo | Blackhat |
Route53Sweep: Empowering AWS Route53 Security with Automated Scanning & Comprehensive Inventory Management
| Divyanshu Shukla, Anjali Singh Shukla | #aws#cloud-access-security-broker#cloud-monitoring+2 |
| 2023-12-06 | Tool demo | Blackhat |
AndroCop: One Click Forensic Investigation & Data Extraction Tool
| Abhinand N, Aswin M Guptha, Varun Nair | #android#android-security#mobile-forensics+4 |
| 2023-12-06 | Tool demo | Blackhat |
HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services
| Rohit Kumar | #bug-hunting#data-loss-prevention#data-protection+4 |
| 2023-12-06 | Tool demo | Blackhat |
SSH into any device from anywhere with ZERO Open Network ports
| Anthony Prakash, Colin Constable | #ssh#zero-trust#secure-development+1 |
| 2023-10-13 | Talk | Hackfest |
Exploring RAM Forensic Analysis for Effective Digital Investigations
| Sneha Banerjee | #forensics#memory-forensics#digital-forensics+2 |
| 2023-09-23 | Panel | Nullcon |
SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAM’S JOURNEY TO EXCELLENCE
| Dinesh Varma, Satish Kumar Dwibhashi, Manoj Kumar | #secure-development#security-tools#cicd-security+2 |
| 2023-08-25 | Tool demo | Hitbsecconf |
eBPFShield
| Sagar Bhure | #dns#machine-learning#security-tools+1 |
| 2023-08-24 | Tool demo | Hitbsecconf |
Vajra
| Raunak Parmar | #aws#azure#cloud-pentesting+3 |
| 2023-08-10 | Tool demo | Blackhat |
MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments
| Aditya K Sood | #ransomware#malware-detection#security-tools |
| 2023-08-10 | Tool demo | Blackhat |
SCodeScanner - An Open-Source Source-Code Scanner
| Utkarsh Agrawal | #code-review#sast#secure-development+4 |
| 2023-08-09 | Tool demo | Blackhat |
ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections
| Ankit Anurag, Ashwath Kumar, Manikandan Rajappan | #cloud-access-security-broker#incident-management#security-tools+2 |
| 2023-05-12 | Tool demo | Blackhat |
eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF
| Sagar Bhure | #dns#machine-learning#network-monitoring+2 |
| 2023-05-12 | Tool demo | Blackhat |
SCodeScanner - An Open-Source Source-Code Scanner
| Utkarsh Agrawal | #code-review#static-analysis#sast+2 |
| 2023-05-11 | Tool demo | Blackhat |
CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2023-05-11 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #docker#application-pentesting#container-security+4 |
| 2023-05-11 | Tool demo | Blackhat |
Post-Quantum Cryptography Library
| Sagar Bhure, Shain Singh | #encryption#quantum-computing#secure-development+3 |
| 2023-05-11 | Tool demo | Blackhat |
ThreatSeeker - Threat Hunting via Windows Event Logs
| Ashish Bhangale, G Khartheesvar, Arafat Ansari | #threat-hunting#windows#security-tools |
| 2023-04-20 | Talk | Hitbsecconf |
BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES
| Rohan Aggarwal | #hacking#hardware-hacking#bypassing+3 |
| 2022-12-07 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#asset-inventory+1 |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | #vulnerability-assessment#security-development-lifecycle#risk-management+3 |
| 2022-09-06 | Panel | Nullcon |
Consumer Tech Bug Bounty Panel: Hear from the Program Managers
| Sandeep Singh, Rishika Hooda, Omar Benbouazza | #bug-bounty#security-testing#application-hardening+3 |
| 2022-08-25 | Talk | Hitbsecconf |
MPT: Pentest In Action
| Jyoti Raval | #security-assessment#application-pentesting#asset-management+2 |
| 2022-08-13 | Panel | Defcon |
Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs
| Niru Ragupathy | #security-development-lifecycle#security-tools#incident-management+2 |
| 2022-08-10 | Tool demo | Blackhat |
Adhrit: Android Security Suite
| Amrudesh Balakrishnan, Rahul Sani, Abhishek Jm | #android#android-security#application-pentesting+4 |
| 2022-08-10 | Tool demo | Blackhat |
ArcherySec - Manage and Automate your Vulnerability Assessment
| Anand Tiwari | #application-pentesting#ci-cd#dynamic-analysis+3 |
| 2022-08-10 | Tool demo | Blackhat |
CANalyse (2.0): A vehicle network analysis and attack tool
| Kartheek Lade, Rahul Jeyasingh | #automobile#car-hacking#iot-device-management+4 |
| 2022-08-10 | Tool demo | Blackhat |
CASPR - Code Trust Audit Framework
| Ajit Hatti | #secure-coding#secure-development#security-tools+3 |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | #reverse-engineering#dynamic-analysis#network-pentesting+4 |
| 2022-08-10 | Tool demo | Blackhat |
ReconPal: Leveraging NLP for Infosec
| Jeswin Mathai, Shantanu Kale, Sherin Stephen | #reconnaissance#ai-security#nlp+3 |
| 2022-06-07 | Talk | Rsac |
Continuous Security - Integrating Pipeline Security
| Vandana Verma Sehgal | #ci-cd#cicd-pipeline#cicd-security+3 |
| 2022-05-12 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #docker#application-pentesting#container-security+4 |
| 2021-11-13 | Talk | C0c0n |
Emerging trends in cyber crimes : Investigation tools & techniques
| Triveni Singh | #incident-management#digital-forensics#forensics+3 |
| 2021-11-10 | Tool demo | Blackhat |
Kubestriker: A Blazing Fast Security Auditing Tool
| Vasant Kumar | #kubernetes#cloud-workload-protection#container-security+3 |
| 2021-08-04 | Tool demo | Blackhat |
Attack Surface Framework
| Prajwal Panchmahalkar, Mauricio Espinosa | #network-defense#application-pentesting#attack-surface+1 |
| 2021-08-04 | Tool demo | Blackhat |
Joern: An Interactive Shell for Code Analysis
| Suchakra Sharma, Vickie Li, Fabian Yamaguchi | #vulnerability-assessment#code-review#sast+4 |
| 2021-08-04 | Tool demo | Blackhat |
Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool
| Pralhad Chaskar, Vasant Kumar | #kubernetes#cloud-workload-protection#container-security+4 |
| 2020-09-18 | Talk | C0c0n |
Introducing SniperPhish: A Web-Email Spear Phishing Toolkit
| Sreehari Haridas, Gem George | #phishing#application-pentesting#security-development-lifecycle+4 |
| 2020-09-18 | Talk | C0c0n |
Automation in Bug Bounties to Work Smarter
| Prerak Mittal | #bug-hunting#bug-bounty#security-tools+4 |
| 2020-08-06 | Tool demo | Blackhat |
MSTICpy: The Security Analysis Swiss Army Knife
| Ashwin Patil, Pete Bryan, Ian Hellen | #digital-forensics#incident-management#data-analytics+3 |
| 2020-03-06 | Tool demo | Nullcon |
PivotSuite
| Manish Gupta | #red-teaming#security-assessment#network-architecture+2 |
| 2019-09-13 | Talk | 44con |
One Person Army – Playbook on how to be the first Security Engineer at a company
| Kashish Mittal | #devsecops#application-hardening#secure-development+4 |
| 2019-08-08 | Tool demo | Blackhat |
CSF: Container Security Framework
| Vaibhav Gupta | #blueteam#container-security#docker+2 |
| 2019-08-08 | Talk | Blackhat |
DevSecOps : What, Why and How
| Anant Shrivastava | #devsecops#ci-cd#cicd-pipeline+4 |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | #incident-management#threat-hunting#ssl+1 |
| 2019-06-02 | Tool demo | Defcon |
VoIPShark: Open Source VoIP Analysis Platform
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#sip#network-pentesting+1 |
| 2019-03-28 | Talk | Blackhat |
DevSecOps : What, Why and How
| Anant Shrivastava | #devsecops#secure-coding#ci-cd+3 |
| 2019-03-28 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli, Ankur Bhargava | #secure-coding#blueteam#application-pentesting+4 |
| 2019-02-28 | Talk | Nullcon |
Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida
| Shivang Desai | #secure-coding#security-assessment#dynamic-analysis+4 |
| 2018-12-05 | Tool demo | Blackhat |
Kurukshetra: Playground for Interactive Security Learning
| Anirudh Anand, Mohan Kallepalli | #secure-coding#blueteam#application-hardening+4 |
| 2018-10-19 | Talk | Appsecdayaustralia |
Threat Modeling-as-Code & Automation for DevSecOps wins
| Abhay Bhargav | #threat-modeling#devsecops#application-hardening+4 |
| 2018-09-27 | Talk | Rootcon |
Bug Bounty Hunting on Steroids
| Anshuman Bhartiya | #bug-hunting#bug-bounty#security-tools+3 |
| 2018-09-12 | Talk | 44con |
Make ARM Shellcode Great Again
| Saumil Shah | #arm#embedded-systems#security-tools+3 |
| 2018-08-11 | Tool demo | Defcon |
HealthyPi—Connected Health
| Ashwin Whitchurch | #raspberry-pi#hardware-embedded#embedded-systems+4 |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | #security-analytics#threat-hunting#osint+3 |
| 2018-08-08 | Tool demo | Blackhat |
SCoDA: Smart COntract Defender and Analyzer
| Ajit Hatti | #blueteam#secure-coding#smart-contracts+4 |
| 2018-03-22 | Talk | Blackhat |
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot
| Ravi Sahita, Daiping Liu, Mingwei Zhang | #blueteam#application-hardening#code-review+4 |
| 2018-03-01 | Talk | Nullcon |
SpotPhish: Zero-Hour Phishing Protection
| Ganesh Varadarajan | #phishing#blueteam#anti-phishing+1 |
| 2017-12-07 | Tool demo | Blackhat |
DataSploit - OSINT Framework
| Shubham Mittal | #osint#reconnaissance#security-tools+2 |
| 2017-12-07 | Tool demo | Blackhat |
THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL
| Raghudeep Kannavara | #threat-intelligence-analysis#machine-learning#security-development-lifecycle+4 |
| 2017-08-18 | Talk | C0c0n |
Cloud_Security Suite - One stop tool for auditing cloud infrastructure
| Shivankar Madaan, Jayesh Chauhan | #aws#blueteam#cloud-monitoring+4 |
| 2017-08-18 | Talk | C0c0n |
The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/
| Rushikesh D Nandedkar | #wifi#network-pentesting#security-tools+1 |
| 2017-07-27 | Tool demo | Blackhat |
Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes
| Anshuman Bhartiya | #security-assessment#bug-hunting#cloud-workload-protection+3 |
| 2017-07-26 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan | #osint#reconnaissance#social-engineering+4 |
| 2017-03-30 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Shubham Mittal | #osint#reconnaissance#security-tools+3 |
| 2016-11-03 | Tool demo | Blackhat |
DataSploit
| Shubham Mittal, Nutan Kumar Panda | #osint#reconnaissance#security-tools+3 |
| 2016-10-14 | Talk | Appsecusa |
Automating API Penetration Testing using fuzzapi
| Abhijeth Dugginapeddi, Lalith Rallabhandi | #fuzzing#api-security#application-pentesting+4 |
| 2016-10-14 | Talk | Appsecusa |
DevOps to DevSecOps: a 2-dimensional view of security for DevOps
| Sanjeev Sharma | #application-hardening#secure-coding#security-development-lifecycle+3 |
| 2016-08-19 | Talk | C0c0n |
SSD Forensics : A Nightmare for Forensic Investigators
| Santosh Khadsare | #forensics#memory-forensics#incident-management+2 |
| 2016-08-06 | Tool demo | Defcon |
Datasploit
| Shubham Mittal | #osint#reconnaissance#data-leak+4 |
| 2015-11-05 | Talk | Groundzerosummit |
chellam – a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | #wifi#firewall#ids+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Hacking RFIDs under 2000INR
| Jayesh Chauhan | #rfid#red-teaming#hardware-embedded+4 |
| 2015-11-05 | Talk | Groundzerosummit |
OSINT Black Magic: Listen who whispers your name in the dark!!!
| Sudhanshu Chauhan, Nutan Kumar Panda | #osint#deep-web#data-leak+4 |
| 2015-03-26 | Tool demo | Blackhat |
SecPod Saner
| Preeti Subramanian | #blueteam#security-tools#automated-scanning+2 |
| 2015-02-06 | Talk | Nullcon |
Toliman, a Hadoop Pentesting Tool
| Jitendra Chauhan | #security-assessment#security-tools#cloud-workload-protection+2 |
| 2014-09-24 | Talk | Brucon |
OWASP: OWTF
| Bharadwaj Machiraju | #security-assessment#application-pentesting#dynamic-analysis+2 |
| 2014-09-11 | Talk | 44con |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | #imsi#endpoint-protection#security-tools |
| 2014-08-22 | Talk | C0c0n |
Still Single with a bleeding heart (Tool Release)
| Tamaghna Basu | #secure-development#application-pentesting#secure-coding+1 |
| 2014-02-15 | Tool demo | Nullcon |
NoSQL Exploitation Framework
| Francis Alexander | #red-teaming#application-pentesting#security-tools+3 |
| 2014-02-15 | Tool demo | Nullcon |
OWASP OWTF - The Offensive (Web) Testing Framework
| Bharadwaj Machiraju, Abraham Aranguren | #security-assessment#application-pentesting#security-tools+3 |
| 2014-02-15 | Tool demo | Nullcon |
XMLChor
| Harshal Jamdade | #exploitation#web-pentesting#security-tools |
| 2013-11-07 | Talk | Groundzerosummit |
How I built a pentest lab in under 70 USD
| Swaroop Yermalkar | #security-assessment#ethical-hacking#bug-bounty+1 |
| 2013-11-07 | Talk | Groundzerosummit |
IronWASP
| Lavakumar Kuppan | #security-assessment#application-pentesting#security-tools+2 |
| 2013-09-27 | Talk | C0c0n |
Blur Captcha
| Anirudh Duggal, Abhinav Mohanty | #red-teaming#security-testing#application-pentesting+1 |
| 2013-09-27 | Talk | C0c0n |
Pwning WiFi Devices!
| Swaroop Yermalkar | #wifi#red-teaming#network-pentesting+2 |
| 2013-09-27 | Talk | C0c0n |
Static analysis of malware with PyTriage
| Yashin Mehaboobe | #secure-coding#static-analysis#dynamic-analysis+2 |
| 2013-03-01 | Talk | Nullcon |
Bug Bounty Hunter’s confession
| Amol Naik | #bug-hunting#security-training#ethical-hacking+3 |
| 2013-03-01 | Talk | Nullcon |
CSRF Finder as a Mozilla Addon
| Piyush Pattanayak | #csrf#blueteam#application-pentesting+4 |
| 2012-12-01 | Talk | Clubhack |
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
| Ajin Abraham | #xss#red-teaming#application-pentesting+4 |
| 2012-08-15 | Award | |
Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select)
| Gursev Singh Kalra | #api-security#web-pentesting#security-tools |
| 2012-08-03 | Talk | C0c0n |
Enterprise server security
| Raghav Shandilya | #blueteam#security-tools#network-monitoring+2 |
| 2012-07-26 | Tool demo | Blackhat |
Bypassing Every CAPTCHA provider with clipcaptcha
| Gursev Singh Kalra | #web-security#bypassing#security-tools |
| 2012-07-25 | Tool demo | Blackhat |
Oyedata for OData Assessments
| Gursev Singh Kalra | #api-security#web-pentesting#security-tools |
| 2011-09-06 | Talk | Securitybyte |
Runtime thread injection and execution in Linux processes
| Aseem Jakhar | #thread-injection#linux#process-injection+2 |
| 2010-12-04 | Talk | Clubhack |
Mantra – Free and Open Source security framework based on browser platform
| Abhi M Balakrishnan | #blueteam#endpoint-protection#application-pentesting+3 |
| 2010-08-01 | Talk | C0c0n |
Wireless MITM
| Prashant Mahajan | #red-teaming#network-pentesting#security-tools |
| 2009-07-31 | Talk | Defcon |
Advancing Video Application Attacks with Video Interception, Recording, and Replay
| Arjun Sambamoorthy, Jason Ostrom | #red-teaming#security-tools#application-hardening |
| 2009-03-16 | Talk | Cansecwest |
On Approaches and Tools for Automated Vulnerability Analysis
| Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert | #security-assessment#blueteam#automated-scanning+4 |
| 2006-10-19 | Talk | Hacklu |
Writing Metasploit plugins - from vulnerability to exploit
| Saumil Shah | #metasploit#red-teaming#exploit-development+3 |
| 2006-08-05 | Talk | Defcon |
Zulu A Command Line Wireless Frame Generator
| Anmol Sheth, Damon Mccoy | #debugging#network-pentesting#linux+1 |
| 2006-04-13 | Talk | Hitbsecconf |
Writing Metasploit Plugins - From Vulnerability to Exploit
| Saumil Shah | #metasploit#red-teaming#exploit-development+3 |
| 2004-05-19 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#automated-scanning+2 |
| 2004-01-29 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+3 |
| 2003-12-16 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#network-defense+3 |
| 2003-10-01 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+2 |