| 2025-12-11 | Tool demo | Blackhat |
SupplyShield: Protecting Your Software Supply Chain
| Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar | #supply-chain#sbom#software-composition-analysis+3 |
| 2025-04-03 | Talk | Blackhat |
Determining Exploitability of Vulnerabilities with SBOM and VEX
| Anusha Penumacha, Srinija Kammari | #sbom#supply-chain#sca+1 |
| 2025-04-03 | Tool demo | Blackhat |
SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application
| Hare Krishna Rai, Gaurav Joshi, K v Prashant | #supply-chain#supply-chain-attack#sca+1 |
| 2025-04-03 | Tool demo | Blackhat |
SupplyShield: Protecting your software supply chain
| Yadhu Krishna M, Akhil Mahendra, Hritik Vijay | #supply-chain#sbom#sca+2 |
| 2025-03-02 | Panel | Nullcon |
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
| Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni | #security-strategy#threat-modeling#zero-trust+3 |
| 2024-12-11 | Tool demo | Blackhat |
SCAGoat - Exploiting Damn Vulnerable SCA Application
| Hare Krishna Rai, Gaurav Joshi, K v Prashant | #supply-chain#sca#software-composition-analysis |
| 2024-11-15 | Talk | C0c0n |
[Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool
| Gaurav Joshi, Hare Krishna Rai | #supply-chain#sca#software-composition-analysis |
| 2023-12-06 | Tool demo | Blackhat |
SupplyShield: Protecting your software supply chain
| Akhil Mahendra, Hritik Vijay | #aws#supply-chain#sbom+2 |
| 2022-12-07 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#asset-inventory+1 |
| 2022-08-11 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#asset-inventory+4 |
| 2022-05-12 | Tool demo | Blackhat |
Patronus: Swiss Army Knife SAST Toolkit
| Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi | #sast#software-composition-analysis#secure-development+1 |
| 2020-12-10 | Talk | Blackhat |
Effective Vulnerability Discovery with Machine Learning
| Asankhaya Sharma, Ming Yi Ang | #security-assessment#machine-learning#software-composition-analysis+4 |
| 2018-09-27 | Talk | Rootcon |
Bug Bounty Hunting on Steroids
| Anshuman Bhartiya | #bug-hunting#bug-bounty#security-tools+3 |
| 2018-03-03 | Panel | Nullcon |
Forensic Challenges and Road Ahead
| Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov | #data-leak#data-protection#forensics+4 |
| 2015-09-24 | Talk | Appsecusa |
QARK: Android App Exploit and SCA Tool
| Tushar Dalvi, Tony Trummer | #android-security#sca#software-composition-analysis |