πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Software Composition Analysis

Focus Area: πŸ“¦ Software Supply Chain Security
15
Total Entries
22
Contributors

Top Contributors

Akhil Mahendra(5) Akshansh Jaiswal(3) Ashwin Shenoi(3) Gaurav Joshi(3) Hare Krishna Rai(3)

All Entries (15 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat SupplyShield: Protecting Your Software Supply Chain Source Code Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar#supply-chain#sbom#software-composition-analysis+3
2025-04-03TalkBlackhat Determining Exploitability of Vulnerabilities with SBOM and VEX Presentation Anusha Penumacha, Srinija Kammari#sbom#supply-chain#sca+1
2025-04-03Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#supply-chain-attack#sca+1
2025-04-03Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#supply-chain#sbom#sca+2
2025-03-02PanelNullcon Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni#security-strategy#threat-modeling#zero-trust+3
2024-12-11Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#sca#software-composition-analysis
2024-11-15TalkC0c0n [Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool Source Code Gaurav Joshi, Hare Krishna Rai#supply-chain#sca#software-composition-analysis
2023-12-06Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Akhil Mahendra, Hritik Vijay#aws#supply-chain#sbom+2
2022-12-07Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+1
2022-08-11Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+4
2022-05-12Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#secure-development+1
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2018-09-27TalkRootcon Bug Bounty Hunting on Steroids Presentation Video Anshuman Bhartiya#bug-hunting#bug-bounty#security-tools+3
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2015-09-24TalkAppsecusa QARK: Android App Exploit and SCA Tool Video Tushar Dalvi, Tony Trummer#android-security#sca#software-composition-analysis