| 2025-08-06 | Tool demo | Blackhat |
ARC β Artifact Reuse Comparator
| Rushikesh D Nandedkar | #static-analysis#reverse-engineering#binary-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
MORF β Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm | #app-security#mobile-pentesting#static-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ParseAndC 4.0 - The Final Cut
| Parbati Kumar Manna | #reverse-engineering#binary-analysis#code-analysis+4 |
| 2025-08-06 | Tool demo | Blackhat |
Realtic
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage | #security-assessment#vulnerability-assessment#static-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis
| Mohammed Tanveer | #reverse-engineering#binary-analysis#static-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker V2
| Devang Solanki | #container-security#docker#static-analysis+3 |
| 2025-08-06 | Tool demo | Blackhat |
vet: Proactive Guardrails against Malicious OSS using Code Analysis
| Abhisek Datta | #static-analysis#software-security#devsecops+2 |
| 2025-04-04 | Tool demo | Blackhat |
Intro to CICDGuard - How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-pipeline#cicd-security#secure-development+3 |
| 2025-04-04 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+2 |
| 2024-12-12 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das | #application-pentesting#code-review#secure-development+3 |
| 2024-12-11 | Tool demo | Blackhat |
Open Source Tool to Shift Left Security Testing by Leveraging AI
| Shivam Rawat, Shivansh Agrawal | #ai-security#secure-development#security-testing+2 |
| 2024-08-29 | Tool demo | Hitbsecconf |
AI Assisted Code Reviewer
| Rajanish Pathak, Hardik Mehta | #ai#ai-security#code-review+4 |
| 2024-08-15 | Talk | Usenix |
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks
| Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik | #binary-analysis#reverse-engineering#deep-learning+1 |
| 2024-04-19 | Tool demo | Blackhat |
AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs
| Asankhaya Sharma | #static-analysis#ai#vulnerability-assessment+1 |
| 2024-04-18 | Tool demo | Blackhat |
APKDeepLens - Android security insights in full spectrum
| Atul Singh, Deepanshu Gajbhiye | #android-security#static-analysis#mobile-pentesting+1 |
| 2024-04-18 | Tool demo | Blackhat |
BinderAPI Scanner & BASS
| Krishnaprasad Subramaniam, Jeffrey Gaor, Valen Sai, Eric Tee Hock Nian | #api-security#application-pentesting#dynamic-analysis+3 |
| 2024-04-18 | Tool demo | Blackhat |
DetectiveSQ: A Extension Auditing Framework Version 2
| Govind Krishna, Xian Xiang Chang | #audit#application-pentesting#ai-security+4 |
| 2024-04-18 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2023-12-07 | Tool demo | Blackhat |
Mobile Security Framework - MobSF
| Ajin Abraham | #android-security#ios-security#mobile-pentesting+2 |
| 2023-12-07 | Talk | Blackhat |
Unmasking APTs: An Automated Approach for Real-World Threat Attribution
| Aakansha Saha | #machine-learning#ai-security#static-analysis+1 |
| 2023-12-06 | Tool demo | Blackhat |
DetectiveSQ: A Extension Auditing Framework
| Jeswin Mathai, Shourya Pratap Singh | #threat-intelligence-analysis#application-pentesting#application-hardening+3 |
| 2023-12-06 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2023-09-23 | Talk | Nullcon |
Android-SigMorph: Covert Communication Exploiting Android Signing Schemes
| Ayan Saha, Achute Sharma | #android#application-pentesting#static-analysis+1 |
| 2023-09-23 | Talk | Nullcon |
Secure Coding: Fix From The Root
| Saddam Hussain, Gopika Subramanian | #secure-coding#application-pentesting#code-review+4 |
| 2023-09-23 | Talk | Nullcon |
Your App Is Probably A Spyware…Or Is It?
| Gaurav Gogia, Pandurang Patil | #spyware#secure-development#security-testing+3 |
| 2023-08-09 | Tool demo | Blackhat |
Damn Vulnerable Bank
| Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana | #android-security#application-pentesting#dynamic-analysis+3 |
| 2023-08-09 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+2 |
| 2023-08-07 | Talk | C0c0n |
Start Left SDLC Security with Open-Source DevSecOps Tooling
| Aswin Raj, Shruti M G | #devsecops#secure-development#static-analysis+3 |
| 2023-05-12 | Tool demo | Blackhat |
SCodeScanner - An Open-Source Source-Code Scanner
| Utkarsh Agrawal | #code-review#static-analysis#sast+2 |
| 2023-05-11 | Tool demo | Blackhat |
APKHunt | OWASP MASVS Static Analyzer
| Mrunal Chawda, Sumit Kalaria | #owasp#application-pentesting#code-review+4 |
| 2023-05-11 | Tool demo | Blackhat |
CASPR - Code Trust Auditing Framework
| Atharva Chincholkar, Srishti Chaubey | #secure-coding#application-pentesting#code-review+4 |
| 2023-05-11 | Tool demo | Blackhat |
Damn Vulnerable Bank
| Rewanth Tammana, Hrushikesh Kakade, Akshansh Jaiswal | #android-security#application-pentesting#dynamic-analysis+3 |
| 2023-05-11 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2023-05-11 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #docker#application-pentesting#container-security+4 |
| 2023-05-11 | Tool demo | Blackhat |
Post-Quantum Cryptography Library
| Sagar Bhure, Shain Singh | #encryption#quantum-computing#secure-development+3 |
| 2023-03-09 | Panel | Nullcon |
How to make security easier for your developers
| Santosh Yadav, Frida Kiriakos, Marie Theresa Brosig, Xavier Rene Corail | #secure-development#security-testing#secure-coding+3 |
| 2023-01-26 | Talk | Usenix |
Building an Automated Machine for Discovering Privacy Violations at Scale
| Suchakra Sharma | #static-analysis#secure-coding#data-protection+2 |
| 2022-12-08 | Tool demo | Blackhat |
Node Security Shield - A Lightweight RASP for NodeJS Applications
| Lavakumar Kuppan, Sukesh Pappu | #application-hardening#secure-development#security-testing+4 |
| 2022-12-07 | Tool demo | Blackhat |
vAPI: Vulnerable Adversely Programmed Interface
| Tushar Kulkarni | #api-security#application-pentesting#secure-development+4 |
| 2022-09-24 | Talk | C0c0n |
Raining CVEs on Wordpress plugins with Semgrep
| Shreya Pohekar, Syed Sheeraz Ali | #web-security#static-analysis#sast+1 |
| 2022-09-08 | Talk | Nullcon |
Hack the Source: Securing Open Source Software β One bug at a time
| Sandeep Singh, Laurie Mercer | #open-source-security#supply-chain#code-review+4 |
| 2022-09-08 | Talk | Nullcon |
Pushing Security Left By Mutating Byte Code
| Gaurav Gogia | #secure-coding#application-hardening#static-analysis+1 |
| 2022-09-08 | Talk | Nullcon |
Raining CVEs On WordPress Plugins With Semgrep
| Shreya Pohekar, Syed Sheeraz Ali | #static-analysis#code-review#secure-coding+3 |
| 2022-09-07 | Talk | Nullcon |
Do PDF Tools Conform To The Specification?
| Prashant Anantharaman | #pdf#data-protection#static-analysis+4 |
| 2022-09-07 | Talk | Nullcon |
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron
| Mohan Sri Rama Krishna Pedhapati, Maxwell Garrett | #red-teaming#application-pentesting#dynamic-analysis+4 |
| 2022-09-06 | Panel | Nullcon |
Securing the Software
| Mrudul Uchil, Abhisek Datta, Harish Goel, Matthew Bohne | #software-security#secure-development#security-testing+3 |
| 2022-08-26 | Talk | Hitbsecconf |
CAN A FUZZER MATCH A HUMAN
| Bhargava Shastry | #fuzzing#solidity#smart-contracts+4 |
| 2022-08-10 | Tool demo | Blackhat |
Adhrit: Android Security Suite
| Amrudesh Balakrishnan, Rahul Sani, Abhishek Jm | #android#android-security#application-pentesting+4 |
| 2022-08-10 | Tool demo | Blackhat |
Node Security Shield - A Lightweight RASP for NodeJS Applications
| Lavakumar Kuppan, Sukesh Pappu | #application-hardening#code-review#secure-development+4 |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 β We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | #reverse-engineering#dynamic-analysis#network-pentesting+4 |
| 2022-05-12 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #docker#application-pentesting#container-security+4 |
| 2021-11-13 | Talk | C0c0n |
New way of looking at the hidden mysteries in the code
| Vandana Verma Sehgal | #code-review#static-analysis#reverse-engineering+2 |
| 2021-11-12 | Talk | C0c0n |
Dissecting Malicious Software and Analysis
| Shrutirupa Banerjiee | #reverse-engineering#dynamic-analysis#static-analysis |
| 2021-11-10 | Tool demo | Blackhat |
Adhrit: Android Security Suite
| Abhishek Jaiswal, Abhishek Jm, Rahul Sani | #android#application-pentesting#code-review+4 |
| 2021-08-04 | Tool demo | Blackhat |
Joern: An Interactive Shell for Code Analysis
| Suchakra Sharma, Vickie Li, Fabian Yamaguchi | #vulnerability-assessment#code-review#sast+4 |
| 2021-08-04 | Tool demo | Blackhat |
ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing
| Parbati Kumar Manna | #reverse-engineering#application-pentesting#code-review+4 |
| 2020-12-10 | Talk | Blackhat |
Effective Vulnerability Discovery with Machine Learning
| Asankhaya Sharma, Ming Yi Ang | #security-assessment#machine-learning#software-composition-analysis+4 |
| 2020-11-20 | Talk | Deepsec |
What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis
| Shyam Sundar Ramaswami | #malware-detection#sandbox#static-analysis+1 |
| 2020-10-02 | Talk | Blackhat |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
| Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky | #embedded-systems#firmware-analysis#static-analysis+1 |
| 2020-08-09 | Talk | Defcon |
Running an appsec program with open source projects
| Vandana Verma Sehgal | #owasp#secure-development#devsecops+3 |
| 2020-03-06 | Tool demo | Nullcon |
SASTRI
| Rushikesh D Nandedkar, Lalit Bhandari | #security-assessment#virtual-machine#static-analysis+3 |
| 2019-11-01 | Talk | Hackfest |
The Mechanics of Malware’s Darkside
| Yagnesh Waran P, Laura Harris | #dynamic-analysis#static-analysis#security-testing+1 |
| 2019-09-27 | Talk | C0c0n |
autoSource an automated framework for Source Code Review
| Malkit Singh | #code-review#secure-coding#static-analysis+3 |
| 2019-08-07 | Tool demo | Blackhat |
SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/
| Rushikesh D Nandedkar, Lalit Bhandari | #security-assessment#virtual-machine#application-hardening+4 |
| 2019-05-21 | Talk | Phdays |
Breaking Microsoft Edge extensions security policies
| Nikhil Mittal | #application-pentesting#code-review#security-testing+2 |
| 2019-03-02 | Panel | Nullcon |
The Myth of Sisyphus Secure Product Development
| Bipin Upadhyay, Minatee Mishra, Neelu Tripathy, Vaibhav Gupta, Vishal Sahani | #secure-development#secure-coding#security-testing+3 |
| 2019-02-28 | Talk | Nullcon |
Building Hardened IoT Implementations with LangSec
| Prashant Anantharaman | #blueteam#secure-development#input-validation+4 |
| 2018-12-05 | Tool demo | Blackhat |
Mafia: Mobile Security Automation Framework for Intelligent Auditing
| Ankur Bhargava, Mohan Kallepalli | #audit#security-testing#secure-development+4 |
| 2018-10-19 | Talk | Appsecdayaustralia |
Threat Modeling-as-Code & Automation for DevSecOps wins
| Abhay Bhargav | #threat-modeling#devsecops#application-hardening+4 |
| 2018-10-10 | Talk | Brucon |
Simplifying the art of instrumentation
| Krishnakant Patil, Rushikesh D Nandedkar | #reverse-engineering#static-analysis#dynamic-analysis+2 |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | #malware-detection#static-analysis#dynamic-analysis+3 |
| 2018-09-06 | Talk | Grrcon |
Analyzing Multi-Dimensional Malware Dataset
| Ankur Tyagi | #blueteam#machine-learning#dynamic-analysis+1 |
| 2018-08-09 | Tool demo | Blackhat |
Mafia: Mobile Security Automation Framework for Intelligent Auditing
| Ankur Bhargava, Sagar Popat, Mohan Kallepalli | #audit#security-testing#automated-scanning+4 |
| 2018-08-08 | Tool demo | Blackhat |
SCoDA: Smart COntract Defender and Analyzer
| Ajit Hatti | #blueteam#secure-coding#smart-contracts+4 |
| 2018-05-13 | Talk | Defcon |
Androsia: Securing ‘Data in Process’ for your Android Apps
| Samit Anwer | #android#blueteam#android-security+4 |
| 2018-03-22 | Tool demo | Blackhat |
Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data
| Samit Anwer | #android#blueteam#application-hardening+4 |
| 2017-12-07 | Tool demo | Blackhat |
THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL
| Raghudeep Kannavara | #threat-intelligence-analysis#machine-learning#security-development-lifecycle+4 |
| 2017-09-21 | Talk | Appsecusa |
Androsia: A tool for securing in memory sensitive data
| Samit Anwer | #android-security#static-analysis#secure-coding |
| 2017-08-18 | Talk | Usenix |
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
| Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna | #linux#kernel#static-analysis+4 |
| 2017-03-30 | Tool demo | Blackhat |
LAMMA 1.0
| Ajit Hatti | #encryption#security-assessment#static-analysis+1 |
| 2017-03-04 | Panel | Nullcon |
Application Security Opportunities and Challenges in a DevOps World
| Abhay Bhargav, Ajay Bongirwar, Arun Jadhav, Pravesh Sharma, Adam Leaonard | #secure-development#security-testing#dynamic-analysis+3 |
| 2016-11-04 | Tool demo | Blackhat |
Firmware Analysis Toolkit (FAT)
| Aditya Gupta | #firmware#security-assessment#embedded-systems+3 |
| 2016-10-14 | Talk | Appsecusa |
DevOps to DevSecOps: a 2-dimensional view of security for DevOps
| Sanjeev Sharma | #application-hardening#secure-coding#security-development-lifecycle+3 |
| 2016-10-13 | Talk | Appsecusa |
Lightning Talk - Demystifying Windows Application
| Rupali Dash | #windows#application-hardening#secure-coding+4 |
| 2016-08-19 | Talk | C0c0n |
App Sec in the Time of Docker Containers
| Akash Mahajan | #docker#application-pentesting#container-security+4 |
| 2016-08-04 | Talk | Blackhat |
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
| Rohit Mothe, Rodrigo Rubira Branco | #security-assessment#application-pentesting#dynamic-analysis+3 |
| 2016-04-01 | Tool demo | Blackhat |
LIMON-SANDBOX FOR ANALYZING LINUX MALWARES
| Monnappa K A | #linux#dynamic-analysis#static-analysis+2 |
| 2016-03-11 | Talk | Nullcon |
Million Dollar Baby: Towards ANGRly conquering DARPA CGC
| Aravind Machiry | #red-teaming#security-assessment#application-pentesting+4 |
| 2015-11-13 | Talk | Blackhat |
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX
| Monnappa K A | #linux#security-assessment#malware-research+4 |
| 2015-08-06 | Talk | Blackhat |
Harnessing Intelligence from Malware Repositories
| Arun Lakhotia, Vivek Notani | #blueteam#security-analytics#malware-research+2 |
| 2015-08-01 | Talk | C0c0n |
Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities
| Anant Shrivastava | #owasp#blueteam#security-testing+4 |
| 2015-05-26 | Talk | Phdays |
Invisible Backdoors In Your Code
| Debasis Mohanty | #blueteam#code-review#secure-coding+4 |
| 2014-11-13 | Talk | Groundzerosummit |
Cyber ‘BrahMos’ - Static analysis driven secure coding
| Joy Sen | #secure-coding#static-analysis#sast+4 |
| 2014-09-26 | Talk | Virusbulletin |
Evolution of Android exploits from a static analysis tools perspective
| Jagadeesh Chandraiah, Anna Szalay | #android-security#static-analysis#reverse-engineering |
| 2014-02-14 | Talk | Nullcon |
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases
| Ankita Gupta, Lavakumar Kuppan | #security-assessment#application-pentesting#security-development-lifecycle+3 |
| 2013-10-19 | Talk | Toorcon |
Static Malware Analysis with PyTriage
| Yashin Mehaboobe | #malware-detection#static-analysis#malware-research+1 |
| 2013-10-17 | Talk | Hitbsecconf |
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis
| Rahul Sasi | #blueteam#static-analysis#automated-exploit-detection |
| 2013-09-27 | Talk | C0c0n |
Sandy - The Malicious Analysis
| Rahul Sasi | #reverse-engineering#static-analysis#dynamic-analysis |
| 2013-09-27 | Talk | C0c0n |
Static analysis of malware with PyTriage
| Yashin Mehaboobe | #secure-coding#static-analysis#dynamic-analysis+2 |
| 2013-08-02 | Talk | Defcon |
Interactive Web Security Testing with IronWASP
| Lavakumar Kuppan | #application-pentesting#dynamic-analysis#security-testing+3 |
| 2012-12-01 | Talk | Clubhack |
XSSshell
| Vandan Joshi | #xss#application-pentesting#code-review+4 |
| 2012-08-03 | Talk | C0c0n |
Easy Money with UI-Redressing
| Amol Naik | #bug-hunting#application-pentesting#dynamic-analysis+4 |
| 2012-03-15 | Talk | Owaspappsecindia |
The Magic of Passive Web Vulnerability Analysis
| Lavakumar Kuppan | #application-pentesting#security-testing#static-analysis+2 |
| 2012-02-15 | Talk | Nullcon |
CAPTCHAs for fun and Profit
| Gursev Singh Kalra | #red-teaming#application-pentesting#input-validation+2 |
| 2011-12-04 | Talk | Clubhack |
DOM XSS β Encounters of the 3rd Kind
| Bishan Singh | #xss#red-teaming#secure-coding+4 |
| 2011-09-07 | Talk | Securitybyte |
Web Application Defender
| K v Prashant, Mohammed Imran | #blueteam#application-pentesting#secure-development+4 |
| 2011-02-25 | Talk | Nullcon |
Fuzzing with complexities
| Vishwas Sharma | #fuzzing#red-teaming#application-pentesting+4 |
| 2011-02-25 | Talk | Nullcon |
Reversing microsoft patches to reveal vulnerable code
| Harsimran Singh Walia | #reverse-engineering#code-review#static-analysis+1 |
| 2010-12-04 | Talk | Clubhack |
Firefox Security!
| Prasanna Kanagasabai | #application-pentesting#secure-development#security-testing+4 |
| 2010-08-01 | Talk | C0c0n |
Code Disclosure over HTTP
| Anant Kochhar | #red-teaming#application-hardening#code-review+4 |
| 2010-02-25 | Talk | Nullcon |
Penetration Testing versus Source Code
| Nikhil Wagholikar | #security-assessment#code-analysis#application-pentesting+4 |
| 2009-12-05 | Talk | Clubhack |
Mobile Application Security Testing
| Gursev Singh Kalra | #security-assessment#mobile-pentesting#application-pentesting+4 |
| 2009-12-05 | Talk | Clubhack |
Revealing the Secrets: Source Code Disclosure, Techniques and Impacts
| Anant Kochhar | #secure-development#secure-coding#code-review+2 |
| 2009-11-18 | Talk | Securitybyte |
Introduction to Web Protection Library
| Anil Chintala | #blueteam#application-pentesting#secure-development+4 |
| 2009-03-16 | Talk | Cansecwest |
On Approaches and Tools for Automated Vulnerability Analysis
| Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert | #security-assessment#blueteam#automated-scanning+4 |
| 2008-10-22 | Talk | Hacklu |
Browser Exploits - A new model for Browser security
| Saumil Shah | #red-teaming#application-hardening#browser-security+4 |
| 2008-08-20 | Talk | Owaspappsecindia |
Application Security Trends & Challenges
| Kamlesh Bajaj | #owasp#appsec#secure-development+4 |
| 2007-12-09 | Talk | Clubhack |
Subtle Security flaws: Why you must follow the basic principles of software security
| Varun Sharma | #blueteam#software-security#secure-coding+4 |
| 2007-12-09 | Talk | Clubhack |
The future of automated web application testing
| Amish Shah, Umesh Nagori | #security-assessment#application-pentesting#security-testing+3 |
| 2006-10-19 | Talk | Hacklu |
Writing Metasploit plugins - from vulnerability to exploit
| Saumil Shah | #metasploit#red-teaming#exploit-development+3 |
| 2006-09-21 | Talk | Hitbsecconf |
Finding Secrets in ISAPI
| Nish Bhalla | #secure-coding#reverse-engineering#application-pentesting+4 |
| 2006-01-26 | Talk | Blackhat |
Analysis of Adversarial Code: Problem, Challenges, Results
| Arun Lakhotia | #secure-coding#blueteam#static-analysis+1 |