πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Static Analysis

Focus Areas: πŸ” Application Security 🦠 Malware Analysis
122
Total Entries
118
Contributors

Top Contributors

Abhishek Jm(9) Amrudesh Balakrishnan(8) Himanshu Das(6) Lavakumar Kuppan(5) Aravind Machiry(4)

All Entries (122 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat ARC – Artifact Reuse Comparator Rushikesh D Nandedkar#static-analysis#reverse-engineering#binary-analysis+3
2025-08-06Tool demoBlackhat MORF – Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm#app-security#mobile-pentesting#static-analysis+3
2025-08-06Tool demoBlackhat ParseAndC 4.0 - The Final Cut Source Code Parbati Kumar Manna#reverse-engineering#binary-analysis#code-analysis+4
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-08-06Tool demoBlackhat ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis Source Code Mohammed Tanveer#reverse-engineering#binary-analysis#static-analysis+3
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solanki#container-security#docker#static-analysis+3
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Datta#static-analysis#software-security#devsecops+2
2025-04-04Tool demoBlackhat Intro to CICDGuard - How to have visibility and security OF CICD ecosystem Source Code Pramod Rana#cicd-pipeline#cicd-security#secure-development+3
2025-04-04Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2024-12-12Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#application-pentesting#code-review#secure-development+3
2024-12-11Tool demoBlackhat Open Source Tool to Shift Left Security Testing by Leveraging AI Shivam Rawat, Shivansh Agrawal#ai-security#secure-development#security-testing+2
2024-08-29Tool demoHitbsecconf AI Assisted Code Reviewer Rajanish Pathak, Hardik Mehta#ai#ai-security#code-review+4
2024-08-15TalkUsenix TYGR: Type Inference on Stripped Binaries using Graph Neural Networks Presentation Whitepaper Video Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik#binary-analysis#reverse-engineering#deep-learning+1
2024-04-19Tool demoBlackhat AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs Source Code Asankhaya Sharma#static-analysis#ai#vulnerability-assessment+1
2024-04-18Tool demoBlackhat APKDeepLens - Android security insights in full spectrum Source Code Atul Singh, Deepanshu Gajbhiye#android-security#static-analysis#mobile-pentesting+1
2024-04-18Tool demoBlackhat BinderAPI Scanner & BASS Source Code Krishnaprasad Subramaniam, Jeffrey Gaor, Valen Sai, Eric Tee Hock Nian#api-security#application-pentesting#dynamic-analysis+3
2024-04-18Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Version 2 Govind Krishna, Xian Xiang Chang#audit#application-pentesting#ai-security+4
2024-04-18Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-12-07Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abraham#android-security#ios-security#mobile-pentesting+2
2023-12-07TalkBlackhat Unmasking APTs: An Automated Approach for Real-World Threat Attribution Presentation Video Aakansha Saha#machine-learning#ai-security#static-analysis+1
2023-12-06Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Jeswin Mathai, Shourya Pratap Singh#threat-intelligence-analysis#application-pentesting#application-hardening+3
2023-12-06Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-09-23TalkNullcon Android-SigMorph: Covert Communication Exploiting Android Signing Schemes Presentation Video Ayan Saha, Achute Sharma#android#application-pentesting#static-analysis+1
2023-09-23TalkNullcon Secure Coding: Fix From The Root Presentation Saddam Hussain, Gopika Subramanian#secure-coding#application-pentesting#code-review+4
2023-09-23TalkNullcon Your App Is Probably A Spyware…Or Is It? Presentation Gaurav Gogia, Pandurang Patil#spyware#secure-development#security-testing+3
2023-08-09Tool demoBlackhat Damn Vulnerable Bank Source Code Akshansh Jaiswal, Hrushikesh Kakade, Rewanth Tammana#android-security#application-pentesting#dynamic-analysis+3
2023-08-09Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+2
2023-08-07TalkC0c0n Start Left SDLC Security with Open-Source DevSecOps Tooling Video Aswin Raj, Shruti M G#devsecops#secure-development#static-analysis+3
2023-05-12Tool demoBlackhat SCodeScanner - An Open-Source Source-Code Scanner Source Code Utkarsh Agrawal#code-review#static-analysis#sast+2
2023-05-11Tool demoBlackhat APKHunt | OWASP MASVS Static Analyzer Source Code Mrunal Chawda, Sumit Kalaria#owasp#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Atharva Chincholkar, Srishti Chaubey#secure-coding#application-pentesting#code-review+4
2023-05-11Tool demoBlackhat Damn Vulnerable Bank Source Code Rewanth Tammana, Hrushikesh Kakade, Akshansh Jaiswal#android-security#application-pentesting#dynamic-analysis+3
2023-05-11Tool demoBlackhat MORF - Mobile Reconnaissance Framework Source Code Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das#reconnaissance#application-pentesting#static-analysis+3
2023-05-11Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2023-05-11Tool demoBlackhat Post-Quantum Cryptography Library Source Code Sagar Bhure, Shain Singh#encryption#quantum-computing#secure-development+3
2023-03-09PanelNullcon How to make security easier for your developers Video Santosh Yadav, Frida Kiriakos, Marie Theresa Brosig, Xavier Rene Corail#secure-development#security-testing#secure-coding+3
2023-01-26TalkUsenix Building an Automated Machine for Discovering Privacy Violations at Scale Video Suchakra Sharma#static-analysis#secure-coding#data-protection+2
2022-12-08Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#secure-development#security-testing+4
2022-12-07Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#application-pentesting#secure-development+4
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Ali#web-security#static-analysis#sast+1
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software – One bug at a time Video Sandeep Singh, Laurie Mercer#open-source-security#supply-chain#code-review+4
2022-09-08TalkNullcon Pushing Security Left By Mutating Byte Code Presentation Video Gaurav Gogia#secure-coding#application-hardening#static-analysis+1
2022-09-08TalkNullcon Raining CVEs On WordPress Plugins With Semgrep Presentation Video Shreya Pohekar, Syed Sheeraz Ali#static-analysis#code-review#secure-coding+3
2022-09-07TalkNullcon Do PDF Tools Conform To The Specification? Presentation Video Prashant Anantharaman#pdf#data-protection#static-analysis+4
2022-09-07TalkNullcon ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron Video Mohan Sri Rama Krishna Pedhapati, Maxwell Garrett#red-teaming#application-pentesting#dynamic-analysis+4
2022-09-06PanelNullcon Securing the Software Video Mrudul Uchil, Abhisek Datta, Harish Goel, Matthew Bohne#software-security#secure-development#security-testing+3
2022-08-26TalkHitbsecconf CAN A FUZZER MATCH A HUMAN Presentation Bhargava Shastry#fuzzing#solidity#smart-contracts+4
2022-08-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Amrudesh Balakrishnan, Rahul Sani, Abhishek Jm#android#android-security#application-pentesting+4
2022-08-10Tool demoBlackhat Node Security Shield - A Lightweight RASP for NodeJS Applications Source Code Lavakumar Kuppan, Sukesh Pappu#application-hardening#code-review#secure-development+4
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Manna#reverse-engineering#dynamic-analysis#network-pentesting+4
2022-05-12Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#application-pentesting#container-security+4
2021-11-13TalkC0c0n New way of looking at the hidden mysteries in the code Vandana Verma Sehgal#code-review#static-analysis#reverse-engineering+2
2021-11-12TalkC0c0n Dissecting Malicious Software and Analysis Shrutirupa Banerjiee#reverse-engineering#dynamic-analysis#static-analysis
2021-11-10Tool demoBlackhat Adhrit: Android Security Suite Source Code Abhishek Jaiswal, Abhishek Jm, Rahul Sani#android#application-pentesting#code-review+4
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2021-08-04Tool demoBlackhat ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing Source Code Parbati Kumar Manna#reverse-engineering#application-pentesting#code-review+4
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-11-20TalkDeepsec What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Presentation Shyam Sundar Ramaswami#malware-detection#sandbox#static-analysis+1
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky#embedded-systems#firmware-analysis#static-analysis+1
2020-08-09TalkDefcon Running an appsec program with open source projects Presentation Video Vandana Verma Sehgal#owasp#secure-development#devsecops+3
2020-03-06Tool demoNullcon SASTRI Source Code Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#static-analysis+3
2019-11-01TalkHackfest The Mechanics of Malware’s Darkside Presentation Video Yagnesh Waran P, Laura Harris#dynamic-analysis#static-analysis#security-testing+1
2019-09-27TalkC0c0n autoSource an automated framework for Source Code Review Source Code Malkit Singh#code-review#secure-coding#static-analysis+3
2019-08-07Tool demoBlackhat SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ Presentation Rushikesh D Nandedkar, Lalit Bhandari#security-assessment#virtual-machine#application-hardening+4
2019-05-21TalkPhdays Breaking Microsoft Edge extensions security policies Presentation Nikhil Mittal#application-pentesting#code-review#security-testing+2
2019-03-02PanelNullcon The Myth of Sisyphus Secure Product Development Video Bipin Upadhyay, Minatee Mishra, Neelu Tripathy, Vaibhav Gupta, Vishal Sahani#secure-development#secure-coding#security-testing+3
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharaman#blueteam#secure-development#input-validation+4
2018-12-05Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Mohan Kallepalli#audit#security-testing#secure-development+4
2018-10-19TalkAppsecdayaustralia Threat Modeling-as-Code & Automation for DevSecOps wins Video Abhay Bhargav#threat-modeling#devsecops#application-hardening+4
2018-10-10TalkBrucon Simplifying the art of instrumentation Krishnakant Patil, Rushikesh D Nandedkar#reverse-engineering#static-analysis#dynamic-analysis+2
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagi#malware-detection#static-analysis#dynamic-analysis+3
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagi#blueteam#machine-learning#dynamic-analysis+1
2018-08-09Tool demoBlackhat Mafia: Mobile Security Automation Framework for Intelligent Auditing Source Code Ankur Bhargava, Sagar Popat, Mohan Kallepalli#audit#security-testing#automated-scanning+4
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hatti#blueteam#secure-coding#smart-contracts+4
2018-05-13TalkDefcon Androsia: Securing ‘Data in Process’ for your Android Apps Presentation Whitepaper Video Samit Anwer#android#blueteam#android-security+4
2018-03-22Tool demoBlackhat Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data Source Code Samit Anwer#android#blueteam#application-hardening+4
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-09-21TalkAppsecusa Androsia: A tool for securing in memory sensitive data Video Samit Anwer#android-security#static-analysis#secure-coding
2017-08-18TalkUsenix DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers Presentation Whitepaper Video Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna#linux#kernel#static-analysis+4
2017-03-30Tool demoBlackhat LAMMA 1.0 Source Code Ajit Hatti#encryption#security-assessment#static-analysis+1
2017-03-04PanelNullcon Application Security Opportunities and Challenges in a DevOps World Video Abhay Bhargav, Ajay Bongirwar, Arun Jadhav, Pravesh Sharma, Adam Leaonard#secure-development#security-testing#dynamic-analysis+3
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Gupta#firmware#security-assessment#embedded-systems+3
2016-10-14TalkAppsecusa DevOps to DevSecOps: a 2-dimensional view of security for DevOps Presentation Sanjeev Sharma#application-hardening#secure-coding#security-development-lifecycle+3
2016-10-13TalkAppsecusa Lightning Talk - Demystifying Windows Application Rupali Dash#windows#application-hardening#secure-coding+4
2016-08-19TalkC0c0n App Sec in the Time of Docker Containers Akash Mahajan#docker#application-pentesting#container-security+4
2016-08-04TalkBlackhat DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes Presentation Whitepaper Video Rohit Mothe, Rodrigo Rubira Branco#security-assessment#application-pentesting#dynamic-analysis+3
2016-04-01Tool demoBlackhat LIMON-SANDBOX FOR ANALYZING LINUX MALWARES Presentation Whitepaper Source Code Monnappa K A#linux#dynamic-analysis#static-analysis+2
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notani#blueteam#security-analytics#malware-research+2
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastava#owasp#blueteam#security-testing+4
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohanty#blueteam#code-review#secure-coding+4
2014-11-13TalkGroundzerosummit Cyber ‘BrahMos’ - Static analysis driven secure coding Joy Sen#secure-coding#static-analysis#sast+4
2014-09-26TalkVirusbulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiah, Anna Szalay#android-security#static-analysis#reverse-engineering
2014-02-14TalkNullcon Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases Presentation Video Ankita Gupta, Lavakumar Kuppan#security-assessment#application-pentesting#security-development-lifecycle+3
2013-10-19TalkToorcon Static Malware Analysis with PyTriage Presentation Yashin Mehaboobe#malware-detection#static-analysis#malware-research+1
2013-10-17TalkHitbsecconf Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis Presentation Rahul Sasi#blueteam#static-analysis#automated-exploit-detection
2013-09-27TalkC0c0n Sandy - The Malicious Analysis Whitepaper Source Code Rahul Sasi#reverse-engineering#static-analysis#dynamic-analysis
2013-09-27TalkC0c0n Static analysis of malware with PyTriage Presentation Yashin Mehaboobe#secure-coding#static-analysis#dynamic-analysis+2
2013-08-02TalkDefcon Interactive Web Security Testing with IronWASP Lavakumar Kuppan#application-pentesting#dynamic-analysis#security-testing+3
2012-12-01TalkClubhack XSSshell Presentation Video Vandan Joshi#xss#application-pentesting#code-review+4
2012-08-03TalkC0c0n Easy Money with UI-Redressing Amol Naik#bug-hunting#application-pentesting#dynamic-analysis+4
2012-03-15TalkOwaspappsecindia The Magic of Passive Web Vulnerability Analysis Lavakumar Kuppan#application-pentesting#security-testing#static-analysis+2
2012-02-15TalkNullcon CAPTCHAs for fun and Profit Video Gursev Singh Kalra#red-teaming#application-pentesting#input-validation+2
2011-12-04TalkClubhack DOM XSS – Encounters of the 3rd Kind Presentation Video Bishan Singh#xss#red-teaming#secure-coding+4
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imran#blueteam#application-pentesting#secure-development+4
2011-02-25TalkNullcon Fuzzing with complexities Presentation Whitepaper Video Vishwas Sharma#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon Reversing microsoft patches to reveal vulnerable code Presentation Whitepaper Harsimran Singh Walia#reverse-engineering#code-review#static-analysis+1
2010-12-04TalkClubhack Firefox Security! Presentation Prasanna Kanagasabai#application-pentesting#secure-development#security-testing+4
2010-08-01TalkC0c0n Code Disclosure over HTTP Anant Kochhar#red-teaming#application-hardening#code-review+4
2010-02-25TalkNullcon Penetration Testing versus Source Code Presentation Nikhil Wagholikar#security-assessment#code-analysis#application-pentesting+4
2009-12-05TalkClubhack Mobile Application Security Testing Presentation Gursev Singh Kalra#security-assessment#mobile-pentesting#application-pentesting+4
2009-12-05TalkClubhack Revealing the Secrets: Source Code Disclosure, Techniques and Impacts Presentation Anant Kochhar#secure-development#secure-coding#code-review+2
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintala#blueteam#application-pentesting#secure-development+4
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Presentation Saumil Shah#red-teaming#application-hardening#browser-security+4
2008-08-20TalkOwaspappsecindia Application Security Trends & Challenges Presentation Kamlesh Bajaj#owasp#appsec#secure-development+4
2007-12-09TalkClubhack Subtle Security flaws: Why you must follow the basic principles of software security Presentation Varun Sharma#blueteam#software-security#secure-coding+4
2007-12-09TalkClubhack The future of automated web application testing Presentation Amish Shah, Umesh Nagori#security-assessment#application-pentesting#security-testing+3
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-09-21TalkHitbsecconf Finding Secrets in ISAPI Presentation Nish Bhalla#secure-coding#reverse-engineering#application-pentesting+4
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotia#secure-coding#blueteam#static-analysis+1