🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Vulnerability Assessment

Focus Areas: 🔐 Application Security 🎯 Penetration Testing 🔍 Vulnerability Management
34
Total Entries
37
Contributors

Top Contributors

Ajit Hatti(3) Anamika Singh(2) Sri Harsha Gajavalli(2) Abhijeth Dugginapeddi(1) Abhijith B R(1)

All Entries (34 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjarattack-surfacevulnerability-assessmentasset-management+2
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Spentestingapplication-pentestingvulnerability-assessment+1
2025-08-06Tool demoBlackhat Realtic Sohan Simha Prabhakar, Samarth Bhaskar Bhatpentestingvulnerability-assessmentstatic-analysis+3
2024-11-28TalkBlackhat A Tale of Pwning 500+ Vehicle Anti-theft Devices Umair Nehrimobile-securityvulnerability-assessmentiot-pentesting+1
2024-11-27Tool demoBlackhat Varunastra: Securing the Depths of Docker Source Code Kunal Aggarwalcontainer-securitydockerpentesting+3
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nainics-securityscadaplc+3
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jativulnerability-assessment
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasavulnerability-assessment
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Ranavulnerability-assessment
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B Rred-teamingethical-hackingvulnerability-assessment+2
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Vermapentestingvulnerability-assessmentapplication-pentesting+1
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekondavulnerability-assessment
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharmavulnerability-assessment
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Guptapentestingvulnerability-assessmentdevsecops
2020-04-25TalkHitb Sec Conf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotvulnerability-assessmentpentestblueteam
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhanauthenticationidentity-managementvulnerability-assessment+3
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shahcloud-pentestingpost-exploitationcloud-architecture+1
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavallinetwork-pentestingvulnerability-assessmentfirewall+3
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkarvulnerability-assessmentpentestingsecure-coding+2
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shahcryptographypentestaudit+1
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Bharadwaj Machirajupentestingapplication-pentestingvulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Francis Alexanderpentestingapplication-pentestingvulnerability-assessment+4
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiryautomated-exploit-detectionreverse-engineeringvulnerability-assessment+1
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatticryptographypentestaudit+1
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatticryptographypentestaudit+1
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekarpentestingethical-hackingvulnerability-assessment+2
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwatevulnerability-managementautomated-scanningvulnerability-assessment+2
2015-03-15TalkDefcon TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER Anamika Singhnetwork-pentestingvulnerability-assessmentvulnerability-management+2
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomaspentestingnetwork-pentestingvulnerability-assessment+2
2014-03-08TalkDefcon WI-Hawk Source Code Anamika Singhnetwork-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkarpentestingforensicsdigital-forensics+2