| 2025-08-07 | Tool demo | Blackhat |
Frogy 2.0 - Automated external attack surface analysis toolkit
| Chintan Gurjar | attack-surfacevulnerability-assessmentasset-management+2 |
| 2025-08-07 | Tool demo | Blackhat |
Pentest Copilot: Cursor for Pentesters
| Dhruva Goyal, Sitaraman S | pentestingapplication-pentestingvulnerability-assessment+1 |
| 2025-08-06 | Tool demo | Blackhat |
Realtic
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat | pentestingvulnerability-assessmentstatic-analysis+3 |
| 2024-11-28 | Talk | Blackhat |
A Tale of Pwning 500+ Vehicle Anti-theft Devices
| Umair Nehri | mobile-securityvulnerability-assessmentiot-pentesting+1 |
| 2024-11-27 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker
| Kunal Aggarwal | container-securitydockerpentesting+3 |
| 2024-10-23 | Tool demo | Blackhat |
Cyber Arsenal47
| Simardeep Singh | automated-scanningvulnerability-assessmentpentesting+3 |
| 2024-08-08 | Tool demo | Blackhat |
ICSGoat: A Damn Vulnerable ICS Infrastructure
| Shantanu Kale, Divya Nain | ics-securityscadaplc+3 |
| 2024-03-11 | Talk | Nullcon |
Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC
| Arpan Jati | vulnerability-assessment |
| 2023-12-06 | Tool demo | Blackhat |
Honeyscanner: a vulnerability analyzer for Honeypots
| Shreyas Srinivasa | vulnerability-assessment |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | vulnerability-assessment |
| 2021-08-06 | Talk | Defcon |
Adversary village Kick-off
| Abhijith B R | red-teamingethical-hackingvulnerability-assessment+2 |
| 2021-08-05 | Talk | Defcon |
The Bug Hunter’s Recon Methodology
| Tushar Verma | pentestingvulnerability-assessmentapplication-pentesting+1 |
| 2021-08-04 | Tool demo | Blackhat |
Counterfit: Attacking Machine Learning in Blackbox Settings
| Raja Sekhar Rao Dheekonda | vulnerability-assessment |
| 2021-08-04 | Tool demo | Blackhat |
Joern: An Interactive Shell for Code Analysis
| Suchakra Sharma | vulnerability-assessment |
| 2020-10-02 | Tool demo | Blackhat |
OWASP Nettacker
| Sri Harsha Gajavalli | pentestingvulnerability-assessmentnetwork-pentesting+3 |
| 2020-09-19 | Talk | C0c0n |
Automate your Recon with ReconNote
| Prasoon Gupta | pentestingvulnerability-assessmentdevsecops |
| 2020-04-25 | Talk | Hitb Sec Conf |
THE STATE OF ICS SECURITY: THEN AND NOW
| Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot | vulnerability-assessmentpentestblueteam |
| 2019-09-23 | Talk | Rootcon |
Identity crisis: war stories from authentication failures
| Vishal Chauhan | authenticationidentity-managementvulnerability-assessment+3 |
| 2019-08-08 | Talk | Defcon |
Anatomy of cloud hacking
| Pratik Shah | cloud-pentestingpost-exploitationcloud-architecture+1 |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli | network-pentestingvulnerability-assessmentfirewall+3 |
| 2017-10-05 | Talk | Brucon |
Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)
| Rushikesh D Nandedkar, Sampada Nandedkar | vulnerability-assessmentpentestingsecure-coding+2 |
| 2017-07-28 | Tool demo | Defcon |
Lamma 1.0
| Ajit Hatti, Antriksh Shah | cryptographypentestaudit+1 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | vulnerability-assessmentbug-bountynetwork-pentesting+1 |
| 2017-03-23 | Talk | Troopers |
How we hacked Distributed Configuration Management Systems
| Bharadwaj Machiraju | pentestingapplication-pentestingvulnerability-assessment+4 |
| 2017-03-23 | Talk | Troopers |
How we hacked Distributed Configuration Management Systems
| Francis Alexander | pentestingapplication-pentestingvulnerability-assessment+4 |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry | automated-exploit-detectionreverse-engineeringvulnerability-assessment+1 |
| 2016-08-06 | Tool demo | Defcon |
LAMMA (beta)
| Ajit Hatti | cryptographypentestaudit+1 |
| 2016-08-04 | Tool demo | Blackhat |
LAMMA
| Ajit Hatti | cryptographypentestaudit+1 |
| 2015-08-07 | Talk | Defcon |
Hacker’s Practice Ground
| Lokesh Pidawekar | pentestingethical-hackingvulnerability-assessment+2 |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | vulnerability-managementautomated-scanningvulnerability-assessment+2 |
| 2015-03-15 | Talk | Defcon |
TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER
| Anamika Singh | network-pentestingvulnerability-assessmentvulnerability-management+2 |
| 2015-02-06 | Talk | Nullcon |
Building custom scans for real world enterprise network
| Sanoop Thomas | pentestingnetwork-pentestingvulnerability-assessment+2 |
| 2014-03-08 | Talk | Defcon |
WI-Hawk
| Anamika Singh | network-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3 |
| 2013-09-13 | Talk | Grrcon |
Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution
| Prajwal Panchmahalkar | pentestingforensicsdigital-forensics+2 |