| 2025-12-11 | Tool demo | Blackhat |
From Triage to Threat Modeling: Open-Source Security LLM in Action
| Dhruv Kedia, Sajana Weerawardhena | #ai-security#threat-modeling#vulnerability-assessment+1 |
| 2025-12-11 | Tool demo | Blackhat |
IOCTL-hammer - Parameter-Centric IOCTL Fuzzer for Windows Drivers
| Mohit Kulamkolly, Mohanraj Ravichandran | #fuzzing#windows#vulnerability-assessment+1 |
| 2025-12-11 | Tool demo | Blackhat |
ReForge: Where Crashes Become Weapons
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Abinav Harsha, Danindu Gammanpilage | #fuzzing#exploit-development#vulnerability-assessment+1 |
| 2025-12-11 | Tool demo | Blackhat |
SupplyShield: Protecting Your Software Supply Chain
| Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar | #supply-chain#sbom#software-composition-analysis+3 |
| 2025-12-11 | Tool demo | Blackhat |
ThreatShield โ The Intelligent Way of Threat Modelling
| Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi | #threat-modeling#security-strategy#architecture+1 |
| 2025-12-10 | Tool demo | Blackhat |
Breaking the Tunnel: Real-Time API Interception in MDM-Locked Mobile Apps with KnoxSpy
| Subho Halder | #mobile-pentesting#vulnerability-assessment#android-security |
| 2025-12-10 | Tool demo | Blackhat |
Nightingale: Docker for Pentesters
| Raja Nagori | #penetration-testing-tools#docker#security-testing+1 |
| 2025-12-10 | Tool demo | Blackhat |
SBOM Play
| Anant Shrivastava | #sbom#supply-chain#vulnerability-assessment+1 |
| 2025-08-07 | Tool demo | Blackhat |
Frogy 2.0 - Automated external attack surface analysis toolkit
| Chintan Gurjar | #attack-surface#vulnerability-assessment#asset-management+2 |
| 2025-08-07 | Tool demo | Blackhat |
Pentest Copilot: Cursor for Pentesters
| Dhruva Goyal, Sitaraman Subramanian | #security-assessment#application-pentesting#vulnerability-assessment+1 |
| 2025-08-06 | Tool demo | Blackhat |
Realtic
| Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage | #security-assessment#vulnerability-assessment#static-analysis+3 |
| 2025-04-03 | Tool demo | Blackhat |
Varunastra: Securing the Depths of Docker V2
| Devang Solanki, Bhavarth Karmarkar | #docker#container-security#vulnerability-assessment |
| 2024-10-23 | Tool demo | Blackhat |
Cyber Arsenal47
| Simardeep Singh | #automated-scanning#vulnerability-assessment#security-assessment+2 |
| 2024-08-08 | Tool demo | Blackhat |
ICSGoat: A Damn Vulnerable ICS Infrastructure
| Shantanu Kale, Divya Nain | #ics-security#scada#plc-security+2 |
| 2024-04-19 | Tool demo | Blackhat |
AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs
| Asankhaya Sharma | #static-analysis#ai#vulnerability-assessment+1 |
| 2024-04-18 | Tool demo | Blackhat |
Damn Vulnerable Browser Extension (DVBE) - Unfold the risks for your Browser Supplements
| Abhinav Khanna | #browser-security#web-security#vulnerability-assessment |
| 2024-03-11 | Talk | Nullcon |
Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC
| Arpan Jati | #vulnerability-assessment#embedded-systems#firmware-analysis |
| 2023-12-06 | Tool demo | Blackhat |
Honeyscanner: a vulnerability analyzer for Honeypots
| Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben | #vulnerability-assessment#honeypot#security-testing+2 |
| 2023-08-12 | Panel | Defcon |
Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert
| Trupti Shiralkar, Kiran Shirali | #appsec#alert-fatigue#vulnerability-assessment |
| 2022-09-08 | Talk | Nullcon |
vPrioritizer: Art of Risk Prioritization
| Pramod Rana | #vulnerability-assessment#security-development-lifecycle#risk-management+3 |
| 2022-09-07 | Talk | Nullcon |
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls
| Shyam Sundar Ramaswami, Rakesh Mahanthi | #vulnerability-assessment#hmi#data-protection+1 |
| 2022-06-01 | Talk | Securityfest |
Exploitation and automated detection of threats to modern cloud infrastructure
| Krishnaa Srinivasa, Maithri Nadig | #aws#vulnerability-assessment#cloud-monitoring+4 |
| 2021-08-06 | Talk | Defcon |
Adversary village Kick-off
| Abhijith B R | #red-teaming#ethical-hacking#vulnerability-assessment+2 |
| 2021-08-05 | Talk | Defcon |
The Bug Hunterโs Recon Methodology
| Tushar Verma | #security-assessment#vulnerability-assessment#application-pentesting+1 |
| 2021-08-04 | Tool demo | Blackhat |
Counterfit: Attacking Machine Learning in Blackbox Settings
| Raja Sekhar Rao Dheekonda, Will Pearce | #vulnerability-assessment#ai-security#machine-learning+2 |
| 2021-08-04 | Tool demo | Blackhat |
Joern: An Interactive Shell for Code Analysis
| Suchakra Sharma, Vickie Li, Fabian Yamaguchi | #vulnerability-assessment#code-review#sast+4 |
| 2020-11-11 | Talk | Powerofcommunity |
My Hacking Adventures With Safari Reader Mode
| Nikhil Mittal 1 | #browser-security#ios-security#vulnerability-assessment+1 |
| 2020-10-02 | Tool demo | Blackhat |
OWASP Nettacker
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan | #security-assessment#vulnerability-assessment#network-pentesting+3 |
| 2020-09-19 | Talk | C0c0n |
Automate your Recon with ReconNote
| Prasoon Gupta | #security-assessment#vulnerability-assessment#devsecops |
| 2020-04-25 | Talk | Hitbsecconf |
THE STATE OF ICS SECURITY: THEN AND NOW
| Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot | #vulnerability-assessment#security-assessment#blueteam |
| 2019-11-07 | Talk | Powerofcommunity |
Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’??
| Kushal Shah | #vulnerability-assessment#fuzzing#reverse-engineering+2 |
| 2019-09-23 | Talk | Rootcon |
Identity crisis: war stories from authentication failures
| Vishal Chauhan | #authentication#identity-management#vulnerability-assessment+3 |
| 2019-08-08 | Talk | Defcon |
Anatomy of cloud hacking
| Pratik Shah | #cloud-pentesting#post-exploitation#architecture+1 |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami | #network-pentesting#vulnerability-assessment#firewall+3 |
| 2017-10-05 | Talk | Brucon |
Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)
| Rushikesh D Nandedkar, Sampada Nandedkar | #vulnerability-assessment#security-assessment#secure-coding+1 |
| 2017-07-28 | Tool demo | Defcon |
Lamma 1.0
| Ajit Hatti, Antriksh Shah | #encryption#security-assessment#audit+1 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | #vulnerability-assessment#bug-bounty#network-pentesting+1 |
| 2017-03-24 | Talk | Insomnihack |
How we hacked Distributed Configuration Management Systems
| Francis Alexander, Bharadwaj Machiraju | #security-assessment#application-pentesting#vulnerability-assessment+4 |
| 2017-03-23 | Talk | Troopers |
How we hacked Distributed Configuration Management Systems
| Bharadwaj Machiraju, Francis Alexander | #security-assessment#application-pentesting#vulnerability-assessment+4 |
| 2017-03-23 | Talk | Troopers |
How we hacked Distributed Configuration Management Systems
| Francis Alexander, Bharadwaj Machiraju | #security-assessment#application-pentesting#vulnerability-assessment+4 |
| 2016-08-07 | Talk | Defcon |
Cyber Grand Shellphish
| Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen | #automated-exploit-detection#reverse-engineering#vulnerability-assessment+1 |
| 2016-08-06 | Tool demo | Defcon |
LAMMA (beta)
| Ajit Hatti | #encryption#security-assessment#audit+1 |
| 2016-08-04 | Tool demo | Blackhat |
LAMMA
| Ajit Hatti | #encryption#security-assessment#audit+1 |
| 2015-08-07 | Talk | Defcon |
Hacker’s Practice Ground
| Lokesh Pidawekar | #security-assessment#ethical-hacking#vulnerability-assessment+2 |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | #automated-scanning#vulnerability-assessment#risk-management+1 |
| 2015-02-06 | Talk | Nullcon |
Building custom scans for real world enterprise network
| Sanoop Thomas | #security-assessment#network-pentesting#vulnerability-assessment+1 |
| 2014-02-14 | Talk | Nullcon |
A security analysis of Browser Extensions
| Abhay Rana | #browser-security#web-security#vulnerability-assessment |
| 2013-09-13 | Talk | Grrcon |
Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution
| Prajwal Panchmahalkar | #security-assessment#forensics#digital-forensics+1 |
| 2013-05-28 | Talk | Confidence |
My Experiments with truth: a different route to bug hunting
| Devesh Bhatt | #security-assessment#vulnerability-assessment#secure-development+2 |
| 2012-09-26 | Talk | Nullcon |
How secure is internet banking in India
| Ajit Hatti | #web-security#authentication#financial-institutions+1 |