๐Ÿงช Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Vulnerability Assessment

Focus Areas: ๐Ÿ” Application Security ๐ŸŽฏ Penetration Testing ๐Ÿ” Vulnerability Management
50
Total Entries
62
Contributors

Top Contributors

Ajit Hatti(4) Bharadwaj Machiraju(3) Francis Alexander(2) Samarth Bhaskar Bhat(2) Sohan Simha Prabhakar(2)

All Entries (50 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat From Triage to Threat Modeling: Open-Source Security LLM in Action Source Code Dhruv Kedia, Sajana Weerawardhena#ai-security#threat-modeling#vulnerability-assessment+1
2025-12-11Tool demoBlackhat IOCTL-hammer - Parameter-Centric IOCTL Fuzzer for Windows Drivers Source Code Mohit Kulamkolly, Mohanraj Ravichandran#fuzzing#windows#vulnerability-assessment+1
2025-12-11Tool demoBlackhat ReForge: Where Crashes Become Weapons Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Abinav Harsha, Danindu Gammanpilage#fuzzing#exploit-development#vulnerability-assessment+1
2025-12-11Tool demoBlackhat SupplyShield: Protecting Your Software Supply Chain Source Code Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar#supply-chain#sbom#software-composition-analysis+3
2025-12-11Tool demoBlackhat ThreatShield โ€“ The Intelligent Way of Threat Modelling Source Code Satyam Nagpal, Sayooj B Kumar, Ashwin Shenoi#threat-modeling#security-strategy#architecture+1
2025-12-10Tool demoBlackhat Breaking the Tunnel: Real-Time API Interception in MDM-Locked Mobile Apps with KnoxSpy Source Code Subho Halder#mobile-pentesting#vulnerability-assessment#android-security
2025-12-10Tool demoBlackhat Nightingale: Docker for Pentesters Source Code Raja Nagori#penetration-testing-tools#docker#security-testing+1
2025-12-10Tool demoBlackhat SBOM Play Source Code Anant Shrivastava#sbom#supply-chain#vulnerability-assessment+1
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjar#attack-surface#vulnerability-assessment#asset-management+2
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Subramanian#security-assessment#application-pentesting#vulnerability-assessment+1
2025-08-06Tool demoBlackhat Realtic Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Danindu Gammanpilage#security-assessment#vulnerability-assessment#static-analysis+3
2025-04-03Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solanki, Bhavarth Karmarkar#docker#container-security#vulnerability-assessment
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singh#automated-scanning#vulnerability-assessment#security-assessment+2
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nain#ics-security#scada#plc-security+2
2024-04-19Tool demoBlackhat AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs Source Code Asankhaya Sharma#static-analysis#ai#vulnerability-assessment+1
2024-04-18Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE) - Unfold the risks for your Browser Supplements Source Code Abhinav Khanna#browser-security#web-security#vulnerability-assessment
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jati#vulnerability-assessment#embedded-systems#firmware-analysis
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Aristofanis Chionis Koufakos, Ricardo Yaben#vulnerability-assessment#honeypot#security-testing+2
2023-08-12PanelDefcon Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert Trupti Shiralkar, Kiran Shirali#appsec#alert-fatigue#vulnerability-assessment
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Rana#vulnerability-assessment#security-development-lifecycle#risk-management+3
2022-09-07TalkNullcon Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls Presentation Video Shyam Sundar Ramaswami, Rakesh Mahanthi#vulnerability-assessment#hmi#data-protection+1
2022-06-01TalkSecurityfest Exploitation and automated detection of threats to modern cloud infrastructure Video Krishnaa Srinivasa, Maithri Nadig#aws#vulnerability-assessment#cloud-monitoring+4
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B R#red-teaming#ethical-hacking#vulnerability-assessment+2
2021-08-05TalkDefcon The Bug Hunterโ€™s Recon Methodology Video Tushar Verma#security-assessment#vulnerability-assessment#application-pentesting+1
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekonda, Will Pearce#vulnerability-assessment#ai-security#machine-learning+2
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharma, Vickie Li, Fabian Yamaguchi#vulnerability-assessment#code-review#sast+4
2020-11-11TalkPowerofcommunity My Hacking Adventures With Safari Reader Mode Presentation Nikhil Mittal 1#browser-security#ios-security#vulnerability-assessment+1
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan#security-assessment#vulnerability-assessment#network-pentesting+3
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Gupta#security-assessment#vulnerability-assessment#devsecops
2020-04-25TalkHitbsecconf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#vulnerability-assessment#security-assessment#blueteam
2019-11-07TalkPowerofcommunity Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’?? Kushal Shah#vulnerability-assessment#fuzzing#reverse-engineering+2
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhan#authentication#identity-management#vulnerability-assessment+3
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shah#cloud-pentesting#post-exploitation#architecture+1
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami#network-pentesting#vulnerability-assessment#firewall+3
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkar#vulnerability-assessment#security-assessment#secure-coding+1
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shah#encryption#security-assessment#audit+1
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddi#vulnerability-assessment#bug-bounty#network-pentesting+1
2017-03-24TalkInsomnihack How we hacked Distributed Configuration Management Systems Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Bharadwaj Machiraju, Francis Alexander#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiry, Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francensco Disperati, Andrew Dutcher, Giovanni Vigna, Chris Salls, Nick Stephens, Fish Wang, John Grosen#automated-exploit-detection#reverse-engineering#vulnerability-assessment+1
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatti#encryption#security-assessment#audit+1
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatti#encryption#security-assessment#audit+1
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekar#security-assessment#ethical-hacking#vulnerability-assessment+2
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwate#automated-scanning#vulnerability-assessment#risk-management+1
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomas#security-assessment#network-pentesting#vulnerability-assessment+1
2014-02-14TalkNullcon A security analysis of Browser Extensions Presentation Abhay Rana#browser-security#web-security#vulnerability-assessment
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkar#security-assessment#forensics#digital-forensics+1
2013-05-28TalkConfidence My Experiments with truth: a different route to bug hunting Video Devesh Bhatt#security-assessment#vulnerability-assessment#secure-development+2
2012-09-26TalkNullcon How secure is internet banking in India Video Ajit Hatti#web-security#authentication#financial-institutions+1