πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Windows

Focus Area: πŸ’» Endpoint Security
37
Total Entries
20
Contributors

Top Contributors

Nikhil Mittal(13) Nitin Kumar(4) Vipin Kumar(4) Ajin Abraham(3) Prashant Mahajan(3)

All Entries (37 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithanewindowsprocess-injectionblueteam+1
2020-08-06Tool demoBlackhat Dynamic Labs: Windows & Active Directory Exploitation Source Code Rohan Durvewindowsactive-directory
2020-07-05Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abrahammobileblueteamios+2
2020-03-06Tool demoNullcon Talisman Source Code Suhas Vishwanathsecure-developmentmacoslinux+3
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittalactive-directoryredteamwindows
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittalwindowsactive-directoryredteam
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-03-22Tool demoBlackhat Mobile Security Framework - MobSF Presentation Source Code Ajin Abrahammobileblueteamios+2
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatiablueteamwindows
2017-09-13Talk44 Con Red Team Revenge : Attacking Microsoft ATA Presentation Video Nikhil Mittalwindowsredteam
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteampentest+1
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteamwindows
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Swamy Shivaganga Nagarajuwindowsblueteam
2016-10-13TalkApp Sec Usa Lightning Talk - Demystifying Windows Application Rupali Dashwindows
2016-08-03TalkBlackhat AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It Presentation Nikhil Mittalwindowsamsipowershell+1
2016-08-03Tool demoBlackhat Nishang: The Goodness of Offensive PowerShell Source Code Nikhil Mittalwindowsredteampowershell
2016-04-01Tool demoBlackhat HackSys Extreme Vulnerable Driver Presentation Whitepaper Source Code Ashfaq Ansariredteampentestwindows
2015-11-12Tool demoBlackhat Kautilya: Fastest shells you will ever get Source Code Nikhil Mittalhidredteamwindows
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittalwindowsredteam
2015-08-06Tool demoBlackhat Chellam Vivek Ramachandranwififirewallblueteam+1
2015-08-06Tool demoBlackhat Kautilya Source Code Nikhil Mittalhidredteamwindows
2015-08-01TalkC0c0n A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. Riyaz Walikarwindowsredteampentest
2015-05-29TalkHitb Sec Conf PowerShell for Penetration Testers Presentation Nikhil Mittalredteamwindowspowershell+1
2014-05-29TalkHitb Sec Conf LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit Presentation Rahul Kashyapredteamwindowskernel
2013-08-03TalkDefcon PowerPreter: Post Exploitation Like a Boss Presentation Source Code Video Nikhil Mittalredteampowershellwindows
2013-08-01Tool demoBlackhat XENOTIX xBOT Source Code Ajin Abrahambotnetlinuxwindows+3
2013-03-15Tool demoBlackhat Prasadhak (And Offensive Powershell) Source Code Nikhil Mittalpowershellwindowsredteam
2010-12-04TalkClubhack Windows Memory Forensic Analysis Presentation Aashish Kuntewindowsforensic
2010-08-01TalkC0c0n Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle Praseed Paiwindowsredteam
2009-12-05TalkClubhack Advance Computer Forensic concepts (windows) Presentation Kush Wadhwaforensicwindows
2009-11-17TalkSecuritybyte Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumarwindowsredteam
2009-04-22TalkHitb Sec Conf Vbootkit 2.0: Attacking Windows 7 via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumarwindowsredteamboot-sector
2007-12-09TalkClubhack Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? Presentation Chetan Guptaforensicwindows
2007-04-04TalkHitb Sec Conf Vboot Kit: Compromising Windows Vista Security Presentation Vipin Kumar, Nitin Kumarwindows
2007-03-29TalkBlackhat Vboot Kit: Compromising Windows Vista Security Presentation Whitepaper Nitin Kumar, Vipin Kumarwindowsredteamkernel