Hackers of India
    
Timeline
This page captures the listings in chronological order with latest on top.
  
  
  - 
    1997/01/14
    Book :  
 :	The_anti_virus_book - 
    
    	Saumil Shah
   	
    
    
    
    
    
  
 
  
  - 
    1998/07/29
    Talk : Blackhat 
 :	Security as an enabler for new business opportunities - The Business Value of Security - 
    
    	Karan Khanna
   	
    
    
    
    
    
  
 
  
  - 
    2001/02/14
    Talk : Blackhat 
 :	Web Hacking - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2001/04/26
    Talk : Blackhat 
 :	Web Hacking - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2001/07/13
    Talk : Defcon 
 :	Security & Privacy are Critically Important Issues in Todays Digitally Connected Age - 
    
    	Sharad Popli
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2001/11/21
    Talk : Blackhat 
 :	One-Way SQL Hacking : Futility of Firewalls in Web Hacking - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2002/08/18
    Book :  
 :	Web Hacking: Attacks and Defense - 
    
    	Saumil Shah
   	
    	Shreeraj Shah
   	
    
     Stuart MC Clure
    
    
    
    
    
  
 
  
  - 
    2002/10/03
    Talk : Blackhat 
 :	Top Ten Web Attacks - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2003/02/26
    Talk : Blackhat 
 :	HTTP: Advanced Assessment Techniques - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2003/07/31
    Talk : Blackhat 
 :	HTTP Fingerprinting & Advanced Assessment Techniques - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2003/10/01
    Talk : Blackhat 
 :	HTTP Fingerprinting & Advanced Assessment Techniques - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2003/12/12
    Talk : Hitb Sec Conf 
 :	Defending Web Applications: Strategies, methods and practices - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
  
 
  
  - 
    2003/12/12
    Talk : Hitb Sec Conf 
 :	New Generation Frauds - 
    
    	Yerra Ravi Kiran Raju
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2003/12/12
    Talk : Hitb Sec Conf 
 :	Threats to Wireless Networks - War Driving - 
    
    	Anurana Saluja
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2003/12/16
    Talk : Blackhat 
 :	HTTP Fingerprinting & Advanced Assessment Techniques - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2004/01/29
    Talk : Blackhat 
 :	HTTP Fingerprinting and Advanced Assessment Techniques - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2004/04/06
    Community :  
 :	Ring of Fire - 
    
    	Debasis Mohanty
   	
    
    
    
    
    
  
 
  
  - 
    2004/05/19
    Talk : Blackhat 
 :	HTTP Fingerprinting and Advanced Assessment Techniques - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2004/07/28
    Talk : Blackhat 
 :	Defeating Automated Web Assessment Tools - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2004/07/29
    Talk : Blackhat 
 :	Evasion and Detection of Web Application Attacks - 
    
    	K K Mookhey
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2004/10/06
    Talk : Hitb Sec Conf 
 :	Web Services - Attacks and Defense Strategies, Methods and Tools - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2005/03/31
    Talk : Blackhat 
 :	Defeating Automated Web Assessment Tools - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2005/04/10
    Talk : Hitb Sec Conf 
 :	Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection - 
    
    	Pukhraj Singh
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2005/04/12
    Talk : Hitb Sec Conf 
 :	Web Application Kung-Fu, The Art of Defense - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2005/06/10
    Talk : Syscan 
 :	.Net Web Security-Attack And Defense - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
  
 
  
  - 
    2005/07/28
    Talk : Blackhat 
 :	Rapid Threat Modeling - 
    
    	Akshay Aggarwal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2005/09/26
    Talk : Hitb Sec Conf 
 :	Web hacking Kung-Fu and Art of Defense - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2005/09/29
    Talk : Hitb Sec Conf 
 :	Analyzing Code for Security Defects - 
    
    	Nish Bhalla
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2005/09/29
    Talk : Hitb Sec Conf 
 :	Trends in Real World Attacks: A Compilation of Case Studies - 
    
    	Rohyt Belani
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2005/10/18
    Talk : Blackhat 
 :	Adware/Spyware - 
    
    	Saumil Shah
   	
    
     Dave Cole
    
    
    
    
    
    
    
   
  
  - 
    2006/01/26
    Talk : Blackhat 
 :	Analysis of Adversarial Code: Problem, Challenges, Results - 
    
    	Arun Lakhotia
   	
    
    
    
    
    
    
    
   
  
  - 
    2006/04/13
    Talk : Hitb Sec Conf 
 :	Writing Metasploit Plugins - From Vulnerability to Exploit - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2006/08/01
    Talk : Blackhat 
 :	Writing Metasploit Plugins - from Vulnerability to Exploit - 
    
    	Saumil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2006/08/02
    Talk : Blackhat 
 :	SQL Injections by Truncation - 
    
    	Bala Neerumalla
   	
    
    
    
    
    
    
    
   
  
  - 
    2006/08/02
    Talk : Blackhat 
 :	Web Application Incident Response & Forensics: A Whole New Ball Game! - 
    
    	Rohyt Belani
   	
    
     Chuck Willis
    
    
    
    
    
    
    
    
    
   
  
  - 
    2006/08/05
    Talk : Defcon 
 :	Zulu A Command Line Wireless Frame Generator - 
    
    	Anmol Sheth
   	
    
     Damon Mccoy
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2006/09/21
    Talk : Hitb Sec Conf 
 :	Finding Secrets in ISAPI - 
    
    	Nish Bhalla
   	
    
    
    
    
    
    
    
   
  
  - 
    2006/09/21
    Talk : Hitb Sec Conf 
 :	Smashing the Stack for Profit - Period - 
    
    	Rohyt Belani
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2006/10/19
    Talk : Hacklu 
 :	Smashing Heap by Free Simulation: - 
    
    	Sandip Chaudhari
   	
    
    
    
    
    
  
 
  
  - 
    2006/10/19
    Talk : Hacklu 
 :	Writing Metasploit plugins - from vulnerability to exploit - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2006/11/29
    Talk : Pac Sec 
 :	Smashing Heap by Free Simulation - 
    
    	Sandip Chaudhari
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/03/15
    Talk : Blackhat 
 :	Exploit-Me Series – Free Firefox Application Penetration Testing Suite Launch - 
    
    	Nish Bhalla
   	
    	Rohit Sethi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2007/03/29
    Talk : Blackhat 
 :	Vboot Kit: Compromising Windows Vista Security - 
    
    	Nitin Kumar
   	
    	Vipin Kumar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2007/03/30
    Talk : Blackhat 
 :	Web Service Vulnerabilities - 
    
    	Nish Bhalla
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/04/04
    Talk : Hitb Sec Conf 
 :	Vboot Kit: Compromising Windows Vista Security - 
    
    	Vipin Kumar
   	
    	Nitin Kumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/04/05
    Talk : Hitb Sec Conf 
 :	WEB 2.0 Hacking – Defending Ajax and Web Services - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/04/18
    Talk : Can Sec West 
 :	Low-Rate Denial-of-Service attacks - 
    
    	Anil Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2007/08/01
    Talk : Blackhat 
 :	PISA: Protocol Identification via Statistical Analysis - 
    
    	Rohit Dhamankar
   	
    
     Rob King
    
    
    
    
    
    
    
    
    
   
  
  - 
    2007/08/01
    Talk : Blackhat 
 :	Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones - 
    
    	Krishna Kurapati
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/08/02
    Talk : Blackhat 
 :	Smoke ’em Out! - 
    
    	Rohyt Belani
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2007/08/02
    Talk : Blackhat 
 :	The Evolution Of Phishing To Organized Crime - 
    
    	Rohyt Belani
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/08/04
    Talk : Defcon 
 :	The Emperor Has No Cloak - WEP Cloaking Exposed - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2007/09/06
    Talk : Hitb Sec Conf 
 :	Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2007/11/20
    Talk : Deepsec 
 :	Web 2.0 Application Kung-Fu - Securing Ajax & Web Services - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2007/12/09
    Talk : Clubhack 
 :	7 years of Indian IT act - 7 Best Cases - 
    
    	Rohas Nagpal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2007/12/09
    Talk : Clubhack 
 :	Analysis of Adversarial Code: The Role of Malware Kits! - 
    
    	Rahul Mohandas
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2007/12/09
    Talk : Clubhack 
 :	Hacking Web 2.0 Art and Science of Vulnerability Detection - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/12/09
    Talk : Clubhack 
 :	Legiment Techniques of IPS/IDS Evasion - 
    
    	Ajit Hatti
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/12/09
    Talk : Clubhack 
 :	Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? - 
    
    	Chetan Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/12/09
    Talk : Clubhack 
 :	Subtle Security flaws: Why you must follow the basic principles of software security - 
    
    	Varun Sharma
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2007/12/09
    Talk : Clubhack 
 :	The future of automated web application testing - 
    
    	Amish Shah
   	
    	Umesh Nagori
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/12/09
    Talk : Clubhack 
 :	Vulnerabilities in VoIP Products and Services - 
    
    	Gaurav Saha
   	
    
    
    
    
    
    
    
   
  
  - 
    2007/12/19
    Talk : Clubhack 
 :	Backdoor 2.0: Hacking Firefox to steal his web secrets - 
    
    	Sunil Arora
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/02/20
    Talk : Blackhat 
 :	Hacking VoIP through IPSec Tunnels - 
    
    	Sachin Joglekar
   	
    	Sudeep Patwardhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/02/20
    Talk : Blackhat 
 :	Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/03/26
    Talk : Can Sec West 
 :	Vulnerabilities Die Hard - 
    
    	Kowsik Guruswamy
   	
    
    
    
    
    
  
 
  
  - 
    2008/03/27
    Talk : Blackhat 
 :	Iron Chef Black Hat: John Henry Challenge - 
    
    	Pravir Chandra
   	
    
     Jacob West
    
     Brian Chess
    
     Sean Fay
    
    
    
    
    
    
    
   
  
  - 
    2008/03/28
    Talk : Blackhat 
 :	Spam-Evolution - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/04/16
    Talk : Hitb Sec Conf 
 :	Securing Next Generation Applications – Scan, Detect and Mitigate - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
  
 
  
  - 
    2008/08/07
    Talk : Blackhat 
 :	Got Citrix, Hack It! - 
    
    	Shanit Gupta
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2008/08/09
    Talk : Defcon 
 :	Autoimmunity Disorder in Wireless LAN - 
    
    	Jvr Murthy
   	
    	Amit Vartak
   	
    	Md Sohail Ahmad
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2008/08/20
    Talk : Owasp App Sec India 
 :	Application Security Trends & Challenges - 
    
    	Kamlesh Bajaj
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/08/20
    Talk : Owasp App Sec India 
 :	Building Enterprise AppSec Program - 
    
    	Nish Bhalla
   	
    
    
    
    
    
  
 
  
  - 
    2008/08/20
    Talk : Owasp App Sec India 
 :	Case Study: Testing 200+ applications in a $10 Billion Enterprise - 
    
    	Roshen Chandran
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/08/20
    Talk : Owasp App Sec India 
 :	Web 2.0 Attacks - Next Generation Threats on the Rise - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/08/20
    Talk : Owasp App Sec India 
 :	Web Application Security: Too Costly To Ignore - 
    
    	Rajesh Nayak
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/08/21
    Talk : Owasp App Sec India 
 :	AppSec For Managers - 
    
    	Nish Bhalla
   	
    
    
    
    
    
  
 
  
  - 
    2008/10/22
    Talk : Hacklu 
 :	Browser Exploits - A new model for Browser security - 
    
    	Saumil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2008/10/29
    Talk : Hitb Sec Conf 
 :	Browser Exploits - A New Model for Browser Security - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/10/29
    Talk : Hitb Sec Conf 
 :	Top 10 Web 2.0 Attacks - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2008/11/13
    Talk : Deepsec 
 :	Game of Web 2.0 Security - Attacking Next Generation Apps - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
  
 
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	AntiSpam - Understanding the good, the bad and the ugly - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	Economic offenses through Credit Card Frauds Dissected - 
    
    	Harshad Patil
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	Hacking Client Side Insecurities - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	Immune IT: Moving from Security to Immunity - 
    
    	Ajit Hatti
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching - 
    
    	Karmendra Kohli
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	Introduction to backtrack - 
    
    	Kunal Sehgal
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	Reverse Engineering for exploit writers - 
    
    	Nibin Varghese
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	Reverse Engineering v/s Secure Coding - 
    
    	Atul Alex
   	
    
    
    
    
    
    
    
   
  
  - 
    2008/12/06
    Talk : Clubhack 
 :	State of Cyber Law in India - 
    
    	Rohas Nagpal
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/02/19
    Talk : Blackhat 
 :	Blinded by Flash: Widespread Security Risks Flash Developers Don’t See - 
    
    	Prajakta Jagdale
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2009/03/16
    Talk : Can Sec West 
 :	On Approaches and Tools for Automated Vulnerability Analysis - 
    
    	Tanmay Ganacharya
   	
    	Abhishek Singh
   	
    	Swapnil Bhalode
   	
    
     Nikola Livic
    
     Scott Lambert
    
    
    
    
    
    
    
   
  
  - 
    2009/04/22
    Talk : Hitb Sec Conf 
 :	Application Defense Tactics & Strategies - WAF at the Gateway - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/04/22
    Talk : Troopers 
 :	Browser Design Flaws – Hacking by Breaking in Architectures - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/04/22
    Talk : Hitb Sec Conf 
 :	Pwnage 2.0 - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/04/22
    Talk : Troopers 
 :	SQL Injections: More Fun and Profit - 
    
    	Sumit Siddharth
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/04/22
    Talk : Hitb Sec Conf 
 :	Vbootkit 2.0: Attacking Windows 7 via Boot Sectors - 
    
    	Nitin Kumar
   	
    	Vipin Kumar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2009/05/19
    Talk : Syscan 
 :	Securing Applications at Gateway with Web Application Firewalls - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
  
 
  
  - 
    2009/05/19
    Talk : Syscan 
 :	Securing Enterprise Applications - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
  
 
  
  - 
    2009/07/31
    Talk : Defcon 
 :	Advancing Video Application Attacks with Video Interception, Recording, and Replay - 
    
    	Arjun Sambamoorthy
   	
    
     Jason Ostrom
    
    
    
    
    
    
    
    
    
   
  
  - 
    2009/08/01
    Talk : Defcon 
 :	The Making of the second SQL injection Worm - 
    
    	Sumit Siddharth
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2009/08/02
    Talk : Defcon 
 :	Wi-Fish Finder: Who Will Bite the Bait - 
    
    	Md Sohail Ahmad
   	
    	Prabhash Dhyani
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Cyber Forensics - 
    
    	Krishna Sastry Pendyal
   	
    
    
    
    
    
  
 
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Cyber Victimisation - 
    
    	K Jaishankar
   	
    
    
    
    
    
  
 
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Information Security Audit - 
    
    	Venkatapathy Subramaniam
   	
    
    
    
    
    
  
 
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Information security management practices - Technical issues and the impact of risk management. - 
    
    	Kp Paulson
   	
    
    
    
    
    
  
 
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Information Warfare - 
    
    	A a Gafoor
   	
    	Vinayak Mishra
   	
    
    
    
    
    
  
 
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Know Your Enemy, and Yourself: Demystifying Threat Modelin - 
    
    	Meera Subbarao
   	
    
    
    
    
    
  
 
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Management & Security of Large Scale Storage Devices - 
    
    	Prashant Dinde
   	
    
    
    
    
    
  
 
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Microsoft Security Strategies - 
    
    	Binoy VC
   	
    
    
    
    
    
  
 
  
  - 
    2009/08/06
    Talk : C0c0n 
 :	Network Intrusions and Hacking - 
    
    	Manu Zacharia
   	
    
    
    
    
    
  
 
  
  - 
    2009/10/07
    Talk : Hitb Sec Conf 
 :	How to Own the World – One Desktop at a Time - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2009/10/28
    Talk : Hacklu 
 :	Ownage 2.0 - 
    
    	Saumil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2009/11/17
    Talk : Securitybyte 
 :	Applications - The new cyber security frontier - 
    
    	Mano Paul
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2009/11/17
    Talk : Securitybyte 
 :	Behind the scenes at the MSRC - 
    
    	Suresh Venkateswaran
   	
    
     Dave Midturi
    
    
    
    
    
    
    
   
  
  - 
    2009/11/17
    Talk : Securitybyte 
 :	Business Case-Risk Management/Compliance at AMITY - 
    
    	Js Sodhi
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2009/11/17
    Talk : Securitybyte 
 :	Business Continuity Case Study - 
    
    	Venkataram Arabolu
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2009/11/17
    Talk : Securitybyte 
 :	Lust 2.0 – Desire for free WiFi and the threat of the Imposter - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/11/17
    Talk : Securitybyte 
 :	Threat Modeling - 
    
    	Varun Sharma
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2009/11/17
    Talk : Securitybyte 
 :	Usability and Privacy in Security - 
    
    	Ponnurangam Kumaraguru
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2009/11/17
    Talk : Securitybyte 
 :	Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors - 
    
    	Nitin Kumar
   	
    	Vipin Kumar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2009/11/18
    Talk : Securitybyte 
 :	Cloud Hacking – Distributed Attack & Exploit Platform - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
  
 
  
  - 
    2009/11/18
    Talk : Securitybyte 
 :	Hacking Oracle From Web - 
    
    	Sumit Siddharth
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/11/18
    Talk : Securitybyte 
 :	Introduction to Web Protection Library - 
    
    	Anil Chintala
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2009/11/18
    Talk : Securitybyte 
 :	Risk based Penetration Testing - 
    
    	K K Mookhey
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/11/18
    Talk : Securitybyte 
 :	Rumbling Infections – Web Malware Ontology - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/11/19
    Talk : Deepsec 
 :	Ownage 2.0 - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/11/19
    Talk : Deepsec 
 :	Top 10 Security Issues Developers Don’t Know About - 
    
    	Neelay S Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/04
    Talk : Clubhack 
 :	Facilitate Collaboration with Information Rights Management - 
    
    	Abhijit Tannu
   	
    
    
    
    
    
  
 
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	India Cyber Crime Scene - Caught in the Crossfire - 
    
    	Vinoo Thomas
   	
    	Rahul Mohandas
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	Advance Computer Forensic concepts (windows) - 
    
    	Kush Wadhwa
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	Incident Handling and Log Analysis for Web Based Incidents - 
    
    	Manindra Kishore
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	Indian IT Act 2000 vs 2009 - 
    
    	Rohas Nagpal
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	Lust 2.0 – Desire for free WiFi and the threat of the Imposter - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	Mobile Application Security Testing - 
    
    	Gursev Singh Kalra
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	Open source for securing data with advanced Crypto-Steganography technology - 
    
    	Suhas Desai
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	Revealing the Secrets: Source Code Disclosure, Techniques and Impacts - 
    
    	Anant Kochhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2009/12/05
    Talk : Clubhack 
 :	Risk Based Penetration Testing - 
    
    	Nikhil Wagholikar
   	
    	K K Mookhey
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/02/03
    Talk : Blackhat 
 :	Beware of Serialized GUI Objects Bearing Data - 
    
    	Rohini Sulatycki
   	
    
     David Byrne
    
    
    
    
    
    
    
   
  
  - 
    2010/02/25
    Talk : Nullcon 
 :	Software Fuzzing with Wireplay. - 
    
    	Abhisek Datta
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2010/02/25
    Talk : Nullcon 
 :	Botnet mitigation, monitoring and management. - 
    
    	Harshad Patil
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/02/25
    Talk : Nullcon 
 :	Imposter ke karnamey: The Browser Phishing Tool. - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
  
 
  
  - 
    2010/02/25
    Talk : Nullcon 
 :	Intelligent debugging and in memory fuzzing. - 
    
    	Vishwas Sharma
   	
    	Amandeep Bharti
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/02/25
    Talk : Nullcon 
 :	Malware Detection Tool for Websites: A Proof-Of-Concept - 
    
    	Anant Kochhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/02/25
    Talk : Nullcon 
 :	Penetration Testing versus Source Code - 
    
    	Nikhil Wagholikar
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/02/25
    Talk : Nullcon 
 :	Quantum Computing Challenges in the field of security - 
    
    	Navin Pai
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/02/25
    Talk : Nullcon 
 :	Steganography & Stegananalysis: A Technical & Psychological Perspective - 
    
    	Prince Komal Boonlia
   	
    	Reena Bhansali
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/03/02
    Award :  
 :	Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution - 
    
    	Lavakumar Kuppan
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2010/03/15
    Talk : Blackhat 
 :	400 Apps in 40 Days - 
    
    	Nish Bhalla
   	
    
     Sahba Kazerooni
    
    
    
    
    
    
    
    
    
   
  
  - 
    2010/04/14
    Talk : Blackhat 
 :	Attacking JAVA Serialized Communication - 
    
    	Manish Saindane
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2010/04/21
    Talk : Hitb Sec Conf 
 :	Web Security – Going Nowhere? - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/06/18
    Talk : Syscan 
 :	REVERSE ENGINEERING WEB 2.0 APPLICATIONS - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
  
 
  
  - 
    2010/07/01
    Talk : Hitb Sec Conf 
 :	The Travelling Hacksmith 2009 – 2010 - 
    
    	Saumil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2010/07/01
    Talk : Hitb Sec Conf 
 :	Top 10 Web 2.0 Attacks and Exploits - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/07/29
    Talk : Blackhat 
 :	Hacking Browser’s DOM - Exploiting Ajax and RIA - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2010/07/29
    Talk : Blackhat 
 :	Hacking Oracle From Web Apps - 
    
    	Sumit Siddharth
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2010/07/30
    Talk : Defcon 
 :	Hacking Oracle From Web Apps - 
    
    	Sumit Siddharth
   	
    
    
    
    
    
  
 
  
  - 
    2010/07/31
    Talk : Defcon 
 :	WPA Too! - 
    
    	Md Sohail Ahmad
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Client Side Exploits using PDF - 
    
    	Ankur Bhargava
   	
    	Tamaghna Basu
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study - 
    
    	Krishnakumar Kottekkat
   	
    	Whiteknight
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Code Disclosure over HTTP - 
    
    	Anant Kochhar
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Concept, Methodology and Challenges in Computer Forensics - 
    
    	Sebastian Edassery
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Dangers and dynamic Malware analysis - 
    
    	Chandrasekar
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	End-point Security - 
    
    	Laxi Eshwari
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Hackers’ EcoSystem in India - 
    
    	Rohit Srivastwa
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Horses, Rats and Bots - 
    
    	Jairam Ramesh
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Last line of defense - Host Intrusion Prevention and Secure application development. - 
    
    	Avinash Shenoi
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Mobile Security - 
    
    	Suhas Desai
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Overview of Cyber Legal Systems in India - 
    
    	Sagar Rahurkar
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	VoIP Security - 
    
    	Mukund Krishnamurthy
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Wireless MITM - 
    
    	Prashant Mahajan
   	
    
    
    
    
    
  
 
  
  - 
    2010/08/01
    Talk : C0c0n 
 :	Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle - 
    
    	Praseed Pai
   	
    
    
    
    
    
  
 
  
  - 
    2010/10/13
    Talk : Hitb Sec Conf 
 :	Hacking a Browser’s DOM – Exploiting Ajax and RIA - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2010/10/14
    Talk : Hitb Sec Conf 
 :	Exploit Delivery - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/10/27
    Talk : Hacklu 
 :	Exploit Delivery - Tricks and Techniques - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/11/11
    Talk : Blackhat 
 :	Attacking with HTML5 - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/11/25
    Talk : Deepsec 
 :	Developers are from Mars, Compliance Auditors are from Venus - 
    
    	Neelay S Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/12/04
    Talk : Clubhack 
 :	Attacking with HTML5 - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/12/04
    Talk : Clubhack 
 :	Data theft in India - 
    
    	K K Mookhey
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/12/04
    Talk : Clubhack 
 :	Firefox Security! - 
    
    	Prasanna Kanagasabai
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/12/04
    Talk : Clubhack 
 :	Mantra – Free and Open Source security framework based on browser platform - 
    
    	Abhi M Balakrishnan
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/12/04
    Talk : Clubhack 
 :	Ultimate Pen Test – Compromising a highly secure environment - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2010/12/04
    Talk : Clubhack 
 :	Windows Memory Forensic Analysis - 
    
    	Aashish Kunte
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/02/15
    Talk : Nullcon 
 :	Botnet Detection approach by DNS behavior and clustering analysis - 
    
    	Nilesh Sharma
   	
    	Pulkit Mehndiratta
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	(secure) SiteHoster – Disable XSS & SQL Injection - 
    
    	Abhishek Kumar
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) - 
    
    	Sunil Kumar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Buffer Under Run Exploits - 
    
    	Saurabh Sharma
   	
    	Chinmaya Kamal
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Chupa Rustam - 
    
    	Abhijeet Hatekar
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Cyber Crime 101 - Cost of cybercrime, trends & analysis - 
    
    	Simran Gambhir
   	
    	Cn Shashidhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Enterprise Paradigm for Controlling Data Leakage - 
    
    	Deepak Rout
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Future of cyber crimes: Limitations and Challenges - 
    
    	Pratap Reddy
   	
    
    
    
    
    
  
 
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Fuzzing with complexities - 
    
    	Vishwas Sharma
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Hacking the Parliament – A classic Social Engineering attack - 
    
    	Anurag Dhanda
   	
    
    
    
    
    
  
 
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Incident Management and Beyond - 
    
    	Dinesh O Bareja
   	
    
    
    
    
    
  
 
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	JSON Fuzzing: New approach to old problems - 
    
    	K v Prashant
   	
    	Tamaghna Basu
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Jugaad Beta: Linux Thread Injection malware PoC - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Lessons Learned From 2010 - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Penetration Testing a Biometric System - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Protect infrastructure or protect information – Lessons from Wikileaks - 
    
    	Vishal Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Reversing microsoft patches to reveal vulnerable code - 
    
    	Harsimran Singh Walia
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower - 
    
    	Hari Krishna Prasad Vemuru
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/02/25
    Talk : Nullcon 
 :	SSLSmart – Smart SSL Cipher Enumeration - 
    
    	Gursev Singh Kalra
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/03/30
    Talk : Troopers 
 :	Femtocell: Femtostep to the Holy Grail - 
    
    	Ravishankar Borgaonkar
   	
    
     Kevin Redon
    
    
    
    
    
    
    
   
  
  - 
    2011/05/19
    Talk : Hitb Sec Conf 
 :	Spying on SpyEye – What Lies Beneath? - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/05/20
    Talk : Hitb Sec Conf 
 :	Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/08/03
    Talk : Blackhat 
 :	Femtocells: A poisonous needle in the operator’s hay stack - 
    
    	Ravishankar Borgaonkar
   	
    
     Nico Golde
    
     Kevin Redon
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/08/03
    Talk : Blackhat 
 :	Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS - 
    
    	Jatin Kataria
   	
    
     Ang Cui
    
     Salvatore Stolfo
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/08/03
    Talk : Blackhat 
 :	Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/08/05
    Talk : Defcon 
 :	Jugaad – Linux Thread Injection Kit - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/08/07
    Talk : Defcon 
 :	VDLDS — All Your Voice Are Belong To Us - 
    
    	Ganesh Devarajan
   	
    
     Don Le Bert
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/09/06
    Talk : Securitybyte 
 :	Botnets at Application+ layer - 
    
    	Raj Shastrakar
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/06
    Talk : Securitybyte 
 :	Enabling Un-trusted Mashups - 
    
    	Bishan Singh
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/06
    Talk : Securitybyte 
 :	Private Internet Circuits - Towards A Next Generation Internet - 
    
    	Sanjay Deshpande
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/06
    Talk : Securitybyte 
 :	Runtime thread injection and execution in Linux processes - 
    
    	Aseem Jakhar
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/06
    Talk : Securitybyte 
 :	Security Threats on Social Networks - 
    
    	Nithya Raman
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/06
    Talk : Securitybyte 
 :	Using Data Analytics for Incident Response - 
    
    	Samir Saklikar
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/06
    Talk : Securitybyte 
 :	Application Security Strategies - 
    
    	K K Mookhey
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/07
    Talk : Securitybyte 
 :	Data Protection - 
    
    	Dipankar Roy
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2011/09/07
    Talk : Securitybyte 
 :	Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit - 
    
    	Vivek Ramachandran
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/07
    Talk : Securitybyte 
 :	IronWASP - A Web Application Security Testing Platform - 
    
    	Lavakumar Kuppan
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/09/07
    Talk : Securitybyte 
 :	Mobile Devices – Boon or Curse? - 
    
    	Kishor Sonawane
   	
    
     Oliver Ng
    
    
    
    
    
    
    
   
  
  - 
    2011/09/07
    Talk : Securitybyte 
 :	Social Web & Privacy – An evolving world - 
    
    	Bala Sathiamurthy
   	
    	Aridaman Tripathi
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2011/09/07
    Talk : Securitybyte 
 :	Web Application Defender - 
    
    	K v Prashant
   	
    	Mohammed Imran
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2011/09/19
    Talk : Brucon 
 :	Botnets and Browsers, Brothers in a Ghost Shell - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/09/19
    Talk : Hacklu 
 :	Linux thread injection - The jugaad way - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/09/19
    Talk : Brucon 
 :	Step-by-Step for Software Security (that anyone can follow) - 
    
    	Pravir Chandra
   	
    
    
    
    
    
  
 
  
  - 
    2011/09/19
    Talk : Hacklu 
 :	The travelling hacksmith - 
    
    	Saumil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2011/09/19
    Talk : Brucon 
 :	Wifi malware for fun and profit - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Automated Malware Analysis - Setting up the Environment - 
    
    	K v Prashant
   	
    	Pushkar Pashupat
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications - 
    
    	Riyaz Walikar
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Digital Evidence - 
    
    	Sushanth Samudrala
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution - 
    
    	Ahamed Nafeez
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	iPhone Jailbreak - 
    
    	Antriksh Shah
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Mobile Security - 
    
    	Santosh Satam
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network - 
    
    	Bala Kumar S
   	
    	Mohamed Emraanullah
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Paranoid Android - 
    
    	Ankur Bhargava
   	
    	Mrigesh
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Password Less Authentication, Authorization - 
    
    	Srikar Sagi
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Pentesting iPhone Applications - 
    
    	Satish Bommisetty
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Runtime thread injection and execution in Linux processes - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Section 43A IT Act compliance - 
    
    	Sagar Rahurkar
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Secure HTTP Headers or How I can finally convince management to let go of IE6 - 
    
    	Akash Mahajan
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Security and Privacy Risks of Cloud Computing - 
    
    	Vishnu Tiwari
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Security Threats in Custom ROM’s (Android) - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Web Application Backdoor Attack,Evasion and Detection - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/10/07
    Talk : C0c0n 
 :	Wi-Fi Malware for Fun and Profit - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/08
    Talk : C0c0n 
 :	Stratagemizing Security Against Perpetrators In Cloud Infrastructure - 
    
    	K S Abhiraj
   	
    
    
    
    
    
  
 
  
  - 
    2011/10/13
    Talk : Hitb Sec Conf 
 :	Femtocells: A Poisonous Needle in the Operator’s Hay Stack - 
    
    	Ravishankar Borgaonkar
   	
    
     Kevin Redon
    
     Nico Golde
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/10/13
    Talk : Hitb Sec Conf 
 :	Web Wars 3 - 
    
    	Saumil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2011/11/04
    Talk : Hackfest 
 :	Here are your keystrokes - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
  
 
  
  - 
    2011/11/17
    Talk : Deepsec 
 :	Behavioral Security: 10 steps forward 5 steps backward - 
    
    	Sourabh Satish
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/11/17
    Award :  
 :	CAPTCHA Hax With TesserCap - 
    
    	Gursev Singh Kalra
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/11/17
    Talk : Deepsec 
 :	FakeAntiVirus - Journey from Trojan to a Persisent Threat - 
    
    	Jagadeesh Chandraiah
   	
    
    
    
    
    
  
 
  
  - 
    2011/11/25
    Talk : Malcon 
 :	Advanced Malware for Apple Products - 
    
    	Atul Alex
   	
    
    
    
    
    
  
 
  
  - 
    2011/11/25
    Talk : Malcon 
 :	Exploit the Exploit kits - 
    
    	Dhruv Soi
   	
    
    
    
    
    
  
 
  
  - 
    2011/11/25
    Talk : Malcon 
 :	Mareech : Look it’s a HID made up of gold - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
  
 
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	Pen testing Mobile Applications - 
    
    	Prashant Verma
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	Android Forensics - 
    
    	Manish Chasta
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	Android Tamer - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	DOM XSS – Encounters of the 3rd Kind - 
    
    	Bishan Singh
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	Exploit the Exploit Kits - 
    
    	Dhruv Soi
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	Hacking your Droid - 
    
    	Aditya Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	Handle Exploitation of Remote System From Email Account - 
    
    	Bhaumik Merchant
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	Mere paas Teensy hai - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	One Link Facebook - 
    
    	Anand Pandey
   	
    
    
    
    
    
    
    
   
  
  - 
    2011/12/04
    Talk : Clubhack 
 :	Wi-Fi malware for Fun and Profit - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
  
 
  
  - 
    2011/12/14
    Talk : Blackhat 
 :	SCADA Security - Why Is It So Hard? - 
    
    	Amol Sarwate
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2011/12/15
    Talk : Blackhat 
 :	Kautilya: Teensy Beyond Shell - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Application security cost management - 
    
    	Ketan Vyas
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Attacking Backup Software - 
    
    	Nibin Varghese
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Best practices to improve the security grading of your project - 
    
    	Hemant Khandelwal
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Binary God - 
    
    	Atul Alex
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	CAPTCHAs for fun and Profit - 
    
    	Gursev Singh Kalra
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Content sniffing Algorithm bypassing techniques and possible attack vectors - 
    
    	Anil Aphale
   	
    	Chaitany Kamble
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Cyberspace: Global commons or a national asset - 
    
    	Kamlesh Bajaj
   	
    
    
    
    
    
  
 
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Friction in the machine - 
    
    	Dinesh Shenoy
   	
    
    
    
    
    
  
 
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Haxdroid: Empowering Android Handset - 
    
    	Anant Shrivastava
   	
    	Prashant Mahajan
   	
    	Pardhasaradhi Ch
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	IVR Security: Internal Network attacks via phone lines - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Javascript static analysis with IronWASP - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Node.js: The good, bad and ugly - 
    
    	Bishan Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Open source revolution :Need Hardware - Software marriage - 
    
    	Venkatesh
   	
    
    
    
    
    
  
 
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Ra.2 Blackbox DOM-based XSS scanner - 
    
    	Nishant Das Patnaik
   	
    	Sarathi Sabyasachi Sahoo
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Sandboxing  The deep truth - 
    
    	Disha Agarwal
   	
    	Manish Pali
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	SCADA Security: Why is it so hard - 
    
    	Amol Sarwate
   	
    
    
    
    
    
  
 
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Shall we dust Beep? The Geo-strategic realities of Cyberwar - 
    
    	Pukhraj Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Teensy for fun and jugaad - 
    
    	Amey Gat
   	
    
    
    
    
    
  
 
  
  - 
    2012/02/15
    Talk : Nullcon 
 :	Your phone is your phone but your calls are now my calls - 
    
    	Akib Sayyed
   	
    	Bipul Sahu
   	
    	Dipesh Goyal
   	
    	Nitin Agarwal
   	
    
    
    
    
    
  
 
  
  - 
    2012/03/02
    Award :  
 :	CAPTCHA Re-Riding Attack - 
    
    	Gursev Singh Kalra
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2012/03/14
    Talk : Blackhat 
 :	Hacking XPATH 2.0 - 
    
    	Sumit Siddharth
   	
    
     Tom Forbes
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/03/14
    Talk : Blackhat 
 :	HTML5 top 10 threats – Stealth Attack and Silent Exploits - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/03/15
    Talk : Hackinparis 
 :	SCADA Security: Why Is It So Hard ? - 
    
    	Amol Sarwate
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/03/15
    Talk : Grr Con 
 :	SCADA Security: Why is it so hard? - 
    
    	Amol Sarwate
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/03/15
    Talk : Owasp App Sec India 
 :	The Magic of Passive Web Vulnerability Analysis - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
  
 
  
  - 
    2012/03/16
    Talk : Blackhat 
 :	IVR Security- Internal Network Attack via Phone Lines - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/03/16
    Talk : Blackhat 
 :	The Pwnage Saga Continues - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/03/21
    Talk : Troopers 
 :	More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/05/24
    Talk : Hitb Sec Conf 
 :	CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/07/22
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kautilya and Nishang - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/07/25
    Tool Demo : Blackhat 
 : Arsenal 
 :	Oyedata for OData Assessments - 
    
    	Gursev Singh Kalra
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/07/26
    Tool Demo : Blackhat 
 : Arsenal 
 :	Bypassing Every CAPTCHA provider with clipcaptcha - 
    
    	Gursev Singh Kalra
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/07/26
    Talk : Blackhat 
 :	HTML5 top 10 threats – Stealth Attack and Silent Exploits - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/07/28
    Talk : Defcon 
 :	Botnets Die Hard - Owned and Operated - 
    
    	Aditya K Sood
   	
    
     Richard J Enbody
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	A model to reduce information security risks due to human error - 
    
    	Anup Narayanan
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Building Security Incident Detection & Handling Capabilities in Enterprises - 
    
    	Sunil Varkey
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Business Continuity and Risk Management in Turbulent Times - 
    
    	Venkataram Arabolu
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Contemporary Transcription and Resource Parasitism - 
    
    	Arpit Patel
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Cracking the Mobile Application Source Code - 
    
    	Sreenarayan Ashokkumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Easy Money with UI-Redressing - 
    
    	Amol Naik
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Enterprise server security - 
    
    	Raghav Shandilya
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Evil JavaScript - 
    
    	Bishan Singh
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Gathering security requirements - 
    
    	K v Prashant
   	
    	Saleem Ahamed
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	I haz you and pwn your maal - 
    
    	Harsimran Singh Walia
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Layer 8 Exploitation: A threat to National Security - 
    
    	Aakash Goel
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	Security Incidents – Avoiding the Apocalypse in 2012 - 
    
    	Ashish Chandra Mishra
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	The Management of Information Security – A Corporate Practitioner’s Perspective - 
    
    	Pawan Kumar Singh
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	The Weakest Link - Reinforcing the Human Element - 
    
    	Sandeep Godbole
   	
    
    
    
    
    
  
 
  
  - 
    2012/08/03
    Talk : C0c0n 
 :	WebApp Remote Code Execution using Server Side Scripting Engines - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/08/15
    Award :  
 :	Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select) - 
    
    	Gursev Singh Kalra
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2012/08/29
    Talk : Owasp App Sec India 
 :	Find me if you can Smart fuzzing and discovery! - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/09/05
    Talk : 44 Con 
 :	Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? - 
    
    	Jitender Arora
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/09/20
    Talk : Ekoparty 
 :	Dirty use of USSD Codes in Cellular Network - 
    
    	Ravishankar Borgaonkar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/09/20
    Talk : Ekoparty 
 :	Fuzzing DTMF Input Processing Algorithms - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/09/26
    Talk : Nullcon 
 :	Forensics Timeline Analysis - 
    
    	Aashish Kunte
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2012/09/26
    Talk : Nullcon 
 :	Highly Harmful Audio Waves aka DTMF Fuzzing - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/09/26
    Talk : Nullcon 
 :	How secure is internet banking in India - 
    
    	Ajit Hatti
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2012/09/26
    Talk : Nullcon  : Delhi
 :	Nullcon_delhi_2012 - 
    
    	Prasanna Kanagasabai
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/09/26
    Talk : Nullcon 
 :	Opening the kimono: Automating behavioral analysis for mobile apps - 
    
    	Pradeep Kulkarni
   	
    
     Michael Sutton
    
    
    
    
    
    
    
   
  
  - 
    2012/09/26
    Talk : Nullcon 
 :	The art of Passive Web Vul Analysis with IronWASP - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/09/27
    Talk : Grrcon 
 :	The Realm of Third Generation Botnet Attacks - 
    
    	Aditya K Sood
   	
    
     Dr. Richard J Enbody
    
    
    
    
    
    
    
   
  
  - 
    2012/09/28
    Talk : Nullcon 
 :	Alert(/xss/) - How to catch an XSS before someone exploits / reports it? - 
    
    	Ahamed Nafeez
   	
    
    
    
    
    
  
 
  
  - 
    2012/09/28
    Talk : Nullcon 
 :	Attacking Angry Droids - 
    
    	Aditya Gupta
   	
    	Subho Halder
   	
    
    
    
    
    
  
 
  
  - 
    2012/09/29
    Talk : Nullcon 
 :	Next-gen Forensics - 
    
    	K K Mookhey
   	
    
    
    
    
    
  
 
  
  - 
    2012/10/10
    Talk : Hitb Sec Conf 
 :	Innovative Approaches to Exploit Delivery - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/10/11
    Talk : Hitb Sec Conf 
 :	XSS & CSRF strike back – Powered by HTML5 - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/10/23
    Talk : Hacklu 
 :	Buster: Android Security Buster - 
    
    	Atul Alex
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2012/11/07
    Award :  
 :	Cross Site Port Attack (XSPA) - 
    
    	Riyaz Walikar
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2012/11/23
    Talk : Malcon 
 :	Advanced Malware Engine - 
    
    	Mohit Kumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/11/23
    Talk : Malcon 
 :	Advances in ROP attacks - 
    
    	Raashid Bhat
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/11/23
    Talk : Malcon 
 :	Surprise paper! - 
    
    	Atul Alex
   	
    
    
    
    
    
  
 
  
  - 
    2012/11/23
    Talk : Malcon 
 :	Tampering in Energy Meters - 
    
    	Mohit Arora
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/11/23
    Talk : Malcon 
 :	Windows Phone 8 Malware Prototype - 
    
    	Shantanu Gawde
   	
    
    
    
    
    
  
 
  
  - 
    2012/11/29
    Talk : Deepsec 
 :	Bad Things in Good Packages - Creative Exploit Delivery - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Content-Type attack -Dark hole in the secure environment - 
    
    	Raman Gupta
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Detecting and Exploiting XSS with Xenotix XSS Exploit Framework - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Real Time Event Recording System, the tool for Digital Forensics Investigation - 
    
    	Madhav Limaye
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher - 
    
    	Vishal Kalro
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	FatCat Web Based SQL Injector - 
    
    	Sandeep Kamble
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Hacking and Securing iOS applications - 
    
    	Satish Bommisetty
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	HAWAS – Hybrid Analyzer for Web Application Security - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Infrastructure Security - 
    
    	Sivamurthy Hiremath
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Legal Nuances to the Cloud - 
    
    	Ritambhara Agrawal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Smart Grid Security - 
    
    	Falgun Rathod
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC - 
    
    	Aditya Gupta
   	
    	Subho Halder
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being - 
    
    	Thomas Kurian Ambattu
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/01
    Talk : Clubhack 
 :	XSSshell - 
    
    	Vandan Joshi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/05
    Talk : Blackhat 
 :	Droid Exploitation Saga - 
    
    	Aditya Gupta
   	
    	Subho Halder
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/06
    Talk : Blackhat 
 :	Attacking ODATA - 
    
    	Gursev Singh Kalra
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/06
    Talk : Blackhat 
 :	HTML5 top 10 threats – Stealth Attack and Silent Exploits - 
    
    	Shreeraj Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/06
    Talk : Blackhat 
 :	Poking servers with Facebook(and other web applications) - 
    
    	Riyaz Walikar
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2012/12/06
    Talk : Blackhat 
 :	The art of exploiting logical flaws in web apps - 
    
    	Sumit Siddharth
   	
    
     Richard Dean
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Automating JavaScript Static Analysis - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
  
 
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Bug Bounty Hunter’s confession - 
    
    	Amol Naik
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	BYOD: How will it shape your wireless network security in future? - 
    
    	Kiran Deshpande
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Capturing Zero-Day Information - 
    
    	Dinesh O Bareja
   	
    	Sumit Sharma
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	CSRF Finder as a Mozilla Addon - 
    
    	Piyush Pattanayak
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Inception of graphical passwords - 
    
    	Rishi Narang
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Mobile Code mining for discovery and exploits - 
    
    	Hemil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Pawing the Droid: Twisting the ARM - 
    
    	Divyanshu Shekhar
   	
    	Anshul Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks - 
    
    	Naga Rohit Samineni
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Sensitive Campus Security with Network - 
    
    	Aravind Sitaraman
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	SMS to Meterpreter - Fuzzing USB Modems - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/01
    Talk : Nullcon 
 :	Vulnerability research anyone? - 
    
    	Omair
   	
    
    
    
    
    
  
 
  
  - 
    2013/03/07
    Talk : Can Sec West 
 :	SMS to Meterpreter - Fuzzing USB Modems - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/03/12
    Talk : Troopers 
 :	Dirty use of USSD Codes in Cellular Network - 
    
    	Ravishankar Borgaonkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/14
    Talk : Blackhat 
 :	Lets play - Applanting - 
    
    	Ajit Hatti
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/03/15
    Tool Demo : Blackhat 
 : Arsenal 
 :	OWASP Xenotix XSS Exploit Framework - 
    
    	Ajin Abraham
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2013/03/15
    Tool Demo : Blackhat 
 : Arsenal 
 :	Prasadhak (And Offensive Powershell) - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/03/15
    Talk : Blackhat 
 :	The Sandbox Roulette- Are you ready for the gamble? - 
    
    	Rahul Kashyap
   	
    
     Rafal Wojtczuk
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/03/15
    Talk : Blackhat 
 :	Vulnerability analysis of 2013 SCADA issues - 
    
    	Amol Sarwate
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/07/31
    Talk : Blackhat 
 :	Clickjacking revisited: A perceptual view of UI security - 
    
    	Devdatta Akhawe
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/07/31
    Talk : Blackhat 
 :	Javascript static security analysis made easy with JSPrime - 
    
    	Nishant Das Patnaik
   	
    	Sarathi Sabyasachi Sahoo
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/07/31
    Tool Demo : Blackhat 
 : Arsenal 
 :	JMSDigger - 
    
    	Gursev Singh Kalra
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/07/31
    Talk : Blackhat 
 :	LTE booms with vulnerabilities - 
    
    	Ankit Gupta
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2013/08/01
    Talk : Blackhat 
 :	Hot knives through butter: Bypassing automated analysis systems - 
    
    	Abhishek Singh
   	
    
     Zheng Bu
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/08/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	OWASP Xenotix XSS Exploit Framework - 
    
    	Ajin Abraham
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2013/08/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	Sparty - 
    
    	Aditya K Sood
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/08/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	XENOTIX xBOT - 
    
    	Ajin Abraham
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2013/08/02
    Talk : Defcon 
 :	Interactive Web Security Testing with IronWASP - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
  
 
  
  - 
    2013/08/03
    Talk : Defcon 
 :	PowerPreter: Post Exploitation Like a Boss - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/09/12
    Talk : Grrcon 
 :	The Droid Exploitation Saga – All Over Again! - 
    
    	Aditya Gupta
   	
    	Subho Halder
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2013/09/13
    Talk : Rootcon 
 :	My Experiments with truth: a different route to bug hunting - 
    
    	Devesh Bhatt
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	ARM, Thumb and the Finger - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Blur Captcha - 
    
    	Anirudh Duggal
   	
    	Abhinav Mohanty
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Disclosing Vulnerabilities: The Bug Bounty Style - 
    
    	Nikhil P Kulkarni
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	From Bedroom to Boardroom - Taking your Weekend Infosec Project Global - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? - 
    
    	Anup Narayanan
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Infiltrating the Intranet with Skanda - 
    
    	Jayesh Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Lets Play - Applanting on new Grounds - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Pwning WiFi Devices! - 
    
    	Swaroop Yermalkar
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Risk and challenges in virtual currencies. - 
    
    	Harsh Patel
   	
    	Swatantra Kumar Gupta
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Sandy - The Malicious Analysis - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Snake Bites - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	SSRF / XSPA - Real World Attacks and Mitigations - 
    
    	Riyaz Walikar
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	Static analysis of malware with PyTriage - 
    
    	Yashin Mehaboobe
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	The Art and Science of Anamoly based Vulnerability Detection - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
  
 
  
  - 
    2013/09/27
    Talk : C0c0n 
 :	The Secure Software Development Life Cycle - 
    
    	Harshal Jamdade
   	
    
    
    
    
    
  
 
  
  - 
    2013/10/17
    Talk : Hitb Sec Conf 
 :	Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Abusing Google Apps: Google is my command and control center - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Advanced security for advanced threats - 
    
    	Kartik Shahani
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Approach to containing the outbreak of malicious information in online social networks - 
    
    	Sriniketh Vijayaraghavan
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state - 
    
    	Vaishali Bhagwat
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Cloud Security: Enabling continuous, scalable security for today’s hyper connected world - 
    
    	Sumedh Thakar
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Evolution of network security around Software Defined Networking (SDN) – The intelligent network - 
    
    	Diwakar Dayal
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	How I built a pentest lab in under 70 USD - 
    
    	Swaroop Yermalkar
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Internet – Transforming terrorism - 
    
    	Sameer Saxena
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	IronWASP - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
   
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Malware for Firefox Mobile OS - 
    
    	Shantanu Gawde
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Securing government Critical Information Infrastructure - 
    
    	Kapil Awasthi
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Serial killing of embedded systems - 
    
    	Atul Alex
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Setting the Data Center on fire - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	The seven sins of Wi-Fi security - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Towards a next generation secure Internet - 
    
    	Sanjay Deshpande
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/07
    Talk : Ground Zero Summit 
 :	Understanding the anatomy of advanced targeted attacks – The Trend Micro approach - 
    
    	Tarun Gupta
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/21
    Talk : Deepsec 
 :	Automation In Android & iOS Application Security Review - 
    
    	Hemil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2013/11/21
    Talk : Deepsec 
 :	Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy - 
    
    	Parth Shukla
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	12 YEARS AND A BAKER’S DOZEN - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	2014 The year in which we cannot ignore SCADA - 
    
    	Amol Sarwate
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	A security analysis of Browser Extensions - 
    
    	Abhay Rana
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Attack of the setuid bit - pt_chown and pwning root terminals - 
    
    	Siddhesh Poyarekar
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Attacking WPA/WPA2 in the Cloud - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Chrome - OS Security 2014: New and future hotness - 
    
    	Sumit Gwalani
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Flowinspect - A Network Inspection Tool - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Hacking YOu’r Cable TV Network. - 
    
    	Rahul Sasi
   	
    	Ahamed Nafeez
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Hardware Attack Vectors - 
    
    	Yashin Mehaboobe
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} - 
    
    	Rushikesh D Nandedkar
   	
    	Amrita C Iyer
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Multi-value W-Fi What the Heck is it - 
    
    	Abhijeet Ghosh
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Null Hardware Badge 101 (Desi Jugaad) - 
    
    	Amey Gat
   	
    	Umesh
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	o’Dea Assertions - Untwining the Security of the SAML Protocol - 
    
    	Achin Kulshrestha
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases - 
    
    	Ankita Gupta
   	
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	phoneypdf: A Virtual PDF Analysis Framework - 
    
    	Kiran Bandla
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Strategic Information Warfare: When Ends define the means - 
    
    	Amit Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	The Security Challenge - 
    
    	Shantanu Ghosh
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	User Privacy in Cellular Networks - 
    
    	Ravishankar Borgaonkar
   	
    
    
    
    
    
  
 
  
  - 
    2014/02/14
    Talk : Nullcon 
 :	Wi-Hawk Password Auditing Tool - 
    
    	Anamika Singh
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/02/15
    Tool Demo : Nullcon 
 :	DrupSnipe - 
    
    	Ranjeet Sengar
   	
    	Sukesh Pappu
   	
    
    
    
    
    
  
 
  
  - 
    2014/02/15
    Tool Demo : Nullcon 
 :	NoSQL Exploitation Framework - 
    
    	Francis Alexander
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/02/15
    Tool Demo : Nullcon 
 :	OWASP OWTF - The Offensive (Web) Testing Framework - 
    
    	Bharadwaj Machiraju
   	
    
     Abraham Aranguren
    
    
    
    
    
    
    
   
  
  - 
    2014/02/15
    Tool Demo : Nullcon 
 :	OWASP Xenotix XSS Exploit Framerwork - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/02/15
    Tool Demo : Nullcon 
 :	XMLChor - 
    
    	Harshal Jamdade
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/03/15
    Talk : Blackhat 
 :	Anatomy of a Credit Card Stealing POS Malware - 
    
    	Amol Sarwate
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/03/15
    Talk : Hitb Sec Conf 
 :	JS Suicide: Using Javascript Security Features to Kill Itself - 
    
    	Ahamed Nafeez
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/03/18
    Talk : Troopers 
 :	Evolution of SIM Card Security - 
    
    	Ravishankar Borgaonkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/03/27
    Talk : Blackhat 
 :	JS Suicide: Using JavaScript Security Features to Kill JS Security - 
    
    	Ahamed Nafeez
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/05/21
    Talk : Phdays 
 :	Android Exploitation - 
    
    	Aditya Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/05/21
    Talk : Phdays 
 :	ARM Exploitation - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/05/29
    Talk : Hitb Sec Conf 
 :	Exploiting NoSQL Like Never Before - 
    
    	Francis Alexander
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/05/29
    Talk : Hitb Sec Conf 
 :	Hacking Your Cable TV Network: Die Hard Style - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/05/29
    Talk : Hitb Sec Conf 
 :	LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit - 
    
    	Rahul Kashyap
   	
    
     Rafal Wojtzcuk
    
    
    
    
    
    
    
   
  
  - 
    2014/06/23
    Talk : Hackinparis 
 :	Pentesting NoSQL DB’s with NoSQL Exploitation Framework - 
    
    	Francis Alexander
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/08/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Flowinspect: Yet another network inspection tool - 
    
    	Ankur Tyagi
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2014/08/06
    Talk : Blackhat 
 :	What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	C-SCAD: Assessing Security flaws in clearscada Web_X client! - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/08/07
    Talk : Blackhat 
 :	Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies - 
    
    	Vijay Balasubramaniyan
   	
    	Raj Bandyopadhyay
   	
    
     Telvis Calhoun
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	APT: Case Study of attackers targeting public tendering - 
    
    	Rahul Sasi
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Breaking and Securing Mobile Apps - Automagically - 
    
    	Aditya Gupta
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Cryptocalypse, Heart Bleed : Is our Government Listening? - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Cryptographic Backdoors: Subverting the RSA - 
    
    	Adhokshaj Mishra
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Exploiting NoSQL Like Never Before - 
    
    	Francis Alexander
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Hacking Communication - 
    
    	Akib Sayyed
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Idle Machines doing Bounty Hunting (Behind your Back) - 
    
    	Mrityunjay Gautam
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Lesser Known Attack - XML Injection - 
    
    	Amol Naik
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Making and breaking security in embedded devices - 
    
    	Yashin Mehaboobe
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	My tryst with Source Code Review - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Piracy Tracker - 
    
    	Vargheese Babu
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	Still Single with a bleeding heart (Tool Release) - 
    
    	Tamaghna Basu
   	
    
    
    
    
    
  
 
  
  - 
    2014/08/22
    Talk : C0c0n 
 :	The Curious Case of ProtoBufs - Demystifying Google’s hottest binary protocol - 
    
    	Prasanna Kanagasabai
   	
    	Jovin Lobo
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/09/11
    Talk : 44 Con 
 :	Darshak: how to turn your phone into a low cost IMSI catcher device - 
    
    	Ravishankar Borgaonkar
   	
    	Swapnil Udar
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/09/12
    Talk : 44con 
 :	Pentesting NoSQL DB’s Using NoSQL Exploitation Framework - 
    
    	Francis Alexander
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/09/16
    Talk : Deepsec 
 :	Advanced Powershell Threat – Lethal Client Side Attacks - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/09/24
    Talk : Brucon 
 :	OWASP: OWTF - 
    
    	Bharadwaj Machiraju
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/09/28
    Talk : Blackhat 
 :	Understanding IMSI Privacy - 
    
    	Swapnil Udar
   	
    	Ravishankar Borgaonkar
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/10/16
    Talk : Grrcon 
 :	Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design - 
    
    	Aditya K Sood
   	
    
     Dr. Richard J Enbody
    
    
    
    
    
  
 
  
  - 
    2014/10/17
    Talk : Blackhat 
 :	Android Kernel and OS Security Assessment with Iron Crow - 
    
    	Akhil Arora
   	
    	Sumanth Naropanth
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2014/10/23
    Talk : Hacklu 
 :	Hacking with Images - Evil Pictures - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/10/23
    Talk : Hacklu 
 :	WiHawk - Router Vulnerability Scanner - 
    
    	Anamika Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/10/29
    Talk : Ekoparty 
 :	Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Attacking Cryptography & PKI Implementations - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Identity theft and its impact on Cyber - Warfare - 
    
    	Tarun Wig
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Network Time Protocol in Amplification Inferno - 
    
    	Sriram Krishnan
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Security vulnerabilities in DVB-C networks: Hacking Cable TV network - 
    
    	Rahul Sasi
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	9 Cell Cyber Diplomacy - 
    
    	Alok Vijayant
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	APT protection for the Enterprise - 
    
    	Deepak Singla
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Attacking Web-Proxies like never before - 
    
    	Ahamed Nafeez
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Cyber ‘BrahMos’ - Static analysis driven secure coding - 
    
    	Joy Sen
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Detecting Fake Cell Phone Towers - 
    
    	Vijay Mukhi
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Enterprise Security - 
    
    	Mano Paul
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF - 
    
    	Bhaumik Merchant
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Financial Integrity and Cyber Security - 
    
    	Karnal Singh
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Fuzzing Asynchronous Protocols built over Websockets - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Hacking consumer electronics for Fun - 
    
    	Atul Alex
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	How I won Browser Fuzzing - 
    
    	Amol Naik
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Internet Governance - 
    
    	Anjana Kovacs
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Making and Breaking Embedded Security - 
    
    	Yashin Mehaboobe
   	
    
    
    
    
    
    
    
   
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Mobile security Automation Framework for Intelligent Auditing - 
    
    	Ankur Bhargava
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	National Cyber Policy and its impact on Business - 
    
    	Vaishali Bhagwat
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	SCADA Exploitation through Firmware - 
    
    	Ashish Saxena
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/13
    Talk : Ground Zero Summit 
 :	Vulnerability Reproduction using Zest - 
    
    	Deep Shah
   	
    
    
    
    
    
  
 
  
  - 
    2014/11/21
    Talk : Deepsec 
 :	Mobile SSL Failures - 
    
    	Tushar Dalvi
   	
    
     Tony Trummer
    
    
    
    
    
    
    
   
  
  - 
    2015/01/28
    Book :  
 :	Python Penetration Testing Essentials - 
    
    	Mohit Raj
   	
    
    
    
    
    
  
 
  
  - 
    2015/02/06
    Panel : Nullcon 
 :	2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys - 
    
    	Shomiron Das Gupta
   	
    	K S Narayanan
   	
    	Shantanu Ghosh
   	
    	Subrahmanya Gupta Boda
   	
    	Vishal Salvi
   	
    
     Benjamin Rivera
    
    
    
    
    
  
 
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Analyzing Chrome crash reports at scale - 
    
    	Abhishek Arya
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Anatomy of a credit card stealing POS malware - 
    
    	Amol Sarwate
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Attack and Defence in Radio and Communication Warfare - 
    
    	Akib Sayyed
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Building custom scans for real world enterprise network - 
    
    	Sanoop Thomas
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Building security and compliance into the software delivery process - 
    
    	Anubhav Bathla
   	
    	Dinesh Pillai
   	
    	S Chandrasekhar
   	
    
     Harish Pillay
    
    
    
    
    
  
 
  
  - 
    2015/02/06
    Panel : Nullcon 
 :	Defender’s Diary: Who’s attacking? What are my options? - 
    
    	Sastry Tumuluri
   	
    	Amit Sharma
   	
    	Venkatesh Subramaniam
   	
    	Sachin Burman
   	
    	Deepak Singla
   	
    
    
    
    
    
  
 
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Drone Attacks: How I hijacked a drone - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Generic Executable Unpacking using Dynamic Binary Instrumentation - 
    
    	Shubham Bansal
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Hacking Tizen: The OS of Everything - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Hunting and Decrypting Ghost communications using Memory Forensics - 
    
    	Monnappa K A
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Pentesting a website with million lines of Javascript - 
    
    	Lavakumar Kuppan
   	
    	Ahamed Nafeez
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Talk : Nullcon 
 :	Toliman, a Hadoop Pentesting Tool - 
    
    	Jitendra Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/02/06
    Panel : Nullcon 
 :	Why CISO should promote more of such technical events - pros and cons, benefits etc - 
    
    	Burgess Cooper
   	
    	Maya Viswanathan
   	
    	Sanjay Burman
   	
    	Sridharan Sankaran
   	
    
     Massoud Issa
    
     Katie Moussouris
    
    
    
    
    
  
 
  
  - 
    2015/02/07
    Panel : Nullcon 
 :	Startup panel – Make in India - 
    
    	Aseem Jakhar
   	
    	Radha Shelat
   	
    	Sumit D Chowdhury
   	
    	Shomiron Das Gupta
   	
    	Sastry Tumuluri
   	
    	Shiju Sathyadevan
   	
    
    
    
    
    
  
 
  
  - 
    2015/03/03
    Award :  
 :	FREAK Attack - 
    
    	Karthikeyan Bhargavan
   	
    
     Mi Tls Team
    
    
    
    
    
    
    
   
  
  - 
    2015/03/15
    Talk : Blackhat 
 :	2015 State of Vulnerability Exploits - 
    
    	Amol Sarwate
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/03/15
    Talk : Hitb Sec Conf 
 :	Sniffing the Airwaves with RTLSDR - 
    
    	Yashin Mehaboobe
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/03/15
    Talk : Defcon 
 :	TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
  
 
  
  - 
    2015/03/26
    Tool Demo : Blackhat 
 : Arsenal 
 :	OWASP Xenotix XSS Exploit Framework - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/03/26
    Tool Demo : Blackhat 
 : Arsenal 
 :	SecPod Saner - 
    
    	Preeti Subramanian
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/03/26
    Talk : Blackhat 
 :	The underground Ecosystem of Credit Card frauds - 
    
    	Abhinav Singh
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/03/26
    Tool Demo : Blackhat 
 : Arsenal 
 :	YSO Mobile Security Framework - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/03/27
    Talk : Blackhat 
 :	Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence - 
    
    	Preeti Subramanian
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/03/27
    Talk : Syscan 
 :	Stegosploit - Hacking with Pictures - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/03/30
    Book :  
 :	Kali Linux: Wireless Penetration Testing Beginner’s Guide, Second Edition - 
    
    	Vivek Ramachandran
   	
    
     Cameron Buchanan
    
    
    
    
    
  
 
  
  - 
    2015/04/30
    Book :  
 :	Learning Android Forensics - 
    
    	Rohit Tamma
   	
    
     Donnie Tindall
    
    
    
    
    
  
 
  
  - 
    2015/05/26
    Talk : Phdays 
 :	Invisible Backdoors In Your Code - 
    
    	Debasis Mohanty
   	
    
    
    
    
    
  
 
  
  - 
    2015/05/26
    Talk : Phdays 
 :	iOS Application Exploitation - 
    
    	Prateek Gianchandani
   	
    
     Egor Tolstoy
    
    
    
    
    
    
    
   
  
  - 
    2015/05/28
    Talk : Hitb Sec Conf 
 :	Stegosploit: Hacking With Pictures - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/05/28
    Talk : Hitb Sec Conf 
 :	The Savage Curtain: Mobile SSL Failures - 
    
    	Tushar Dalvi
   	
    
     Tony Trummer
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/05/29
    Talk : Hitb Sec Conf 
 :	Hacking Samsung’s Tizen: The OS of Everything - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/05/29
    Talk : Hitb Sec Conf 
 :	PowerShell for Penetration Testers - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/06/16
    Talk : Blackhat 
 :	The Savage Curtain: Mobile SSL Failures - 
    
    	Tushar Dalvi
   	
    
     Tony Trummer
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/07/06
    Talk : Blackhat 
 :	DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS - 
    
    	Ahamed Nafeez
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/07/29
    Book :  
 :	Wireshark Network Security - 
    
    	Piyush Verma
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. - 
    
    	Riyaz Walikar
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Attack chaining for web exploitation- From Information leakage to gaining Root access - 
    
    	Abhijeth Dugginapeddi
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Automated Security Analysis of Android & iOS Applications with Mobile Security Framework - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Blockchains in Security - 
    
    	Harsh Patel
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Breaking into Infosec Research - 
    
    	Vivek Ramachandran
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Demystifying and Breaking BLE - 
    
    	Yashin Mehaboobe
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) - 
    
    	Anto Joseph
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Hacking RFIDs under 2000 INR - 
    
    	Jayesh Chauhan
   	
    	Divya S John
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Medical device security and critical infrastructure inside hospitals - 
    
    	Anirudh Duggal
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	NoPo - The NoSQL HoneyPot Framework - 
    
    	Francis Alexander
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Reversing and Deciphering the Cyber Espionage Malware Communications - 
    
    	Monnappa K A
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	S3curi7y at 36K feet - 
    
    	Rugved Mehta
   	
    	Gaurav Trivedi
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/01
    Talk : C0c0n 
 :	Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/08/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	PixelCaptcha: A unicode based captcha scheme - 
    
    	Gursev Singh Kalra
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/08/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	QARK - Android Application SCA and Exploit Tool - 
    
    	Tushar Dalvi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/08/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	Rudra - The Destroyer of Evil - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Chellam - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/06
    Talk : Blackhat 
 :	Harnessing Intelligence from Malware Repositories - 
    
    	Arun Lakhotia
   	
    	Vivek Notani
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/08/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kautilya - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/07
    Talk : Defcon 
 :	Chellam – a Wi-Fi IDS/Firewall for Windows - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/08/07
    Talk : Defcon  : Crypto&privacy Village
 :	Getting into the Trust Store We Trust - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2015/08/07
    Talk : Defcon  : Packetcapture Village
 :	Hacker’s Practice Ground - 
    
    	Lokesh Pidawekar
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/07
    Workshop : Defcon  : Wireless Village
 :	WPA Enterprise Hacking - 
    
    	Vivek Ramachandran
   	
    
     Thomas D Otreppe
    
    
    
    
    
    
    
   
  
  - 
    2015/08/08
    Workshop : Defcon  : Wireless Village
 :	Automatic Live WPA/WPA2 Attacks and WPA_Supplicant - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/08
    Talk : Defcon 
 :	Chigula — a framework for Wi-Fi Intrusion Detection and Forensics - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/08
    Talk : Defcon 
 :	Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/08
    Talk : Defcon  : Packetcapture Village
 :	Powershell for Penetraton Testers - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/08
    Talk : Defcon 
 :	QARK: Android App Exploit and SCA Tool - 
    
    	Tushar Dalvi
   	
    
     Tony Trummer
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/08/08
    Tool Demo : Defcon 
 : DemoLabs  :	Rudra - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/09
    Talk : Defcon  : Packetcapture Village
 :	802.11 Monitoring with PCAP2XML/SQLite - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/08/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	Damn Vulnerable iOS App (DVIA) - 
    
    	Prateek Gianchandani
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2015/09/11
    Talk : 44 Con 
 :	Stegosploit – Drive-by Browser Exploits using only Images - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/10/08
    Talk : Brucon 
 :	The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed - 
    
    	Rushikesh D Nandedkar
   	
    	Amrita C Iyer
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/10/21
    Talk : Hacklu 
 :	Stegosploit - Delivering Drive-By Exploits With Only Images - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Cyber Security in Hospitals:Hospitals Under Seige - 
    
    	Anirudh Duggal
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Exposing Cyber Espionage: Hello from Pakistan- IIC Session - 
    
    	Jiten Jain
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Western Air Command - 
    
    	B S Singh Deo
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Authentication flaw in Automatic Bank Passbook printing machine. - 
    
    	Indrajeet Bhuyan
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Browser based Malware attacks - 
    
    	Harsh Daftary
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	chellam – a Wi-Fi IDS/Firewall for Windows - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Credit Card Frauds – The money making Ecosystem for Cyber criminals - 
    
    	Abhinav Singh
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Dissecting Android Malware - 
    
    	Anto Joseph
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Economics of Post Quantum Crypto Systems : Do we really Need it - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Elliptical Curve Cryptography - 
    
    	Aneesha S
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Hacking RFIDs under 2000INR - 
    
    	Jayesh Chauhan
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	OSINT Black Magic: Listen who whispers your name in the dark!!! - 
    
    	Sudhanshu Chauhan
   	
    	Nutan Kumar Panda
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Sanctioned to Hack: Your SCADA HMIs Belong to Us! - 
    
    	Aditya K Sood
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Thanks for the free cookies - 
    
    	Anshul Saxena
   	
    	Nishant Yadav
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Trailing Terror in the Darknets - 
    
    	Shesh Sarangdhar
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	Wolves Among Sheep: Defeating Targeted Attacks With Deception - 
    
    	Sahir Hidayatullah
   	
    	Raviraj Doshi
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/05
    Talk : Ground Zero Summit 
 :	XSS - The art of evading web application filters! - 
    
    	Anirudh Anand
   	
    
    
    
    
    
  
 
  
  - 
    2015/11/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Android InsecureBank - 
    
    	Dinesh Shetty
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2015/11/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Android Tamer - 
    
    	Anant Shrivastava
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2015/11/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kautilya: Fastest shells you will ever get - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/11/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Nishang - Tracking A Windows User - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/11/12
    Talk : Blackhat 
 :	Stegosploit - Exploit Delivery with Steganography and Polyglots - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/11/13
    Talk : Blackhat 
 :	LTE & IMSI Catcher Myths - 
    
    	Ravishankar Borgaonkar
   	
    	N Asokan
   	
    	Altaf Shaik
   	
    
     Valtteri Niemi
    
     Jean Pierre Seifert
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/11/13
    Talk : Blackhat 
 :	AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX - 
    
    	Monnappa K A
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/11/13
    Talk : Blackhat 
 :	Continuous Intrusion: Why CI tools are an Attacker’s Best Friends - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2015/11/13
    Tool Demo : Blackhat 
 : Arsenal 
 :	Rudra - The Destroyer of Evil - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/11/19
    Talk : Deepsec 
 :	Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2015/11/27
    Book :  
 :	ASP.NET Web API Security Essentials - 
    
    	Rajesh Gunasundaram
   	
    
    
    
    
    
  
 
  
  - 
    2016/01/07
    Book :  
 :	Learning iOS Penetration Testing - 
    
    	Swaroop Yermalkar
   	
    
    
    
    
    
  
 
  
  - 
    2016/01/29
    Book :  
 :	iOS Forensics Cookbook - 
    
    	Bhanu Birani
   	
    	Mayank Birani
   	
    
    
    
    
    
  
 
  
  - 
    2016/02/25
    Book :  
 :	Mastering Kali Linux Wireless Pentesting - 
    
    	Raghu Rami Reddy
   	
    
     Brian Sak
    
    
    
    
    
  
 
  
  - 
    2016/02/29
    Book :  
 :	Learning Network Forensics - 
    
    	Samir Datt
   	
    
    
    
    
    
  
 
  
  - 
    2016/03/11
    Talk : Nullcon 
 :	Attacking and defending healthcare - EMR solutions - 
    
    	Anirudh Duggal
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/03/11
    Talk : Nullcon 
 :	Automated Mobile Application Security Assessment with MobSF - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/03/11
    Talk : Nullcon 
 :	Hitchhiker’s guide to hacking Industrial Control systems (ICS) - 
    
    	Arun Mane
   	
    
    
    
    
    
  
 
  
  - 
    2016/03/11
    Talk : Nullcon 
 :	Making Machines think about security for fun and profit - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/03/11
    Talk : Nullcon 
 :	Million Dollar Baby: Towards ANGRly conquering DARPA CGC - 
    
    	Aravind Machiry
   	
    
    
    
    
    
  
 
  
  - 
    2016/03/11
    Book :  
 :	Mobile Application Penetration Testing - 
    
    	Vijay Kumar Velu
   	
    
    
    
    
    
  
 
  
  - 
    2016/03/11
    Talk : Nullcon 
 :	Privacy leaks on 4G-LTE networks - 
    
    	Altaf Shaik
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/03/11
    Talk : Nullcon 
 :	Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day - 
    
    	Pallav Jakhotiya
   	
    	Vipul Sawant
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/04/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	Android Tamer - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/04/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	HackSys Extreme Vulnerable Driver - 
    
    	Ashfaq Ansari
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/04/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans - 
    
    	Sanoop Thomas
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/04/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	LIMON-SANDBOX FOR ANALYZING LINUX MALWARES - 
    
    	Monnappa K A
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/04/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	Rudra: The Destroyer of Evil - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/04/07
    Workshop : Ground Zero Summit 
 :	Basics to Advanced Cryptography & PKI for Penetration Testers and Auditors - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2016/04/08
    Panel : Groundzerosummit 
 :	Make in India for Makers of India - 
    
    	Sachin Burman
   	
    	Nandkumar Saravade
   	
    
     Govind
    
     Bikram Singh
    
     Shri Srinath
    
    
    
    
    
  
 
  
  - 
    2016/04/29
    Book :  
 :	Practical Linux Security Cookbook - 
    
    	Tajinder Kalsi
   	
    
     Michael a Lindner
    
    
    
    
    
  
 
  
  - 
    2016/05/17
    Talk : Phdays 
 :	Fingerprinting and Attacking a Healthcare Infrastructure - 
    
    	Anirudh Duggal
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/05/17
    Talk : Phdays 
 :	Security Automation Based on Artificial Intelligence - 
    
    	Rahul Sasi
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/05/20
    Book :  
 :	Practical Mobile Forensics : Second Edition - 
    
    	Rohit Tamma
   	
    	Satish Bommisetty
   	
    
     Heather Mahalik
    
    
    
    
    
  
 
  
  - 
    2016/05/26
    Talk : Hitb Sec Conf 
 :	HITB Lab: Droid-FF: The First Android Fuzzing Framework - 
    
    	Anto Joseph
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/05/26
    Talk : Hitb Sec Conf 
 :	HITB Lab: Mobile Application Security for iOS and Android - 
    
    	Tushar Dalvi
   	
    
     Tony Trummer
    
    
    
    
    
    
    
   
  
  - 
    2016/06/29
    Book :  
 :	Effective Python Penetration Testing - 
    
    	Rejah Rehim
   	
    
    
    
    
    
  
 
  
  - 
    2016/06/30
    Book :  
 :	CISSP in 21 Days - 
    
    	M L Srinivasan
   	
    
    
    
    
    
  
 
  
  - 
    2016/06/30
    Book :  
 :	Mobile Device Exploitation Cookbook - 
    
    	Prashant Verma
   	
    	Akshay Dixit
   	
    
    
    
    
    
  
 
  
  - 
    2016/07/01
    Talk : Hackinparis 
 :	DIFFDroid - Dynamic Analysis Made Easier for Android - 
    
    	Anto Joseph
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/07/28
    Book :  
 :	Hacking Android - 
    
    	Mohammed Imran
   	
    	Srinivas Rao
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/03
    Talk : Blackhat 
 :	AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	DataSploit - 
    
    	Sudhanshu Chauhan
   	
    	Shubham Mittal
   	
    	Nutan Kumar Panda
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	Nishang: The Goodness of Offensive PowerShell - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	Visual Network and File Forensics Using Rudra - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	Android Tamer - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/08/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	Android-InsecureBankv2 - 
    
    	Dinesh Shetty
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	AppMon - 
    
    	Nishant Das Patnaik
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/04
    Talk : Blackhat 
 :	DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes - 
    
    	Rohit Mothe
   	
    
     Rodrigo Rubira Branco
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Droid-FF: Android Fuzzing Framework - 
    
    	Anto Joseph
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2016/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	LAMMA - 
    
    	Ajit Hatti
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Maltese (Malware Traffic Emulating Software) - 
    
    	Sasi Siddharth
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2016/08/04
    Talk : Blackhat 
 :	Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages - 
    
    	Anirudh Duggal
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/06
    Tool Demo : Defcon 
 : DemoLabs  :	Android-InsecureBank - 
    
    	Dinesh Shetty
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/06
    Tool Demo : Defcon 
 : DemoLabs  :	Datasploit - 
    
    	Shubham Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/06
    Tool Demo : Defcon 
 : DemoLabs  :	LAMMA (beta) - 
    
    	Ajit Hatti
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/06
    Tool Demo : Defcon 
 : DemoLabs  :	Visual Network and File Forensics using Rudra - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/08/07
    Talk : Defcon 
 :	Cyber Grand Shellphish - 
    
    	Aravind Machiry
   	
    
     Yan Shoshitaishvili
    
     Antonio Bianchi
    
     Kevin Borgolte
    
     Jacopo Corbetta
    
     Francensco Disperati
    
     Andrew Dutcher
    
     Giovanni Vigna
    
     Chris Salls
    
     Nick Stephens
    
     Fish Wang
    
     John Grosen
    
    
    
    
    
    
    
   
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	Abusing Digital Certificates : Malware Style - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	App Sec in the Time of Docker Containers - 
    
    	Akash Mahajan
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	Attacking and crashing IOT devices via Bluetooth LE Protocol - 
    
    	Pratap Chandra Allena
   	
    	Ajay Pratap Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	Backdooring my Enemies with a Proxy for Threat Intelligence - 
    
    	Jovin Lobo
   	
    	Aditya Vasekar
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	Breaking into Gas stations! - 
    
    	Suraj Pratap
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	Esoteric XSS Payloads - 
    
    	Riyaz Walikar
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	Evading Corporate Security – You’re as secure as the weakest link - 
    
    	Prajwal Panchmahalkar
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	How (in)secure are Indian GSM networks? - 
    
    	Ajay Fuloria
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	Kill the password - A new era of authentication - 
    
    	Tamaghna Basu
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	SSD Forensics : A Nightmare for Forensic Investigators - 
    
    	Santosh Khadsare
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	The Art of Social Hacking - 
    
    	Gaurav Trivedi
   	
    	Rugved Mehta
   	
    
    
    
    
    
  
 
  
  - 
    2016/08/19
    Talk : C0c0n 
 :	Threats in Connected World - 
    
    	Bhavin Gandhi
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/09/14
    Talk : 44 Con 
 :	2016: The Infosec Crossroads - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/09/23
    Talk : Rootcon 
 :	Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans - 
    
    	Sanoop Thomas
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/09/30
    Book :  
 :	Mastering Metasploit - 
    
    	Nipun Jaswal
   	
    
    
    
    
    
  
 
  
  - 
    2016/10/07
    Talk : Deepsec 
 :	Inside Stegosploit - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/10/19
    Talk : Hacklu 
 :	2016: The Infosec Crossroads - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/10/27
    Talk : Brucon 
 :	Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - 
    
    	Rushikesh D Nandedkar
   	
    	Amrita C Iyer
   	
    	Krishnakant Patil
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/10/28
    Book :  
 :	Mastering Modern Web Penetration Testing - 
    
    	Prakhar Prasad
   	
    
     Rafay Baloch
    
    
    
    
    
  
 
  
  - 
    2016/11/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	DataSploit - 
    
    	Shubham Mittal
   	
    	Nutan Kumar Panda
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/11/03
    Talk : Blackhat 
 :	WiFi-Based IMSI Catcher - 
    
    	Ravishankar Borgaonkar
   	
    
     Piers O Hanlon
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/11/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	AppMon: Runtime Security Testing & Profiling Framework for Native Apps - 
    
    	Nishant Das Patnaik
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/11/04
    Talk : Blackhat 
 :	Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk - 
    
    	Siddharth Rao
   	
    	Bhanu Kotte
   	
    
     Dr. Silke Holtmanns
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/11/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Firmware Analysis Toolkit (FAT) - 
    
    	Aditya Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/11/04
    Talk : Blackhat 
 :	Randomization Can’t Stop BPF JIT Spray - 
    
    	N Asokan
   	
    
     Filippo Bonazzi
    
     Elena Reshetova
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2016/11/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Yasuo - 
    
    	Saurabh Harit
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2016/11/05
    Talk : Hackfest 
 :	LockPicker: Leaking data from live LUKS partition - 
    
    	Adhokshaj Mishra
   	
    
    
    
    
    
  
 
  
  - 
    2016/11/06
    Talk : Ground Zero Summit 
 :	Hacking The Droids - 
    
    	Anto Joseph
   	
    
    
    
    
    
  
 
  
  - 
    2016/11/11
    Talk : Deepsec 
 :	AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2016/11/11
    Talk : Deepsec 
 :	Human vs Artificial intelligence – Battle of Trust - 
    
    	Hemil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	Agility with security mitigations in Windows 10 - 
    
    	Swamy Shivaganga Nagaraju
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	Breach Response - Time to shake up the status quo - 
    
    	K K Mookhey
   	
    	Pranesh Prakash
   	
    	Sahir Hidayatullah
   	
    	Shobha Jagathpal
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	Case study of SS7/Sigtran assessment - 
    
    	Akib Sayyed
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	Case Study on RFID (proximity cards) hacking - 
    
    	Sarwar Jahan
   	
    	Ashwath Kumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	DevOpSec: Rapid Security in the Cloud with AWS and CIS - 
    
    	Mikhail Advani
   	
    	Rajesh Tamhane
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/03/03
    Panel : Nullcon 
 :	Digital warriors: India and the Future of Conflict on the Internet - 
    
    	Saikat Datta
   	
    	Brijesh Datta
   	
    	Muktesh Chander
   	
    	Cmde Anand
   	
    
     Anja Kovacs
    
    
    
    
    
    
    
   
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	Hacking medical devices and infrastructure - 
    
    	Anirudh Duggal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/03/03
    Panel : Nullcon 
 :	Hardware Security: Foundational Block of Cyber Battlefield - 
    
    	Vinayak Godse
   	
    	Amit Sharma
   	
    	Aseem Jakhar
   	
    	Minatee Mishra
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	Injecting Security into Web apps with Runtime Patching and Context Learning - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	Securing Critical National Infrastructure - 
    
    	Shailendra Fuloria
   	
    	R Sarangapani
   	
    	Rahul Tongia
   	
    
     Michael Pyle
    
     Justin Searle
    
    
    
    
    
    
    
   
  
  - 
    2017/03/03
    Talk : Nullcon 
 :	Tale of training a Web Terminator! - 
    
    	Bharadwaj Machiraju
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/03/04
    Panel : Nullcon 
 :	Application Security Opportunities and Challenges in a DevOps World - 
    
    	Abhay Bhargav
   	
    	Ajay Bongirwar
   	
    	Arun Jadhav
   	
    	Pravesh Sharma
   	
    
     Adam Leaonard
    
    
    
    
    
    
    
   
  
  - 
    2017/03/04
    Panel : Nullcon 
 :	Challenges in securing the cloud - 
    
    	Vinayak Hegde
   	
    	Manish Tiwari
   	
    	Subramanian Kumar
   	
    
     David Lenoe
    
     Lucas Moody
    
    
    
    
    
  
 
  
  - 
    2017/03/04
    Panel : Nullcon 
 :	Cyber-Security Blue-Print for the Future! - 
    
    	Kapil Awasthi
   	
    	Mathan Babu Kasilingam
   	
    	Partha Sengupta
   	
    	Sumit Malhotra
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/15
    Talk : Can Sec West 
 :	Inside Stegosploit - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/03/21
    Talk : Troopers 
 :	New attacks in 4G technologies - 
    
    	Ravishankar Borgaonkar
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/23
    Talk : Troopers 
 :	How we hacked Distributed Configuration Management Systems - 
    
    	Bharadwaj Machiraju
   	
    
     Francis Alexander
    
    
    
    
    
  
 
  
  - 
    2017/03/23
    Talk : Troopers 
 :	How we hacked Distributed Configuration Management Systems - 
    
    	Francis Alexander
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/30
    Tool Demo : Blackhat 
 : Arsenal 
 :	DAMN VULNERABLE SS7 NETWORK - 
    
    	Akib Sayyed
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/30
    Tool Demo : Blackhat 
 : Arsenal 
 :	Devknox - Autocorrect Security Issues from Android Studio - 
    
    	Subho Halder
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/03/30
    Tool Demo : Blackhat 
 : Arsenal 
 :	WiDy: WiFi 0wnage in Under $5 - 
    
    	Vivek Ramachandran
   	
    	Nishant Sharma
   	
    	Ashish Bhangale
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/30
    Tool Demo : Blackhat 
 : Arsenal 
 :	Datasploit - Automated Open Source Intelligence (OSINT) Tool - 
    
    	Shubham Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/03/30
    Tool Demo : Blackhat 
 : Arsenal 
 :	LAMMA 1.0 - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2017/03/31
    Talk : Blackhat 
 :	Mobile-Telephony Threats in Asia - 
    
    	Payas Gupta
   	
    
     Marco Balduzzi
    
     Lion Gu
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/03/31
    Talk : Blackhat 
 :	The Seven Axioms of Security - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/03/31
    Talk : Blackhat 
 :	WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION - 
    
    	Monnappa K A
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/04/13
    Keynote : Hitb Sec Conf 
 :	Redefining Defense - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/04/14
    Talk : Hitb Sec Conf 
 :	COMMSEC: IoT Hacking Simplified - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/04/14
    Talk : Hitb Sec Conf 
 :	Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure - 
    
    	Anirudh Duggal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/04/19
    Talk : Brucon 
 :	Evading Microsoft ATA for Active Directory Domination - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/04/21
    Book :  
 :	Kali Linux Intrusion and Exploitation Cookbook - 
    
    	Dhruv Shah
   	
    	Ishan Girdhar
   	
    
    
    
    
    
  
 
  
  - 
    2017/05/23
    Talk : Phdays 
 :	How we hacked distributed configuration management systems - 
    
    	Bharadwaj Machiraju
   	
    	Francis Alexander
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/05/23
    Talk : Phdays 
 :	Injecting security into web apps in the runtime - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/05/23
    Talk : Phdays 
 :	Practical machine learning in infosecurity - 
    
    	Anto Joseph
   	
    
     Clarence Chio
    
    
    
    
    
    
    
   
  
  - 
    2017/05/25
    Book :  
 :	Metasploit Bootcamp - 
    
    	Nipun Jaswal
   	
    
    
    
    
    
  
 
  
  - 
    2017/06/23
    Talk : Hackinparis 
 :	Injecting Security into Web apps with Runtime Patching and Context Learning - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/06/26
    Tool Demo : Blackhat 
 : Arsenal 
 :	DiffDroid - 
    
    	Anto Joseph
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/06/30
    Book :  
 :	Mastering Kali Linux for Advanced Penetration Testing, Second Edition - 
    
    	Vijay Kumar Velu
   	
    
    
    
    
    
  
 
  
  - 
    2017/07/21
    Book :  
 :	Metasploit for Beginners - 
    
    	Sagar Rahalkar
   	
    
    
    
    
    
  
 
  
  - 
    2017/07/26
    Tool Demo : Blackhat 
 : Arsenal 
 :	Datasploit - Automated Open Source Intelligence (OSINT) Tool - 
    
    	Kunal Aggarwal
   	
    	Shubham Mittal
   	
    	Sudhanshu Chauhan
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2017/07/26
    Tool Demo : Blackhat 
 : Arsenal 
 :	Devknox - Autocorrect Security Issues from Android Studio - 
    
    	Subho Halder
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/07/26
    Talk : Blackhat 
 :	New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor - 
    
    	Ravishankar Borgaonkar
   	
    	Altaf Shaik
   	
    
     Shinjo Park
    
     Lucca Hirschi
    
     Andrew Martin
    
     Jean Pierre Seifert
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/07/26
    Talk : Blackhat 
 :	Wire Me Through Machine Learning - 
    
    	Ankit Singh
   	
    	Vijay Thaware
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/07/27
    Tool Demo : Blackhat 
 : Arsenal 
 :	Android Tamer - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/07/27
    Talk : Blackhat 
 :	Evading Microsoft ATA for Active Directory Domination - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/07/27
    Tool Demo : Blackhat 
 : Arsenal 
 :	Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday - 
    
    	Lalith Rallabhandi
   	
    	Abhijeth Dugginapeddi
   	
    	Srinivas Rao
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/07/27
    Tool Demo : Blackhat 
 : Arsenal 
 :	Gibber Sense - 
    
    	Ajit Hatti
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/07/27
    Talk : Defcon  : Lockpick Village
 :	ICS Humla - 
    
    	Sneha Rajguru
   	
    	Arun Mane
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/07/27
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes - 
    
    	Anshuman Bhartiya
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2017/07/27
    Talk : Defcon  : Recon Village
 :	Recon and bug bounties what a great love story - 
    
    	Abhijeth Dugginapeddi
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/07/27
    Workshop : Defcon 
 :	Attacking and Defending 802.11ac Networks - 
    
    	Vivek Ramachandran
   	
    
     Thomas D' Otreppe
    
    
    
    
    
  
 
  
  - 
    2017/07/28
    Tool Demo : Defcon 
 : DemoLabs  :	Android Tamer - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/07/28
    Tool Demo : Defcon 
 : DemoLabs  :	GibberSense - 
    
    	Ajit Hatti
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/07/28
    Tool Demo : Defcon 
 : DemoLabs  :	Lamma 1.0 - 
    
    	Ajit Hatti
   	
    	Antriksh Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/07/29
    Tool Demo : Defcon 
 : DemoLabs  :	Fuzzapi - 
    
    	Abhijeth Dugginapeddi
   	
    	Lalith Rallabhandi
   	
    	Srinivas Rao
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/07/29
    Tool Demo : Defcon 
 : DemoLabs  :	WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED - 
    
    	Vivek Ramachandran
   	
    	Nishant Sharma
   	
    	Ashish Bhangale
   	
    
    
    
    
    
  
 
  
  - 
    2017/07/29
    Tool Demo : Defcon 
 : DemoLabs  :	WiMonitor - an OpenWRT package for remote WiFi sniffing - 
    
    	Vivek Ramachandran
   	
    	Nishant Sharma
   	
    	Ashish Bhangale
   	
    
    
    
    
    
  
 
  
  - 
    2017/07/30
    Tool Demo : Blackhat 
 : Arsenal 
 :	Yasuo - 
    
    	Saurabh Harit
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Hunting Botnets with Analytics - 
    
    	Shomiron Das Gupta
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Phishing threats to customers and mitigation - 
    
    	Bhavin Bhansali
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work - 
    
    	Rahul Binjve
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Androsia: A tool for securing in memory sensitive data - 
    
    	Samit Anwer
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Anti-Virus Bypassing for Fun and Profit - 
    
    	Vanshit Malhotra
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! - 
    
    	Abhinav Biswas
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Bank on Compliance for Cyber Security - 
    
    	Dinesh O Bareja
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Big Data Analytics with pattern matching for smarter analytics - 
    
    	Tarun Wig
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Blockchain for Information security - 
    
    	Shobha Jagathpal
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Case study: Security of Digital Wallet apps in India - 
    
    	Ashwath Kumar
   	
    	Sandesh Mysore Anand
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Catching Network anomalies using Deep learning - 
    
    	Aditya Vasekar
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Challenges in Digital Banking - 
    
    	Biju K
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Cloud_Security Suite - One stop tool for auditing cloud infrastructure - 
    
    	Shivankar Madaan
   	
    	Jayesh Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	CoAP versus MQTT: IoT Protocol Vulnerability analysis - 
    
    	Rajiv Pandey
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Cyber bullying and Cyber Harassment - 
    
    	Martina Mathew
   	
    	Jacob Jose
   	
    	Ankit John Abraham
   	
    	Lekshmi B
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Cyber bullying-Screen the Mean - 
    
    	Nitin Awade
   	
    	Surjata Awade
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Cyber Security Threat Management  – Model it, Collect Intelligence and Hunt them! - 
    
    	Illyas Kooliyankal
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Cyber Threat Intelligence - Are We There , Yet…? - 
    
    	A Shiju Rawther
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Do Students really require Smartphones - 
    
    	Pranav a Menon
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Dynamic Binary Instrumentation - 
    
    	Vivek Arora
   	
    	Bhaskar Rastogi
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Exploiting the smartness of BLE Stack - 
    
    	Apoorva Gupta
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Hacking Homes: A hardware insight for IoT [in]Security - 
    
    	Jiggyasu Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Hunting the Hunters – Fighting CyberCrime at the Source - 
    
    	Valan Sivasubramanian
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Identity Theft - 
    
    	Devika a V
   	
    	Meera P
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	iGoat – A Self Learning Tool for iOS App Pentesting and Security - 
    
    	Swaroop Yermalkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Internet Addiction and Children - 
    
    	Teena Jose
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Mobile Banking (In)Security - 
    
    	Sneha Rajguru
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Moving from Cybersecurity Awareness to Cybersecurity Competence - 
    
    	Anup Narayanan
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	OSINT and Privacy - 
    
    	Rohit Srivastwa
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis - 
    
    	Furqan Khan
   	
    	Siddharth Anbalahan
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure - 
    
    	Manas Pratim Sarma
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Sleep, Screen and Teenagers - 
    
    	Natishia Rebecca Chandy
   	
    	Pulkit Deepak Khatri
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Social Media and You - 
    
    	Parry Aftab
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Technology-The New Frontier in Teaching - 
    
    	Bindu Mony
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	The card hack - Lessons from the Hitachi Payments Breach - 
    
    	Saikat Datta
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ - 
    
    	Rushikesh D Nandedkar
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	The Internet Of Things: Essentials of Secur(IOT)y - 
    
    	Arpit Bajpai
   	
    	Ronald Michael
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	The need for Teachers to cope with Technology - 
    
    	Resmi Rajan
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	The need for Teachers to cope with Technology - 
    
    	Shibi Anand
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	The Role of Teachers in Digital Era - 
    
    	Nisha Prayan
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Threats with online gaming and issues with games like Pokemon - 
    
    	Riyaz Walikar
   	
    	Akash Mahajan
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	What Security Managers can learn from story tellers? - 
    
    	Anup Narayanan
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Yarafying Android Malware: A Missing Step Before Malware Analysis - 
    
    	Shivang Desai
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/18
    Talk : C0c0n 
 :	Your friendly neighbourhood exploit - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/19
    Panel : C0c0n 
 :	Security in Banking - Being one step aheadt - 
    
    	Sunil Varkey
   	
    	Rajesh Hemrajani
   	
    	Biju K
   	
    	Bhavin Bhansali
   	
    	B R Nath
   	
    	V George Antony
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/19
    Talk : C0c0n 
 :	The Public Private Partnership - Navigating the Govt - 
    
    	Saikat Datta
   	
    
    
    
    
    
  
 
  
  - 
    2017/08/19
    Talk : C0c0n 
 :	Trust, the foundation of Digital Mastery - 
    
    	Sunil Varkey
   	
    
    
    
    
    
  
 
  
  - 
    2017/09/13
    Talk : 44 Con 
 :	Red Team Revenge : Attacking Microsoft ATA - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/10/05
    Talk : Brucon 
 :	Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) - 
    
    	Rushikesh D Nandedkar
   	
    	Sampada Nandedkar
   	
    
    
    
    
    
  
 
  
  - 
    2017/10/19
    Talk : Hacklu 
 :	Are your VoLTE and VoWiFi calls secure? - 
    
    	Sreepriya Chalakkal
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/10/19
    Talk : Hacklu 
 :	Bug hunting using symbolic virtual machines! - 
    
    	Anto Joseph
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/10/19
    Talk : Hacklu 
 :	Intel AMT: Using & Abusing the Ghost in the Machine - 
    
    	Parth Shukla
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/11/14
    Talk : Blackhat 
 :	Pwning a Smart Home in Under 10 Minutes - 
    
    	Aditya Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/11/17
    Talk : Deepsec 
 :	How Secure Are Your VoLTE And VoWiFi Calls? - 
    
    	Sreepriya Chalakkal
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/11/17
    Talk : Deepsec 
 :	Intel AMT: Using & Abusing The Ghost In The Machine - 
    
    	Parth Shukla
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/11/20
    Talk : Hackfest 
 :	How my SV Machine nailed your Malware - 
    
    	Nikhil P Kulkarni
   	
    
    
    
    
    
  
 
  
  - 
    2017/11/28
    Book :  
 :	Python Penetration Testing Cookbook - 
    
    	Rejah Rehim
   	
    
    
    
    
    
  
 
  
  - 
    2017/11/29
    Book :  
 :	IoT Penetration Testing Cookbook - 
    
    	Aditya Gupta
   	
    
     Aaron Guzman
    
    
    
    
    
  
 
  
  - 
    2017/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	ANWI (All New Wireless IDS) - The £5 WIDS - 
    
    	Sanket Karpe
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2017/12/06
    Talk : Blackhat 
 :	BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES - 
    
    	Saurabh Harit
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/12/06
    Talk : Blackhat 
 :	DIFUZZING ANDROID KERNEL DRIVERS - 
    
    	Aravind Machiry
   	
    
     Chris Salls
    
     Yan Shoshitaishvili
    
     Jake Corina
    
     Shuang Hao
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2017/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	DataSploit - OSINT Framework - 
    
    	Shubham Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL - 
    
    	Raghudeep Kannavara
   	
    
    
    
    
    
    
    
   
  
  - 
    2017/12/13
    Book :  
 :	Security Automation with Ansible 2 - 
    
    	Akash Mahajan
   	
    	Madhu Akula
   	
    
    
    
    
    
  
 
  
  - 
    2017/12/28
    Book :  
 :	Kali Linux Wireless Penetration Testing Beginner’s Guide : Third Edition - 
    
    	Vivek Ramachandran
   	
    
     Dieterle
    
     Cameron Buchanan
    
    
    
    
    
  
 
  
  - 
    2017/12/29
    Book :  
 :	Enterprise Cloud Security and Governance - 
    
    	Zeal Vora
   	
    
    
    
    
    
  
 
  
  - 
    2017/12/30
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Security Suite - One Stop Tool for AWS Security Audit - 
    
    	Shivankar Madaan
   	
    	Prajal Kulkarni
   	
    	Jayesh Chauhan
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/02/26
    Book :  
 :	Metasploit Penetration Testing Cookbook - 
    
    	Nipun Jaswal
   	
    	Abhinav Singh
   	
    	Monika Agarwal
   	
    
     Daniel Teixeira
    
    
    
    
    
  
 
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	A Game between Adversary and AI Scientist - 
    
    	Satnam Singh
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	Abusing and Attacking Content Sharing Solutions - 
    
    	Pratap Chandra Allena
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	Breaking Into Container Orchestrators - 
    
    	Nadeem Hussain
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	DARWIN (A parasite covert wireless network) - 
    
    	Rushikesh D Nandedkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	Looting your bank savings using Digital India - 
    
    	Indrajeet Bhuyan
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	Security through obscurity and fear - 
    
    	Abhinav Srivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	Software Supply Chain Cyberattack - 
    
    	Samiran Ghatak
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	SpotPhish: Zero-Hour Phishing Protection - 
    
    	Ganesh Varadarajan
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	Unleashing D* on Android Kernel Drivers - 
    
    	Aravind Machiry
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/01
    Talk : Nullcon 
 :	White-Stingray: Bypassing stingray detectors - 
    
    	Altaf Shaik
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/02
    Panel : Nullcon 
 :	Economics of Hacks & Data Breaches Who Pays, Who Secures & Who Wins - 
    
    	Vinayak Godse
   	
    	Ashutosh Jain
   	
    	Bhishma Maheshwari
   	
    	Manish Tiwari
   	
    	Suchit Mishra
   	
    
    
    
    
    
  
 
  
  - 
    2018/03/02
    Panel : Nullcon 
 :	Should all ciso promote hall of fame” within their organizations - 
    
    	Shomiron Das Gupta
   	
    	Hariprasad Chede
   	
    	Keyur Desai
   	
    	Subramanian Kumaraswamy
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/02
    Panel : Nullcon 
 :	Should all ciso promote hall of fame” within their organizations - 
    
    	Burgess Cooper
   	
    	Durga Dube
   	
    
     Thom Langford
    
     Harish Pillay
    
    
    
    
    
    
    
   
  
  - 
    2018/03/02
    Panel : Nullcon 
 :	The complexity of regulation & cybersecurity - 
    
    	Saikat Datta
   	
    	Maya R Nair
   	
    	Nandkumar Saravade
   	
    	Sanjay Bahl
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/03
    Panel : Nullcon 
 :	Forensic Challenges and Road Ahead - 
    
    	Manu Zacharia
   	
    	Brijesh Singh
   	
    	Sanjay Bahl
   	
    
     Vladimir Katalov
    
    
    
    
    
    
    
   
  
  - 
    2018/03/03
    Panel : Nullcon 
 :	IoT : How long till D Day? - 
    
    	Aseem Jakhar
   	
    	Shobha Jagathpal
   	
    	Rishikesh Kamat
   	
    
     Daniel Cisowski
    
     Michael Pyle
    
    
    
    
    
    
    
   
  
  - 
    2018/03/03
    Panel : Nullcon 
 :	Managing Cyber Risk in the Connected Environment - 
    
    	Gaurav Shukla
   	
    	Ramachandra Hegde
   	
    	Sudarshan Rajagopal
   	
    
     Kabir Mulchandani
    
    
    
    
    
    
    
   
  
  - 
    2018/03/03
    Panel : Nullcon 
 :	Next generation cyber SOC - 
    
    	K K Mookhey
   	
    	Mathan Babu Kasilingam
   	
    	Hidayath Khan
   	
    	Shivkumar Pandey
   	
    
     Michael Smith
    
    
    
    
    
    
    
   
  
  - 
    2018/03/15
    Talk : Troopers 
 :	Defending Microsoft Environments at Scale - 
    
    	Vineet Bhatia
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/22
    Tool Demo : Blackhat 
 : Arsenal 
 :	ADRecon: Active Directory Recon - 
    
    	Prashant Mahajan
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/22
    Tool Demo : Blackhat 
 : Arsenal 
 :	Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data - 
    
    	Samit Anwer
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/03/22
    Tool Demo : Blackhat 
 : Arsenal 
 :	Archery - Open Source Vulnerability Assessment and Management - 
    
    	Anand Tiwari
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/22
    Tool Demo : Blackhat 
 : Arsenal 
 :	Jackhammer - One Security Vulnerability Assessment/Management Tool - 
    
    	Rajagopal Vr
   	
    	Krishna Chaitanya Yarramsetty
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/03/22
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mobile Security Framework - MobSF - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/22
    Talk : Blackhat 
 :	Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables - 
    
    	Sumanth Naropanth
   	
    	Kavya Racharla
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/22
    Talk : Blackhat 
 :	XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot - 
    
    	Ravi Sahita
   	
    
     Daiping Liu
    
     Mingwei Zhang
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/03/23
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit - 
    
    	Jayesh Chauhan
   	
    	Shivankar Madaan
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/03/28
    Book :  
 :	Cloud Security Automation - 
    
    	Prashant Priyam
   	
    
    
    
    
    
  
 
  
  - 
    2018/05/13
    Talk : Defcon 
 :	Androsia: Securing ‘Data in Process’ for your Android Apps - 
    
    	Samit Anwer
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/05/29
    Award :  
 :	Data Exfiltration via Formula Injection #Part1 - 
    
    	Ajay Prashar
   	
    	Balaji Gopal
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/06/15
    Book :  
 :	CCNA Security 210-260 Certification Guide - 
    
    	Vijay Anandh
   	
    
     Glen D. Singh
    
     Michael Vinod
    
    
    
    
    
  
 
  
  - 
    2018/06/29
    Talk : Hackinparis 
 :	Hunting PBX for Vulnerabilities - 
    
    	Himanshu Mehta
   	
    	Sachin Wagh
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/06/29
    Book :  
 :	Learning Malware Analysis - 
    
    	Monnappa K A
   	
    
    
    
    
    
  
 
  
  - 
    2018/07/30
    Book :  
 :	Network Security with pfSense - 
    
    	Manuj Aggarwal
   	
    
    
    
    
    
  
 
  
  - 
    2018/07/30
    Book :  
 :	Practical Industrial Internet of Things Security - 
    
    	Sravani Bhattacharjee
   	
    
    
    
    
    
  
 
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	ADRecon: Active Directory Recon - 
    
    	Prashant Mahajan
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	ANWI (All New Wireless IDS): The $5 WIDS - 
    
    	Rishikesh Bhide
   	
    	Sanket Karpe
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Archerysec Tool Demo - 
    
    	Anand Tiwari
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Astra: Automated Security Testing For REST APIs - 
    
    	Ankur Bhargava
   	
    	Prajal Kulkarni
   	
    	Sagar Popat
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Talk : Blackhat 
 :	Back to the Future: A Radical Insecure Design of KVM on ARM - 
    
    	Baibhav Singh
   	
    	Rahul Kashyap
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit - 
    
    	Divya S John
   	
    	Jayesh Chauhan
   	
    	Shivankar Madaan
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Talk : Blackhat 
 :	Compression Oracle Attacks on VPN Networks - 
    
    	Ahamed Nafeez
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Damn Vulnerable iOS App: Swift Edition - 
    
    	Prateek Gianchandani
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	DARWIN: Real World Use Cases for Covert Wireless - 
    
    	Arun Mane
   	
    	Rushikesh D Nandedkar
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	DataSploit 2.0 - 
    
    	Kunal Aggarwal
   	
    	Shubham Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	DejaVu: An Open Source Deception Framework - 
    
    	Bhadreshkumar Patel
   	
    	Harish Ramadoss
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Expl-iot: IoT Security Testing and Exploitation Framework - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Halcyon IDE: For Nmap Script Developers - 
    
    	Sanoop Thomas
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Talk : Blackhat 
 :	LTE Network Automation Under Threat - 
    
    	Ravishankar Borgaonkar
   	
    	Altaf Shaik
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	PA Toolkit: Wireshark Plugins for Pentesters - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting - 
    
    	Sudhanshu Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	SCoDA: Smart COntract Defender and Analyzer - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	ThreatPlaybook - 
    
    	Abhay Bhargav
   	
    	Sharath Kumar
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	V2X Validation Tool - 
    
    	Raashid Ansari
   	
    
     Jonathan Petit
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Talk : Defcon 
 :	4G—Who is paying your cellular phone bill? - 
    
    	Isha Singh
   	
    
     Dr Silke Holtmanns
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Talk : Defcon  : Crypto&privacy Village
 :	Anonymous rate-limiting in services with Direct Anonymous Attestation - 
    
    	Konark Modi
   	
    
     Alex Catarineu
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Talk : Defcon  : Lockpick Village
 :	Backdooring DVR/NVR devices - 
    
    	Arun Mane
   	
    
    
    
    
    
  
 
  
  - 
    2018/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	BLEMystique: Affordable Custom BLE Target - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	Jackhammer: One Security Vulnerability Assessment/Management Tool - 
    
    	Madhusudhan Konda
   	
    	Rajagopal Vr
   	
    	Shreyas Chidambara
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mafia: Mobile Security Automation Framework for Intelligent Auditing - 
    
    	Ankur Bhargava
   	
    	Sagar Popat
   	
    	Mohan Kallepalli
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	OWASP Offensive Web Testing Framework - 
    
    	Viyat Bhalodia
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style - 
    
    	Sudheendra Bhat
   	
    
     Ismael Valenzuela
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Talk : Blackhat 
 :	Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key - 
    
    	Sanchari Das
   	
    
     Andrew C Dingman
    
     Gianpaolo Russo
    
     L Jean Camp
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/09
    Talk : Blackhat 
 :	Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina - 
    
    	Bhargava Shastry
   	
    
     Vincent Ulitzsch
    
     Dominik Maier
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/10
    Talk : Defcon  : Packethacking Village
 :	AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION - 
    
    	Lokesh Pidawekar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/10
    Talk : Defcon  : Recon Village
 :	Building visualisation platforms for OSINT data using open source solutions - 
    
    	Bharath Kumar
   	
    	Madhu Akula
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	ADRecon: Active Directory Recon - 
    
    	Prashant Mahajan
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	Angad: A Malware Detection Framework using Multi-Dimensional Visualization - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	Archery—Open Source Vulnerability Assessment and Management - 
    
    	Anand Tiwari
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	BLEMystique—Affordable custom BLE target - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit - 
    
    	Jayesh Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Talk : Defcon 
 :	Compression Oracle Attacks on VPN Networks - 
    
    	Ahamed Nafeez
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	DejaVU—An Open Source Deception Framework - 
    
    	Harish Ramadoss
   	
    	Bhadreshkumar Patel
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	Halcyon IDE - 
    
    	Sanoop Thomas
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	HealthyPi—Connected Health - 
    
    	Ashwin Whitchurch
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	Local Sheriff - 
    
    	Konark Modi
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	PA Toolkit—Wireshark plugins for Pentesters - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/11
    Tool Demo : Defcon 
 : DemoLabs  :	Sh00t—An open platform for manual security testers & bug hunters - 
    
    	Pavan Mohan
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/08/12
    Tool Demo : Defcon 
 : DemoLabs  :	Expl-iot—IoT Security Testing and Exploitation framework - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/08/12
    Talk : Defcon 
 :	Last mile authentication problem: Exploiting the missing link in end-to-end secure communication - 
    
    	Siddharth Rao
   	
    
     Thanh Bui
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/08/30
    Talk : Hitb Sec Conf 
 :	Exploiting Automation in LTE Mobile Networks - 
    
    	Ravishankar Borgaonkar
   	
    
     Altaf Shaik
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/09/06
    Talk : Grrcon 
 :	Analyzing Multi-Dimensional Malware Dataset - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/09/06
    Talk : Grrcon 
 :	Angad: A Malware Detection Framework using Multi-Dimensional Visualization - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/09/06
    Talk : Grrcon 
 :	Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI - 
    
    	Pranshu Bajpai
   	
    
     Richard Enbody
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/09/12
    Book :  
 :	Hands-On Bug Hunting for Penetration Testers - 
    
    	Himanshu Sharma
   	
    
     Joe Marshall
    
    
    
    
    
  
 
  
  - 
    2018/09/12
    Talk : 44 Con 
 :	Make ARM Shellcode Great Again - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/09/27
    Talk : Rootcon 
 :	Bug Bounty Hunting on Steroids - 
    
    	Anshuman Bhartiya
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/09/27
    Talk : Rootcon 
 :	Cyber Security Threats to Telecom Networks - 
    
    	Hardik Mehta
   	
    
     Rosalia D’ Alessandro
    
     Loay Abdelrazek
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/09/27
    Talk : Rootcon 
 :	Defending cloud Infrastructures with Cloud Security Suite - 
    
    	Shivankar Madaan
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/09/27
    Talk : Rootcon 
 :	Expl-iot: Hacking IoT like a boss - 
    
    	Aseem Jakhar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/09/28
    Book :  
 :	Hands-On Red Team Tactics - 
    
    	Himanshu Sharma
   	
    	Harpreet Singh
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	Angad: A Malware Detection Framework Using Multi-Dimensional Visualization - 
    
    	Ankur Tyagi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Defending cloud Infrastructures with Cloud Security Suite - 
    
    	Jayesh Chauhan
   	
    	Shivankar Madaan
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	DNS Exfiltration and Out of Band Attacks - 
    
    	Nitesh Shilpkar
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Pentesting GraphQL Applications - 
    
    	Neelu Tripathy
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Adaptive GRC - 
    
    	Mahesh Kalyanaraman
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Artificial Intelligence and Social Media Analytics in Criminal Investigation - 
    
    	Amit Dubey
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Blockchains as techno-power structures: towards emergence of P2P Politics - 
    
    	Sunil Aggarwal
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Cyber security in Health Care Industry - 
    
    	Noorul Haq
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Cybersecurity Embedded Digital Transformation - The Future - 
    
    	Sunil Kanchi
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Data management challenge for Privacy compliance - 
    
    	Maria Bellarmine
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Dealing with Changing Threat Landscape - 
    
    	Vijendra Katiyar
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Defending Healthcare Base - 
    
    	Jiggyasu Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Digital Innovation revolution in Kerala Government - 
    
    	Sunil Varkey
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	DomGoat - the DOM Security Playground - 
    
    	Lavakumar Kuppan
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Future of Mobility & Cyber Security - 
    
    	Suja Chandy
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	How can we use machine learning to prevent Frauds and password breaches - 
    
    	Tamaghna Basu
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	OSINT : Indian Citizen Edition - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Predictive policing using Big Data analytics. - 
    
    	Tarun Wig
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Privacy And Data Protection: Stakeholders’ Perspectives - 
    
    	Rahul Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Resiliency Focus alongside Digital Disruption - 
    
    	Lince Lawrence
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	SCANDA: To Unbosom Malware Behavior - 
    
    	Rajesh Nikam
   	
    	Parmanand Mishra
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Taking cyber security to the board room - 
    
    	Amit Pradhan
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Unconventional vulnerabilities in Google Cloud Platform - 
    
    	Pranav Venkat
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Using Fault Injection for Forensics - 
    
    	Yashin Mehaboobe
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/05
    Talk : C0c0n 
 :	Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? - 
    
    	Roshy John
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/10
    Talk : Brucon 
 :	Forging Trusts for Deception in Active Directory - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/10/10
    Talk : Brucon 
 :	Simplifying the art of instrumentation - 
    
    	Krishnakant Patil
   	
    	Rushikesh D Nandedkar
   	
    
    
    
    
    
  
 
  
  - 
    2018/10/15
    Talk : Hacklu 
 :	Come to the dark side! We have radical insurance groups & ransomware - 
    
    	Ankit Gangwal
   	
    
     Eireann Leverett
    
    
    
    
    
    
    
   
  
  - 
    2018/10/15
    Talk : Hacklu 
 :	Make ARM Shellcode Great Again - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/10/19
    Talk : App Sec Day Australia 
 :	Continuous Integration and Delivery with Docker Containers - 
    
    	Vasant Kumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/10/19
    Talk : App Sec Day Australia 
 :	Threat Modeling-as-Code & Automation for DevSecOps wins - 
    
    	Abhay Bhargav
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/11/02
    Talk : Hitb Sec Conf 
 :	Defending The Enterprise in 2018 - 
    
    	Saumil Shah
   	
    
    
    
    
    
  
 
  
  - 
    2018/11/02
    Talk : Hackfest 
 :	Exploiting Connected Medical Devices: Lessons Learned & Data Earned - 
    
    	Saurabh Harit
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/11/27
    Talk : Hitb Sec Conf 
 :	BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit - 
    
    	Rewanth Tammana
   	
    
     
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/11/27
    Talk : Hitb Sec Conf 
 :	COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding - 
    
    	Vikash Yadav
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/11/27
    Talk : Hitb Sec Conf 
 :	COMMSEC: Taking Over Telecom Networks - 
    
    	Hardik Mehta
   	
    
     Loay Hassan Abdelrazek
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/11/27
    Talk : Hitb Sec Conf 
 :	Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit - 
    
    	Himanshu Mehta
   	
    	Sachine Wagh
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/11/29
    Talk : Deepsec 
 :	DNS Exfiltration and Out-of-Band Attacks - 
    
    	Nitesh Shilpkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/12/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kurukshetra: Playground for Interactive Security Learning - 
    
    	Anirudh Anand
   	
    	Mohan Kallepalli
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2018/12/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mafia: Mobile Security Automation Framework for Intelligent Auditing - 
    
    	Ankur Bhargava
   	
    	Mohan Kallepalli
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/12/05
    Talk : Blackhat 
 :	The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols - 
    
    	N Asokan
   	
    
     Lachlan Gunn
    
     Ricardo Vieitez Parra
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/12/06
    Talk : Blackhat 
 :	AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace - 
    
    	Vijay Thaware
   	
    	Niranjan Agnihotri
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2018/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Astra: Automated Security Testing For REST APIs - 
    
    	Sagar Popat
   	
    	Harsh Grover
   	
    
    
    
    
    
    
    
   
  
  - 
    2018/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit - 
    
    	Jayesh Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/01/30
    Book :  
 :	Mastering Kali Linux for Advanced Penetration Testing - 
    
    	Vijay Kumar Velu
   	
    
     Robert Beggs
    
    
    
    
    
  
 
  
  - 
    2019/01/31
    Book :  
 :	Hands-On Penetration Testing with Python - 
    
    	Furqan Khan
   	
    
    
    
    
    
  
 
  
  - 
    2019/02/28
    Talk : Nullcon 
 :	A Hacker Walks into a Co-working Space - 
    
    	Rahul Binjve
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/02/28
    Talk : Nullcon 
 :	Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida - 
    
    	Shivang Desai
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/02/28
    Talk : Nullcon 
 :	Attacking & Securing HealthCare Standards & hospital secured systems - 
    
    	Ajay Pratap Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/02/28
    Talk : Nullcon 
 :	Building Hardened IoT Implementations with LangSec - 
    
    	Prashant Anantharaman
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/02/28
    Talk : Nullcon 
 :	Dirty use of USSD Codes - 
    
    	Ravishankar Borgaonkar
   	
    
    
    
    
    
  
 
  
  - 
    2019/02/28
    Book :  
 :	Hands-On Application Penetration Testing with Burp Suite - 
    
    	Dhruv Shah
   	
    	Riyaz Walikar
   	
    
     Carlos A. Lozano
    
    
    
    
    
  
 
  
  - 
    2019/02/28
    Talk : Nullcon 
 :	Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases - 
    
    	Lavakumar Kuppan
   	
    	Ankit Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/01
    Panel : Nullcon 
 :	Breached? – Here is how I responded! - 
    
    	Muslim Koser
   	
    	Mrudul Uchil
   	
    	Sachin Burman
   	
    	Venkata Satish Guttula
   	
    	Vijay K Verma
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/01
    Panel : Nullcon 
 :	Clash of the Titans; who will survive? - 
    
    	Burgess Cooper
   	
    	Durga Dube
   	
    	Vasanthika Srinath
   	
    
     Jaya Baloo
    
     Shan Lee
    
    
    
    
    
    
    
   
  
  - 
    2019/03/01
    Panel : Nullcon 
 :	Clear and Present Danger: Cyber Wars will Target Critical Infrastructure - 
    
    	Sourabh Issar
   	
    	Sachin Burman
   	
    	Sudarshan Rajagopal
   	
    	Somenath Kundu
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/01
    Panel : Nullcon 
 :	Cybersecurity: Is Machine Learning the Answer? - 
    
    	Rahul Sasi
   	
    	Sitesh Behera
   	
    	Sumeet Khokhani
   	
    
     Rui Bastos
    
    
    
    
    
    
    
   
  
  - 
    2019/03/02
    Panel : Nullcon 
 :	Actionable Intelligence and Cyber Security - 
    
    	Durga Dube
   	
    	M v Sheshadri
   	
    	Rahul Sasi
   	
    	Shrikant Shitole
   	
    
     Alan White
    
    
    
    
    
    
    
   
  
  - 
    2019/03/02
    Panel : Nullcon 
 :	CISO Strategy for OT and IoT risk and Threat Management - 
    
    	Gaurav Shukla
   	
    	Gomeet Pant
   	
    	Rakesh Viswanathan
   	
    	Sudarshan Rajagopal
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/02
    Panel : Nullcon 
 :	Navigating Risk in the Changing Business and Technology Landscape - 
    
    	Rahul Neel Mani
   	
    	Burgess Cooper
   	
    	Manish Tiwari
   	
    	Mannan Godil
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/02
    Panel : Nullcon 
 :	The Myth of Sisyphus Secure Product Development - 
    
    	Bipin Upadhyay
   	
    	Minatee Mishra
   	
    	Neelu Tripathy
   	
    	Vaibhav Gupta
   	
    	Vishal Sahani
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/21
    Talk : Troopers 
 :	Evolution of kernel fuzzers in NetBSD - 
    
    	Siddharth M
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	Archery - Open Source Vulnerability Assessment and Management- 2.0 - 
    
    	Anand Tiwari
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit - 
    
    	Jayesh Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Talk : Blackhat 
 :	DevSecOps : What, Why and How - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Talk : Blackhat 
 :	Investigating Malware Using Memory Forensics - A Practical Approach - 
    
    	Monnappa K A
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kurukshetra: Playground for Interactive Security Learning - 
    
    	Anirudh Anand
   	
    	Mohan Kallepalli
   	
    	Ankur Bhargava
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research - 
    
    	Nilaksh Das
   	
    
     Evan Yang
    
     Li Chen
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	OWASP Nettacker: Automated Penetration Testing Framework - 
    
    	Sri Harsha Gajavalli
   	
    
     Ali Razmjoo Qalaei
    
     Ehsan Nezami
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	pytm: A Pythonic Framework for Threat Modeling - 
    
    	Rohit Shambhuni
   	
    
     Izar Tarandach
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	RTS: Real Time Scrapper - 
    
    	Naveen Rudrappa
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/03/28
    Tool Demo : Blackhat 
 : Arsenal 
 :	VoIP Wireshark Attack-Defense Toolkit - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    	Ashish Bhangale
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/03/29
    Tool Demo : Blackhat 
 : Arsenal 
 :	Halcyon IDE: Nmap Script Development IDE - 
    
    	Sanoop Thomas
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/05/09
    Talk : Hitb Sec Conf 
 :	GDALR: Duplicating Black Box Machine Learning Models - 
    
    	Rewanth Tammana
   	
    	Nikhil Joshi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/05/09
    Talk : Hitb Sec Conf 
 :	HAXPO: WiCy: Monitoring 802.11AC Networks at Scale - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/05/09
    Talk : Hitb Sec Conf 
 :	Make ARM Shellcode Great Again - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/05/10
    Talk : Hitb Sec Conf 
 :	HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR - 
    
    	Himanshu Mehta
   	
    	Harshit Agrawal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/05/21
    Talk : Phdays 
 :	Active defense using Honeypots v2 - 
    
    	Rahul Binjve
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/05/21
    Talk : Phdays 
 :	Breaking Microsoft Edge extensions security policies - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/05/21
    Talk : Phdays 
 :	Fuzzing 101 - 
    
    	Dhiraj Mishra
   	
    	Zubin Devnani
   	
    
    
    
    
    
  
 
  
  - 
    2019/05/21
    Talk : Phdays 
 :	GDALR: an efficient model duplication attack on black-box machine learning models - 
    
    	Rewanth Tammana
   	
    	Nikhil Joshi
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/05/21
    Talk : Phdays 
 :	How to fail in hardware hacking - 
    
    	Arun Magesh
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/05/21
    Talk : Phdays 
 :	Rapid hardware hacking 101 - 
    
    	Arun Magesh
   	
    
    
    
    
    
  
 
  
  - 
    2019/05/27
    Book :  
 :	Cybersecurity: The Beginner’s Guide - 
    
    	Deepayan Chanda
   	
    
     Dr. Erdal Ozkaya
    
    
    
    
    
  
 
  
  - 
    2019/06/02
    Tool Demo : Defcon 
 : DemoLabs  :	VoIPShark: Open Source VoIP Analysis Platform - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    	Ashish Bhangale
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	CertPivot: Infra-Chaining + Cert-Check - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2019/08/07
    Talk : Blackhat 
 :	Defense Against Rapidly Morphing DDOS - 
    
    	Mudit Tyagi
   	
    
     Mikhail Fedorov
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	Medaudit: Auditing Medical Devices and Healthcare Infrastructure - 
    
    	Anirudh Duggal
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/08/07
    Talk : Blackhat 
 :	New Vulnerabilities in 5G Networks - 
    
    	Ravishankar Borgaonkar
   	
    	Altaf Shaik
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit - 
    
    	Manish Gupta
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting - 
    
    	Sudhanshu Chauhan
   	
    	Kunal Aggarwal
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ - 
    
    	Rushikesh D Nandedkar
   	
    	Lalit Bhandari
   	
    
    
    
    
    
  
 
  
  - 
    2019/08/08
    Talk : Blackhat 
 :	100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans - 
    
    	Jatin Kataria
   	
    
     Richard Housley
    
     Ang Cui
    
    
    
    
    
  
 
  
  - 
    2019/08/08
    Talk : Defcon  : Cloud Village
 :	Anatomy of cloud hacking - 
    
    	Pratik Shah
   	
    
    
    
    
    
  
 
  
  - 
    2019/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit - 
    
    	Jayesh Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	CSF: Container Security Framework - 
    
    	Vaibhav Gupta
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Talk : Blackhat 
 :	Death to the IOC: What’s Next in Threat Intelligence - 
    
    	Bhavna Soman
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Talk : Blackhat 
 :	DevSecOps : What, Why and How - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	EXPLIoT: IoT Security Testing and Exploitation Framework - 
    
    	Aseem Jakhar
   	
    	Murtuja Bharmal
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Tool Demo : Defcon 
 : DemoLabs  :	Hachi: An Intelligent threat mapper - 
    
    	Parmanand Mishra
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Talk : Defcon  : Lockpick Village
 :	Hacking ICS devices for Fun Penetration Testing of Vehicle Components - 
    
    	Arun Mane
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Tool Demo : Defcon 
 : DemoLabs  :	Let’s Map Your Network - 
    
    	Pramod Rana
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Tool Demo : Defcon 
 : DemoLabs  :	PcapXray - 
    
    	Srinivas Piskala Ganesh Babu
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Talk : Defcon  : Cloud Village
 :	Phishing in the cloud era - 
    
    	Ashwin Vamshi
   	
    	Abhinav Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Talk : Blackhat 
 :	Preventing Authentication Bypass: A Tale of Two Researchers - 
    
    	Ravi Jaiswal
   	
    
     Terry Zhang
    
     Ron Chan
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	RWDD: Remote Web Deface Detection Tool - 
    
    	K v Prashant
   	
    
     Ade Yoseman Putra
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/08
    Talk : Defcon  : Packethacking Village
 :	YOUR PHONE IS USING TOR AND LEAKING YOUR PII - 
    
    	Milind Bhargava
   	
    
     Adam Podgorski
    
    
    
    
    
    
    
   
  
  - 
    2019/08/09
    Tool Demo : Defcon 
 : DemoLabs  :	EXPLIoT - IoT Security Testing and Exploitation Framework - 
    
    	Aseem Jakhar
   	
    	Murtuja Bharmal
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/09
    Tool Demo : Defcon 
 : DemoLabs  :	PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit - 
    
    	Manish Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/09
    Tool Demo : Defcon 
 : DemoLabs  :	Srujan: Safer Networks for Smart Homes - 
    
    	Sanket Karpe
   	
    	Parmanand Mishra
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/10
    Tool Demo : Defcon 
 : DemoLabs  :	Local Sheriff - 
    
    	Konark Modi
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/08/10
    Talk : Defcon 
 :	RACE - Minimal Rights and ACE for Active Directory Dominance - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/11
    Talk : Defcon  : Appsec Village
 :	Exploiting and Securing iOS Apps using OWASP iGoat - 
    
    	Swaroop Yermalkar
   	
    
    
    
    
    
  
 
  
  - 
    2019/08/11
    Talk : Defcon  : Appsec Village
 :	Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants - 
    
    	Vandana Verma Sehgal
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/29
    Tool Demo : Hitb Sec Conf 
 :	Halcyon IDE: An IDE for NMAP script developers - 
    
    	Sanoop Thomas
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/08/29
    Keynote : Hitb Sec Conf 
 :	The CISO’s Dilemma - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/29
    Talk : Hitb Sec Conf 
 :	Understanding, Attacking & Securing Medical Devices - 
    
    	Ajay Pratap Singh
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/08/30
    Talk : Hitb Sec Conf 
 :	COMMSEC: PErfidious: Make PE Backdooring Great Again! - 
    
    	Shreyans Doshi
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/09/13
    Talk : 44 Con 
 :	One Person Army – Playbook on how to be the first Security Engineer at a company - 
    
    	Kashish Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/13
    Talk : 44 Con 
 :	The CISO’s Dilemma - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/09/23
    Talk : Rootcon 
 :	APAD: An EDR Grade Agent for Wi-Fi Access Points - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/09/23
    Talk : Rootcon 
 :	Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking - 
    
    	Arun Mane
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/23
    Talk : Rootcon 
 :	Hunting Threats with Wireshark Plugins - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    	Shivam Bathla
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/09/23
    Talk : Rootcon 
 :	Identity crisis: war stories from authentication failures - 
    
    	Vishal Chauhan
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/09/23
    Talk : Rootcon 
 :	Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) - 
    
    	Arun Mane
   	
    	Nikhil Bogam
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	A Day in the Life of a CISO - 
    
    	Sridhar Govardhan
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Advanced Persistent Threat and counter measures - 
    
    	A a Gafoor
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	AI, ML and Security - 
    
    	Varun Kohli
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	autoSource an automated framework for Source Code Review - 
    
    	Malkit Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Block Chain for Secured Automation - 
    
    	Sanat Bhat
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Building a cloud security monitoring and auditing framework - 
    
    	Nirali Shah
   	
    	Prasoon Dwivedi
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	CISO Mind Set - 
    
    	Lopa Mudraa Basuu
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Cyber Hygiene from Enterprise point of view - 
    
    	Noorul Haq
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Defense in Depth for Embedded Systems - 
    
    	Jiggyasu Sharma
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Demystifying HealthCare Security - 
    
    	Ajay Pratap Singh
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Detection of TOR Sources using Artificial Intelligence - 
    
    	Roshy John
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Panel : C0c0n 
 :	Digital Transformation and Evolving Governance Structure - 
    
    	A Shiju Rawther
   	
    	Ajith Balagopal
   	
    	Balakrishnan A
   	
    	Sreekumar Balachandran
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Doing SecOps for the Cloud using Cloud Native Services - 
    
    	Akash Mahajan
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Golang for Pentesters / RedTeamers - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Hacking ICS devices for Fun - 
    
    	Arun Mane
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Industry 4.0 - Security and Compliance - 
    
    	Santhosh Srinivasan
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Lessons learned form data breaches in the cloud - 
    
    	Ajay Agrawal
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Looking a decade ahead: Big data, drones , Robots and cyber security. - 
    
    	Rahul Sasi
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Offensive Machine Learning for Pentesters and Red Teams - 
    
    	Tamaghna Basu
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Practical Approach to Cyber Security for financial institutions - 
    
    	Georgie Kurien
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	RANSOMWARE - to pay or not to pay - 
    
    	Seshaprakash Kusuma Sreenivasa
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Securing Payment Data with PCI Security Standards and Programs - 
    
    	Nitin Bhatnagar
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Security @scale for startups - 
    
    	Shivanath Somanathan
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Serverless SOAR - 
    
    	Sabyasachi Dhal
   	
    	Suresh Sharma
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/27
    Panel : C0c0n 
 :	Shouldn’t Organization disclose breaches - The need for a shared platform - 
    
    	Sunil Varkey
   	
    	Jacxine Fernandez
   	
    	Rahul Sasi
   	
    	K K Chaudhary
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	Stepping into Password Less Economy - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/27
    Talk : C0c0n 
 :	VyAPI - The Vulnerable Hybrid Android App - 
    
    	Riddhi Shree
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/09/28
    Panel : C0c0n 
 :	Align security and risk management strategies with enterprise objectives - 
    
    	Abdul Karim Vettiyanickal
   	
    	George Eapen
   	
    	Ranjeet Rai
   	
    	Amit Dubey
   	
    	Biju K
   	
    	Kanu Pathania
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/09/28
    Panel : C0c0n 
 :	Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions - 
    
    	B R Nath
   	
    	Jijy Oommen
   	
    	Maya R Nair
   	
    	Ajay Porus
   	
    	Georgie Kurien
   	
    
    
    
    
    
  
 
  
  - 
    2019/09/28
    Talk : C0c0n 
 :	Vulnerability Prioritization with Threat Intelligence - 
    
    	Muslim Koser
   	
    	Devesh Vatsa
   	
    	Rohit Srivastwa
   	
    	Dinesh O Bareja
   	
    
    
    
    
    
  
 
  
  - 
    2019/10/10
    Talk : Brucon 
 :	Security transition from 4G to 5G: are we secure enough? - 
    
    	Altaf Shaik
   	
    	Ravishankar Borgaonkar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/10/14
    Talk : Hitb Sec Conf 
 :	CALL OF DUTY: MODERN BROWSER WARFARE - 
    
    	Dhiraj Mishra
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/10/14
    Talk : Hitb Sec Conf 
 :	IoT Pentesting The Right Way - 
    
    	Yogesh Ojha
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/10/14
    Talk : Hitb Sec Conf 
 :	ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES - 
    
    	Harshit Agrawal
   	
    	Himanshu Mehta
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/10/15
    Talk : Hitb Sec Conf 
 :	Car Hacking: Practical Guide to Automotive Security - 
    
    	Yogesh Ojha
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/10/16
    Tool Demo : Hitb Sec Conf 
 :	Introducing ARM-X - The ARM IoT Firmware Emulation Framework - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/10/17
    Talk : Hitb Sec Conf 
 :	Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure - 
    
    	Anima Anandkumar
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/10/22
    Talk : Hacklu 
 :	Intro to Dark Arts: Getting Started with CTFs - 
    
    	Geethna T K
   	
    	Shruti Dixit
   	
    	Sowmya Potluri
   	
    
    
    
    
    
  
 
  
  - 
    2019/11/01
    Talk : App Sec Day Australia 
 :	A Purple Team View of Serverless and GraphQL Applications - 
    
    	Abhay Bhargav
   	
    
    
    
    
    
  
 
  
  - 
    2019/11/01
    Talk : App Sec Day Australia 
 :	Protecting the Damned: Deploying Insecure Applications at Scale - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/11/01
    Talk : Hackfest 
 :	The Mechanics of Malware’s Darkside - 
    
    	Yagnesh Waran P
   	
    
     Laura Harris
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/11/05
    Book :  
 :	Security Designs for the Cloud, IoT, and Social Networking - 
    
    	Chintan Bhatt
   	
    	Mani Madhukar
   	
    
     Dac Nhuong Le
    
    
    
    
    
  
 
  
  - 
    2019/11/28
    Talk : Deepsec 
 :	Mastering AWS Pentesting and Methodology - 
    
    	Ankit Giri
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/12/04
    Talk : Blackhat 
 :	Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing - 
    
    	Karthik Ramasamy
   	
    
     Eric Hampshire
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/12/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit - 
    
    	Jayesh Chauhan
   	
    
    
    
    
    
    
    
   
  
  - 
    2019/12/04
    Talk : Blackhat 
 :	ClusterFuzz: Fuzzing at Google Scale - 
    
    	Abhishek Arya
   	
    
     Oliver Chang
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2019/12/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	DumpTheGit - 
    
    	Malkit Singh
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2019/12/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	RTTM: Real Time Threat Monitoring Tool - 
    
    	Naveen Rudrappa
   	
    	Murali Krishna Segu
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2020/02/27
    Book :  
 :	AWS Security Cookbook - 
    
    	Heartin Kanikathottu
   	
    
    
    
    
    
  
 
  
  - 
    2020/03/06
    Talk : Nullcon 
 :	Automated Classification of Web-Application Attacks for Intrusion Detection - 
    
    	Aneet Kumar Dutta
   	
    
    
    
    
    
  
 
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	Callidus - 
    
    	Chirag Savla
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Talk : Nullcon 
 :	Cloud As an Attack vector - 
    
    	Ashwin Vamshi
   	
    	Rushikesh Vishwakarma
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Panel : Nullcon 
 :	Complication in security practices - 
    
    	Himanshu Das
   	
    	Neelu Tripathy
   	
    	Kushal Das
   	
    	Ankur Bhargava
   	
    	Vaibhav Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	F.R.I.D.A.Y - 
    
    	Shyam Sundar Ramaswami
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	FRISPY - 
    
    	Tejas Girme
   	
    	Parmanand Mishra
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	FuzzCube - 
    
    	Anto Joseph
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	Hachi - 
    
    	Parmanand Mishra
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Talk : Nullcon 
 :	InfoSec Deep Learning in Action - 
    
    	Satnam Singh
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Panel : Nullcon 
 :	Lessons from the Cyber Trenches - 
    
    	Shivkumar Pandey
   	
    	Manish Tiwari
   	
    	Venkatesh Subramaniam
   	
    	Jacxine Fernandez
   	
    	Burgess Cooper
   	
    
     Ramesh Kumar
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	Mobexler - 
    
    	Abhinav Mishra
   	
    	Abhishek Jaiswal
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	Omniscient - 
    
    	Pramod Rana
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	Phishing Simulation - 
    
    	Jyoti Raval
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	PivotSuite - 
    
    	Manish Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Panel : Nullcon 
 :	Predicting Danger: Building the Ideal Threat Intelligence Model - 
    
    	Saikat Datta
   	
    	Sandeep Sharma
   	
    	Muslim Koser
   	
    	Shankar Jadhav
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	Providence - 
    
    	Swapnil Kumbhar
   	
    	Akshay Shah
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Talk : Nullcon 
 :	Putting it all together: building an iOS jailbreak from scratch - 
    
    	Umang Raghuvanshi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	SASTRI - 
    
    	Rushikesh D Nandedkar
   	
    	Lalit Bhandari
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Panel : Nullcon 
 :	Securing the Human Factor - 
    
    	Rahul Neel Mani
   	
    	Phoram Mehta
   	
    	Burgess Cooper
   	
    	Manish Tiwari
   	
    	Venkatesh Subramaniam
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	spike2kill - 
    
    	Manish Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	Talisman - 
    
    	Suhas Vishwanath
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	VyAPI - 
    
    	Riddhi Shree
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/06
    Tool Demo : Nullcon 
 :	Wolverine - 
    
    	Furqan Khan
   	
    	Siddharth Anbalahan
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/07
    Panel : Nullcon 
 :	Economics Of Data Breach And Attack - 
    
    	Bhaskar Medhi
   	
    	Manu Zacharia
   	
    	Suchit Mishra
   	
    	Yash Kadakia
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/07
    Panel : Nullcon 
 :	Hack the law: Protection for cybersecurity research in India - 
    
    	Apar Gupta
   	
    	Manu Zacharia
   	
    	Raman Jit Singh Chima
   	
    	Neelu Tripathy
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/03/07
    Panel : Nullcon 
 :	Supply Chain Security In Critical Infrastructure Systems - 
    
    	Manish Tiwari
   	
    	Suchit Mishra
   	
    	Faruk Kazi
   	
    
     Cristofaro Mune
    
    
    
    
    
    
    
   
  
  - 
    2020/03/18
    Talk : Can Sec West 
 :	The ARM-X Firmware Emulation Framework - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/04/10
    Book :  
 :	Metasploit 5.0 for Beginners - 
    
    	Sagar Rahalkar
   	
    
    
    
    
    
  
 
  
  - 
    2020/04/24
    Talk : Hitb Sec Conf 
 :	COMMSEC: The State of ICS Security : Then and Now - 
    
    	Praveen Soni
   	
    	Shivbihari Pandey
   	
    	Ashish Kumar Gahlot
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2020/04/25
    Talk : Hitb Sec Conf 
 :	THE STATE OF ICS SECURITY: THEN AND NOW - 
    
    	Praveen Soni
   	
    	Shivbihari Pandey
   	
    	Ashish Kumar Gahlot
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2020/05/22
    Book :  
 :	Hands-On Web Penetration Testing with Metasploit - 
    
    	Harpreet Singh
   	
    	Himanshu Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2020/07/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mobile Security Framework - MobSF - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/07/09
    Book :  
 :	Learn Kubernetes Security - 
    
    	Pranjal Jumde
   	
    
     Kaizhe Huang
    
    
    
    
    
  
 
  
  - 
    2020/07/26
    Talk : Hitb Sec Conf 
 :	Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company - 
    
    	Himanshu Sharma
   	
    	Aman Sachdev
   	
    
     
    
    
    
    
    
  
 
  
  - 
    2020/08/05
    Talk : Blackhat 
 :	Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic - 
    
    	Harini Kannan
   	
    
     Nick Gregory
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/08/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) - 
    
    	Pramod Rana
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2020/08/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Dynamic Labs: Windows & Active Directory Exploitation - 
    
    	Rohan Durve
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2020/08/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	FuzzCube - 
    
    	Anto Joseph
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/08/06
    Talk : Blackhat 
 :	How I Created My Clone Using AI - Next-Gen Social Engineering - 
    
    	Tamaghna Basu
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/08/06
    Panel : Blackhat 
 :	Locknote: Conclusions and Key Takeaways from Day 2 - 
    
    	Aanchal Gupta
   	
    
     Kymberlee Price
    
     Rodrigo Rubira Branco
    
     Stefano Zanero
    
    
    
    
    
  
 
  
  - 
    2020/08/06
    Talk : Blackhat 
 :	Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community - 
    
    	Vandana Verma Sehgal
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/08/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	MSTICpy: The Security Analysis Swiss Army Knife - 
    
    	Ashwin Patil
   	
    
     Pete Bryan
    
     Ian Hellen
    
    
    
    
    
    
    
   
  
  - 
    2020/08/07
    Panel : Defcon 
 :	D0 N0 H4RM: A Healthcare Security Conversation - 
    
    	Vidha Murthy
   	
    
     Christian Dameff
    
     Jeff Tully
    
     Jessica Wilkerson
    
     Veronica Schmitt
    
     Ash Luft
    
    
    
    
    
    
    
   
  
  - 
    2020/08/09
    Talk : Defcon  : Appsec Village
 :	Running an appsec program with open source projects - 
    
    	Vandana Verma Sehgal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/08/21
    Book :  
 :	CISA – Certified Information Systems Auditor Study Guide - 
    
    	Hemang Doshi
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Herd Immunity, in the Cyber World - 
    
    	Sunil Varkey
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	How I created my clone using AI - next-gen Social Engineering - 
    
    	Tamaghna Basu
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Introducing SniperPhish: A Web-Email Spear Phishing Toolkit - 
    
    	Sreehari Haridas
   	
    	Gem George
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment - 
    
    	Madhu Akula
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Web Application hacking with WebZGround - 
    
    	Parveen Yadav
   	
    	Narendra Kumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	All about IOT Forensics - 
    
    	Hima Bindu Vejella
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Automation in Bug Bounties to Work Smarter - 
    
    	Prerak Mittal
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Broken Cryptography & Account Takeover - 
    
    	Harsh Bothra
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Coping with Digital Transformation - A CISO perspective - 
    
    	Maya R Nair
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	COVID-19 Cyber impact on financial sector and remote employees - 
    
    	Amit Dubey
   	
    
     Tal Catran
    
     Yair Feldman
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Cyber Security Shifts During COVID-19 - 
    
    	Sunil Kanchi
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Keynote : C0c0n 
 :	Data protection and Privacy Data protection and Privacy - 
    
    	Kris Gopalakrishnan
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Deep Learning for Intrusion Attempt Detection - 
    
    	Varun Kohli
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Demystifying Zero Trust - A Real world - 
    
    	Sandeep Variyam
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	My top 3 findings in bug Bounty journey | Aiming for high impact issues - 
    
    	Ankit Giri
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Offensive & Scope Based Recon - 
    
    	Harsh Bothra
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing - 
    
    	Kaustubh Padwad
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux - 
    
    	Munawwar Hussain Shelia
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/18
    Talk : C0c0n 
 :	Supercharging your initial foothold in Red Team engagements - 
    
    	Sachin S Kamath
   	
    
    
    
    
    
  
 
  
  - 
    2020/09/19
    Talk : C0c0n 
 :	Automate your Recon with ReconNote - 
    
    	Prasoon Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/10/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	Adhrit: Android Security Suite - 
    
    	Abhishek Jm
   	
    	Akhil Mahendra
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2020/10/01
    Talk : Blackhat 
 :	Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community - 
    
    	Vandana Verma Sehgal
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/10/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mobexler: An All-in-One Mobile Pentest VM - 
    
    	Abhinav Mishra
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2020/10/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	OWASP Python Honeypot - 
    
    	Sri Harsha Gajavalli
   	
    
     Ali Razmjoo
    
    
    
    
    
    
    
   
  
  - 
    2020/10/01
    Tool Demo : Blackhat 
 : Arsenal 
 :	Wi-Fi Access Point Rootkits - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    
    
    
    
    
  
 
  
  - 
    2020/10/02
    Talk : Blackhat 
 :	Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - 
    
    	Aravind Machiry
   	
    
     Nilo Redini
    
     Andrea Continella
    
     Ruoyu Wang
    
     Yan Shoshitaishvili
    
     Cristopher Kruegel
    
     Giovanni Vigna
    
     Chad Spensky
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/10/02
    Tool Demo : Blackhat 
 : Arsenal 
 :	MalViz.ai - 
    
    	Vasu Sethia
   	
    	Shivam Kataria
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2020/10/02
    Tool Demo : Blackhat 
 : Arsenal 
 :	OWASP Nettacker - 
    
    	Sri Harsha Gajavalli
   	
    
     Ali Razmjoo Qalaei
    
     Sam Stepanyan
    
    
    
    
    
    
    
   
  
  - 
    2020/10/02
    Tool Demo : Blackhat 
 : Arsenal 
 :	Phishing Simulation Assessment - 
    
    	Jyoti Raval
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2020/10/07
    Talk : Rootcon 
 :	Automating Threat Hunting on the Dark Web and other nitty-gritty thingso - 
    
    	Apurv Singh Gautam
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/10/07
    Talk : Rootcon 
 :	Blockchain Based OT Monitoring Solution (BBOTMS) - 
    
    	Asif Hameed Khan
   	
    	Gagan Jattana
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/10/07
    Talk : Rootcon 
 :	How I Pwned the ICS data during my internship - 
    
    	Shail Patel
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/10/07
    Talk : Rootcon 
 :	Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing - 
    
    	Kaustubh Padwad
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/10/07
    Talk : Rootcon 
 :	ReconPal: Leveraging NLP for Infosec - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/10/07
    Talk : Rootcon 
 :	Zero Trust in the Era of Cloud - 
    
    	Vandana Verma Sehgal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/11/06
    Book :  
 :	Network Security Strategies - 
    
    	Aditya Mukherjee
   	
    
    
    
    
    
  
 
  
  - 
    2020/11/20
    Talk : Deepsec 
 :	What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis - 
    
    	Shyam Sundar Ramaswami
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/12/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	ArcherySec 2.0 - Open Source Vulnerability Assessment and Management - 
    
    	Anand Tiwari
   	
    
     
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/12/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	HosTaGe: mobile honeypots for rapid deployment - 
    
    	Shreyas Srinivasa
   	
    
     Emmanouil Vasilomanolakis
    
     Eirini Lygerou
    
    
    
    
    
    
    
   
  
  - 
    2020/12/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	Strafer: A Tool to Detect Infections in Elasticsearch Instances - 
    
    	Rohit Bansal
   	
    	Aditya K Sood
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/12/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	AndroGoat: Learn Android Application Security Testing - 
    
    	Satish Patnayak
   	
    
    
    
    
    
    
    
   
  
  - 
    2020/12/10
    Talk : Blackhat 
 :	Effective Vulnerability Discovery with Machine Learning - 
    
    	Asankhaya Sharma
   	
    
     Ming Yi Ang
    
    
    
    
    
    
    
    
    
   
  
  - 
    2020/12/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	reNgine: an automated reconnaissance Framework - 
    
    	Yogesh Ojha
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/03/05
    Talk : Nullcon 
 :	Arbitrary code execution on RISC-V using fault injection - 
    
    	Praveen Vadnala
   	
    
     Nils Wiersma
    
    
    
    
    
    
    
   
  
  - 
    2021/03/05
    Panel : Nullcon 
 :	CyberPhysical Systems Security - Trends, challenges & opportunities - 
    
    	Frank Sanjay
   	
    	Khushwant Pawar
   	
    	Mayur Mehta
   	
    	Faruk Kazi
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/03/05
    Panel : Nullcon 
 :	Tech Startups/Businesses and Infonomics - 
    
    	Sourabh Issar
   	
    	Burgess Cooper
   	
    
     Joerg Simon
    
    
    
    
    
    
    
   
  
  - 
    2021/03/05
    Talk : Nullcon 
 :	Telecom Security Challenges in 5G - 
    
    	Akib Sayyed
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/03/06
    Talk : Nullcon 
 :	Bug hunter adventures - 
    
    	Shreyas Dighe
   	
    	Yuvraj Dighe
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/03/06
    Panel : Nullcon 
 :	From Reactive to Proactive - Operationalizing your Threat Intel - 
    
    	Akshat Jain
   	
    	Amit Ghodekar
   	
    	Suhas Desai
   	
    	Ambuj Bhalla
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/05/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way - 
    
    	Vasant Kumar
   	
    	Rupali Dash
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/05/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	FalconEye: Windows Process Injection Techniques - Catch Them All - 
    
    	Rajiv Kulkarni
   	
    	Sushant Paithane
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2021/05/06
    Talk : Blackhat 
 :	Threat Hunting in Active Directory Environment - 
    
    	Anurag Khanna
   	
    	Thirumalai Natarajan Muthiah
   	
    
     
    
    
    
    
    
    
    
   
  
  - 
    2021/05/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	CANalyse: A Vehicle Network Analysis and Attack Tool - 
    
    	Kartheek Lade
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/05/07
    Panel : Blackhat 
 :	Insights and Predictions: What’s Next in InfoSec - 
    
    	Vandana Verma Sehgal
   	
    
     Neil R. Wyler
    
     Lidia Giuliano
    
     Jeff Wilson
    
     Vitaly Kamluk
    
    
    
    
    
  
 
  
  - 
    2021/06/11
    Book :  
 :	Zscaler Cloud Security Essentials - 
    
    	Ravi Devarasetty
   	
    
    
    
    
    
  
 
  
  - 
    2021/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Attack Surface Framework - 
    
    	Prajwal Panchmahalkar
   	
    
     Mauricio Espinosa
    
    
    
    
    
    
    
   
  
  - 
    2021/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Automated Attack Path Planning and Validation (A2P2V) - 
    
    	Subir Das
   	
    
     Fukutomo Nakanishi
    
     Jason Youzwak
    
     Michael Hylkema
    
     Santoshi Aoki
    
    
    
    
    
    
    
   
  
  - 
    2021/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Counterfit: Attacking Machine Learning in Blackbox Settings - 
    
    	Raja Sekhar Rao Dheekonda
   	
    
     Will Pearce
    
    
    
    
    
    
    
   
  
  - 
    2021/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Joern: An Interactive Shell for Code Analysis - 
    
    	Suchakra Sharma
   	
    
     Vickie Li
    
     Fabian Yamaguchi
    
    
    
    
    
    
    
   
  
  - 
    2021/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool - 
    
    	Pralhad Chaskar
   	
    	Vasant Kumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing - 
    
    	Parbati Kumar Manna
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/04
    Talk : Blackhat 
 :	Siamese Neural Networks for Detecting Brand Impersonation - 
    
    	Jugal Parikh
   	
    
     Nitin Kumar Goel
    
     Justin Grana
    
     Yuchao Dai
    
    
    
    
    
    
    
   
  
  - 
    2021/08/05
    Talk : Blackhat 
 :	5G IMSI Catchers Mirage - 
    
    	Ravishankar Borgaonkar
   	
    	Altaf Shaik
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/05
    Talk : Blackhat 
 :	PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors - 
    
    	Hareesh Khattri
   	
    	Nagaraju N Kodalapura
   	
    
     Nam N Nguyen
    
    
    
    
    
    
    
   
  
  - 
    2021/08/05
    Tool Demo : Blackhat 
 : Arsenal 
 :	reNgine: An Automated Reconnaissance Framework - 
    
    	Yogesh Ojha
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/05
    Talk : Defcon  : Recon Village
 :	The Bug Hunter’s Recon Methodology - 
    
    	Tushar Verma
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/05
    Talk : Blackhat 
 :	The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks - 
    
    	Ambrish Rawat
   	
    
     Killian Levacher
    
     Mathieu Sinn
    
    
    
    
    
    
    
   
  
  - 
    2021/08/06
    Panel : Defcon  : Adversary Village
 :	Adversary simulation, emulation or purple teaming - How would you define it? - 
    
    	Anant Shrivastava
   	
    
     Vincent Yiu
    
     Martin Ingesen
    
     Jean Marie Bourbon
    
     Samuel Kimmons
    
     Joe Vest
    
    
    
    
    
    
    
   
  
  - 
    2021/08/06
    Talk : Defcon  : Adversary Village
 :	Adversary village Kick-off - 
    
    	Abhijith B R
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/06
    Talk : Defcon  : Iot Village
 :	Defending IoT in the Future of High-Tech Warfare - 
    
    	Harshit Agrawal
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/07
    Tool Demo : Defcon  : Adversary Village
 : DemoLabs  :	Red Team Credentials Reconnaissance (OLD with a TWIST) - 
    
    	Shantanu Khandelwal
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/07
    Tool Demo : Defcon  : Adversary Village
 : DemoLabs  :	Tenacity- An Adversary Emulation Tool for Persistence - 
    
    	Atul Nair
   	
    	Harshal Tupsamudre
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/07
    Talk : Defcon  : Appsec Village
 :	The Curious Case of Knowing the Unknown - 
    
    	Vandana Verma Sehgal
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/08
    Talk : Defcon  : Appsec Village
 :	AppSec 101: A Journey from Engineer to Hacker - 
    
    	Arjun Gopalakrishna
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/08/08
    Panel : Defcon  : Adversary Village
 :	Resilient cyber space: The role of hacker and security communities - 
    
    	Manu Zacharia
   	
    	Aseem Jakhar
   	
    	Abhijith B R
   	
    
     Jay Turla
    
     Omar Santos
    
     Dave Lewis
    
     Dhillon Kannabhiran
    
     
    
    
    
    
    
    
    
   
  
  - 
    2021/08/08
    Talk : Defcon  : Ics Village
 :	Top 20 Secure PLC Coding Practices - 
    
    	Vivek Ponnada
   	
    
     Sarah Fluchs
    
    
    
    
    
    
    
   
  
  - 
    2021/08/26
    Talk : Hitb Sec Conf 
 :	Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade - 
    
    	Harshit Agrawal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2021/08/27
    Talk : Hitb Sec Conf 
 :	Securing Webviews and The Story Behind CVE-2021–21136 - 
    
    	Shiv Sahni
   	
    	Imdadullah Mohammed
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2021/10/13
    Tool Demo : Rootcon 
 :	Buzzard : Crafting your post exploitation framework against odds - 
    
    	Aravindha Hariharan
   	
    	Subhajeet Singha
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/10/13
    Talk : Rootcon 
 :	The Kill Chain: Future of Cyber in Defense - 
    
    	Harshit Agrawal
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/10/15
    Talk : Rootcon 
 :	The Curious case of knowing the unknown - 
    
    	Vandana Verma Sehgal
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/04
    Talk : Ekoparty 
 :	DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system - 
    
    	Saransh Rana
   	
    	Divyanshu Mehta
   	
    	Harsh Varagiya
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2021/11/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	Adhrit: Android Security Suite - 
    
    	Abhishek Jaiswal
   	
    	Abhishek Jm
   	
    	Rahul Sani
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kubestriker: A Blazing Fast Security Auditing Tool - 
    
    	Vasant Kumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot - 
    
    	Abhimanyu Rawat
   	
    	Shreyas Srinivasa
   	
    
     Emmanouil Vasilomanolakis
    
    
    
    
    
    
    
   
  
  - 
    2021/11/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	Wireshark Forensics Toolkit - 
    
    	Rishikesh Bhide
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Damn Vulnerable Bank - 
    
    	Akshansh Jaiswal
   	
    	Hrushikesh Kakade
   	
    	Rewanth Tammana
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	DejaVu ++ - 
    
    	Bhadreshkumar Patel
   	
    	Harish Ramadoss
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kubernetes Goat: Interactive Kubernetes Security Learning Playground - 
    
    	Madhu Akula
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10) - 
    
    	Tushar Kulkarni
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	“Let’s Go Phishing”: Discerning the insidious nature of Social Engineering - 
    
    	Ruchira Pokhriyal
   	
    	Shashi Karhail
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	2021 Supply Chain Attacks Analysis - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Panel : C0c0n 
 :	Cyber Security - Crystal Gazing in to the future - 
    
    	Burgess Cooper
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	Data Security and Privacy - 
    
    	Abhilasha Vyas
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	Dissecting Malicious Software and Analysis - 
    
    	Shrutirupa Banerjiee
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Panel : C0c0n 
 :	Diversity and Inclusion - 
    
    	Aarushi Koolwal
   	
    	Hussaina Begum
   	
    	Nehal Mehta
   	
    	Shivani Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	Enterprise Governance and Risk Management - 
    
    	Arathy Nair
   	
    	Muskan Mangla
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	Executive Presence….a cardinal of the cyber rostrum - 
    
    	Bishakha Jain
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	ICS Security —- A need, a challenge and a new change in Mindset - 
    
    	Dhruv Gupta
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	IoT Security Guidelines & Standards - 
    
    	Yashodhan Vivek Mandke
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches - 
    
    	Illyas Kooliyankal
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	Regulating Social Media Platforms : Should it be done in Democratic Societies ? - 
    
    	J Sam Daniel Stalin
   	
    	Apar Gupta
   	
    	Dinesh O Bareja
   	
    	Prashant Mali
   	
    	Jiten Jain
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Panel : C0c0n 
 :	Stopping Breaches with CrowdStrike - 
    
    	Sandeep Rao
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	The evolving nature of cyber community - 
    
    	Aastha Sahni
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/12
    Talk : C0c0n 
 :	Understanding the Psychology Behind Threats - adding Twists to your Turns - 
    
    	Saman Fatima
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Decoding new age hackers and Criminal Investigation - 
    
    	Amit Dubey
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	A look into cyber-espionage activities targeting critical infrastructure in India - 
    
    	Saurabh Sharma
   	
    
     Kurt Baumgartner
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Building Global Cyber Security Company Out of India: Key Lessons Learnt During My Entrepreneurship Journey - 
    
    	Bikash Barai
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Case Study - Cyber Heist in a Bank and Recovery of Systems and Money - 
    
    	Prashant Choudhary
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Case study - E-crime group targeting mobile users - 
    
    	Rahul Sasi
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Changing Cyber Security Paradigm & Cyber Tsunami - 
    
    	Sunil Varkey
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Cloud Threat landscape - 
    
    	Gunjan Chhillar
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Connecting the dots between customers and security teams - 
    
    	Shruthi Kamath
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Crisis Capitalization in a Pandemic - 
    
    	Greeshma M R
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Cyber Warfare & Securing Critical Infrastructures - 
    
    	Faruk Kazi
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Cybersecurity in the era of Resilience - A walk through people, process and technology - 
    
    	Babitha B P
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Emerging trends in cyber crimes : Investigation tools & techniques - 
    
    	Triveni Singh
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics - 
    
    	Kiran Kumar Pg
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application - 
    
    	Gayatri Nayak
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Panel : C0c0n 
 :	Human errors & system misconfigurations- We can handle it! - 
    
    	Amit Dubey
   	
    	Maninder Singh
   	
    	Tulika Pandey
   	
    
     Tal Catran
    
     Dunston Pereira
    
     Angel Redoble
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Introducing Free & Open Elastic Limitless XDR - 
    
    	Ravindra Ramnani
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n  : Adversary Village
 :	Light Basin - Telecom roaming network attack case study - 
    
    	Akib Sayyed
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Machine learning to detect Chia mining - 
    
    	Varun Kohli
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Mature Your Threat Hunting Program - 
    
    	Neha Dhyani
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Need for Zero Trust in Banking - 
    
    	Biju K
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	New way of looking at the hidden mysteries in the code - 
    
    	Vandana Verma Sehgal
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n  : Adversary Village
 :	Painting Your Organizations with Shades of Red, Blue & Purple - 
    
    	Hidayath Khan
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Post pandemic Transformation - A CISO’s perspective - 
    
    	Sridhar Govardhan
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Securing OT in O&G Industry - 
    
    	George Eapen
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Server-side javascript Injection - 
    
    	Kavisha Sheth
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Third Party Risk Management - 
    
    	Mahesh Kalyanaraman
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/13
    Talk : C0c0n 
 :	Zero Trust & Micro-segmentation - 
    
    	Suresh Menon
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/18
    Talk : Hackinparis 
 :	{Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/18
    Talk : Hackinparis 
 :	Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS - 
    
    	Kavisha Sheth
   	
    
    
    
    
    
  
 
  
  - 
    2021/11/25
    Tool Demo : Hitb Sec Conf 
 :	reNgine: Using reNgine for automated reconnaissance and continous monitoring, how and why! - 
    
    	Yogesh Ojha
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/25
    Tool Demo : Hitb Sec Conf 
 :	vAPI: Vulnerable Adversely Programmed Interface - 
    
    	Tushar Kulkarni
   	
    
    
    
    
    
    
    
   
  
  - 
    2021/11/26
    Book :  
 :	Certified Information Security Manager Exam Prep Guide - 
    
    	Hemang Doshi
   	
    
    
    
    
    
  
 
  
  - 
    2022/02/28
    Book :  
 :	Mastering Kali Linux for Advanced Penetration Testing – Fourth Edition - 
    
    	Vijay Kumar Velu
   	
    
    
    
    
    
  
 
  
  - 
    2022/04/08
    Talk : Nullcon 
 :	Attack Surfaces for 5G Networks - 
    
    	Altaf Shaik
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/04/08
    Talk : Nullcon 
 :	Bheem OS - A next-generation reasonably secure OS using Rust MicroVM - 
    
    	Akram Ansari
   	
    	Subash Sn
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/04/08
    Panel : Nullcon 
 :	Digital Identity In The Age Of Fintech - 
    
    	Sheetal Joseph
   	
    
     Alessandro Avagliano
    
     Guido Reismueller
    
     Benoit Flippen
    
     Travis Carelock
    
    
    
    
    
    
    
   
  
  - 
    2022/05/12
    Keynote : Blackhat 
 :	Keynote: #HackingDemocracy: Will Our Societies Hold? - 
    
    	Samir Saran
   	
    
    
    
    
    
  
 
  
  - 
    2022/05/12
    Panel : Blackhat 
 :	Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 - 
    
    	Vandana Verma Sehgal
   	
    
     Jeff Moss
    
     Ryan Flores
    
     Lidia Giuliano
    
     Stefano Zanero
    
    
    
    
    
  
 
  
  - 
    2022/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mitigating Open Source Software Supply Chain Attacks - 
    
    	Ajinkya Rajput
   	
    
     Ashish Bijlani
    
    
    
    
    
    
    
   
  
  - 
    2022/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Nightingale: Docker for Pentesters - 
    
    	Raja Nagori
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Node Security Shield - 
    
    	Lavakumar Kuppan
   	
    	Sukesh Pappu
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/05/12
    Talk : Blackhat 
 :	Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems - 
    
    	Prashant Rajput
   	
    
     Michail Maniatakos
    
    
    
    
    
    
    
   
  
  - 
    2022/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Patronus: Swiss Army Knife SAST Toolkit - 
    
    	Akhil Mahendra
   	
    	Akshansh Jaiswal
   	
    	Ashwin Shenoi
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	ReconPal: Leveraging NLP for Infosec - 
    
    	Jeswin Mathai
   	
    	Shantanu Kale
   	
    	Sherin Stephen
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	ThunderCloud: Attack Cloud Without Keys! - 
    
    	Shivankar Madaan
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/05/18
    Panel : Phdays 
 :	Challenges for cybersecurity conferences. Part II - 
    
    	Aseem Jakhar
   	
    
     Timur Yunusov
    
     Igor Lukic
    
     Dhillon Andrew Kannabhiran
    
    
    
    
    
  
 
  
  - 
    2022/05/18
    Talk : Can Sec West 
 :	Launching EMUX - A framework for emulating ARM and MIPS IoT Devices - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/05/27
    Book :  
 :	Mobile App Reverse Engineering - 
    
    	Abhinav Mishra
   	
    
    
    
    
    
  
 
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	Adhrit: Android Security Suite - 
    
    	Amrudesh Balakrishnan
   	
    	Rahul Sani
   	
    	Abhishek Jm
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	ArcherySec - Manage and Automate your Vulnerability Assessment - 
    
    	Anand Tiwari
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Talk : Blackhat 
 :	Attacks From a New Front Door in 4G & 5G Mobile Networks - 
    
    	Altaf Shaik
   	
    
     Shinjo Park
    
     Matteo Strada
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	AWSGoat : A Damn Vulnerable AWS Infrastructure - 
    
    	Nishant Sharma
   	
    	Jeswin Mathai
   	
    	Sanjeev Mahunta
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	AzureGoat : A Damn Vulnerable Azure Infrastructure - 
    
    	Jeswin Mathai
   	
    	Nishant Sharma
   	
    	Rachna Umaraniya
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	CANalyse (2.0): A vehicle network analysis and attack tool - 
    
    	Kartheek Lade
   	
    	Rahul Jeyasingh
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	CASPR - Code Trust Audit Framework - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	HazProne : Cloud Hacking - 
    
    	Devansh Patel
   	
    
     Staford Titus S
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	Node Security Shield - A Lightweight RASP for NodeJS Applications - 
    
    	Lavakumar Kuppan
   	
    	Sukesh Pappu
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) - 
    
    	Parbati Kumar Manna
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	ReconPal: Leveraging NLP for Infosec - 
    
    	Jeswin Mathai
   	
    	Shantanu Kale
   	
    	Sherin Stephen
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Talk : Blackhat 
 :	The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting - 
    
    	Sameer Koranne
   	
    
     John Dwyer
    
     Neil Wyler
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	Vajra - Your Weapon To Cloud - 
    
    	Raunak Parmar
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	What’s new in reNgine? - 
    
    	Yogesh Ojha
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/11
    Talk : Blackhat 
 :	ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron - 
    
    	Mohan Sri Rama Krishna Pedhapati
   	
    
     Aaditya Purani
    
     Max Garrett
    
     William Bowling
    
    
    
    
    
    
    
   
  
  - 
    2022/08/11
    Talk : Blackhat 
 :	Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol - 
    
    	Subhechha Subudhi
   	
    
     Clara Maine
    
     Akke Toeter
    
     Victoria Bosch
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/08/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Octopii - AI-powered Personal Identifiable Information (PII) scanner - 
    
    	Owais Shaikh
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Patronus: Swiss Army Knife SAST Toolkit - 
    
    	Akhil Mahendra
   	
    	Akshansh Jaiswal
   	
    	Ashwin Shenoi
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/11
    Talk : Blackhat 
 :	RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems - 
    
    	Soundarya Ramesh
   	
    
     Levente Csikor
    
     Hoon Wei Lim
    
     Jun Wen Wong
    
     Rohini Poolat Parameswarath
    
     Chan Mun Choon
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/08/12
    Panel : Defcon  : Appsec Village
 :	Agility Broke AppSec. Now It’s Going to Fix It. - 
    
    	Vandana Verma Sehgal
   	
    
     Roy Erlich
    
     Emil Vaagland
    
     Seth Kirschner
    
    
    
    
    
    
    
   
  
  - 
    2022/08/12
    Talk : Defcon  : Ics Village
 :	Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years - 
    
    	Vivek Ponnada
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/13
    Panel : Defcon  : Adversary Village
 :	Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs - 
    
    	Niru Ragupathy
   	
    
    
    
    
    
  
 
  
  - 
    2022/08/14
    Talk : Defcon  : Ics Village
 :	Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right - 
    
    	Vivek Ponnada
   	
    
    
    
    
    
  
 
  
  - 
    2022/08/25
    Talk : Hitb Sec Conf 
 :	Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle - 
    
    	Rahul Sasi
   	
    	Vishal Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/08/25
    Talk : Hitb Sec Conf 
 :	MPT: Pentest In Action - 
    
    	Jyoti Raval
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/08/26
    Talk : Hitb Sec Conf 
 :	CAN A FUZZER MATCH A HUMAN - 
    
    	Bhargava Shastry
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	Securing the Software - 
    
    	Mrudul Uchil
   	
    	Abhisek Datta
   	
    	Harish Goel
   	
    
     Matthew Bohne
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	Cloud Services for Financial Inclusion: Possibilities & Challenges - 
    
    	Nandkumar Saravade
   	
    	Ganesh Ar
   	
    	Himanshu Das
   	
    	Navin Kumar Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	Consumer Tech Bug Bounty Panel: Hear from the Program Managers - 
    
    	Sandeep Singh
   	
    	Rishika Hooda
   	
    
     Omar Benbouazza
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	Does your SOC sucks? - 
    
    	Krishna Pandey
   	
    	Shweta Kshirsagar
   	
    	Vivek Gopalan
   	
    	Yogi Kapur
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	Impact of disruptive technologies on CISO’s career & progression - 
    
    	Burgess Cooper
   	
    	Sandeep Karan
   	
    	Jacxine Fernandez
   	
    	Ravi Kumar
   	
    	Ankur Bhargava
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	IoT Supply Chain Blues and the way forward - 
    
    	Aseem Jakhar
   	
    	Kedar Sovani
   	
    	Anantharaman Iyer
   	
    	Suvabrata Sinha
   	
    	Sudarshan Rajagopal
   	
    
     Sachin Jain
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	PAM Maturity From Zero Trust To Least Privilege - 
    
    	Ajay Bongirwar
   	
    	Charanjit Bhatia
   	
    	Bala Ramanan
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	Secure Service Edge (SSE): Challenges & Upsides of Adoption - 
    
    	Rahul Neel Mani
   	
    	Anuprita Daga
   	
    	Rajesh Hemrajani
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	Securing India The CERTIn Way - 
    
    	Saikat Datta
   	
    	Sanjay Bahl
   	
    	Ajit Menon
   	
    	Anuprita Daga
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/06
    Panel : Nullcon 
 :	Unlocking Security Collaboration With Cyber Threat Intelligence - 
    
    	Avkash Kathiriya
   	
    	Varun Singla
   	
    	Mathan Babu Kasilingam
   	
    	Amol Naik
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/07
    Talk : Nullcon 
 :	Do PDF Tools Conform To The Specification? - 
    
    	Prashant Anantharaman
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/07
    Talk : Nullcon 
 :	ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron - 
    
    	Mohan Sri Rama Krishna Pedhapati
   	
    
     Maxwell Garrett
    
    
    
    
    
    
    
   
  
  - 
    2022/09/07
    Talk : Nullcon 
 :	Hack The Bridge - 
    
    	Anto Joseph
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/07
    Talk : Nullcon 
 :	Hacking 5G Is No Rocket Science - 
    
    	Altaf Shaik
   	
    
     Matteo Strada
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/07
    Talk : Nullcon 
 :	Hacking Android Foreground Services Escalation Of Privileges - 
    
    	Rony Das
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/07
    Talk : Nullcon 
 :	Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls - 
    
    	Shyam Sundar Ramaswami
   	
    	Rakesh Mahanthi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/07
    Talk : Nullcon 
 :	Scale hacking to secure your cloud and beyond - 
    
    	Anand Prakash
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/07
    Talk : Nullcon 
 :	Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj - 
    
    	Devdutt Patnaik
   	
    
     Ashish Bijlani
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Talk : Nullcon 
 :	Automate Your Whatsapp Chats - 
    
    	Aditi Bhatnagar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Talk : Nullcon 
 :	Hack the Source: Securing Open Source Software – One bug at a time - 
    
    	Sandeep Singh
   	
    
     Laurie Mercer
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Talk : Nullcon 
 :	Handling A Bug Bounty program From A Blue Team Perspective - 
    
    	Ashwath Kumar
   	
    	Ankit Anurag
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Talk : Nullcon 
 :	Pushing Security Left By Mutating Byte Code - 
    
    	Gaurav Gogia
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Talk : Nullcon 
 :	Raining CVEs On WordPress Plugins With Semgrep - 
    
    	Shreya Pohekar
   	
    	Syed Sheeraz Ali
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Talk : Nullcon 
 :	The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple - 
    
    	Amit Malik
   	
    	Pratik Jeware
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Tool Demo : Nullcon 
 :	Vajra - Your Weapon To Cloud - 
    
    	Raunak Parmar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Talk : Nullcon 
 :	vPrioritizer: Art of Risk Prioritization - 
    
    	Pramod Rana
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Talk : Nullcon 
 :	Web3.0 - Smart Contracts Could Be Leaky - 
    
    	Riddhi Shree
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/08
    Tool Demo : Nullcon 
 :	ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs - 
    
    	Rohit Sehgal
   	
    	Varun Kakumani
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	A Tale of Credential Leak of a Popular Cloud Threat Actor - 
    
    	Nitesh Surana
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Attacking connected industries in 5G networks - 
    
    	Altaf Shaik
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Battle of 300 Crore - how they lost it and got most of it back - 
    
    	Prashant Choudhary
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Bridging the gap between Security and Operations - 
    
    	Sujay Rajashekar Gundagatti
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Building a Safer and Innovative Digital Ecosystem - 
    
    	Vijay Pamarathi
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Collaborative efforts for safe digital banking - 
    
    	Biju K
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Common Misconfigurations in your Kubernetes Cluster and What can you do about it? - 
    
    	Kumar Ashwin
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Panel : C0c0n 
 :	Customer, Credit & Risk - Fintech trends 2022 - 
    
    	Maya R Nair
   	
    	Balakrishnan A
   	
    	A Shiju Rawther
   	
    	Linson Paul
   	
    	Shivanath Somanathan
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Panel : C0c0n 
 :	Cybersecurity Dissonance: Perception vs Reality - 
    
    	Dinesh O Bareja
   	
    	George Eapen
   	
    	Jairam Ramesh
   	
    	Rajesh Hemrajani
   	
    	Suresh Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Cybersecurity for Manufacturing - 
    
    	Santhosh Srinivasan
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Panel : C0c0n 
 :	Digital Apocalypse: Emerging cybersecurity challenges and future Crimes - 
    
    	Nidhish Bhatnagar
   	
    	Amit Dubey
   	
    	Philip Varughese Vayarakunnil
   	
    	Rahul Sasi
   	
    	Saranga Rajan
   	
    	Suhel Daud
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Hacking SmartContracts - 
    
    	Anto Joseph
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Hyperledger Fabric & Ethereum Apps: Security Deep Dive - 
    
    	Alex Devassy
   	
    	Dhanith Krishna
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Log4j vulnerability continuous to be favourite for APT groups through mid 2022 - 
    
    	Niranjan Jayanand
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? - 
    
    	Abhijith B R
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Pwning Android Apps at Scale - 
    
    	Sparsh Kulshrestha
   	
    	Shashank Barthwal
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Ransomware: Prevention, Early Detection and Response - 
    
    	Babitha Bp
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Rolling out Central Bank Digital Currency - Technical Design Considerations - 
    
    	Sunil Raveendran
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Securing your APIs for a cloud native future - 
    
    	Navendu Pottekkat
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Startup Ecosystem and Investments in Post Covid Era - 
    
    	Sunil Kanchi
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Technological Reliance for Resilience - 
    
    	Tulika Pandey
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Threats Landscape and Intelligence of API & Shield to protect - 
    
    	Navaneethan M
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	Tracking the Bad guys. An interesting story of how the criminal underground operates - 
    
    	Aarushi Koolwal
   	
    	Anjana Sathyan
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Talk : C0c0n 
 :	TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor - 
    
    	Saurabh Sharma
   	
    
     Noushin Shabab
    
    
    
    
    
  
 
  
  - 
    2022/09/23
    Panel : C0c0n 
 :	What ails the Indian cybersecurity startup ecosystem? - 
    
    	Sunil Varkey
   	
    	Ajit Hatti
   	
    	Akash Mahajan
   	
    	Aseem Jakhar
   	
    	Shubham Mittal
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	BEC, still the sure shot trap - 
    
    	Georgie Kurien
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Building Smart, Resilient and Sustainable Cyber Eco System - 
    
    	Navin Kumar Singh
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	CANalyse: A Vehicle Network Analysis and Attack Tool - 
    
    	Kartheek Lade
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Citizen Mobile Security (ICAMPS) - 
    
    	Satyendra Verma
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Cryptocurrency Forensics - 
    
    	Bhushan Gulabrao Borase
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Cyber Defence and Role of private players - public private partnership - 
    
    	Jasbir Singh Solanki
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Panel : C0c0n 
 :	Data sovereignty - Challenges and the road ahead - 
    
    	Sanjeev Sharma
   	
    	Saranga Rajan
   	
    	A Muralidhar
   	
    	Jojy Joy
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Deep Learning to detect Network Attacks - 
    
    	Varun Kohli
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	In production with GRC for cloud - 
    
    	Mahesh Kalyanaraman
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Introduction to RFID/NFC Hacking - 
    
    	Davis Sojan
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Know Your Organization? : Mapping Entities in Google Workspace - 
    
    	Manish Gupta
   	
    	Yash Bharadwaj
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Panel : C0c0n 
 :	MoonWorking’ and associated legal, ethical, security aspects - 
    
    	Georgie Kurien
   	
    	Sreekumar Balachandran
   	
    	Sony A
   	
    	Robin Joy
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Need for Advanced SOC - 
    
    	Vijayakumar K M
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	OSINT Tools and Techniques - 
    
    	Brijesh Singh
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Power of Narratives in Cyber Security - 
    
    	Sunil Varkey
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Raining CVEs on Wordpress plugins with Semgrep - 
    
    	Shreya Pohekar
   	
    	Syed Sheeraz Ali
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Panel : C0c0n 
 :	Ransom Trends in India - 
    
    	Pardhasaradhi Ch
   	
    	Srikanta Prasad
   	
    	Jacxine Fernandez
   	
    	Diwakar Sheoran
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Rationalizing Cyber Security Risk in Risk Language - 
    
    	Anish Koshy
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks - 
    
    	Manesh Thankappan
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Weaponising Social Media for Psychological Operations - 
    
    	A a Gafoor
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/24
    Talk : C0c0n 
 :	Web3 Security - Security in MetaVerse, and the new world of web3 - 
    
    	Rohit Srivastwa
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/28
    Talk : Rootcon 
 :	AWSGoat : A Damn Vulnerable AWS Infrastructure - 
    
    	Jeswin Mathai
   	
    	Shantanu Kale
   	
    	Sanjeev Mahunta
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2022/09/28
    Talk : Rootcon 
 :	Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations - 
    
    	Harshit Agrawal
   	
    
    
    
    
    
  
 
  
  - 
    2022/09/29
    Talk : Brucon 
 :	0wn-premises: Bypassing Microsoft Defender for Identity - 
    
    	Nikhil Mittal
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/10/26
    Book :  
 :	Network Protocols for Security Professionals - 
    
    	Deepanshu Khanna
   	
    
     Yoram Orzach
    
    
    
    
    
  
 
  
  - 
    2022/11/18
    Book :  
 :	Hybrid Cloud Security Patterns - 
    
    	Sreekanth Iyer
   	
    
    
    
    
    
  
 
  
  - 
    2022/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. - 
    
    	Subhash Popuri
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	Patronus: Swiss Army Knife SAST Toolkit - 
    
    	Akhil Mahendra
   	
    	Akshansh Jaiswal
   	
    	Ashwin Shenoi
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	vAPI: Vulnerable Adversely Programmed Interface - 
    
    	Tushar Kulkarni
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/12/08
    Talk : Blackhat 
 :	Exploring a New Class of Kernel Exploit Primitive - 
    
    	Rohit Mothe
   	
    
     Andrew Ruddick
    
    
    
    
    
    
    
   
  
  - 
    2022/12/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Industrial Control Systems: Capture the Train! - 
    
    	Dhruv Sharan
   	
    
     Arnaud Soullié
    
    
    
    
    
  
 
  
  - 
    2022/12/08
    Panel : Blackhat 
 :	Locknote: Conclusions and Key Takeaways from Day 2 - 
    
    	Anant Shrivastava
   	
    
     Jeff Moss
    
     Jiska Classen
    
     Leigh Anney Galloway
    
     Federico Maggi
    
    
    
    
    
  
 
  
  - 
    2022/12/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Node Security Shield - A Lightweight RASP for NodeJS Applications - 
    
    	Lavakumar Kuppan
   	
    	Sukesh Pappu
   	
    
    
    
    
    
    
    
   
  
  - 
    2022/12/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	ThunderCloud: Attack Cloud Without Keys! - 
    
    	Shivankar Madaan
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/02/17
    Book :  
 :	Cybersecurity Blue Team Strategies - 
    
    	Kunal Sehgal
   	
    
     Nikolaos Thymianis
    
    
    
    
    
  
 
  
  - 
    2023/03/09
    Panel : Nullcon 
 :	Elements of a Successful Security Strategy: A Comprehensive Approach - 
    
    	Sheetal Joseph
   	
    
     Sybe Izzak Rispens
    
     Travis Carelock
    
    
    
    
    
    
    
   
  
  - 
    2023/03/09
    Panel : Nullcon 
 :	How to make security easier for your developers - 
    
    	Santosh Yadav
   	
    
     Frida Kiriakos
    
     Marie Theresa Brosig
    
     Xavier Rene Corail
    
    
    
    
    
    
    
   
  
  - 
    2023/03/09
    Talk : Nullcon 
 :	Not So Famous Attack Vectors In The World Of Smart Contract Security! - 
    
    	Tejaswa Rastogi
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/03/30
    Book :  
 :	IoT and OT Security Handbook - 
    
    	Smita Jain
   	
    	Vasantha Lakshmi
   	
    
    
    
    
    
  
 
  
  - 
    2023/04/14
    Book :  
 :	Managing Risks in Digital Transformation - 
    
    	Ashish Kumar
   	
    	Shashank Kumar
   	
    	Abbas Kudrati
   	
    
    
    
    
    
  
 
  
  - 
    2023/04/20
    Talk : Hitb Sec Conf 
 :	BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES - 
    
    	Rohan Aggarwal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/04/21
    Talk : Hitb Sec Conf 
 :	LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS - 
    
    	Saumil Shah
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	APKHunt | OWASP MASVS Static Analyzer - 
    
    	Mrunal Chawda
   	
    	Sumit Kalaria
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	AzureGoat : A Damn Vulnerable Azure Infrastructure - 
    
    	Nishant Sharma
   	
    	Dasari Yashwanth Babu
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Talk : Blackhat 
 :	Bypassing Anti-Cheats & Hacking Competitive Games - 
    
    	Rohan Aggarwal
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool - 
    
    	Kartheek Lade
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	CASPR - Code Trust Auditing Framework - 
    
    	Atharva Chincholkar
   	
    	Srishti Chaubey
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Damn Vulnerable Bank - 
    
    	Rewanth Tammana
   	
    	Hrushikesh Kakade
   	
    	Akshansh Jaiswal
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	KernelGoat - 
    
    	Shivankar Madaan
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kubernetes Goat: Interactive Kubernetes Security Learning Playground - 
    
    	Madhu Akula
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	MORF - Mobile Reconnaissance Framework - 
    
    	Abhishek Jm
   	
    	Amrudesh Balakrishnan
   	
    	Himanshu Das
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Nightingale: Docker for Pentesters - 
    
    	Raja Nagori
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Post-Quantum Cryptography Library - 
    
    	Sagar Bhure
   	
    
     Shain Singh
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	reNgine: An Open-Source Automated Reconnaissance/Attack Surface Management tool - 
    
    	Yogesh Ojha
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	ThreatSeeker - Threat Hunting via Windows Event Logs - 
    
    	Ashish Bhangale
   	
    	G Khartheesvar
   	
    	Arafat Ansari
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/12
    Talk : Blackhat 
 :	Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators - 
    
    	Sravan Akkaram
   	
    
     Nestori Syynimaa
    
    
    
    
    
    
    
   
  
  - 
    2023/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF - 
    
    	Sagar Bhure
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/12
    Talk : Blackhat 
 :	Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines - 
    
    	Rohit Sehgal
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	GCPGoat : A Damn Vulnerable GCP Infrastructure - 
    
    	Shantanu Kale
   	
    	Rishappreet Singh Moonga
   	
    	Ravi Verma
   	
    	Govind Krishna
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration - 
    
    	Ravi Rajput
   	
    
    
    
    
    
  
 
  
  - 
    2023/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	SCodeScanner - An Open-Source Source-Code Scanner - 
    
    	Utkarsh Agrawal
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/05/12
    Panel : Blackhat 
 :	Trends and Top Takeaways from Black Hat Asia - 
    
    	Sudhanshu Chauhan
   	
    
     Ty Miller
    
     Jeff Moss
    
     Asuka Nakajima
    
     Pamela O Shea
    
    
    
    
    
  
 
  
  - 
    2023/05/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Vajra - Your Weapon To Cloud - 
    
    	Raunak Parmar
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/06/28
    Book :  
 :	Building a Next-Gen SOC with IBM QRadar - 
    
    	Ashish Kothekar
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things - 
    
    	Panchami V
   	
    	Mahima Mary Mathews
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	AI in Cyber Security and Crime Prevention - 
    
    	Vishal Salvi
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	CBDC and future of Finance - 
    
    	Sunil Raveendran
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Cryptocurrencies and challenges to Law Enforcement Agencies - 
    
    	Bhushan Gulabrao Borase
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Cybercrimes Victim Compensation : Legal Remedies and Process - 
    
    	Nisheeth Dixit
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Cybersecurity in the Era of AI - 
    
    	Suvin Mullaseril
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Dark web for investigations - 
    
    	Amit Lokhande
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Developments in Deep Fake detection - 
    
    	Tapas Saini
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Digital Innovation and its Impact on CIOs, CISOs and DPOs - 
    
    	Navaneethan M
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Emerging crimes and threat landscape in cyber domain and the need for international cooperation - 
    
    	Kiran Sivakumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Expanding capability horizons : Homelabs and beyond - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Panel : C0c0n 
 :	Generative AI - An Industry Perspective - 
    
    	Georgie Kurien
   	
    	Balakrishnan A
   	
    	Sreekumar Balachandran
   	
    	V v Jacob
   	
    	Sony A
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Influence of Artificial Intelligence in GRC Space - 
    
    	Mahesh Kalyanaraman
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Insider Threats - Best Practices and Common Pitfalls - 
    
    	Georgie Kurien
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Mitigating SSRF at scale the right way with IMDSv2! - 
    
    	Ayush Priya
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Panel : C0c0n 
 :	nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge - 
    
    	Murli Nambiar
   	
    	A Shiju Rawther
   	
    	Jacxine Fernandez
   	
    	Vishal Salvi
   	
    	Sridhar Govardhan
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Playing cat and mouse with the Adversary: Sometimes a breach is inevitable - 
    
    	Abhijith B R
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Panel : C0c0n 
 :	Power of Control: Navigating the PDP Act - 
    
    	Prem Kamath
   	
    	K Kamaneesh
   	
    	Swapnil Bangali
   	
    	Rahul Sharma
   	
    	Dinesh O Bareja
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape - 
    
    	Jaydev Joshi
   	
    	Simran Kothari
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G - 
    
    	Altaf Shaik
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Subduing Adversaries with Information Superiority - 
    
    	Antony K M
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Survivability in the Cyber World - 
    
    	Sunil Varkey
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Surviving In Dependency Hell - 
    
    	Kumar Ashwin
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector - 
    
    	Anshu Kumar
   	
    	Pavan Sorab
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	The new way to be secure - 
    
    	Sakshi Bhutani
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/06
    Talk : C0c0n 
 :	Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management - 
    
    	Kumar Ritesh
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Cellibrite Premium Mobile Forensic tool iPhone analysis - 
    
    	Vaibhav Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Chinese APT against Government officials using G7 summit lure - 
    
    	Niranjan Jayanand
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Panel : C0c0n 
 :	CII Protection: How can the c0c0n community contribute ? - 
    
    	Navin Kumar Singh
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Citizen Mobile Security: Responsibilities, Accountability, and Impacts - 
    
    	Satyendra Verma
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Cyber Threats to Global Financial Systems - 
    
    	Lince Lawrence
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Darkweb Investigations - 
    
    	Amit Dubey
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/07
    Panel : C0c0n 
 :	DPDP Act - Transformation challenges for BFSI - 
    
    	Linson Paul
   	
    	Venugopal Parameswara
   	
    	Biju K
   	
    	Babitha B P
   	
    	Santosh Khadsare
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux - 
    
    	Pranav Sivvam
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	ESOC Trinetra Project - 
    
    	Pankaj Kumar Dalela
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs - 
    
    	Sathwik RAM Prakki
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Panel : C0c0n 
 :	Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity - 
    
    	Vikas Arora
   	
    	Sanjay Singh
   	
    	Baidyanath Kumar
   	
    	Saurabh Gugnani
   	
    	Gokulavan Jayaraman
   	
    	Vijay Nair
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Exploring Threats in Operational Technology - 
    
    	Manjunath Hiregange
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/07
    Panel : C0c0n 
 :	Frictionless Security…Experience Simplified. - 
    
    	A Shiju Rawther
   	
    	Maya R Nair
   	
    	Suresh Sharma
   	
    	Himanshu Das
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Generative AI and Cyber Crimes - 
    
    	Brijesh Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Homomorphic Encryption - Myth to Reality - 
    
    	Anish Koshy
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Putting a leash on AI - 
    
    	Aditya Vasekar
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Serverless Siege: AWS Lambda Pentesting - 
    
    	Anjali Singh Shukla
   	
    	Divyanshu Shukla
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Shifting left blockchain development for safer DApps - 
    
    	Dhanith Krishna
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Smart Contract Phishing : Attack & Defense - 
    
    	Tejaswa Rastogi
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Start Left SDLC Security with Open-Source DevSecOps Tooling - 
    
    	Aswin Raj
   	
    	Shruti M G
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Tackling Advanced Threat Landscape with MDR - Best Practices - 
    
    	Vijayakumar K M
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	The DPDPA Effect: Jubilation, Twinge and Reticence that followed - 
    
    	Rahul Sharma
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Trust Resiliency - A Lesson Learned from Russia Ukraine War - 
    
    	Ajit Hatti
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities - 
    
    	Nitesh Surana
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/07
    Talk : C0c0n 
 :	Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos - 
    
    	Nikhil Prabhakar
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	Akto - Open Source API Security Tool - 
    
    	Ankush Jain
   	
    	Ankita Gupta 1
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	AntiSquat - An AI-Powered Phishing Domain Finder - 
    
    	Owais Shaikh
   	
    	Umair Nehri
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections - 
    
    	Ankit Anurag
   	
    	Ashwath Kumar
   	
    	Manikandan Rajappan
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	BucketLoot - An Automated S3 Bucket Inspector - 
    
    	Owais Shaikh
   	
    	Umair Nehri
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	CASPR - Code Trust Auditing Framework - 
    
    	Ajit Hatti
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	Damn Vulnerable Bank - 
    
    	Akshansh Jaiswal
   	
    	Hrushikesh Kakade
   	
    	Rewanth Tammana
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	DIAL - Did I Alert Lambda? Centralised Security Misconfiguration Detection Framework - 
    
    	Saransh Rana
   	
    	Rashid Feroze
   	
    	Harsh Varagiya
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Talk : Blackhat 
 :	Diversity Microtalks: Perspectives on Creating Change - 
    
    	Aastha Sahni
   	
    
     Andy Ellis
    
     Meghan Jacquot
    
     Sherri Davidoff
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. - 
    
    	Sagar Bhure
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Talk : Blackhat 
 :	Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach - 
    
    	Pankaj Moolrajani
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/09
    Tool Demo : Blackhat 
 : Arsenal 
 :	MORF - Mobile Reconnaissance Framework - 
    
    	Abhishek Jm
   	
    	Amrudesh Balakrishnan
   	
    	Himanshu Das
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/10
    Talk : Blackhat 
 :	AI Assisted Decision Making of Security Review Needs for New Features - 
    
    	Mrityunjay Gautam
   	
    
     Pavan Kolachoor
    
    
    
    
    
    
    
   
  
  - 
    2023/08/10
    Talk : Defcon  : Lockpick Village
 :	Attacking Vehicle Fleet Management Systems - 
    
    	Yashin Mehaboobe
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/08/10
    Talk : Blackhat 
 :	Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? - 
    
    	Amit Deokar
   	
    
     Ali Ahmed
    
     Brian Lee
    
    
    
    
    
    
    
   
  
  - 
    2023/08/10
    Talk : Defcon  : Lockpick Village
 :	Hardware Backdooring an e-Scooter - 
    
    	Arun Mane
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments - 
    
    	Aditya K Sood
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	SCodeScanner - An Open-Source Source-Code Scanner - 
    
    	Utkarsh Agrawal
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/10
    Talk : Blackhat 
 :	Uncovering Azure’s Silent Threats: A Journey into Cloud Vulnerabilities - 
    
    	Nitesh Surana
   	
    
     Magno Logan
    
     David Fiser
    
    
    
    
    
    
    
   
  
  - 
    2023/08/10
    Tool Demo : Blackhat 
 : Arsenal 
 :	vAPI: Vulnerable Adversely Programmed Interface - 
    
    	Tushar Kulkarni
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/10
    Talk : Defcon  : Lockpick Village
 :	Wheels of Wonder: Unveiling Car Hacking Poetry - 
    
    	Hrishikesh Somchatwar
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/08/11
    Talk : Defcon  : Appsec Village
 :	Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications - 
    
    	Ankur Chowdhary
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/11
    Talk : Defcon 
 :	Getting a Migraine - uncovering a unique SIP bypass on macOS - 
    
    	Anurag Bohra
   	
    
     Jonathan Bar Or
    
     Michael Pearse
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/08/11
    Book :  
 :	Mastering Information Security Compliance Management - 
    
    	Adarsh Nair
   	
    	Greeshma M R
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/11
    Tool Demo : Defcon  : Appsec Village
 : DemoLabs  :	vAPI : Vulnerable Adversely Programmed Interface - 
    
    	Tushar Kulkarni
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/12
    Talk : Defcon  : Appsec Village
 :	Getting More Bang for your Buck:Appsec on a Limited Budget - 
    
    	Vandana Verma Sehgal
   	
    	Viraj Gandhi
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/12
    Panel : Defcon  : Appsec Village
 :	Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert - 
    
    	Trupti Shiralkar
   	
    	Kiran Shirali
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/12
    Tool Demo : Defcon  : Appsec Village
 : DemoLabs  :	Open Source API Security for devsecops - 
    
    	Ankush Jain
   	
    	Ankita Gupta 1
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/13
    Tool Demo : Blackhat 
 : Arsenal 
 :	Advanced ROP Framework: Pushing ROP to Its Limits - 
    
    	Shiva Shashank
   	
    
     Bramwell Brizendine
    
    
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/08/24
    Tool Demo : Hitb Sec Conf 
 :	Vajra - 
    
    	Raunak Parmar
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/25
    Talk : Hitb Sec Conf 
 :	Breaking ML Services: Finding 0-days in Azure Machine Learning - 
    
    	Nitesh Surana
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/08/25
    Book :  
 :	Cloud Native Software Security Handbook - 
    
    	Mihir Shah
   	
    
    
    
    
    
  
 
  
  - 
    2023/08/25
    Tool Demo : Hitb Sec Conf 
 :	eBPFShield - 
    
    	Sagar Bhure
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/25
    Talk : Hitb Sec Conf 
 :	Hacking into iOS’s VOLTE implementation - 
    
    	Hardik Mehta
   	
    	Rajanish Pathak
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/08/25
    Tool Demo : Hitb Sec Conf 
 :	iGoat - 
    
    	Swaroop Yermalkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/08/30
    Book :  
 :	Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide - 
    
    	Ankush Chowdhary
   	
    	Prashant Kulkarni
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/08
    Book :  
 :	ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide - 
    
    	Shobhit Mehta
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/23
    Panel : Nullcon 
 :	INSIDE THE INVESTOR’S MIND: A FIRESIDE CHAT OF ENTREPRENEUR-VC (AAP KI ADALAT) - 
    
    	Akshat Jain
   	
    	Ajey Gore
   	
    	Sateesh Andra
   	
    	Prayank Swaroop
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	Android-SigMorph: Covert Communication Exploiting Android Signing Schemes - 
    
    	Ayan Saha
   	
    	Achute Sharma
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Panel : Nullcon 
 :	CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE - 
    
    	Saikat Datta
   	
    	M v Sheshadri
   	
    	Madhavi Purandare
   	
    	Mathan Babu Kasilingam
   	
    	Navin Kumar Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Panel : Nullcon 
 :	DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY - 
    
    	Burgess Cooper
   	
    	Ashish Bhadouria
   	
    	Jimmi Thakkar
   	
    	Sunil Bajpai
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In iOS - 
    
    	Shubham Sharma
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	How I hacked your bank account: A detailed look at UPI Security - 
    
    	Abhay Rana
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	Journey in setting up OT SOC - 
    
    	Ramandeep Singh Walia
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers - 
    
    	Rishit Bansal
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	Secure Coding: Fix From The Root - 
    
    	Saddam Hussain
   	
    	Gopika Subramanian
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	Secure Your Angular App Using JWT And GraphQL - 
    
    	Ankit Sharma
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Panel : Nullcon 
 :	SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAM’S JOURNEY TO EXCELLENCE - 
    
    	Dinesh Varma
   	
    	Satish Kumar Dwibhashi
   	
    	Manoj Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis - 
    
    	Nikhil Ashok Hegde
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	The Curious Case Of The Rogue SOAR - 
    
    	Mukesh Sai Kumar
   	
    	Jaden Furtado
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Panel : Nullcon 
 :	THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY - 
    
    	Ramandeep Singh Walia
   	
    	Yask Sharma
   	
    	Sanjeev Sharma
   	
    	Britto Sidhan
   	
    	Rohit Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities - 
    
    	Nitesh Surana
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/09/23
    Panel : Nullcon 
 :	WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI - 
    
    	Rahul Neel Mani
   	
    	Manish Tiwari
   	
    	Yogesh Kulkarni
   	
    	Ambarish Kumar Singh
   	
    
     Alan J White
    
    
    
    
    
  
 
  
  - 
    2023/09/23
    Talk : Nullcon 
 :	Your App Is Probably A Spyware…Or Is It? - 
    
    	Gaurav Gogia
   	
    	Pandurang Patil
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/09/24
    Panel : Nullcon 
 :	A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY - 
    
    	Kunal Korgaonkar
   	
    	Kapil Jaiswal
   	
    	Malcolm Dsouza
   	
    	Manoj Aggarwal
   	
    	Niraj Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/24
    Panel : Nullcon 
 :	ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT - 
    
    	Shomiron Das Gupta
   	
    	Yogi Kapur
   	
    	Manish Tiwari
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/24
    Panel : Nullcon 
 :	C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE - 
    
    	Saikat Datta
   	
    	Akash Mahajan
   	
    	Varun Singla
   	
    	Navin Kumar Singh
   	
    
     Phil Rodrigues
    
    
    
    
    
  
 
  
  - 
    2023/09/24
    Panel : Nullcon 
 :	Cyber Operations, Doctrine, And Geo-Politics - 
    
    	Anand Venkatanarayanan
   	
    	Manu Zacharia
   	
    
     John Lambert
    
    
    
    
    
    
    
   
  
  - 
    2023/09/24
    Panel : Nullcon 
 :	INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI - 
    
    	Avkash Kathiriya
   	
    	Mathan Babu Kasilingam
   	
    	Sanjay Bahl
   	
    	Krishna Pandey
   	
    
     Travis Carelock
    
    
    
    
    
  
 
  
  - 
    2023/09/28
    Talk : Rootcon 
 :	Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation - 
    
    	Raunak Parmar
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/09/28
    Talk : Hackinparis 
 :	How to have visibility and security OF CICD ecosystem - 
    
    	Pramod Rana
   	
    
    
    
    
    
  
 
  
  - 
    2023/09/29
    Talk : Hackinparis 
 :	A Tale of Credential Leak of a Popular Cloud Threat Actor - 
    
    	Nitesh Surana
   	
    
    
    
    
    
  
 
  
  - 
    2023/10/13
    Talk : Hackfest 
 :	Exploring RAM Forensic Analysis for Effective Digital Investigations - 
    
    	Sneha Banerjee
   	
    
    
    
    
    
  
 
  
  - 
    2023/11/17
    Talk : Deepsec 
 :	Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption - 
    
    	Shubham Dubey
   	
    
    
    
    
    
  
 
  
  - 
    2023/12/06
    Talk : Blackhat 
 :	AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers - 
    
    	Ankit Gangwal
   	
    	Shubham Singh
   	
    	Abhijeet Srivastava
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	AndroCop: One Click Forensic Investigation & Data Extraction Tool - 
    
    	Abhinand N
   	
    	Aswin M Guptha
   	
    	Varun Nair
   	
    
    
    
    
    
  
 
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	BucketLoot - An Automated S3-compatible Bucket Inspector - 
    
    	Owais Shaikh
   	
    	Umair Nehri
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	DetectiveSQ: A Extension Auditing Framework - 
    
    	Jeswin Mathai
   	
    	Shourya Pratap Singh
   	
    
    
    
    
    
  
 
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Docker Exploitation Framework - 
    
    	Rohit Pitke
   	
    
     Emmanuel Law
    
    
    
    
    
    
    
   
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services - 
    
    	Rohit Kumar
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Honeyscanner: a vulnerability analyzer for Honeypots - 
    
    	Shreyas Srinivasa
   	
    
     Emmanouil Vasilomanolakis
    
     Aristofanis Chionis Koufakos
    
     Ricardo Yaben
    
    
    
    
    
    
    
   
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	MORF - Mobile Reconnaissance Framework - 
    
    	Abhishek Jm
   	
    	Amrudesh Balakrishnan
   	
    	Himanshu Das
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	Octopii v2 - 
    
    	Owais Shaikh
   	
    	Umair Nehri
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	SSH into any device from anywhere with ZERO Open Network ports - 
    
    	Anthony Prakash
   	
    
     Colin Constable
    
    
    
    
    
    
    
   
  
  - 
    2023/12/06
    Tool Demo : Blackhat 
 : Arsenal 
 :	SupplyShield: Protecting your software supply chain - 
    
    	Akhil Mahendra
   	
    	Hritik Vijay
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	Akto - Open Source API Security Tool - 
    
    	Ankush Jain
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/07
    Panel : Blackhat 
 :	Locknote: Conclusions and Key Takeaways from Day 2 - 
    
    	Vandana Verma Sehgal
   	
    
     Jeff Moss
    
     Ali Abbasi
    
     Jiska Classen
    
     Kenneth White
    
    
    
    
    
  
 
  
  - 
    2023/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mantis - Asset Discovery at Scale - 
    
    	Prateek Thakare
   	
    	Bharath Kumar
   	
    	Praveen Kanniah
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mobile Security Framework - MobSF - 
    
    	Ajin Abraham
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	Route53Sweep: Empowering AWS Route53 Security with Automated Scanning & Comprehensive Inventory Management - 
    
    	Divyanshu Shukla
   	
    	Anjali Singh Shukla
   	
    
    
    
    
    
    
    
   
  
  - 
    2023/12/07
    Talk : Blackhat 
 :	Unmasking APTs: An Automated Approach for Real-World Threat Attribution - 
    
    	Aakansha Saha
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2023/12/22
    Book :  
 :	Implementing DevSecOps Practices - 
    
    	Vandana Verma Sehgal
   	
    
    
    
    
    
  
 
  
  - 
    2024/02/22
    Book :  
 :	Cloud Forensics Demystified - 
    
    	Ganesh Ramakrishnan
   	
    
     Mansoor Haqanee
    
    
    
    
    
  
 
  
  - 
    2024/03/11
    Talk : Nullcon 
 :	Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC - 
    
    	Arpan Jati
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2024/03/11
    Talk : Nullcon 
 :	Hacking Trains - 
    
    	Jaden Furtado
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/03/12
    Talk : Nullcon 
 :	Secure Web Gateways are dead. What’s next? - 
    
    	Vivek Ramachandran
   	
    
    
    
    
    
  
 
  
  - 
    2024/03/21
    Talk : Can Sec West 
 :	Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server - 
    
    	Arif Hussain
   	
    
     George Hughey
    
    
    
    
    
  
 
  
  - 
    2024/04/12
    Book :  
 :	Security Monitoring with Wazuh - 
    
    	Rajneesh Gupta
   	
    
    
    
    
    
  
 
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	APKDeepLens - Android security insights in full spectrum - 
    
    	Atul Singh
   	
    	Deepanshu Gajbhiye
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	BinderAPI Scanner & BASS - 
    
    	Krishnaprasad Subramaniam
   	
    
     Jeffrey Gaor
    
     Valen Sai
    
     Eric Tee Hock Nian
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Talk : Blackhat 
 :	Breaking Managed Identity Barriers In Azure Services - 
    
    	Nitesh Surana
   	
    
     David Fiser
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	Catching adversaries on Azure - Deception on Cloud - 
    
    	Subhash Popuri
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	Damn Vulnerable Browser Extension (DVBE) - Unfold the risks for your Browser Supplements - 
    
    	Abhinav Khanna
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows - 
    
    	Soumyanil Biswas
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	DetectiveSQ: A Extension Auditing Framework Version 2 - 
    
    	Govind Krishna
   	
    
     Xian Xiang Chang
    
    
    
    
    
  
 
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security - 
    
    	Sagar Bhure
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	findmytakeover - find dangling domains in a multi cloud environment - 
    
    	Aniruddha Biyani
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	Genzai - The IoT Security Toolkit - 
    
    	Umair Nehri
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mantis - Asset Discovery at Scale - 
    
    	Ankur Bhargava
   	
    	Prateek Thakare
   	
    	Saddam Hussain
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	MORF - Mobile Reconnaissance Framework - 
    
    	Amrudesh Balakrishnan
   	
    	Abhishek Jm
   	
    	Himanshu Das
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	Nightingale: Docker for Pentesters - 
    
    	Raja Nagori
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	R0fuzz - 
    
    	Season Cherian
   	
    	Vishnu Dev
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	RedCloud OS : Cloud Adversary Simulation Operating System - 
    
    	Manish Gupta
   	
    	Yash Bharadwaj
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Tool Demo : Blackhat 
 : Arsenal 
 :	Secure Local Vault - Git Based Secret Manager - 
    
    	Sriram Krishnan
   	
    	Shibly Meeran
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/18
    Talk : Blackhat 
 :	The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition - 
    
    	Arun Kanuparthi
   	
    	Hareesh Khattri
   	
    	Jeyavijayan Jv Rajendran
   	
    
     Jason Fung
    
     Ahmad Reza Sadeghi
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Tool Demo : Blackhat 
 : Arsenal 
 :	AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs - 
    
    	Asankhaya Sharma
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Tool Demo : Blackhat 
 : Arsenal 
 :	AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud - 
    
    	Sherin Stephen
   	
    	Nishant Sharma
   	
    	Rishappreet Singh Moonga
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Tool Demo : Blackhat 
 : Arsenal 
 :	BucketLoot - An Automated S3 Bucket Inspector - 
    
    	Umair Nehri
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Talk : Blackhat 
 :	China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? - 
    
    	Pukhraj Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Talk : Blackhat 
 :	Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems - 
    
    	Anirban Chakraborty
   	
    	Nimish Mishra
   	
    	Debdeep Mukhopadhyay
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Tool Demo : Blackhat 
 : Arsenal 
 :	GearGoat : Car Vulnerabilities Simulator - 
    
    	Nishant Sharma
   	
    	Pranjal Soni
   	
    	Sanjeev Mahunta
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Panel : Blackhat 
 :	Locknote: Conclusions and Key Takeaways - 
    
    	Anant Shrivastava
   	
    
     Vitaly Kamluk
    
     Ty Miller
    
     Jeff Moss
    
     Pamela O'shea
    
    
    
    
    
  
 
  
  - 
    2024/04/19
    Tool Demo : Blackhat 
 : Arsenal 
 :	Malware clustering using unsupervised ML : CalMal - 
    
    	Himanshu Anand
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Tool Demo : Blackhat 
 : Arsenal 
 :	Monitoring and Detecting Leaks with GitAlerts - 
    
    	Nikhil Mittal 1
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/19
    Tool Demo : Blackhat 
 : Arsenal 
 :	vet: Policy Driven vetting of Open Source Software Components - 
    
    	Abhisek Datta
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/04/30
    Book :  
 :	Rust for Blockchain Application Development - 
    
    	Akhil Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2024/06/21
    Book :  
 :	CCSP (ISC)2 Certified Cloud Security Professional Exam Guide - 
    
    	Navya Lakshmana
   	
    
     Omar A. Turner
    
    
    
    
    
  
 
  
  - 
    2024/06/27
    Talk : Troopers 
 :	The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps - 
    
    	Priyank Nigam
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/07/31
    Book :  
 :	The Complete Guide to Defense in Depth - 
    
    	Akash Mukherjee
   	
    
    
    
    
    
  
 
  
  - 
    2024/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	BucketLoot - An Automated S3 Bucket Inspector - 
    
    	Kunal Aggarwal
   	
    	Umair Nehri
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	DarkWidow: Dropper/PostExploitation Tool targeting Windows - 
    
    	Soumyanil Biswas
   	
    	Chirag Savla
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	Hacking generative AI with PyRIT - 
    
    	Raja Sekhar Rao Dheekonda
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2024/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	RedCloud OS : Cloud Adversary Simulation Operating System - 
    
    	Manish Gupta
   	
    	Yash Bharadwaj
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/07
    Talk : Blackhat 
 :	The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition - 
    
    	Arun Kanuparthi
   	
    	Hareesh Khattri
   	
    	Jeyavijayan Jv Rajendran
   	
    
     Jason Fung
    
     Ahmad Reza Sadeghi
    
    
    
    
    
    
    
   
  
  - 
    2024/08/07
    Tool Demo : Blackhat 
 : Arsenal 
 :	TrafficWardenX: OpenWRT Security & Monitoring - 
    
    	Sampad Adhikary
   	
    	Tripti Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2024/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Active Directory Cyber Deception using Huginn - 
    
    	Rohan Durve
   	
    
     Paul Laine
    
    
    
    
    
    
    
   
  
  - 
    2024/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Offensive Breach and Risk Assessment (COBRA) - 
    
    	Anand Tiwari
   	
    	Harsha Koushik
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	ICSGoat: A Damn Vulnerable ICS Infrastructure - 
    
    	Shantanu Kale
   	
    	Divya Nain
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Octopii v2 - 
    
    	Owais Shaikh
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/08
    Tool Demo : Blackhat 
 : Arsenal 
 :	Open Source LLM Security - 
    
    	Ankita Gupta 1
   	
    	Ankush Jain
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/09
    Talk : Defcon 
 :	Breaking Secure Web Gateways (SWG) for Fun and Profit - 
    
    	Vivek Ramachandran
   	
    	Jeswin Mathai
   	
    
    
    
    
    
  
 
  
  - 
    2024/08/09
    Talk : Defcon 
 :	Breaking Secure Web Gateways (SWG) for Fun and Profit - 
    
    	Vivek Ramachandran
   	
    	Jeswin Mathai
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/09
    Panel : Defcon  : Adversary Village
 :	Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors - 
    
    	Abhijith B R
   	
    	Nikhil Mittal
   	
    
     Adam Pennington
    
     Ken Kato
    
     Ashley Stryker
    
    
    
    
    
  
 
  
  - 
    2024/08/09
    Talk : Defcon  : Bug Bounty Village
 :	Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways - 
    
    	Nikhil Shrivastava
   	
    
     Charles Waterhouse
    
    
    
    
    
  
 
  
  - 
    2024/08/10
    Panel : Defcon  : Makers Community
 :	Color Blasted Badge Making: How Hard Could It Be ? - 
    
    	Abhinav Panda
   	
    
     Hamster
    
     Bradan Lane
    
    
    
    
    
  
 
  
  - 
    2024/08/10
    Talk : Defcon 
 :	Compromising an Electronic Logging Device and Creating a Truck2Truck Worm - 
    
    	Rik Chatterjee
   	
    
     Jake Jepson
    
    
    
    
    
    
    
   
  
  - 
    2024/08/10
    Talk : Defcon  : Adversary Village
 :	Sneaky Extensions: The MV3 Escape Artists - 
    
    	Vivek Ramachandran
   	
    	Shourya Pratap Singh
   	
    
    
    
    
    
  
 
  
  - 
    2024/08/10
    Talk : Defcon 
 :	Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming - 
    
    	Shiva Shashank
   	
    
     Bramwell Brizendine
    
    
    
    
    
    
    
    
    
    
    
   
  
  - 
    2024/08/29
    Tool Demo : Hitb Sec Conf 
 :	AI Assisted Code Reviewer - 
    
    	Rajanish Pathak
   	
    	Hardik Mehta
   	
    
    
    
    
    
  
 
  
  - 
    2024/08/29
    Tool Demo : Hitb Sec Conf 
 :	CICDGuard - 
    
    	Pramod Rana
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/29
    Talk : Hitb Sec Conf 
 :	COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts - 
    
    	Chetan Raghuprasad
   	
    
     Joey Chen
    
    
    
    
    
    
    
    
    
   
  
  - 
    2024/08/29
    Tool Demo : Hitb Sec Conf 
 :	eBPFShield - 
    
    	Sagar Bhure
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/29
    Tool Demo : Hitb Sec Conf 
 :	Mantis - 
    
    	Bharath Kumar
   	
    	Akshay Jain
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/08/30
    Talk : Hitb Sec Conf 
 :	Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles - 
    
    	Ravi Rajput
   	
    
    
    
    
    
    
    
    
    
   
  
  - 
    2024/09/20
    Talk : 44 Con 
 :	Unveiling the ghosts of mobile networks: When will old bugs die? - 
    
    	Altaf Shaik
   	
    
    
    
    
    
  
 
  
  - 
    2024/09/26
    Talk : Rootcon 
 :	How to have visibility and security OF CICD ecosystem - 
    
    	Pramod Rana
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/09/30
    Book :  
 :	Offensive Security Using Python - 
    
    	Rejah Rehim
   	
    	Manindar Mohan
   	
    
    
    
    
    
  
 
  
  - 
    2024/10/23
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cyber Arsenal47 - 
    
    	Simardeep Singh
   	
    
    
    
    
    
  
 
  
  - 
    2024/10/23
    Tool Demo : Blackhat 
 : Arsenal 
 :	DarkWidow: Customizable Dropper Tool Targeting Windows - 
    
    	Soumyanil Biswas
   	
    
    
    
    
    
  
 
  
  - 
    2024/10/23
    Tool Demo : Blackhat 
 : Arsenal 
 :	eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security - 
    
    	Sagar Bhure
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/10/23
    Talk : Blackhat 
 :	Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks - 
    
    	Shruti Ranjit
   	
    
     Mangatas Tondang
    
    
    
    
    
    
    
    
    
   
  
  - 
    2024/10/23
    Tool Demo : Blackhat 
 : Arsenal 
 :	R0fuzz: A Collaborative Fuzzer - 
    
    	Season Cherian
   	
    	Vishnu Dev
   	
    	Vivek N J
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/10/29
    Talk : Blackhat 
 :	Hacking Deepfake Image Detection System with White and Black Box Attacks - 
    
    	Sagar Bhure
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	[Yodha] Nightingale: Docker for Pentesters - 
    
    	Raja Nagori
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	[Yodha] RedCloud : A Multi-Cloud Hacking OS - 
    
    	Yash Bharadwaj
   	
    	Manish Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	[Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool - 
    
    	Gaurav Joshi
   	
    	Hare Krishna Rai
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	Automated Security Engineer Co-Pilot: Leveraging Large Language Models for Enhanced Code Security - 
    
    	Ashwath Kumar
   	
    	Hariprasad Pujari
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques - 
    
    	Adrip Mukherjee
   	
    	Vinay Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	CISO’s take on BYOAI - 
    
    	Venugopal Parameswara
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	GenAI and Autonomous Security in the Age of Zero Trust - 
    
    	Philip Varughese Vayarakunnil
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate - 
    
    	Kartik Lalan
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Panel : C0c0n 
 :	Intelligence led security - 
    
    	Midhun Babu
   	
    	Sameer Ratolikar
   	
    	M v Sheshadri
   	
    	A Shiju Rawther
   	
    	Maya R Nair
   	
    	Balakrishnan A
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	Know your Enemies: Deep Dive into Ransomware Threat Groups - 
    
    	Niranjan Jayanand
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	PCI 4.0, Javascript Security for product security teams - 
    
    	Anand Kumar Ganesan
   	
    	Mohammad Arif
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Talk : C0c0n 
 :	Remote Whispers of Mobile Sim - 
    
    	Vipin Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/15
    Panel : C0c0n 
 :	The Pager Attack: A Wake-Up Call for Global Cyber Defense Strategies - 
    
    	Aseem Jakhar
   	
    	M Nagarajan
   	
    	Tarun Wig
   	
    	Philip Varughese Vayarakunnil
   	
    	Nikhil Shrivastava
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Invisible Invaders: Bypassing Email Security with Legitimate Tools - 
    
    	Dhruv Bisani
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers - 
    
    	Nihar Sawant
   	
    	Jaydev Joshi
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Active Directory Deception Strategies - 
    
    	Madhukar Raina
   	
    	Sayan Mitra
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Breach of the borderless: Cyber threat actors targeting India’s cyberspace - 
    
    	Abhijith B R
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac - 
    
    	Ajay Sk
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	KEY NOTE - 
    
    	Navin Kumar Singh
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape - 
    
    	Dharani Sanjaiy
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Panel : C0c0n 
 :	Post-Quantum Security: Balancing Opportunities and Overcoming Challenges - 
    
    	Anant Shrivastava
   	
    	Sapan Talwar
   	
    	Ajit Hatti
   	
    	Sridhar Govardhan
   	
    	Abhilasha Vyas
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides - 
    
    	Rakesh Seal
   	
    	Diptisha Samanta
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Serverless Phishing Factory: Automate, Attack, Adapt - 
    
    	Yash Bharadwaj
   	
    	Manish Gupta
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	The Stealth Code Conspiracy: Unmasking Hidden Threats in CI/CD Pipelines - 
    
    	Arpith Rajagopal
   	
    	Suchith Narayan
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	The subtle art of checkmating CISOs - 
    
    	Sunil Varkey
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Panel : C0c0n 
 :	Transitioning from CTF to real world VAPT - 
    
    	Aseem Jakhar
   	
    	Akhilesh Variar
   	
    	Dhruv Bisani
   	
    	Anant Shrivastava
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	We got the Shiny SBoM; what next? - 
    
    	Anant Shrivastava
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/11/16
    Panel : C0c0n 
 :	When Falcon Strikes Back: The Defender’s Dilemma - 
    
    	Burgess Cooper
   	
    	Shivkumar Pandey
   	
    	A Shiju Rawther
   	
    	Padnya Manwar
   	
    	Kishan Kendre
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/16
    Talk : C0c0n 
 :	Who is holding the Marauders map? - 
    
    	Maya R Nair
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/21
    Talk : Deepsec 
 :	Hacking with Physics v2.0 - 
    
    	Hrishikesh Somchatwar
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/26
    Talk : Blackhat 
 :	Cyber Security & Resiliency: a perspective with emerging technologies and Innovation - 
    
    	Atul Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/26
    Tool Demo : Blackhat 
 : Arsenal 
 :	Halberd: Multi-Cloud Security Testing Tool - 
    
    	Arpan Abani Sarkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/11/26
    Talk : Blackhat 
 :	The Double Edge Sword - Cybersecurity & AI - 
    
    	Karmendra Kohli
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/26
    Talk : Blackhat 
 :	The Gen AI Double Agent Dilemma: Ally or Adversary - 
    
    	Lakshmi Hanspal
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/27
    Talk : Blackhat 
 :	AI-Powered Cybersecurity: Promises & Perils - 
    
    	Lakshmi Hanspal
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/27
    Panel : Blackhat 
 :	The State of VC in Cybersecurity - 
    
    	Lakshmi Hanspal
   	
    
     Mohammed Almeshekah
    
     Dr Arwa Alhamad
    
     Kais Al Essa
    
    
    
    
    
  
 
  
  - 
    2024/11/27
    Tool Demo : Blackhat 
 : Arsenal 
 :	Varunastra: Securing the Depths of Docker - 
    
    	Kunal Aggarwal
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/11/28
    Talk : Blackhat 
 :	Harnessing Language Models for Detection of Evasive Malicious Email Attachments - 
    
    	Abhishek Singh
   	
    	Kalpesh Mantri
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/28
    Talk : Blackhat 
 :	Threat Modelling the Generative AI - 
    
    	Atul Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2024/11/29
    Book :  
 :	Mastering Windows 365 - 
    
    	Sandeep Patnaik
   	
    
     Christiaan Brinkhoff
    
     Morten Pedholt
    
    
    
    
    
  
 
  
  - 
    2024/12/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Active Directory Cyber Deception using Huginn - 
    
    	Rohan Durve
   	
    
     Paul Laine
    
    
    
    
    
    
    
   
  
  - 
    2024/12/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Agneyastra - Firebase Misconfiguration Detection Toolkit - 
    
    	Bhavarth Karmarkar
   	
    	Devang Solanki
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel - 
    
    	Amit Parjapat
   	
    	Vedant Wayal
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	findmytakeover - find dangling domains in a multi cloud environment - 
    
    	Aniruddha Biyani
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	Open Source Tool to Shift Left Security Testing by Leveraging AI - 
    
    	Shivam Rawat
   	
    	Shivansh Agrawal
   	
    
    
    
    
    
  
 
  
  - 
    2024/12/11
    Tool Demo : Blackhat 
 : Arsenal 
 :	SCAGoat - Exploiting Damn Vulnerable SCA Application - 
    
    	Hare Krishna Rai
   	
    	Gaurav Joshi
   	
    	K v Prashant
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/11
    Talk : Blackhat 
 :	The CVSS Deception: How We’ve Been Misled on Vulnerability Severity - 
    
    	Ankur Sand
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Cloud Offensive Breach and Risk Assessment (COBRA) - 
    
    	Harsha Koushik
   	
    	Anand Tiwari
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Damn Vulnerable Browser Extension (DVBE) - Knowing the risks of your Browser Supplements - 
    
    	Abhinav Khanna
   	
    	Krishna Chaganti
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	DarkWidow: Customizable Dropper Tool Targeting Windows - 
    
    	Soumyanil Biswas
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Genzai - The IoT Security Toolkit - 
    
    	Umair Nehri
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	GoatPen: Hack, Hone, Harden - 
    
    	Nishant Sharma
   	
    	Shantanu Kale
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	Halberd : Cloud Security Testing Tool - 
    
    	Arpan Abani Sarkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Panel : Blackhat 
 :	Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024 - 
    
    	Vandana Verma Sehgal
   	
    
     Jeff Moss
    
     Stefano Zanero
    
     James Forshaw
    
     Meadow Ellis
    
    
    
    
    
  
 
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	MORF - Mobile Reconnaissance Framework - 
    
    	Amrudesh Balakrishnan
   	
    	Abhishek Jm
   	
    	Himanshu Das
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	MPT: Pentest In Action! - 
    
    	Jyoti Raval
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/12
    Tool Demo : Blackhat 
 : Arsenal 
 :	RedCloud OS : Cloud Adversary Simulation Operating System - 
    
    	Yash Bharadwaj
   	
    	Manish Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2024/12/20
    Book :  
 :	Cyber Security Kill Chain - Tactics and Strategies - 
    
    	Gourav Nagar
   	
    	Shreyas Kumar
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Panel : Nullcon 
 :	AI in SecOps: Enhancing Incident Response with Intelligence - 
    
    	Mrudul Uchil
   	
    	Parag Deodhar
   	
    	Felix Mohan
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Panel : Nullcon 
 :	AI versus AI : Reimagining Security Operation - 
    
    	Arnav Khorana
   	
    	Prithvi Raju Alluri
   	
    	Vinay Jain
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Panel : Nullcon 
 :	Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking - 
    
    	Krishna Pandey
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Panel : Nullcon 
 :	Converging IT and OT Security: Unified strategies for protection, detection and response - 
    
    	Burgess Cooper
   	
    	Kuldeep Singh
   	
    	Shailendra Fuloria
   	
    	Rohit Sharma
   	
    	Sachin Burman
   	
    	Yask Sharma
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Panel : Nullcon 
 :	Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense - 
    
    	Ajit Hatti
   	
    	Varun Singla
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Talk : Nullcon 
 :	Drawing parallels between iOS and macOS Pentesting with DVMA - 
    
    	Vaibhav Lakhani
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Talk : Nullcon 
 :	MacOS Lockdown Mode: A Forensic Deep Dive - 
    
    	Bhargav Rathod
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Talk : Nullcon 
 :	MLOps Under Attack: Threat Modeling Modern AI Systems - 
    
    	Sandeep Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/03/01
    Panel : Nullcon 
 :	Navigating Data Protection in the age of globalisation - 
    
    	Saikat Datta
   	
    	Krishan Dev
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/01
    Talk : Nullcon 
 :	Reversing Large Deep learning AI Models - 
    
    	Yashodhan Vivek Mandke
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/03/01
    Talk : Nullcon 
 :	The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties - 
    
    	Anto Joseph
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/03/02
    Talk : Nullcon 
 :	Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks - 
    
    	Shyam Kumar Arshid
   	
    	Chinmay Krishna
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/03/02
    Panel : Nullcon 
 :	Cyber Fusion Center: The Command Center for Integrated Cyber Defense - 
    
    	Avkash Kathiriya
   	
    	Mathan Babu Kasilingam
   	
    	Yogi Kapur
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Talk : Nullcon 
 :	Cyber Security from Telco lens - 
    
    	Sanjeev Dhallam
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Talk : Nullcon 
 :	eKYC Crisis: Securing the Lockers - 
    
    	Kartik Lalan
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Panel : Nullcon 
 :	Enterprise Readiness for Supply Chain Attacks - 
    
    	Sanjay Bahl
   	
    
     Cassie Crossley
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Panel : Nullcon 
 :	From Code to Defense: Why Developers Are the New Security Leaders - 
    
    	Vaibhav Gupta
   	
    	Vikas Goyal
   	
    	Hilal Lone
   	
    
     Gene Golovinsky
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Talk : Nullcon 
 :	Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms - 
    
    	Kumar Ashwin
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Panel : Nullcon 
 :	How can organisations protect themselves against Advanced Cyber Threats - 
    
    	Bithal Bhardwaj
   	
    	Vishal Salvi
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Talk : Nullcon 
 :	Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell - 
    
    	Alla Vamsi Krishna
   	
    	Kandi Abhishek Reddy
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Panel : Nullcon 
 :	Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? - 
    
    	Ketan Vyas
   	
    	Prajal Kulkarni
   	
    	Satyavathi Divadari
   	
    	Srihari Kotni
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Talk : Nullcon 
 :	Satellite Communications: Analyzing and Protecting Space-Based Assets - 
    
    	Drishti Jain
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Talk : Nullcon 
 :	Securing the chains: Building defensive layers for software supply chains - 
    
    	Yadhu Krishna M
   	
    	Akhil Mahendra
   	
    	Hritik Vijay
   	
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Panel : Nullcon 
 :	Tackling Automotive Hardware Vulnerabilities - 
    
    	Aseem Jakhar
   	
    	Sachin Jain
   	
    
     Adam Laurie
    
    
    
    
    
  
 
  
  - 
    2025/03/02
    Panel : Nullcon 
 :	Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships - 
    
    	Atul Kumar
   	
    	Savita Utreja
   	
    
    
    
    
    
  
 
  
  - 
    2025/04/03
    Talk : Blackhat 
 :	Cloud Security: Building Connections in the Cloud - 
    
    	Vandana Verma Sehgal
   	
    
     Lidia Giuliano
    
    
    
    
    
  
 
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	CompartIoT - 
    
    	Sreesankar S
   	
    	Aditya Krishna Vinod
   	
    	Season Cherian
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Talk : Blackhat 
 :	Determining Exploitability of Vulnerabilities with SBOM and VEX - 
    
    	Anusha Penumacha
   	
    	Srinija Kammari
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	Halberd : Multi-Cloud Security Testing Tool - 
    
    	Arpan Abani Sarkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	KubeSF V1.2 - Kubernetes Security Posture Audit Suite - 
    
    	Abhishek S
   	
    	Ajith Prabhu
   	
    
    
    
    
    
  
 
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	Mantis - Asset Discovery at Scale - 
    
    	Hitesh Thakur
   	
    	Praveen Kanniah
   	
    	Prateek Thakare
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	MobXplore - 
    
    	Aman Pareek
   	
    	Akarsh Singh
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Talk : Blackhat 
 :	ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! - 
    
    	Vivek Balachandran
   	
    
     Nikhil Bartake
    
     Zi Jie See Toh
    
     Michael Kasper
    
    
    
    
    
  
 
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	R0fuzz: A Collaborative Fuzzer - 
    
    	Season Cherian
   	
    	Anikait Panigrahi
   	
    	Aparna Balaji
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application - 
    
    	Hare Krishna Rai
   	
    	Gaurav Joshi
   	
    	K v Prashant
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	SmuggleShield 2.0 - Basic Protection Against HTML Smuggling - 
    
    	Dhiraj Mishra
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	SupplyShield: Protecting your software supply chain - 
    
    	Yadhu Krishna M
   	
    	Akhil Mahendra
   	
    	Hritik Vijay
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	Varunastra: Securing the Depths of Docker V2 - 
    
    	Devang Solanki
   	
    	Bhavarth Karmarkar
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/03
    Tool Demo : Blackhat 
 : Arsenal 
 :	VulnScout - 
    
    	Samaksh K
   	
    	Nimit Jain
   	
    
    
    
    
    
  
 
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Agneyastra - Firebase Misconfiguration Detection Toolkit V2 - 
    
    	Bhavarth Karmarkar
   	
    	Devang Solanki
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	CompartIoT - 
    
    	Sreesankar S
   	
    	Aditya Krishna Vinod
   	
    	Season Cherian
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Decoy Mutex - 
    
    	Madhukar Raina
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Intro to CICDGuard - How to have visibility and security OF CICD ecosystem - 
    
    	Pramod Rana
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	KernelGoat - 
    
    	Shivankar Madaan
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	Kubernetes Goat: A Hands-on Interactive Kubernetes Security Playground - 
    
    	Madhu Akula
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Panel : Blackhat 
 :	Locknote: Highlights & Key Takeaways from Black Hat Asia 2025 - 
    
    	Vandana Verma Sehgal
   	
    
     Daniel Cuthbert
    
     Ryan Flores
    
     Vitaly Kamluk
    
     Jeff Moss
    
     Asuka Nakajima
    
    
    
    
    
  
 
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	MORF - Mobile Reconnaissance Framework - 
    
    	Amrudesh Balakrishnan
   	
    	Abhishek Jm
   	
    	Himanshu Das
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	RedInfraCraft : Automate Complex Red Team Infra - 
    
    	Yash Bharadwaj
   	
    	Manish Gupta
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	SHIVA Spampot: Actionable Spam and Phishing Intelligence - 
    
    	Rahul Binjve
   	
    	Viren Kapadia
   	
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Talk : Blackhat 
 :	Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM - 
    
    	Vikas Gupta
   	
    
     Peter Garba
    
    
    
    
    
    
    
   
  
  - 
    2025/04/04
    Tool Demo : Blackhat 
 : Arsenal 
 :	TrackGuard: Browser Fingerprint Detection and Defence - 
    
    	Pankaj Sharma
   	
    	Yuvraj Khanna
   	
    	Ishan Verma