Hackers of India
Timeline
This page captures the listings in chronological order with latest on top.
-
1997/01/14
Book :
: The_anti_virus_book -
Saumil Shah
-
1998/07/29
Talk : Blackhat
: Security as an enabler for new business opportunities - The Business Value of Security -
Karan Khanna
-
2001/02/14
Talk : Blackhat
: Web Hacking -
Saumil Shah
-
2001/04/26
Talk : Blackhat
: Web Hacking -
Saumil Shah
-
2001/07/13
Talk : Defcon
: Security & Privacy are Critically Important Issues in Todays Digitally Connected Age -
Sharad Popli
-
2001/11/21
Talk : Blackhat
: One-Way SQL Hacking : Futility of Firewalls in Web Hacking -
Saumil Shah
-
2002/08/18
Book :
: Web Hacking: Attacks and Defense -
Saumil Shah
Shreeraj Shah
Stuart MC Clure
-
2002/10/03
Talk : Blackhat
: Top Ten Web Attacks -
Saumil Shah
-
2003/02/26
Talk : Blackhat
: HTTP: Advanced Assessment Techniques -
Saumil Shah
-
2003/07/31
Talk : Blackhat
: HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2003/10/01
Talk : Blackhat
: HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2003/12/12
Talk : Hitb Sec Conf
: Defending Web Applications: Strategies, methods and practices -
Shreeraj Shah
-
2003/12/12
Talk : Hitb Sec Conf
: New Generation Frauds -
Yerra Ravi Kiran Raju
-
2003/12/12
Talk : Hitb Sec Conf
: Threats to Wireless Networks - War Driving -
Anurana Saluja
-
2003/12/16
Talk : Blackhat
: HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2004/01/29
Talk : Blackhat
: HTTP Fingerprinting and Advanced Assessment Techniques -
Saumil Shah
-
2004/04/06
Community :
: Ring of Fire -
Debasis Mohanty
-
2004/05/19
Talk : Blackhat
: HTTP Fingerprinting and Advanced Assessment Techniques -
Saumil Shah
-
2004/07/28
Talk : Blackhat
: Defeating Automated Web Assessment Tools -
Saumil Shah
-
2004/07/29
Talk : Blackhat
: Evasion and Detection of Web Application Attacks -
K K Mookhey
-
2004/10/06
Talk : Hitb Sec Conf
: Web Services - Attacks and Defense Strategies, Methods and Tools -
Shreeraj Shah
-
2005/03/31
Talk : Blackhat
: Defeating Automated Web Assessment Tools -
Saumil Shah
-
2005/04/10
Talk : Hitb Sec Conf
: Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection -
Pukhraj Singh
-
2005/04/12
Talk : Hitb Sec Conf
: Web Application Kung-Fu, The Art of Defense -
Shreeraj Shah
-
2005/07/28
Talk : Blackhat
: Rapid Threat Modeling -
Akshay Aggarwal
-
2005/09/26
Talk : Hitb Sec Conf
: Web hacking Kung-Fu and Art of Defense -
Shreeraj Shah
-
2005/09/29
Talk : Hitb Sec Conf
: Analyzing Code for Security Defects -
Nish Bhalla
-
2005/09/29
Talk : Hitb Sec Conf
: Trends in Real World Attacks: A Compilation of Case Studies -
Rohyt Belani
-
2005/10/18
Talk : Blackhat
: Adware/Spyware -
Saumil Shah
Dave Cole
-
2006/01/26
Talk : Blackhat
: Analysis of Adversarial Code: Problem, Challenges, Results -
Arun Lakhotia
-
2006/04/13
Talk : Hitb Sec Conf
: Writing Metasploit Plugins - From Vulnerability to Exploit -
Saumil Shah
-
2006/08/02
Talk : Blackhat
: SQL Injections by Truncation -
Bala Neerumalla
-
2006/08/05
Talk : Defcon
: Zulu A Command Line Wireless Frame Generator -
Anmol Sheth
Damon Mccoy
-
2006/09/21
Talk : Hitb Sec Conf
: Finding Secrets in ISAPI -
Nish Bhalla
-
2006/09/21
Talk : Hitb Sec Conf
: Smashing the Stack for Profit - Period -
Rohyt Belani
-
2006/10/19
Talk : Hacklu
: Smashing Heap by Free Simulation: -
Sandip Chaudhari
-
2006/10/19
Talk : Hacklu
: Writing Metasploit plugins - from vulnerability to exploit -
Saumil Shah
-
2006/11/29
Talk : Pac Sec
: Smashing Heap by Free Simulation -
Sandip Chaudhari
-
2007/03/29
Talk : Blackhat
: Vboot Kit: Compromising Windows Vista Security -
Nitin Kumar
Vipin Kumar
-
2007/03/30
Talk : Blackhat
: Web Service Vulnerabilities -
Nish Bhalla
-
2007/04/04
Talk : Hitb Sec Conf
: Vboot Kit: Compromising Windows Vista Security -
Vipin Kumar
Nitin Kumar
-
2007/04/05
Talk : Hitb Sec Conf
: WEB 2.0 Hacking – Defending Ajax and Web Services -
Shreeraj Shah
-
2007/04/18
Talk : Can Sec West
: Low-Rate Denial-of-Service attacks -
Anil Kumar
-
2007/08/01
Talk : Blackhat
: PISA: Protocol Identification via Statistical Analysis -
Rohit Dhamankar
Rob King
-
2007/08/01
Talk : Blackhat
: Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones -
Krishna Kurapati
-
2007/08/02
Talk : Blackhat
: Smoke ’em Out! -
Rohyt Belani
-
2007/08/04
Talk : Defcon
: The Emperor Has No Cloak - WEP Cloaking Exposed -
Vivek Ramachandran
-
2007/09/06
Talk : Hitb Sec Conf
: Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise -
Shreeraj Shah
-
2007/11/20
Talk : Deepsec
: Web 2.0 Application Kung-Fu - Securing Ajax & Web Services -
Shreeraj Shah
-
2007/12/09
Talk : Clubhack
: 7 years of Indian IT act - 7 Best Cases -
Rohas Nagpal
-
2007/12/09
Talk : Clubhack
: Analysis of Adversarial Code: The Role of Malware Kits! -
Rahul Mohandas
-
2007/12/09
Talk : Clubhack
: Hacking Web 2.0 Art and Science of Vulnerability Detection -
Shreeraj Shah
-
2007/12/09
Talk : Clubhack
: Legiment Techniques of IPS/IDS Evasion -
Ajit Hatti
-
2007/12/09
Talk : Clubhack
: Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? -
Chetan Gupta
-
2007/12/09
Talk : Clubhack
: Subtle Security flaws: Why you must follow the basic principles of software security -
Varun Sharma
-
2007/12/09
Talk : Clubhack
: The future of automated web application testing -
Amish Shah
Umesh Nagori
-
2007/12/09
Talk : Clubhack
: Vulnerabilities in VoIP Products and Services -
Gaurav Saha
-
2007/12/19
Talk : Clubhack
: Backdoor 2.0: Hacking Firefox to steal his web secrets -
Sunil Arora
-
2008/02/20
Talk : Blackhat
: Hacking VoIP through IPSec Tunnels -
Sachin Joglekar
Sudeep Patwardhan
-
2008/02/20
Talk : Blackhat
: Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools -
Shreeraj Shah
-
2008/03/26
Talk : Can Sec West
: Vulnerabilities Die Hard -
Kowsik Guruswamy
-
2008/03/27
Talk : Blackhat
: Iron Chef Black Hat: John Henry Challenge -
Pravir Chandra
Jacob West
Brian Chess
Sean Fay
-
2008/03/28
Talk : Blackhat
: Spam-Evolution -
Aseem Jakhar
-
2008/04/16
Talk : Hitb Sec Conf
: Securing Next Generation Applications – Scan, Detect and Mitigate -
Shreeraj Shah
-
2008/08/07
Talk : Blackhat
: Got Citrix, Hack It! -
Shanit Gupta
-
2008/08/09
Talk : Defcon
: Autoimmunity Disorder in Wireless LAN -
Jvr Murthy
Amit Vartak
Md Sohail Ahmad
-
2008/08/20
Talk : Owasp App Sec India
: Application Security Trends & Challenges -
Kamlesh Bajaj
-
2008/08/20
Talk : Owasp App Sec India
: Building Enterprise AppSec Program -
Nish Bhalla
-
2008/08/20
Talk : Owasp App Sec India
: Case Study: Testing 200+ applications in a $10 Billion Enterprise -
Roshen Chandran
-
2008/08/20
Talk : Owasp App Sec India
: Web 2.0 Attacks - Next Generation Threats on the Rise -
Shreeraj Shah
-
2008/08/20
Talk : Owasp App Sec India
: Web Application Security: Too Costly To Ignore -
Rajesh Nayak
-
2008/08/21
Talk : Owasp App Sec India
: AppSec For Managers -
Nish Bhalla
-
2008/10/22
Talk : Hacklu
: Browser Exploits - A new model for Browser security -
Saumil Shah
-
2008/10/29
Talk : Hitb Sec Conf
: Browser Exploits - A New Model for Browser Security -
Saumil Shah
-
2008/10/29
Talk : Hitb Sec Conf
: Top 10 Web 2.0 Attacks -
Shreeraj Shah
-
2008/11/13
Talk : Deepsec
: Game of Web 2.0 Security - Attacking Next Generation Apps -
Shreeraj Shah
-
2008/12/06
Talk : Clubhack
: AntiSpam - Understanding the good, the bad and the ugly -
Aseem Jakhar
-
2008/12/06
Talk : Clubhack
: Economic offenses through Credit Card Frauds Dissected -
Harshad Patil
-
2008/12/06
Talk : Clubhack
: Hacking Client Side Insecurities -
Aditya K Sood
-
2008/12/06
Talk : Clubhack
: Immune IT: Moving from Security to Immunity -
Ajit Hatti
-
2008/12/06
Talk : Clubhack
: Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching -
Karmendra Kohli
-
2008/12/06
Talk : Clubhack
: Introduction to backtrack -
Kunal Sehgal
-
2008/12/06
Talk : Clubhack
: Reverse Engineering for exploit writers -
Nibin Varghese
-
2008/12/06
Talk : Clubhack
: Reverse Engineering v/s Secure Coding -
Atul Alex
-
2008/12/06
Talk : Clubhack
: State of Cyber Law in India -
Rohas Nagpal
-
2009/02/19
Talk : Blackhat
: Blinded by Flash: Widespread Security Risks Flash Developers Don’t See -
Prajakta Jagdale
-
2009/03/16
Talk : Can Sec West
: On Approaches and Tools for Automated Vulnerability Analysis -
Tanmay Ganacharya
Abhishek Singh
Swapnil Bhalode
Nikola Livic
Scott Lambert
-
2009/04/22
Talk : Hitb Sec Conf
: Application Defense Tactics & Strategies - WAF at the Gateway -
Shreeraj Shah
-
2009/04/22
Talk : Troopers
: Browser Design Flaws – Hacking by Breaking in Architectures -
Aditya K Sood
-
2009/04/22
Talk : Hitb Sec Conf
: Pwnage 2.0 -
Saumil Shah
-
2009/04/22
Talk : Troopers
: SQL Injections: More Fun and Profit -
Sumit Siddharth
-
2009/04/22
Talk : Hitb Sec Conf
: Vbootkit 2.0: Attacking Windows 7 via Boot Sectors -
Nitin Kumar
Vipin Kumar
-
2009/05/19
Talk : Syscan
: Securing Applications at Gateway with Web Application Firewalls -
Shreeraj Shah
-
2009/05/19
Talk : Syscan
: Securing Enterprise Applications -
Shreeraj Shah
-
2009/07/31
Talk : Defcon
: Advancing Video Application Attacks with Video Interception, Recording, and Replay -
Arjun Sambamoorthy
Jason Ostrom
-
2009/08/01
Talk : Defcon
: The Making of the second SQL injection Worm -
Sumit Siddharth
-
2009/08/02
Talk : Defcon
: Wi-Fish Finder: Who Will Bite the Bait -
Md Sohail Ahmad
Prabhash Dhyani
-
2009/08/06
Talk : C0c0n
: Cyber Forensics -
Krishna Sastry Pendyal
-
2009/08/06
Talk : C0c0n
: Cyber Victimisation -
K Jaishankar
-
2009/08/06
Talk : C0c0n
: Information Security Audit -
Venkatapathy Subramaniam
-
2009/08/06
Talk : C0c0n
: Information security management practices - Technical issues and the impact of risk management. -
Kp Paulson
-
2009/08/06
Talk : C0c0n
: Information Warfare -
A a Gafoor
Vinayak Mishra
-
2009/08/06
Talk : C0c0n
: Know Your Enemy, and Yourself: Demystifying Threat Modelin -
Meera Subbarao
-
2009/08/06
Talk : C0c0n
: Management & Security of Large Scale Storage Devices -
Prashant Dinde
-
2009/08/06
Talk : C0c0n
: Microsoft Security Strategies -
Binoy VC
-
2009/08/06
Talk : C0c0n
: Network Intrusions and Hacking -
Manu Zacharia
-
2009/10/07
Talk : Hitb Sec Conf
: How to Own the World – One Desktop at a Time -
Saumil Shah
-
2009/10/28
Talk : Hacklu
: Ownage 2.0 -
Saumil Shah
-
2009/11/17
Talk : Securitybyte
: Applications - The new cyber security frontier -
Mano Paul
-
2009/11/17
Talk : Securitybyte
: Behind the scenes at the MSRC -
Suresh Venkateswaran
Dave Midturi
-
2009/11/17
Talk : Securitybyte
: Business Case-Risk Management/Compliance at AMITY -
Dr Js Sodhi
-
2009/11/17
Talk : Securitybyte
: Business Continuity Case Study -
Venkataram Arabolu
-
2009/11/17
Talk : Securitybyte
: Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
Lavakumar Kuppan
-
2009/11/17
Talk : Securitybyte
: Threat Modeling -
Varun Sharma
-
2009/11/17
Talk : Securitybyte
: Usability and Privacy in Security -
Ponnurangam Kumaraguru
-
2009/11/17
Talk : Securitybyte
: Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors -
Nitin Kumar
Vipin Kumar
-
2009/11/18
Talk : Securitybyte
: Cloud Hacking – Distributed Attack & Exploit Platform -
Shreeraj Shah
-
2009/11/18
Talk : Securitybyte
: Hacking Oracle From Web -
Sumit Siddharth
-
2009/11/18
Talk : Securitybyte
: Introduction to Web Protection Library -
Anil Chintala
-
2009/11/18
Talk : Securitybyte
: Risk based Penetration Testing -
K K Mookhey
-
2009/11/18
Talk : Securitybyte
: Rumbling Infections – Web Malware Ontology -
Aditya K Sood
-
2009/11/19
Talk : Deepsec
: Ownage 2.0 -
Saumil Shah
-
2009/11/19
Talk : Deepsec
: Top 10 Security Issues Developers Don’t Know About -
Neelay S Shah
-
2009/12/04
Talk : Clubhack
: Facilitate Collaboration with Information Rights Management -
Abhijit Tannu
-
2009/12/05
Talk : Clubhack
: India Cyber Crime Scene - Caught in the Crossfire -
Vinoo Thomas
Rahul Mohandas
-
2009/12/05
Talk : Clubhack
: Advance Computer Forensic concepts (windows) -
Kush Wadhwa
-
2009/12/05
Talk : Clubhack
: Incident Handling and Log Analysis for Web Based Incidents -
Manindra Kishore
-
2009/12/05
Talk : Clubhack
: Indian IT Act 2000 vs 2009 -
Rohas Nagpal
-
2009/12/05
Talk : Clubhack
: Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
Lavakumar Kuppan
-
2009/12/05
Talk : Clubhack
: Mobile Application Security Testing -
Gursev Singh Kalra
-
2009/12/05
Talk : Clubhack
: Open source for securing data with advanced Crypto-Steganography technology -
Suhas Desai
-
2009/12/05
Talk : Clubhack
: Revealing the Secrets: Source Code Disclosure, Techniques and Impacts -
Anant Kochhar
-
2009/12/05
Talk : Clubhack
: Risk Based Penetration Testing -
Nikhil Wagholikar
K K Mookhey
-
2010/02/03
Talk : Blackhat
: Beware of Serialized GUI Objects Bearing Data -
Rohini Sulatycki
David Byrne
-
2010/02/25
Talk : Nullcon
: Software Fuzzing with Wireplay. -
Abhisek Datta
-
2010/02/25
Talk : Nullcon
: Botnet mitigation, monitoring and management. -
Harshad Patil
-
2010/02/25
Talk : Nullcon
: Imposter ke karnamey: The Browser Phishing Tool. -
Lavakumar Kuppan
-
2010/02/25
Talk : Nullcon
: Intelligent debugging and in memory fuzzing. -
Vishwas Sharma
Amandeep Bharti
-
2010/02/25
Talk : Nullcon
: Malware Detection Tool for Websites: A Proof-Of-Concept -
Anant Kochhar
-
2010/02/25
Talk : Nullcon
: Penetration Testing versus Source Code -
Nikhil Wagholikar
-
2010/02/25
Talk : Nullcon
: Quantum Computing Challenges in the field of security -
Navin Pai
-
2010/02/25
Talk : Nullcon
: Steganography & Stegananalysis: A Technical & Psychological Perspective -
Prince Komal Boonlia
Reena Bhansali
-
2010/03/02
Award :
: Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution -
Lavakumar Kuppan
-
2010/04/14
Talk : Blackhat
: Attacking JAVA Serialized Communication -
Manish Saindane
-
2010/04/21
Talk : Hitb Sec Conf
: Web Security – Going Nowhere? -
Saumil Shah
-
2010/06/18
Talk : Syscan
: REVERSE ENGINEERING WEB 2.0 APPLICATIONS -
Shreeraj Shah
-
2010/07/01
Talk : Hitb Sec Conf
: The Travelling Hacksmith 2009 – 2010 -
Saumil Shah
-
2010/07/01
Talk : Hitb Sec Conf
: Top 10 Web 2.0 Attacks and Exploits -
Shreeraj Shah
-
2010/07/29
Talk : Blackhat
: Hacking Browser’s DOM - Exploiting Ajax and RIA -
Shreeraj Shah
-
2010/07/29
Talk : Blackhat
: Hacking Oracle From Web Apps -
Sumit Siddharth
-
2010/07/31
Talk : Defcon
: WPA Too! -
Md Sohail Ahmad
-
2010/08/01
Talk : C0c0n
: Client Side Exploits using PDF -
Ankur Bhargava
Tamaghna Basu
-
2010/08/01
Talk : C0c0n
: Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study -
Krishnakumar Kottekkat
Whiteknight
-
2010/08/01
Talk : C0c0n
: Code Disclosure over HTTP -
Anant Kochhar
-
2010/08/01
Talk : C0c0n
: Concept, Methodology and Challenges in Computer Forensics -
Sebastian Edassery
-
2010/08/01
Talk : C0c0n
: Dangers and dynamic Malware analysis -
Dr Chandrasekar
-
2010/08/01
Talk : C0c0n
: End-point Security -
Laxi Eshwari
-
2010/08/01
Talk : C0c0n
: Hackers’ EcoSystem in India -
Rohit Srivastwa
-
2010/08/01
Talk : C0c0n
: Horses, Rats and Bots -
Jayaram Ramesh
-
2010/08/01
Talk : C0c0n
: Last line of defense - Host Intrusion Prevention and Secure application development. -
Avinash Shenoi
-
2010/08/01
Talk : C0c0n
: Mobile Security -
Suhas Desai
-
2010/08/01
Talk : C0c0n
: Overview of Cyber Legal Systems in India -
Sagar Rahurkar
-
2010/08/01
Talk : C0c0n
: VoIP Security -
Mukund Krishnamurthy
-
2010/08/01
Talk : C0c0n
: Wireless MITM -
Prashant Mahajan
-
2010/08/01
Talk : C0c0n
: Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle -
Praseed Pai
-
2010/10/13
Talk : Hitb Sec Conf
: Hacking a Browser’s DOM – Exploiting Ajax and RIA -
Shreeraj Shah
-
2010/10/14
Talk : Hitb Sec Conf
: Exploit Delivery -
Saumil Shah
-
2010/10/27
Talk : Hacklu
: Exploit Delivery - Tricks and Techniques -
Saumil Shah
-
2010/11/25
Talk : Deepsec
: Developers are from Mars, Compliance Auditors are from Venus -
Neelay S Shah
-
2010/12/04
Talk : Clubhack
: Attacking with HTML5 -
Lavakumar Kuppan
-
2010/12/04
Talk : Clubhack
: Data theft in India -
K K Mookhey
-
2010/12/04
Talk : Clubhack
: Firefox Security! -
Prasanna Kanagasabai
-
2010/12/04
Talk : Clubhack
: Mantra – Free and Open Source security framework based on browser platform -
Abhi M Balakrishnan
-
2010/12/04
Talk : Clubhack
: Ultimate Pen Test – Compromising a highly secure environment -
Nikhil Mittal
-
2010/12/04
Talk : Clubhack
: Windows Memory Forensic Analysis -
Aashish Kunte
-
2011/02/15
Talk : Nullcon
: Botnet Detection approach by DNS behavior and clustering analysis -
Nilesh Sharma
Pulkit Mehndiratta
-
2011/02/25
Talk : Nullcon
: (secure) SiteHoster – Disable XSS & SQL Injection -
Abhishek Kumar
-
2011/02/25
Talk : Nullcon
: Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) -
Sunil Kumar
-
2011/02/25
Talk : Nullcon
: Buffer Under Run Exploits -
Saurabh Sharma
Chinmaya Kamal
-
2011/02/25
Talk : Nullcon
: Chupa Rustam -
Abhijeet Hatekar
-
2011/02/25
Talk : Nullcon
: Cyber Crime 101 - Cost of cybercrime, trends & analysis -
Simran Gambhir
Cn Shashidhar
-
2011/02/25
Talk : Nullcon
: Enterprise Paradigm for Controlling Data Leakage -
Deepak Rout
-
2011/02/25
Talk : Nullcon
: Future of cyber crimes: Limitations and Challenges -
Pratap Reddy
-
2011/02/25
Talk : Nullcon
: Fuzzing with complexities -
Vishwas Sharma
-
2011/02/25
Talk : Nullcon
: Hacking the Parliament – A classic Social Engineering attack -
Anurag Dhanda
-
2011/02/25
Talk : Nullcon
: Incident Management and Beyond -
Dinesh O Bareja
-
2011/02/25
Talk : Nullcon
: JSON Fuzzing: New approach to old problems -
K v Prashant
Tamaghna Basu
-
2011/02/25
Talk : Nullcon
: Jugaad Beta: Linux Thread Injection malware PoC -
Aseem Jakhar
-
2011/02/25
Talk : Nullcon
: Lessons Learned From 2010 -
Saumil Shah
-
2011/02/25
Talk : Nullcon
: Penetration Testing a Biometric System -
Rahul Sasi
-
2011/02/25
Talk : Nullcon
: Protect infrastructure or protect information – Lessons from Wikileaks -
Vishal Gupta
-
2011/02/25
Talk : Nullcon
: Reversing microsoft patches to reveal vulnerable code -
Harsimran Singh Walia
-
2011/02/25
Talk : Nullcon
: Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower -
Hari Krishna Prasad Vemuru
-
2011/02/25
Talk : Nullcon
: SSLSmart – Smart SSL Cipher Enumeration -
Gursev Singh Kalra
-
2011/03/30
Talk : Troopers
: Femtocell: Femtostep to the Holy Grail -
Ravishankar Borgaonkar
Kevin Redon
-
2011/05/19
Talk : Hitb Sec Conf
: Spying on SpyEye – What Lies Beneath? -
Aditya K Sood
-
2011/05/20
Talk : Hitb Sec Conf
: Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) -
Shreeraj Shah
-
2011/08/03
Talk : Blackhat
: Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS -
Jatin Kataria
Ang Cui
Salvatore Stolfo
-
2011/08/03
Talk : Blackhat
: Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex -
Shreeraj Shah
-
2011/08/05
Talk : Defcon
: Jugaad – Linux Thread Injection Kit -
Aseem Jakhar
-
2011/08/07
Talk : Defcon
: VDLDS — All Your Voice Are Belong To Us -
Ganesh Devarajan
Don Le Bert
-
2011/09/06
Talk : Securitybyte
: Botnets at Application+ layer -
Raj Shastrakar
-
2011/09/06
Talk : Securitybyte
: Enabling Un-trusted Mashups -
Bishan Singh
-
2011/09/06
Talk : Securitybyte
: Private Internet Circuits - Towards A Next Generation Internet -
Sanjay Deshpande
-
2011/09/06
Talk : Securitybyte
: Runtime thread injection and execution in Linux processes -
Aseem Jakhar
-
2011/09/06
Talk : Securitybyte
: Security Threats on Social Networks -
Nithya Raman
-
2011/09/06
Talk : Securitybyte
: Using Data Analytics for Incident Response -
Samir Saklikar
-
2011/09/06
Talk : Securitybyte
: Application Security Strategies -
K K Mookhey
-
2011/09/07
Talk : Securitybyte
: Data Protection -
Dipankar Roy
-
2011/09/07
Talk : Securitybyte
: Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit -
Vivek Ramachandran
-
2011/09/07
Talk : Securitybyte
: IronWASP - A Web Application Security Testing Platform -
Lavakumar Kuppan
-
2011/09/07
Talk : Securitybyte
: Mobile Devices – Boon or Curse? -
Kishor Sonawane
Oliver Ng
-
2011/09/07
Talk : Securitybyte
: Social Web & Privacy – An evolving world -
Bala Sathiamurthy
Aridaman Tripathi
-
2011/09/07
Talk : Securitybyte
: Web Application Defender -
K v Prashant
Mohammed Imran
-
2011/09/19
Talk : Brucon
: Botnets and Browsers, Brothers in a Ghost Shell -
Aditya K Sood
-
2011/09/19
Talk : Hacklu
: Linux thread injection - The jugaad way -
Aseem Jakhar
-
2011/09/19
Talk : Brucon
: Step-by-Step for Software Security (that anyone can follow) -
Pravir Chandra
-
2011/09/19
Talk : Hacklu
: The travelling hacksmith -
Saumil Shah
-
2011/09/19
Talk : Brucon
: Wifi malware for fun and profit -
Vivek Ramachandran
-
2011/10/07
Talk : C0c0n
: Automated Malware Analysis - Setting up the Environment -
K v Prashant
Pushkar Pashupat
-
2011/10/07
Talk : C0c0n
: Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications -
Riyaz Walikar
-
2011/10/07
Talk : C0c0n
: Digital Evidence -
Sushanth Samudrala
-
2011/10/07
Talk : C0c0n
: Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution -
Ahamed Nafeez
-
2011/10/07
Talk : C0c0n
: iPhone Jailbreak -
Antriksh Shah
-
2011/10/07
Talk : C0c0n
: Mobile Security -
Santosh Satam
-
2011/10/07
Talk : C0c0n
: Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network -
Bala Kumar S
Mohamed Emraanullah
-
2011/10/07
Talk : C0c0n
: Paranoid Android -
Ankur Bhargava
Migresh
-
2011/10/07
Talk : C0c0n
: Password Less Authentication, Authorization -
Srikar Sagi
-
2011/10/07
Talk : C0c0n
: Pentesting iPhone Applications -
Satish Bommisetty
-
2011/10/07
Talk : C0c0n
: Runtime thread injection and execution in Linux processes -
Aseem Jakhar
-
2011/10/07
Talk : C0c0n
: Section 43A IT Act compliance -
Sagar Rahurkar
-
2011/10/07
Talk : C0c0n
: Secure HTTP Headers or How I can finally convince management to let go of IE6 -
Akash Mahajan
-
2011/10/07
Talk : C0c0n
: Security and Privacy Risks of Cloud Computing -
Vishnu Tiwari
-
2011/10/07
Talk : C0c0n
: Security Threats in Custom ROM’s (Android) -
Anant Shrivastava
-
2011/10/07
Talk : C0c0n
: Web Application Backdoor Attack,Evasion and Detection -
Rahul Sasi
-
2011/10/07
Talk : C0c0n
: Wi-Fi Malware for Fun and Profit -
Vivek Ramachandran
-
2011/10/08
Talk : C0c0n
: Stratagemizing Security Against Perpetrators In Cloud Infrastructure -
K S Abhiraj
-
2011/10/13
Talk : Hitb Sec Conf
: Femtocells: A Poisonous Needle in the Operator’s Hay Stack -
Ravishankar Borgaonkar
Kevin Redon
Nico Golde
-
2011/10/13
Talk : Hitb Sec Conf
: Web Wars 3 -
Saumil Shah
-
2011/11/04
Talk : Hackfest
: Here are your keystrokes -
Nikhil Mittal
-
2011/11/17
Talk : Deepsec
: Behavioral Security: 10 steps forward 5 steps backward -
Sourabh Satish
-
2011/11/17
Award :
: CAPTCHA Hax With TesserCap -
Gursev Singh Kalra
-
2011/11/17
Talk : Deepsec
: FakeAntiVirus - Journey from Trojan to a Persisent Threat -
Jagadeesh Chandraiah
-
2011/11/25
Talk : Malcon
: Advanced Malware for Apple Products -
Atul Alex
-
2011/11/25
Talk : Malcon
: Exploit the Exploit kits -
Dhruv Soi
-
2011/11/25
Talk : Malcon
: Mareech : Look it’s a HID made up of gold -
Nikhil Mittal
-
2011/12/04
Talk : Clubhack
: Pen testing Mobile Applications -
Prashant Verma
-
2011/12/04
Talk : Clubhack
: Android Forensics -
Manish Chasta
-
2011/12/04
Talk : Clubhack
: Android Tamer -
Anant Shrivastava
-
2011/12/04
Talk : Clubhack
: DOM XSS – Encounters of the 3rd Kind -
Bishan Singh
-
2011/12/04
Talk : Clubhack
: Exploit the Exploit Kits -
Dhruv Soi
-
2011/12/04
Talk : Clubhack
: Hacking your Droid -
Aditya Gupta
-
2011/12/04
Talk : Clubhack
: Handle Exploitation of Remote System From Email Account -
Bhaumik Merchant
-
2011/12/04
Talk : Clubhack
: Mere paas Teensy hai -
Nikhil Mittal
-
2011/12/04
Talk : Clubhack
: One Link Facebook -
Anand Pandey
-
2011/12/14
Talk : Blackhat
: SCADA Security - Why Is It So Hard? -
Amol Sarwate
-
2011/12/15
Talk : Blackhat
: Kautilya: Teensy Beyond Shell -
Nikhil Mittal
-
2012/02/15
Talk : Nullcon
: Application security cost management -
Ketan Vyas
-
2012/02/15
Talk : Nullcon
: Attacking Backup Software -
Nibin Varghese
-
2012/02/15
Talk : Nullcon
: Best practices to improve the security grading of your project -
Hemant Khandelwal
-
2012/02/15
Talk : Nullcon
: Binary God -
Atul Alex
-
2012/02/15
Talk : Nullcon
: CAPTCHAs for fun and Profit -
Gursev Singh Kalra
-
2012/02/15
Talk : Nullcon
: Content sniffing Algorithm bypassing techniques and possible attack vectors -
Anil Aphale
Chaitany Kamble
-
2012/02/15
Talk : Nullcon
: Cyberspace: Global commons or a national asset -
Kamlesh Bajaj
-
2012/02/15
Talk : Nullcon
: Friction in the machine -
Dinesh Shenoy
-
2012/02/15
Talk : Nullcon
: Haxdroid: Empowering Android Handset -
Anant Shrivastava
Prashant Mahajan
Pardhasaradhi Ch
-
2012/02/15
Talk : Nullcon
: IVR Security: Internal Network attacks via phone lines -
Rahul Sasi
-
2012/02/15
Talk : Nullcon
: Javascript static analysis with IronWASP -
Lavakumar Kuppan
-
2012/02/15
Talk : Nullcon
: Node.js: The good, bad and ugly -
Bishan Singh
-
2012/02/15
Talk : Nullcon
: Open source revolution :Need Hardware - Software marriage -
Dr Venkatesh
-
2012/02/15
Talk : Nullcon
: Ra.2 Blackbox DOM-based XSS scanner -
Nishant Das Patnaik
Sarathi Sabyasachi Sahoo
-
2012/02/15
Talk : Nullcon
: Sandboxing The deep truth -
Disha Agarwal
Manish Pali
-
2012/02/15
Talk : Nullcon
: SCADA Security: Why is it so hard -
Amol Sarwate
-
2012/02/15
Talk : Nullcon
: Shall we dust Beep? The Geo-strategic realities of Cyberwar -
Pukhraj Singh
-
2012/02/15
Talk : Nullcon
: Teensy for fun and jugaad -
Amey Gat
-
2012/02/15
Talk : Nullcon
: Your phone is your phone but your calls are now my calls -
Akib Sayyed
Bipul Sahu
Dipesh Goyal
Nitin Agarwal
-
2012/03/02
Award :
: CAPTCHA Re-Riding Attack -
Gursev Singh Kalra
-
2012/03/14
Talk : Blackhat
: Hacking XPATH 2.0 -
Sumit Siddharth
Tom Forbes
-
2012/03/14
Talk : Blackhat
: HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/03/16
Talk : Blackhat
: IVR Security- Internal Network Attack via Phone Lines -
Rahul Sasi
-
2012/03/16
Talk : Blackhat
: The Pwnage Saga Continues -
Nikhil Mittal
-
2012/03/21
Talk : Troopers
: More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard -
Nikhil Mittal
-
2012/05/24
Talk : Hitb Sec Conf
: CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants -
Rahul Sasi
-
2012/07/26
Talk : Blackhat
: HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/07/28
Talk : Defcon
: Botnets Die Hard - Owned and Operated -
Aditya K Sood
Richard J Enbody
-
2012/08/03
Talk : C0c0n
: A model to reduce information security risks due to human error -
Anup Narayanan
-
2012/08/03
Talk : C0c0n
: Building Security Incident Detection & Handling Capabilities in Enterprises -
Sunil Varkey
-
2012/08/03
Talk : C0c0n
: Business Continuity and Risk Management in Turbulent Times -
Venkataram Arabolu
-
2012/08/03
Talk : C0c0n
: Contemporary Transcription and Resource Parasitism -
Arpit Patel
-
2012/08/03
Talk : C0c0n
: Cracking the Mobile Application Source Code -
Sreenarayan Ashokkumar
-
2012/08/03
Talk : C0c0n
: Easy Money with UI-Redressing -
Amol Naik
-
2012/08/03
Talk : C0c0n
: Enterprise server security -
Raghav Shandilya
-
2012/08/03
Talk : C0c0n
: Evil JavaScript -
Bishan Singh
-
2012/08/03
Talk : C0c0n
: Gathering security requirements -
K v Prashant
Saleem Ahamed
-
2012/08/03
Talk : C0c0n
: I haz you and pwn your maal -
Harsimran Singh Walia
-
2012/08/03
Talk : C0c0n
: Layer 8 Exploitation: A threat to National Security -
Aakash Goel
-
2012/08/03
Talk : C0c0n
: Security Incidents – Avoiding the Apocalypse in 2012 -
Ashish Chandra Mishra
-
2012/08/03
Talk : C0c0n
: The Management of Information Security – A Corporate Practitioner’s Perspective -
Pawan Kumar Singh
-
2012/08/03
Talk : C0c0n
: The Weakest Link - Reinforcing the Human Element -
Sandeep Godbole
-
2012/08/03
Talk : C0c0n
: WebApp Remote Code Execution using Server Side Scripting Engines -
Rahul Sasi
-
2012/08/15
Award :
: Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select) -
Gursev Singh Kalra
-
2012/09/05
Talk : 44 Con
: Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? -
Jitender Arora
-
2012/09/20
Talk : Ekoparty
: Dirty use of USSD Codes in Cellular Network -
Ravishankar Borgaonkar
-
2012/09/20
Talk : Ekoparty
: Fuzzing DTMF Input Processing Algorithms -
Rahul Sasi
-
2012/09/26
Talk : Nullcon
: Forensics Timeline Analysis -
Aashish Kunte
-
2012/09/26
Talk : Nullcon
: Highly Harmful Audio Waves aka DTMF Fuzzing -
Rahul Sasi
-
2012/09/26
Talk : Nullcon
: How secure is internet banking in India -
Ajit Hatti
-
2012/09/26
Talk : Nullcon : Delhi
: Nullcon_delhi_2012 -
Prasanna Kanagasabai
-
2012/09/26
Talk : Nullcon
: Opening the kimono: Automating behavioral analysis for mobile apps -
Pradeep Kulkarni
Michael Sutton
-
2012/09/26
Talk : Nullcon
: The art of Passive Web Vul Analysis with IronWASP -
Lavakumar Kuppan
-
2012/09/27
Talk : Grrcon
: The Realm of Third Generation Botnet Attacks -
Aditya K Sood
Dr. Richard J Enbody
-
2012/10/10
Talk : Hitb Sec Conf
: Innovative Approaches to Exploit Delivery -
Saumil Shah
-
2012/10/11
Talk : Hitb Sec Conf
: XSS & CSRF strike back – Powered by HTML5 -
Shreeraj Shah
-
2012/10/23
Talk : Hacklu
: Buster: Android Security Buster -
Atul Alex
-
2012/11/07
Award :
: Cross Site Port Attack (XSPA) -
Riyaz Walikar
-
2012/11/23
Talk : Malcon
: Advanced Malware Engine -
Mohit Kumar
-
2012/11/23
Talk : Malcon
: Advances in ROP attacks -
Raashid Bhat
-
2012/11/23
Talk : Malcon
: Surprise paper! -
Atul Alex
-
2012/11/23
Talk : Malcon
: Tampering in Energy Meters -
Mohit Arora
-
2012/11/23
Talk : Malcon
: Windows Phone 8 Malware Prototype -
Shantanu Gawde
-
2012/11/29
Talk : Deepsec
: Bad Things in Good Packages - Creative Exploit Delivery -
Saumil Shah
-
2012/12/01
Talk : Clubhack
: Content-Type attack -Dark hole in the secure environment -
Raman Gupta
-
2012/12/01
Talk : Clubhack
: Detecting and Exploiting XSS with Xenotix XSS Exploit Framework -
Ajin Abraham
-
2012/12/01
Talk : Clubhack
: Real Time Event Recording System, the tool for Digital Forensics Investigation -
Madhav Limaye
-
2012/12/01
Talk : Clubhack
: Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher -
Vishal Kalro
-
2012/12/01
Talk : Clubhack
: FatCat Web Based SQL Injector -
Sandeep Kamble
-
2012/12/01
Talk : Clubhack
: Hacking and Securing iOS applications -
Satish Bommisetty
-
2012/12/01
Talk : Clubhack
: HAWAS – Hybrid Analyzer for Web Application Security -
Lavakumar Kuppan
-
2012/12/01
Talk : Clubhack
: Infrastructure Security -
Sivamurthy Hiremath
-
2012/12/01
Talk : Clubhack
: Legal Nuances to the Cloud -
Ritambhara Agrawal
-
2012/12/01
Talk : Clubhack
: Smart Grid Security -
Falgun Rathod
-
2012/12/01
Talk : Clubhack
: Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC -
Aditya Gupta
Subho Halder
-
2012/12/01
Talk : Clubhack
: The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being -
Thomas Kurian Ambattu
-
2012/12/01
Talk : Clubhack
: XSSshell -
Vandan Joshi
-
2012/12/05
Talk : Blackhat
: Droid Exploitation Saga -
Aditya Gupta
Subho Halder
-
2012/12/06
Talk : Blackhat
: Attacking ODATA -
Gursev Singh Kalra
-
2012/12/06
Talk : Blackhat
: HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/12/06
Talk : Blackhat
: Poking servers with Facebook(and other web applications) -
Riyaz Walikar
-
2012/12/06
Talk : Blackhat
: The art of exploiting logical flaws in web apps -
Sumit Siddharth
Richard Dean
-
2013/03/01
Talk : Nullcon
: Automating JavaScript Static Analysis -
Lavakumar Kuppan
-
2013/03/01
Talk : Nullcon
: Bug Bounty Hunter’s confession -
Amol Naik
-
2013/03/01
Talk : Nullcon
: BYOD: How will it shape your wireless network security in future? -
Kiran Deshpande
-
2013/03/01
Talk : Nullcon
: Capturing Zero-Day Information -
Dinesh O Bareja
Sumit Sharma
-
2013/03/01
Talk : Nullcon
: CSRF Finder as a Mozilla Addon -
Piyush Pattanayak
-
2013/03/01
Talk : Nullcon
: Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework -
Ajin Abraham
-
2013/03/01
Talk : Nullcon
: Inception of graphical passwords -
Rishi Narang
-
2013/03/01
Talk : Nullcon
: Mobile Code mining for discovery and exploits -
Hemil Shah
-
2013/03/01
Talk : Nullcon
: Pawing the Droid: Twisting the ARM -
Divyanshu Shekhar
Anshul Kumar
-
2013/03/01
Talk : Nullcon
: Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks -
Naga Rohit Samineni
-
2013/03/01
Talk : Nullcon
: Sensitive Campus Security with Network -
Aravind Sitaraman
-
2013/03/01
Talk : Nullcon
: SMS to Meterpreter - Fuzzing USB Modems -
Rahul Sasi
-
2013/03/01
Talk : Nullcon
: Vulnerability research anyone? -
Omair
-
2013/03/07
Talk : Can Sec West
: SMS to Meterpreter - Fuzzing USB Modems -
Rahul Sasi
-
2013/03/12
Talk : Troopers
: Dirty use of USSD Codes in Cellular Network -
Ravishankar Borgaonkar
-
2013/03/14
Talk : Blackhat
: Lets play - Applanting -
Ajit Hatti
-
2013/03/15
Tool Demo : Blackhat
: Arsenal
: OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2013/03/15
Tool Demo : Blackhat
: Arsenal
: Prasadhak (And Offensive Powershell) -
Nikhil Mittal
-
2013/03/15
Talk : Blackhat
: The Sandbox Roulette- Are you ready for the gamble? -
Rahul Kashyap
Rafal Wojtczuk
-
2013/07/31
Talk : Blackhat
: Clickjacking revisited: A perceptual view of UI security -
Devdatta Akhawe
-
2013/07/31
Talk : Blackhat
: Javascript static security analysis made easy with JSPrime -
Nishant Das Patnaik
Sarathi Sabyasachi Sahoo
-
2013/07/31
Tool Demo : Blackhat
: Arsenal
: JMSDigger -
Gursev Singh Kalra
-
2013/07/31
Talk : Blackhat
: LTE booms with vulnerabilities -
Ankit Gupta
-
2013/08/01
Talk : Blackhat
: Hot knives through butter: Bypassing automated analysis systems -
Abhishek Singh
Zheng Bu
-
2013/08/01
Tool Demo : Blackhat
: Arsenal
: OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2013/08/01
Tool Demo : Blackhat
: Arsenal
: Sparty -
Aditya K Sood
-
2013/08/01
Tool Demo : Blackhat
: Arsenal
: XENOTIX xBOT -
Ajin Abraham
-
2013/08/03
Talk : Defcon
: PowerPreter: Post Exploitation Like a Boss -
Nikhil Mittal
-
2013/09/12
Talk : Grrcon
: The Droid Exploitation Saga – All Over Again! -
Aditya Gupta
Subho Halder
-
2013/09/13
Talk : Rootcon
: My Experiments with truth: a different route to bug hunting -
Devesh Bhatt
-
2013/09/27
Talk : C0c0n
: ARM, Thumb and the Finger -
Aseem Jakhar
-
2013/09/27
Talk : C0c0n
: Blur Captcha -
Anirudh Duggal
Abhinav Mohanty
-
2013/09/27
Talk : C0c0n
: Disclosing Vulnerabilities: The Bug Bounty Style -
Nikhil P Kulkarni
-
2013/09/27
Talk : C0c0n
: From Bedroom to Boardroom - Taking your Weekend Infosec Project Global -
Vivek Ramachandran
-
2013/09/27
Talk : C0c0n
: Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? -
Anup Narayanan
-
2013/09/27
Talk : C0c0n
: Infiltrating the Intranet with Skanda -
Jayesh Chauhan
-
2013/09/27
Talk : C0c0n
: Lets Play - Applanting on new Grounds -
Ajit Hatti
-
2013/09/27
Talk : C0c0n
: Pwning WiFi Devices! -
Swaroop Yermalkar
-
2013/09/27
Talk : C0c0n
: Risk and challenges in virtual currencies. -
Harsh Patel
Swatantra Kumar Gupta
-
2013/09/27
Talk : C0c0n
: Sandy - The Malicious Analysis -
Rahul Sasi
-
2013/09/27
Talk : C0c0n
: Snake Bites -
Anant Shrivastava
-
2013/09/27
Talk : C0c0n
: SSRF / XSPA - Real World Attacks and Mitigations -
Riyaz Walikar
-
2013/09/27
Talk : C0c0n
: Static analysis of malware with PyTriage -
Yashin Mehaboobe
-
2013/09/27
Talk : C0c0n
: The Art and Science of Anamoly based Vulnerability Detection -
Lavakumar Kuppan
-
2013/09/27
Talk : C0c0n
: The Secure Software Development Life Cycle -
Harshal Jamdade
-
2013/10/17
Talk : Hitb Sec Conf
: Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis -
Rahul Sasi
-
2013/11/07
Talk : Ground Zero Summit
: Abusing Google Apps: Google is my command and control center -
Ajin Abraham
-
2013/11/07
Talk : Ground Zero Summit
: Advanced security for advanced threats -
Kartik Shahani
-
2013/11/07
Talk : Ground Zero Summit
: Approach to containing the outbreak of malicious information in online social networks -
Sriniketh Vijayaraghavan
-
2013/11/07
Talk : Ground Zero Summit
: Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state -
Vaishali Bhagwat
-
2013/11/07
Talk : Ground Zero Summit
: Cloud Security: Enabling continuous, scalable security for today’s hyper connected world -
Sumedh Thakar
-
2013/11/07
Talk : Ground Zero Summit
: Evolution of network security around Software Defined Networking (SDN) – The intelligent network -
Diwakar Dayal
-
2013/11/07
Talk : Ground Zero Summit
: How I built a pentest lab in under 70 USD -
Swaroop Yermalkar
-
2013/11/07
Talk : Ground Zero Summit
: Internet – Transforming terrorism -
Sameer Saxena
-
2013/11/07
Talk : Ground Zero Summit
: IronWASP -
Lavakumar Kuppan
-
2013/11/07
Talk : Ground Zero Summit
: Malware for Firefox Mobile OS -
Shantanu Gawde
-
2013/11/07
Talk : Ground Zero Summit
: Securing government Critical Information Infrastructure -
Kapil Awasthi
-
2013/11/07
Talk : Ground Zero Summit
: Serial killing of embedded systems -
Atul Alex
-
2013/11/07
Talk : Ground Zero Summit
: Setting the Data Center on fire -
Ajit Hatti
-
2013/11/07
Talk : Ground Zero Summit
: The seven sins of Wi-Fi security -
Vivek Ramachandran
-
2013/11/07
Talk : Ground Zero Summit
: Towards a next generation secure Internet -
Sanjay Deshpande
-
2013/11/07
Talk : Ground Zero Summit
: Understanding the anatomy of advanced targeted attacks – The Trend Micro approach -
Tarun Gupta
-
2013/11/21
Talk : Deepsec
: Automation In Android & iOS Application Security Review -
Hemil Shah
-
2013/11/21
Talk : Deepsec
: Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy -
Parth Shukla
-
2014/02/14
Talk : Nullcon
: 12 YEARS AND A BAKER’S DOZEN -
Saumil Shah
-
2014/02/14
Talk : Nullcon
: 2014 The year in which we cannot ignore SCADA -
Amol Sarwate
-
2014/02/14
Talk : Nullcon
: A security analysis of Browser Extensions -
Abhay Rana
-
2014/02/14
Talk : Nullcon
: Attack of the setuid bit - pt_chown and pwning root terminals -
Siddhesh Poyarekar
-
2014/02/14
Talk : Nullcon
: Attacking WPA/WPA2 in the Cloud -
Vivek Ramachandran
-
2014/02/14
Talk : Nullcon
: Chrome - OS Security 2014: New and future hotness -
Sumit Gwalani
-
2014/02/14
Talk : Nullcon
: Flowinspect - A Network Inspection Tool -
Ankur Tyagi
-
2014/02/14
Talk : Nullcon
: Hacking YOu’r Cable TV Network. -
Rahul Sasi
Ahamed Nafeez
-
2014/02/14
Talk : Nullcon
: Hardware Attack Vectors -
Yashin Mehaboobe
-
2014/02/14
Talk : Nullcon
: In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} -
Rushikesh D Nandedkar
Amrita C Iyer
-
2014/02/14
Talk : Nullcon
: Multi-value W-Fi What the Heck is it -
Abhijeet Ghosh
-
2014/02/14
Talk : Nullcon
: Null Hardware Badge 101 (Desi Jugaad) -
Amey Gat
Umesh
-
2014/02/14
Talk : Nullcon
: o’Dea Assertions - Untwining the Security of the SAML Protocol -
Achin Kulshrestha
-
2014/02/14
Talk : Nullcon
: Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases -
Ankita Gupta
Lavakumar Kuppan
-
2014/02/14
Talk : Nullcon
: phoneypdf: A Virtual PDF Analysis Framework -
Kiran Bandla
-
2014/02/14
Talk : Nullcon
: Strategic Information Warfare: When Ends define the means -
Amit Sharma
-
2014/02/14
Talk : Nullcon
: The Security Challenge -
Shantanu Ghosh
-
2014/02/14
Talk : Nullcon
: Wi-Hawk Password Auditing Tool -
Anamika Singh
-
2014/02/15
Tool Demo : Nullcon
: DrupSnipe -
Ranjeet Sengar
Sukesh Pappu
-
2014/02/15
Tool Demo : Nullcon
: NoSQL Exploitation Framework -
Francis Alexander
-
2014/02/15
Tool Demo : Nullcon
: OWASP OWTF - The Offensive (Web) Testing Framework -
Bharadwaj Machiraju
Abraham Aranguren
-
2014/02/15
Tool Demo : Nullcon
: OWASP Xenotix XSS Exploit Framerwork -
Ajin Abraham
-
2014/02/15
Tool Demo : Nullcon
: XMLChor -
Harshal Jamdade
-
2014/03/18
Talk : Troopers
: Evolution of SIM Card Security -
Ravishankar Borgaonkar
-
2014/03/27
Talk : Blackhat
: JS Suicide: Using JavaScript Security Features to Kill JS Security -
Ahamed Nafeez
-
2014/05/21
Talk : Phdays
: Android Exploitation -
Aditya Gupta
-
2014/05/21
Talk : Phdays
: ARM Exploitation -
Aseem Jakhar
-
2014/05/29
Talk : Hitb Sec Conf
: Hacking Your Cable TV Network: Die Hard Style -
Rahul Sasi
-
2014/05/29
Talk : Hitb Sec Conf
: LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit -
Rahul Kashyap
Rafal Wojtzcuk
-
2014/06/23
Talk : Hackinparis
: Pentesting NoSQL DB’s with NoSQL Exploitation Framework -
Francis Alexander
-
2014/08/06
Tool Demo : Blackhat
: Arsenal
: Flowinspect: Yet another network inspection tool -
Ankur Tyagi
-
2014/08/06
Talk : Blackhat
: What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! -
Aditya K Sood
-
2014/08/07
Tool Demo : Blackhat
: Arsenal
: C-SCAD: Assessing Security flaws in clearscada Web_X client! -
Aditya K Sood
-
2014/08/07
Talk : Blackhat
: Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies -
Vijay Balasubramaniyan
Raj Bandyopadhyay
Telvis Calhoun
-
2014/08/22
Talk : C0c0n
: APT: Case Study of attackers targeting public tendering -
Rahul Sasi
-
2014/08/22
Talk : C0c0n
: Breaking and Securing Mobile Apps - Automagically -
Aditya Gupta
-
2014/08/22
Talk : C0c0n
: Cryptocalypse, Heart Bleed : Is our Government Listening? -
Ajit Hatti
-
2014/08/22
Talk : C0c0n
: Cryptographic Backdoors: Subverting the RSA -
Adhokshaj Mishra
-
2014/08/22
Talk : C0c0n
: Exploiting NoSQL Like Never Before -
Francis Alexander
-
2014/08/22
Talk : C0c0n
: Hacking Communication -
Akib Sayyed
-
2014/08/22
Talk : C0c0n
: Idle Machines doing Bounty Hunting (Behind your Back) -
Mrityunjay Gautam
-
2014/08/22
Talk : C0c0n
: Lesser Known Attack - XML Injection -
Amol Naik
-
2014/08/22
Talk : C0c0n
: Making and breaking security in embedded devices -
Yashin Mehaboobe
-
2014/08/22
Talk : C0c0n
: My tryst with Source Code Review -
Anant Shrivastava
-
2014/08/22
Talk : C0c0n
: Piracy Tracker -
Vargheese Babu
-
2014/08/22
Talk : C0c0n
: Still Single with a bleeding heart (Tool Release) -
Tamaghna Basu
-
2014/08/22
Talk : C0c0n
: The Curious Case of ProtoBufs - Demystifying Google’s hottest binary protocol -
Prasanna Kanagasabai
Jovin Lobo
-
2014/09/24
Talk : Brucon
: OWASP: OWTF -
Bharadwaj Machiraju
-
2014/09/28
Talk : Blackhat
: Understanding IMSI Privacy -
Swapnil Udar
Ravishankar Borgaonkar
-
2014/10/16
Talk : Grrcon
: Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design -
Aditya K Sood
Dr. Richard J Enbody
-
2014/10/17
Talk : Blackhat
: Android Kernel and OS Security Assessment with Iron Crow -
Akhil Arora
Sumanth Naropanth
-
2014/10/23
Talk : Hacklu
: Hacking with Images - Evil Pictures -
Saumil Shah
-
2014/10/23
Talk : Hacklu
: WiHawk - Router Vulnerability Scanner -
Anamika Singh
-
2014/10/29
Talk : Ekoparty
: Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 -
Rahul Sasi
-
2014/11/13
Talk : Ground Zero Summit
: Attacking Cryptography & PKI Implementations -
Ajit Hatti
-
2014/11/13
Talk : Ground Zero Summit
: Identity theft and its impact on Cyber - Warfare -
Tarun Wig
-
2014/11/13
Talk : Ground Zero Summit
: Network Time Protocol in Amplification Inferno -
Sriram Krishnan
-
2014/11/13
Talk : Ground Zero Summit
: Security vulnerabilities in DVB-C networks: Hacking Cable TV network -
Rahul Sasi
-
2014/11/13
Talk : Ground Zero Summit
: 9 Cell Cyber Diplomacy -
Alok Vijayant
-
2014/11/13
Talk : Ground Zero Summit
: APT protection for the Enterprise -
Deepak Singla
-
2014/11/13
Talk : Ground Zero Summit
: Attacking Web-Proxies like never before -
Ahamed Nafeez
-
2014/11/13
Talk : Ground Zero Summit
: Cyber ‘BrahMos’ - Static analysis driven secure coding -
Joy Sen
-
2014/11/13
Talk : Ground Zero Summit
: Detecting Fake Cell Phone Towers -
Vijay Mukhi
-
2014/11/13
Talk : Ground Zero Summit
: Enterprise Security -
Mano Paul
-
2014/11/13
Talk : Ground Zero Summit
: Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF -
Bhaumik Merchant
-
2014/11/13
Talk : Ground Zero Summit
: Financial Integrity and Cyber Security -
Karnal Singh
-
2014/11/13
Talk : Ground Zero Summit
: Fuzzing Asynchronous Protocols built over Websockets -
Lavakumar Kuppan
-
2014/11/13
Talk : Ground Zero Summit
: Hacking consumer electronics for Fun -
Atul Alex
-
2014/11/13
Talk : Ground Zero Summit
: How I won Browser Fuzzing -
Amol Naik
-
2014/11/13
Talk : Ground Zero Summit
: Internet Governance -
Anjana Kovacs
-
2014/11/13
Talk : Ground Zero Summit
: Making and Breaking Embedded Security -
Yashin Mehaboobe
-
2014/11/13
Talk : Ground Zero Summit
: Mobile security Automation Framework for Intelligent Auditing -
Ankur Bhargava
-
2014/11/13
Talk : Ground Zero Summit
: National Cyber Policy and its impact on Business -
Vaishali Bhagwat
-
2014/11/13
Talk : Ground Zero Summit
: SCADA Exploitation through Firmware -
Ashish Saxena
-
2014/11/13
Talk : Ground Zero Summit
: Vulnerability Reproduction using Zest -
Deep Shah
-
2015/02/06
Panel : Nullcon
: 2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys -
Shomiron Das Gupta
K S Narayanan
Shantanu Ghosh
Subrahmanya Gupta Boda
Vishal Salvi
Benjamin Rivera
-
2015/02/06
Talk : Nullcon
: Analyzing Chrome crash reports at scale -
Abhishek Arya
-
2015/02/06
Talk : Nullcon
: Anatomy of a credit card stealing POS malware -
Amol Sarwate
-
2015/02/06
Talk : Nullcon
: Attack and Defence in Radio and Communication Warfare -
Akib Sayyed
-
2015/02/06
Talk : Nullcon
: Building custom scans for real world enterprise network -
Sanoop Thomas
-
2015/02/06
Talk : Nullcon
: Building security and compliance into the software delivery process -
Anubhav Bathla
Dinesh Pillai
S Chandrasekhar
Harish Pillay
-
2015/02/06
Panel : Nullcon
: Defender’s Diary: Who’s attacking? What are my options? -
Sastry Tumuluri
Amit Sharma
Venkatesh Subramaniam
Sachin Burman
Deepak Singla
-
2015/02/06
Talk : Nullcon
: Drone Attacks: How I hijacked a drone -
Rahul Sasi
-
2015/02/06
Talk : Nullcon
: Generic Executable Unpacking using Dynamic Binary Instrumentation -
Shubham Bansal
-
2015/02/06
Talk : Nullcon
: Hacking Tizen: The OS of Everything -
Ajin Abraham
-
2015/02/06
Talk : Nullcon
: Hunting and Decrypting Ghost communications using Memory Forensics -
Monnappa K A
-
2015/02/06
Talk : Nullcon
: Pentesting a website with million lines of Javascript -
Lavakumar Kuppan
Ahamed Nafeez
-
2015/02/06
Talk : Nullcon
: Toliman, a Hadoop Pentesting Tool -
Jitendra Chauhan
-
2015/02/06
Panel : Nullcon
: Why CISO should promote more of such technical events - pros and cons, benefits etc -
Burgess Cooper
Maya Viswanathan
Sanjay Burman
Sridharan Sankaran
Massoud Issa
Katie Moussouris
-
2015/02/07
Panel : Nullcon
: Startup panel – Make in India -
Aseem Jakhar
Radha Shelat
Sumit D Chowdhury
Shomiron Das Gupta
Sastry Tumuluri
Shiju Sathyadevan
-
2015/03/03
Award :
: FREAK Attack -
Karthikeyan Bhargavan
Mi Tls Team
-
2015/03/26
Tool Demo : Blackhat
: Arsenal
: OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2015/03/26
Tool Demo : Blackhat
: Arsenal
: SecPod Saner -
Preeti Subramanian
-
2015/03/26
Talk : Blackhat
: The underground Ecosystem of Credit Card frauds -
Abhinav Singh
-
2015/03/26
Tool Demo : Blackhat
: Arsenal
: YSO Mobile Security Framework -
Ajin Abraham
-
2015/03/27
Talk : Blackhat
: Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence -
Preeti Subramanian
-
2015/03/27
Talk : Syscan
: Stegosploit - Hacking with Pictures -
Saumil Shah
-
2015/05/26
Talk : Phdays
: Invisible Backdoors In Your Code -
Debasis Mohanty
-
2015/05/26
Talk : Phdays
: iOS Application Exploitation -
Prateek Gianchandani
Egor Tolstoy
-
2015/05/28
Talk : Hitb Sec Conf
: Stegosploit: Hacking With Pictures -
Saumil Shah
-
2015/05/28
Talk : Hitb Sec Conf
: The Savage Curtain: Mobile SSL Failures -
Tushar Dalvi
Tony Trummer
-
2015/05/29
Talk : Hitb Sec Conf
: Hacking Samsung’s Tizen: The OS of Everything -
Ajin Abraham
-
2015/05/29
Talk : Hitb Sec Conf
: PowerShell for Penetration Testers -
Nikhil Mittal
-
2015/07/06
Talk : Blackhat
: DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS -
Ahamed Nafeez
-
2015/08/01
Talk : C0c0n
: A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. -
Riyaz Walikar
-
2015/08/01
Talk : C0c0n
: Attack chaining for web exploitation- From Information leakage to gaining Root access -
Abhijeth Dugginapeddi
-
2015/08/01
Talk : C0c0n
: Automated Security Analysis of Android & iOS Applications with Mobile Security Framework -
Ajin Abraham
-
2015/08/01
Talk : C0c0n
: Blockchains in Security -
Harsh Patel
-
2015/08/01
Talk : C0c0n
: Breaking into Infosec Research -
Vivek Ramachandran
-
2015/08/01
Talk : C0c0n
: Demystifying and Breaking BLE -
Yashin Mehaboobe
-
2015/08/01
Talk : C0c0n
: From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) -
Anto Joseph
-
2015/08/01
Talk : C0c0n
: Hacking RFIDs under 2000 INR -
Jayesh Chauhan
Divya S John
-
2015/08/01
Talk : C0c0n
: Medical device security and critical infrastructure inside hospitals -
Anirudh Duggal
-
2015/08/01
Talk : C0c0n
: NoPo - The NoSQL HoneyPot Framework -
Francis Alexander
-
2015/08/01
Talk : C0c0n
: Reversing and Deciphering the Cyber Espionage Malware Communications -
Monnappa K A
-
2015/08/01
Talk : C0c0n
: S3curi7y at 36K feet -
Rugved Mehta
Gaurav Trivedi
-
2015/08/01
Talk : C0c0n
: Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities -
Anant Shrivastava
-
2015/08/05
Tool Demo : Blackhat
: Arsenal
: PixelCaptcha: A unicode based captcha scheme -
Gursev Singh Kalra
-
2015/08/05
Tool Demo : Blackhat
: Arsenal
: QARK - Android Application SCA and Exploit Tool -
Tushar Dalvi
-
2015/08/05
Tool Demo : Blackhat
: Arsenal
: Rudra - The Destroyer of Evil -
Ankur Tyagi
-
2015/08/06
Tool Demo : Blackhat
: Arsenal
: Chellam -
Vivek Ramachandran
-
2015/08/06
Talk : Blackhat
: Harnessing Intelligence from Malware Repositories -
Arun Lakhotia
Vivek Notani
-
2015/08/06
Tool Demo : Blackhat
: Arsenal
: Kautilya -
Nikhil Mittal
-
2015/08/07
Talk : Defcon
: Chellam – a Wi-Fi IDS/Firewall for Windows -
Vivek Ramachandran
-
2015/08/07
Talk : Defcon : Crypto&privacy Village
: Getting into the Trust Store We Trust -
Ajit Hatti
-
2015/08/07
Talk : Defcon : Packetcapture Village
: Hacker’s Practice Ground -
Lokesh Pidawekar
-
2015/08/07
Workshop : Defcon : Wireless Village
: WPA Enterprise Hacking -
Vivek Ramachandran
Thomas D Otreppe
-
2015/08/08
Workshop : Defcon : Wireless Village
: Automatic Live WPA/WPA2 Attacks and WPA_Supplicant -
Vivek Ramachandran
-
2015/08/08
Talk : Defcon
: Chigula — a framework for Wi-Fi Intrusion Detection and Forensics -
Vivek Ramachandran
-
2015/08/08
Talk : Defcon
: Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities -
Aditya K Sood
-
2015/08/08
Talk : Defcon : Packetcapture Village
: Powershell for Penetraton Testers -
Nikhil Mittal
-
2015/08/08
Talk : Defcon
: QARK: Android App Exploit and SCA Tool -
Tushar Dalvi
Tony Trummer
-
2015/08/08
Tool Demo : Defcon
: DemoLabs : Rudra -
Ankur Tyagi
-
2015/08/09
Talk : Defcon : Packetcapture Village
: 802.11 Monitoring with PCAP2XML/SQLite -
Vivek Ramachandran
-
2015/08/28
Tool Demo : Blackhat
: Arsenal
: Damn Vulnerable iOS App (DVIA) -
Prateek Gianchandani
-
2015/09/11
Talk : 44 Con
: Stegosploit – Drive-by Browser Exploits using only Images -
Saumil Shah
-
2015/10/08
Talk : Brucon
: The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed -
Rushikesh D Nandedkar
Amrita C Iyer
-
2015/10/21
Talk : Hacklu
: Stegosploit - Delivering Drive-By Exploits With Only Images -
Saumil Shah
-
2015/11/05
Talk : Ground Zero Summit
: Cyber Security in Hospitals:Hospitals Under Seige -
Anirudh Duggal
-
2015/11/05
Talk : Ground Zero Summit
: Exposing Cyber Espionage: Hello from Pakistan- IIC Session -
Jiten Jain
-
2015/11/05
Talk : Ground Zero Summit
: Western Air Command -
B S Singh Deo
-
2015/11/05
Talk : Ground Zero Summit
: Authentication flaw in Automatic Bank Passbook printing machine. -
Indrajeet Bhuyan
-
2015/11/05
Talk : Ground Zero Summit
: Browser based Malware attacks -
Harsh Daftary
-
2015/11/05
Talk : Ground Zero Summit
: chellam – a Wi-Fi IDS/Firewall for Windows -
Vivek Ramachandran
-
2015/11/05
Talk : Ground Zero Summit
: Credit Card Frauds – The money making Ecosystem for Cyber criminals -
Abhinav Singh
-
2015/11/05
Talk : Ground Zero Summit
: Dissecting Android Malware -
Anto Joseph
-
2015/11/05
Talk : Ground Zero Summit
: Economics of Post Quantum Crypto Systems : Do we really Need it -
Ajit Hatti
-
2015/11/05
Talk : Ground Zero Summit
: Elliptical Curve Cryptography -
Aneesha S
-
2015/11/05
Talk : Ground Zero Summit
: Hacking RFIDs under 2000INR -
Jayesh Chauhan
-
2015/11/05
Talk : Ground Zero Summit
: OSINT Black Magic: Listen who whispers your name in the dark!!! -
Sudhanshu Chauhan
Nutan Kumar Panda
-
2015/11/05
Talk : Ground Zero Summit
: Sanctioned to Hack: Your SCADA HMIs Belong to Us! -
Aditya K Sood
-
2015/11/05
Talk : Ground Zero Summit
: Thanks for the free cookies -
Anshul Saxena
Nishant Yadav
-
2015/11/05
Talk : Ground Zero Summit
: Trailing Terror in the Darknets -
Shesh Sarangdhar
-
2015/11/05
Talk : Ground Zero Summit
: Wolves Among Sheep: Defeating Targeted Attacks With Deception -
Sahir Hidayatullah
Raviraj Doshi
-
2015/11/05
Talk : Ground Zero Summit
: XSS - The art of evading web application filters! -
Anirudh Anand
-
2015/11/12
Tool Demo : Blackhat
: Arsenal
: Android InsecureBank -
Dinesh Shetty
-
2015/11/12
Tool Demo : Blackhat
: Arsenal
: Android Tamer -
Anant Shrivastava
-
2015/11/12
Tool Demo : Blackhat
: Arsenal
: Kautilya: Fastest shells you will ever get -
Nikhil Mittal
-
2015/11/12
Tool Demo : Blackhat
: Arsenal
: Nishang - Tracking A Windows User -
Nikhil Mittal
-
2015/11/12
Talk : Blackhat
: Stegosploit - Exploit Delivery with Steganography and Polyglots -
Saumil Shah
-
2015/11/13
Talk : Blackhat
: LTE & IMSI Catcher Myths -
Ravishankar Borgaonkar
N Asokan
Altaf Shaik
Valtteri Niemi
Jean Pierre Seifert
-
2015/11/13
Talk : Blackhat
: AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX -
Monnappa K A
-
2015/11/13
Talk : Blackhat
: Continuous Intrusion: Why CI tools are an Attacker’s Best Friends -
Nikhil Mittal
-
2015/11/13
Tool Demo : Blackhat
: Arsenal
: Rudra - The Destroyer of Evil -
Ankur Tyagi
-
2015/11/19
Talk : Deepsec
: Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. -
Nikhil Mittal
-
2016/03/11
Talk : Nullcon
: Attacking and defending healthcare - EMR solutions -
Anirudh Duggal
-
2016/03/11
Talk : Nullcon
: Automated Mobile Application Security Assessment with MobSF -
Ajin Abraham
-
2016/03/11
Talk : Nullcon
: Hitchhiker’s guide to hacking Industrial Control systems (ICS) -
Arun Mane
-
2016/03/11
Talk : Nullcon
: Making Machines think about security for fun and profit -
Rahul Sasi
-
2016/03/11
Talk : Nullcon
: Million Dollar Baby: Towards ANGRly conquering DARPA CGC -
Aravind Machiry
-
2016/03/11
Talk : Nullcon
: Privacy leaks on 4G-LTE networks -
Altaf Shaik
-
2016/03/11
Talk : Nullcon
: Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day -
Pallav Jakhotiya
Vipul Sawant
-
2016/04/01
Tool Demo : Blackhat
: Arsenal
: Android Tamer -
Anant Shrivastava
-
2016/04/01
Tool Demo : Blackhat
: Arsenal
: HackSys Extreme Vulnerable Driver -
Ashfaq Ansari
-
2016/04/01
Tool Demo : Blackhat
: Arsenal
: Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
Sanoop Thomas
-
2016/04/01
Tool Demo : Blackhat
: Arsenal
: LIMON-SANDBOX FOR ANALYZING LINUX MALWARES -
Monnappa K A
-
2016/04/01
Tool Demo : Blackhat
: Arsenal
: Rudra: The Destroyer of Evil -
Ankur Tyagi
-
2016/05/17
Talk : Phdays
: Fingerprinting and Attacking a Healthcare Infrastructure -
Anirudh Duggal
-
2016/05/17
Talk : Phdays
: Security Automation Based on Artificial Intelligence -
Rahul Sasi
-
2016/05/26
Talk : Hitb Sec Conf
: HITB Lab: Droid-FF: The First Android Fuzzing Framework -
Anto Joseph
-
2016/05/26
Talk : Hitb Sec Conf
: HITB Lab: Mobile Application Security for iOS and Android -
Tushar Dalvi
Tony Trummer
-
2016/07/01
Talk : Hackinparis
: DIFFDroid - Dynamic Analysis Made Easier for Android -
Anto Joseph
-
2016/08/03
Talk : Blackhat
: AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It -
Nikhil Mittal
-
2016/08/03
Tool Demo : Blackhat
: Arsenal
: DataSploit -
Sudhanshu Chauhan
Shubham Mittal
Nutan Kumar Panda
-
2016/08/03
Tool Demo : Blackhat
: Arsenal
: Nishang: The Goodness of Offensive PowerShell -
Nikhil Mittal
-
2016/08/03
Tool Demo : Blackhat
: Arsenal
: Visual Network and File Forensics Using Rudra -
Ankur Tyagi
-
2016/08/03
Tool Demo : Blackhat
: Arsenal
: Android Tamer -
Anant Shrivastava
-
2016/08/03
Tool Demo : Blackhat
: Arsenal
: Android-InsecureBankv2 -
Dinesh Shetty
-
2016/08/04
Tool Demo : Blackhat
: Arsenal
: AppMon -
Nishant Das Patnaik
-
2016/08/04
Talk : Blackhat
: DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes -
Rohit Mothe
Rodrigo Rubira Branco
-
2016/08/04
Tool Demo : Blackhat
: Arsenal
: Droid-FF: Android Fuzzing Framework -
Anto Joseph
-
2016/08/04
Tool Demo : Blackhat
: Arsenal
: LAMMA -
Ajit Hatti
-
2016/08/04
Tool Demo : Blackhat
: Arsenal
: Maltese (Malware Traffic Emulating Software) -
Sasi Siddharth
-
2016/08/06
Tool Demo : Defcon
: DemoLabs : Android-InsecureBank -
Dinesh Shetty
-
2016/08/06
Tool Demo : Defcon
: DemoLabs : Datasploit -
Shubham Mittal
-
2016/08/06
Tool Demo : Defcon
: DemoLabs : LAMMA (beta) -
Ajit Hatti
-
2016/08/06
Tool Demo : Defcon
: DemoLabs : Visual Network and File Forensics using Rudra -
Ankur Tyagi
-
2016/08/19
Talk : C0c0n
: Abusing Digital Certificates : Malware Style -
Ajit Hatti
-
2016/08/19
Talk : C0c0n
: App Sec in the Time of Docker Containers -
Akash Mahajan
-
2016/08/19
Talk : C0c0n
: Attacking and crashing IOT devices via Bluetooth LE Protocol -
Pratap Chandra Allena
Ajay Pratap Singh
-
2016/08/19
Talk : C0c0n
: Backdooring my Enemies with a Proxy for Threat Intelligence -
Jovin Lobo
Aditya Vasekar
-
2016/08/19
Talk : C0c0n
: Breaking into Gas stations! -
Suraj Pratap
-
2016/08/19
Talk : C0c0n
: Esoteric XSS Payloads -
Riyaz Walikar
-
2016/08/19
Talk : C0c0n
: Evading Corporate Security – You’re as secure as the weakest link -
Prajwal Panchmahalkar
-
2016/08/19
Talk : C0c0n
: How (in)secure are Indian GSM networks? -
Ajay Fuloria
-
2016/08/19
Talk : C0c0n
: Kill the password - A new era of authentication -
Tamaghna Basu
-
2016/08/19
Talk : C0c0n
: SSD Forensics : A Nightmare for Forensic Investigators -
Santosh Khadsare
-
2016/08/19
Talk : C0c0n
: The Art of Social Hacking -
Gaurav Trivedi
Rugved Mehta
-
2016/08/19
Talk : C0c0n
: Threats in Connected World -
Bhavin Gandhi
-
2016/09/14
Talk : 44 Con
: 2016: The Infosec Crossroads -
Saumil Shah
-
2016/09/23
Talk : Rootcon
: Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
Sanoop Thomas
-
2016/10/19
Talk : Hacklu
: 2016: The Infosec Crossroads -
Saumil Shah
-
2016/10/27
Talk : Brucon
: Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! -
Rushikesh D Nandedkar
Amrita C Iyer
Krishnakant Patil
-
2016/11/03
Tool Demo : Blackhat
: Arsenal
: DataSploit -
Shubham Mittal
Nutan Kumar Panda
-
2016/11/04
Tool Demo : Blackhat
: Arsenal
: AppMon: Runtime Security Testing & Profiling Framework for Native Apps -
Nishant Das Patnaik
-
2016/11/04
Talk : Blackhat
: Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk -
Siddharth Rao
Bhanu Kotte
Dr. Silke Holtmanns
-
2016/11/04
Tool Demo : Blackhat
: Arsenal
: Firmware Analysis Toolkit (FAT) -
Aditya Gupta
-
2016/11/04
Talk : Blackhat
: Randomization Can’t Stop BPF JIT Spray -
N Asokan
Filippo Bonazzi
Elena Reshetova
-
2016/11/04
Tool Demo : Blackhat
: Arsenal
: Yasuo -
Saurabh Harit
-
2016/11/05
Talk : Hackfest
: LockPicker: Leaking data from live LUKS partition -
Adhokshaj Mishra
-
2016/11/11
Talk : Deepsec
: AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That -
Nikhil Mittal
-
2016/11/11
Talk : Deepsec
: Human vs Artificial intelligence – Battle of Trust -
Hemil Shah
-
2017/03/03
Talk : Nullcon
: Agility with security mitigations in Windows 10 -
Swamy Shivaganga Nagaraju
-
2017/03/03
Talk : Nullcon
: Breach Response - Time to shake up the status quo -
K K Mookhey
Pranesh Prakash
Sahir Hidayatullah
Shobha Jagathpal
-
2017/03/03
Talk : Nullcon
: Case study of SS7/Sigtran assessment -
Akib Sayyed
-
2017/03/03
Talk : Nullcon
: Case Study on RFID (proximity cards) hacking -
Sarwar Jahan
Ashwath Kumar
-
2017/03/03
Talk : Nullcon
: DevOpSec: Rapid Security in the Cloud with AWS and CIS -
Mikhail Advani
Rajesh Tamhane
-
2017/03/03
Panel : Nullcon
: Digital warriors: India and the Future of Conflict on the Internet -
Saikat Datta
Brijesh Datta
Muktesh Chander
Cmde Anand
Anja Kovacs
-
2017/03/03
Talk : Nullcon
: Hacking medical devices and infrastructure -
Anirudh Duggal
-
2017/03/03
Panel : Nullcon
: Hardware Security: Foundational Block of Cyber Battlefield -
Vinayak Godse
Amit Sharma
Aseem Jakhar
Minatee Mishra
-
2017/03/03
Talk : Nullcon
: Injecting Security into Web apps with Runtime Patching and Context Learning -
Ajin Abraham
-
2017/03/03
Talk : Nullcon
: Securing Critical National Infrastructure -
Shailendra Fuloria
R Sarangapani
Rahul Tongia
Michael Pyle
Justin Searle
-
2017/03/03
Talk : Nullcon
: Tale of training a Web Terminator! -
Bharadwaj Machiraju
-
2017/03/04
Panel : Nullcon
: Application Security Opportunities and Challenges in a DevOps World -
Abhay Bhargav
Ajay Bongirwar
Arun Jadhav
Pravesh Sharma
Adam Leaonard
-
2017/03/04
Panel : Nullcon
: Challenges in securing the cloud -
Vinayak Hegde
Manish Tiwari
Subramanian Kumar
David Lenoe
Lucas Moody
-
2017/03/04
Panel : Nullcon
: Cyber-Security Blue-Print for the Future! -
Kapil Awasthi
Mathan Babu Kasilingam
Partha Sengupta
Sumit Malhotra
-
2017/03/15
Talk : Can Sec West
: Inside Stegosploit -
Saumil Shah
-
2017/03/30
Tool Demo : Blackhat
: Arsenal
: DAMN VULNERABLE SS7 NETWORK -
Akib Sayyed
-
2017/03/30
Tool Demo : Blackhat
: Arsenal
: Devknox - Autocorrect Security Issues from Android Studio -
Subho Halder
-
2017/03/30
Tool Demo : Blackhat
: Arsenal
: WiDy: WiFi 0wnage in Under $5 -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
-
2017/03/30
Tool Demo : Blackhat
: Arsenal
: Datasploit - Automated Open Source Intelligence (OSINT) Tool -
Shubham Mittal
-
2017/03/30
Tool Demo : Blackhat
: Arsenal
: LAMMA 1.0 -
Ajit Hatti
-
2017/03/31
Talk : Blackhat
: Mobile-Telephony Threats in Asia -
Payas Gupta
Marco Balduzzi
Lion Gu
-
2017/03/31
Talk : Blackhat
: The Seven Axioms of Security -
Saumil Shah
-
2017/03/31
Talk : Blackhat
: WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION -
Monnappa K A
-
2017/04/13
Keynote : Hitb Sec Conf
: Redefining Defense -
Saumil Shah
-
2017/04/14
Talk : Hitb Sec Conf
: COMMSEC: IoT Hacking Simplified -
Aseem Jakhar
-
2017/04/14
Talk : Hitb Sec Conf
: Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure -
Anirudh Duggal
-
2017/04/19
Talk : Brucon
: Evading Microsoft ATA for Active Directory Domination -
Nikhil Mittal
-
2017/05/23
Talk : Phdays
: How we hacked distributed configuration management systems -
Bharadwaj Machiraju
Francis Alexander
-
2017/05/23
Talk : Phdays
: Injecting security into web apps in the runtime -
Ajin Abraham
-
2017/05/23
Talk : Phdays
: Practical machine learning in infosecurity -
Anto Joseph
Clarence Chio
-
2017/06/23
Talk : Hackinparis
: Injecting Security into Web apps with Runtime Patching and Context Learning -
Ajin Abraham
-
2017/06/26
Tool Demo : Blackhat
: Arsenal
: DiffDroid -
Anto Joseph
-
2017/07/26
Tool Demo : Blackhat
: Arsenal
: Datasploit - Automated Open Source Intelligence (OSINT) Tool -
Kunal Aggarwal
Shubham Mittal
Sudhanshu Chauhan
-
2017/07/26
Tool Demo : Blackhat
: Arsenal
: Devknox - Autocorrect Security Issues from Android Studio -
Subho Halder
-
2017/07/26
Talk : Blackhat
: New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor -
Ravishankar Borgaonkar
Altaf Shaik
Shinjo Park
Lucca Hirschi
Andrew Martin
Jean Pierre Seifert
-
2017/07/26
Talk : Blackhat
: Wire Me Through Machine Learning -
Ankit Singh
Vijay Thaware
-
2017/07/27
Tool Demo : Blackhat
: Arsenal
: Android Tamer -
Anant Shrivastava
-
2017/07/27
Talk : Blackhat
: Evading Microsoft ATA for Active Directory Domination -
Nikhil Mittal
-
2017/07/27
Tool Demo : Blackhat
: Arsenal
: Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday -
Lalith Rallabhandi
Abhijeth Dugginapeddi
Srinavas Rao
-
2017/07/27
Tool Demo : Blackhat
: Arsenal
: Gibber Sense -
Ajit Hatti
-
2017/07/27
Talk : Defcon : Lockpick Village
: ICS Humla -
Sneha Rajguru
Arun Mane
-
2017/07/27
Tool Demo : Blackhat
: Arsenal
: Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes -
Anshuman Bhartiya
-
2017/07/27
Talk : Defcon : Recon Village
: Recon and bug bounties what a great love story -
Abhijeth Dugginapeddi
-
2017/07/27
Workshop : Defcon
: Attacking and Defending 802.11ac Networks -
Vivek Ramachandran
Thomas D' Otreppe
-
2017/07/28
Tool Demo : Defcon
: DemoLabs : Android Tamer -
Anant Shrivastava
-
2017/07/28
Tool Demo : Defcon
: DemoLabs : GibberSense -
Ajit Hatti
-
2017/07/28
Tool Demo : Defcon
: DemoLabs : Lamma 1.0 -
Ajit Hatti
Antriksh Shah
-
2017/07/29
Tool Demo : Defcon
: DemoLabs : Fuzzapi -
Abhijeth Dugginapeddi
Lalith Rallabhandi
Srinivas Rao
-
2017/07/29
Tool Demo : Defcon
: DemoLabs : WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
-
2017/07/29
Tool Demo : Defcon
: DemoLabs : WiMonitor - an OpenWRT package for remote WiFi sniffing -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
-
2017/07/30
Tool Demo : Blackhat
: Arsenal
: Yasuo -
Saurabh Harit
-
2017/08/18
Talk : C0c0n
: Hunting Botnets with Analytics -
Shomiron Das Gupta
-
2017/08/18
Talk : C0c0n
: Phishing threats to customers and mitigation -
Bhavin Bhansali
-
2017/08/18
Talk : C0c0n
: 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work -
Rahul Binjve
-
2017/08/18
Talk : C0c0n
: Androsia: A tool for securing in memory sensitive data -
Samit Anwer
-
2017/08/18
Talk : C0c0n
: Anti-Virus Bypassing for Fun and Profit -
Vanshit Malhotra
-
2017/08/18
Talk : C0c0n
: Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! -
Abhinav Biswas
-
2017/08/18
Talk : C0c0n
: Bank on Compliance for Cyber Security -
Dinesh O Bareja
-
2017/08/18
Talk : C0c0n
: Big Data Analytics with pattern matching for smarter analytics -
Tarun Wig
-
2017/08/18
Talk : C0c0n
: Blockchain for Information security -
Shobha Jagathpal
-
2017/08/18
Talk : C0c0n
: Case study: Security of Digital Wallet apps in India -
Ashwath Kumar
Sandesh Mysore Anand
-
2017/08/18
Talk : C0c0n
: Catching Network anomalies using Deep learning -
Aditya Vasekar
-
2017/08/18
Talk : C0c0n
: Challenges in Digital Banking -
Biju K
-
2017/08/18
Talk : C0c0n
: Cloud_Security Suite - One stop tool for auditing cloud infrastructure -
Shivankar Madaan
Jayesh Chauhan
-
2017/08/18
Talk : C0c0n
: CoAP versus MQTT: IoT Protocol Vulnerability analysis -
Rajiv Pandey
-
2017/08/18
Talk : C0c0n
: Cyber bullying and Cyber Harassment -
Martina Mathew
Jacob Jose
Ankit John Abraham
Lekshmi B
-
2017/08/18
Talk : C0c0n
: Cyber bullying-Screen the Mean -
Nitin Awade
Surjata Awade
-
2017/08/18
Talk : C0c0n
: Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! -
Illyas Kooliyankal
-
2017/08/18
Talk : C0c0n
: Cyber Threat Intelligence - Are We There , Yet…? -
A Shiju Rawther
-
2017/08/18
Talk : C0c0n
: Do Students really require Smartphones -
Pranav a Menon
-
2017/08/18
Talk : C0c0n
: Dynamic Binary Instrumentation -
Vivek Arora
Bhaskar Rastogi
-
2017/08/18
Talk : C0c0n
: Exploiting the smartness of BLE Stack -
Apoorva Gupta
-
2017/08/18
Talk : C0c0n
: Hacking Homes: A hardware insight for IoT [in]Security -
Jiggyasu Sharma
-
2017/08/18
Talk : C0c0n
: Hunting the Hunters – Fighting CyberCrime at the Source -
Valan Sivasubramanian
-
2017/08/18
Talk : C0c0n
: Identity Theft -
Devika a V
Meera P
-
2017/08/18
Talk : C0c0n
: iGoat – A Self Learning Tool for iOS App Pentesting and Security -
Swaroop Yermalkar
-
2017/08/18
Talk : C0c0n
: Internet Addiction and Children -
Teena Jose
-
2017/08/18
Talk : C0c0n
: Mobile Banking (In)Security -
Sneha Rajguru
-
2017/08/18
Talk : C0c0n
: Moving from Cybersecurity Awareness to Cybersecurity Competence -
Anup Narayanan
-
2017/08/18
Talk : C0c0n
: OSINT and Privacy -
Rohit Srivastwa
-
2017/08/18
Talk : C0c0n
: Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis -
Furqan Khan
Siddharth Anbalahan
-
2017/08/18
Talk : C0c0n
: Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure -
Manas Pratim Sarma
-
2017/08/18
Talk : C0c0n
: Sleep, Screen and Teenagers -
Natishia Rebecca Chandy
Pulkit Deepak Khatri
-
2017/08/18
Talk : C0c0n
: Social Media and You -
Parry Aftab
-
2017/08/18
Talk : C0c0n
: Technology-The New Frontier in Teaching -
Bindu Mony
-
2017/08/18
Talk : C0c0n
: The card hack - Lessons from the Hitachi Payments Breach -
Saikat Datta
-
2017/08/18
Talk : C0c0n
: The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ -
Rushikesh D Nandedkar
-
2017/08/18
Talk : C0c0n
: The Internet Of Things: Essentials of Secur(IOT)y -
Arpit Bajpai
Ronald Michael
-
2017/08/18
Talk : C0c0n
: The Internet Of Things: Essentials of Secur(IOT)y -
Ronald Michel
-
2017/08/18
Talk : C0c0n
: The need for Teachers to cope with Technology -
Resmi Rajan
-
2017/08/18
Talk : C0c0n
: The need for Teachers to cope with Technology -
Shibi Anand
-
2017/08/18
Talk : C0c0n
: The Role of Teachers in Digital Era -
Nisha Prayan
-
2017/08/18
Talk : C0c0n
: Threats with online gaming and issues with games like Pokemon -
Riyaz Walikar
Akash Mahajan
-
2017/08/18
Talk : C0c0n
: What Security Managers can learn from story tellers? -
Anup Narayanan
-
2017/08/18
Talk : C0c0n
: Yarafying Android Malware: A Missing Step Before Malware Analysis -
Shivang Desai
-
2017/08/18
Talk : C0c0n
: Your friendly neighbourhood exploit -
Aseem Jakhar
-
2017/09/13
Talk : 44 Con
: Red Team Revenge : Attacking Microsoft ATA -
Nikhil Mittal
-
2017/10/19
Talk : Hacklu
: Are your VoLTE and VoWiFi calls secure? -
Sreepriya Chalakkal
-
2017/10/19
Talk : Hacklu
: Bug hunting using symbolic virtual machines! -
Anto Joseph
-
2017/10/19
Talk : Hacklu
: Intel AMT: Using & Abusing the Ghost in the Machine -
Parth Shukla
-
2017/11/17
Talk : Deepsec
: How Secure Are Your VoLTE And VoWiFi Calls? -
Sreepriya Chalakkal
-
2017/11/17
Talk : Deepsec
: Intel AMT: Using & Abusing The Ghost In The Machine -
Parth Shukla
-
2017/11/20
Talk : Hackfest
: How my SV Machine nailed your Malware -
Nikhil P Kulkarni
-
2017/12/06
Tool Demo : Blackhat
: Arsenal
: ANWI (All New Wireless IDS) - The £5 WIDS -
Sanket Karpe
-
2017/12/06
Talk : Blackhat
: BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES -
Saurabh Harit
-
2017/12/06
Talk : Blackhat
: DIFUZZING ANDROID KERNEL DRIVERS -
Aravind Machiry
Chris Salls
Yan Shoshitaishvili
Jake Corina
Shuang Hao
-
2017/12/06
Tool Demo : Blackhat
: Arsenal
: EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK -
Aseem Jakhar
-
2017/12/07
Tool Demo : Blackhat
: Arsenal
: DataSploit - OSINT Framework -
Shubham Mittal
-
2017/12/07
Tool Demo : Blackhat
: Arsenal
: THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL -
Raghudeep Kannavara
-
2017/12/30
Tool Demo : Blackhat
: Arsenal
: Cloud Security Suite - One Stop Tool for AWS Security Audit -
Shivankar Madaan
Prajal Kulkarni
Jayesh Chauhan
-
2018/03/01
Talk : Nullcon
: A Game between Adversary and AI Scientist -
Satnam Singh
-
2018/03/01
Talk : Nullcon
: Abusing and Attacking Content Sharing Solutions -
Pratap Chandra Allena
-
2018/03/01
Talk : Nullcon
: Breaking Into Container Orchestrators -
Nadeem Hussain
-
2018/03/01
Talk : Nullcon
: DARWIN (A parasite covert wireless network) -
Rushikesh D Nandedkar
-
2018/03/01
Talk : Nullcon
: Looting your bank savings using Digital India -
Indrajeet Bhuyan
-
2018/03/01
Talk : Nullcon
: Security through obscurity and fear -
Abhinav Srivastava
-
2018/03/01
Talk : Nullcon
: Software Supply Chain Cyberattack -
Samiran Ghatak
-
2018/03/01
Talk : Nullcon
: SpotPhish: Zero-Hour Phishing Protection -
Ganesh Varadarajan
-
2018/03/01
Talk : Nullcon
: Unleashing D* on Android Kernel Drivers -
Aravind Machiry
-
2018/03/01
Talk : Nullcon
: White-Stingray: Bypassing stingray detectors -
Altaf Shaik
-
2018/03/02
Panel : Nullcon
: Economics of Hacks & Data Breaches Who Pays, Who Secures & Who Wins -
Vinayak Godse
Ashutosh Jain
Bhishma Maheshwari
Manish Tiwari
Suchit Mishra
-
2018/03/02
Panel : Nullcon
: Should all ciso promote hall of fame” within their organizations -
Shomiron Das Gupta
Hariprasad Chede
Keyur Desai
Subramanian Kumaraswamy
-
2018/03/02
Panel : Nullcon
: Should all ciso promote hall of fame” within their organizations -
Burgess Cooper
Durga Dube
Thom Langford
Harish Pillay
-
2018/03/02
Panel : Nullcon
: The complexity of regulation & cybersecurity -
Saikat Datta
Maya R Nair
Nandkumar Saravade
Sanjay Bahl
-
2018/03/03
Panel : Nullcon
: Forensic Challenges and Road Ahead -
Manu Zacharia
Brijesh Singh
Sanjay Bahl
Vladimir Katalov
-
2018/03/03
Panel : Nullcon
: IoT : How long till D Day? -
Aseem Jakhar
Hari Vasudev
Rishikesh Kamat
Daniel Cisowski
Michael Pyle
-
2018/03/03
Panel : Nullcon
: Managing Cyber Risk in the Connected Environment -
Gaurav Shukla
Ramachandra Hegde
Sudarshan Rajagopal
Kabir Mulchandani
-
2018/03/03
Panel : Nullcon
: Next generation cyber SOC -
K K Mookhey
Mathan Babu Kasilingam
Hidayath Khan
Shivkumar Pandey
Michael Smith
-
2018/03/15
Talk : Troopers
: Defending Microsoft Environments at Scale -
Vineet Bhatia
-
2018/03/22
Tool Demo : Blackhat
: Arsenal
: ADRecon: Active Directory Recon -
Prashant Mahajan
-
2018/03/22
Tool Demo : Blackhat
: Arsenal
: Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data -
Samit Anwer
-
2018/03/22
Tool Demo : Blackhat
: Arsenal
: Archery - Open Source Vulnerability Assessment and Management -
Anand Tiwari
-
2018/03/22
Tool Demo : Blackhat
: Arsenal
: Jackhammer - One Security Vulnerability Assessment/Management Tool -
Rajagopal Vr
Krishna Chaitanya Yarramsetty
-
2018/03/22
Tool Demo : Blackhat
: Arsenal
: Mobile Security Framework - MobSF -
Ajin Abraham
-
2018/03/22
Talk : Blackhat
: Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables -
Sumanth Naropanth
Kavya Racharla
-
2018/03/22
Talk : Blackhat
: XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot -
Ravi Sahita
Daiping Liu
Mingwei Zhang
-
2018/03/23
Tool Demo : Blackhat
: Arsenal
: Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit -
Jayesh Chauhan
Shivankar Madaan
-
2018/05/13
Talk : Defcon
: Androsia: Securing ‘Data in Process’ for your Android Apps -
Samit Anwer
-
2018/05/29
Award :
: Data Exfiltration via Formula Injection #Part1 -
Ajay Prashar
Balaji Gopal
-
2018/06/29
Talk : Hackinparis
: Hunting PBX for Vulnerabilities -
Himanshu Mehta
Sachin Wagh
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: ADRecon: Active Directory Recon -
Prashant Mahajan
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: ANWI (All New Wireless IDS): The $5 WIDS -
Rishikesh Bhide
Sanket Karpe
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: Archerysec Tool Demo -
Anand Tiwari
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: Astra: Automated Security Testing For REST APIs -
Ankur Bhargava
Prajal Kulkarni
Sagar Popat
-
2018/08/08
Talk : Blackhat
: Back to the Future: A Radical Insecure Design of KVM on ARM -
Baibhav Singh
Rahul Kashyap
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit -
Divya John
Jayesh Chauhan
Shivankar Madaan
-
2018/08/08
Talk : Blackhat
: Compression Oracle Attacks on VPN Networks -
Ahamed Nafeez
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: Damn Vulnerable iOS App: Swift Edition -
Prateek Gianchandani
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: DARWIN: Real World Use Cases for Covert Wireless -
Arun Mane
Rushikesh D Nandedkar
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: DataSploit 2.0 -
Kunal Aggarwal
Shubham Mittal
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: DejaVu: An Open Source Deception Framework -
Bhadreshkumar Patel
Harish Ramadoss
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: Expl-iot: IoT Security Testing and Exploitation Framework -
Aseem Jakhar
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: Halcyon IDE: For Nmap Script Developers -
Sanoop Thomas
-
2018/08/08
Talk : Blackhat
: LTE Network Automation Under Threat -
Ravishankar Borgaonkar
Altaf Shaik
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: PA Toolkit: Wireshark Plugins for Pentesters -
Nishant Sharma
Jeswin Mathai
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting -
Sudhanshu Chauhan
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: SCoDA: Smart COntract Defender and Analyzer -
Ajit Hatti
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: ThreatPlaybook -
Abhay Bhargav
Sharath Kumar
-
2018/08/08
Tool Demo : Blackhat
: Arsenal
: V2X Validation Tool -
Raashid Ansari
Jonathan Petit
-
2018/08/09
Talk : Defcon
: 4G—Who is paying your cellular phone bill? -
Isha Singh
Dr Silke Holtmanns
-
2018/08/09
Talk : Defcon : Crypto&privacy Village
: Anonymous rate-limiting in services with Direct Anonymous Attestation -
Konark Modi
Alex Catarineu
-
2018/08/09
Talk : Defcon : Lockpick Village
: Backdooring DVR/NVR devices -
Arun Mane
-
2018/08/09
Tool Demo : Blackhat
: Arsenal
: BLEMystique: Affordable Custom BLE Target -
Nishant Sharma
Jeswin Mathai
-
2018/08/09
Tool Demo : Blackhat
: Arsenal
: Jackhammer: One Security Vulnerability Assessment/Management Tool -
Madhusudhan Konda
Rajagopal Vr
Shreyas Chidambara
-
2018/08/09
Tool Demo : Blackhat
: Arsenal
: Mafia: Mobile Security Automation Framework for Intelligent Auditing -
Ankur Bhargava
Sagar Popat
Mohan Kallepalli
-
2018/08/09
Tool Demo : Blackhat
: Arsenal
: OWASP Offensive Web Testing Framework -
Viyat Bhalodia
-
2018/08/09
Tool Demo : Blackhat
: Arsenal
: rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style -
Sudheendra Bhat
Ismael Valenzuela
-
2018/08/09
Talk : Blackhat
: Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key -
Sanchari Das
Andrew C Dingman
Gianpaolo Russo
L Jean Camp
-
2018/08/09
Talk : Blackhat
: Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina -
Bhargava Shastry
Vincent Ulitzsch
Dominik Maier
-
2018/08/10
Talk : Defcon : Packethacking Village
: AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION -
Lokesh Pidawekar
-
2018/08/10
Talk : Defcon : Recon Village
: Building visualisation platforms for OSINT data using open source solutions -
Bharath Kumar
Madhu Akula
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : ADRecon: Active Directory Recon -
Prashant Mahajan
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
Ankur Tyagi
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : Archery—Open Source Vulnerability Assessment and Management -
Anand Tiwari
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : BLEMystique—Affordable custom BLE target -
Nishant Sharma
Jeswin Mathai
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit -
Jayesh Chauhan
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : DejaVU—An Open Source Deception Framework -
Harish Ramadoss
Bhadreshkumar Patel
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : Halcyon IDE -
Sanoop Thomas
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : HealthyPi—Connected Health -
Ashwin Whitchurch
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : Local Sheriff -
Konark Modi
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : PA Toolkit—Wireshark plugins for Pentesters -
Nishant Sharma
Jeswin Mathai
-
2018/08/11
Tool Demo : Defcon
: DemoLabs : Sh00t—An open platform for manual security testers & bug hunters -
Pavan Mohan
-
2018/08/12
Tool Demo : Defcon
: DemoLabs : Expl-iot—IoT Security Testing and Exploitation framework -
Aseem Jakhar
-
2018/08/12
Talk : Defcon
: Last mile authentication problem: Exploiting the missing link in end-to-end secure communication -
Siddharth Rao
Thanh Bui
-
2018/08/30
Talk : Hitb Sec Conf
: Exploiting Automation in LTE Mobile Networks -
Ravishankar Borgaonkar
Altaf Shaik
-
2018/09/06
Talk : Grrcon
: Analyzing Multi-Dimensional Malware Dataset -
Ankur Tyagi
-
2018/09/06
Talk : Grrcon
: Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
Ankur Tyagi
-
2018/09/06
Talk : Grrcon
: Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI -
Pranshu Bajpai
Richard Enbody
-
2018/09/12
Talk : 44 Con
: Make ARM Shellcode Great Again -
Saumil Shah
-
2018/09/27
Talk : Rootcon
: Bug Bounty Hunting on Steroids -
Anshuman Bhartiya
-
2018/09/27
Talk : Rootcon
: Cyber Security Threats to Telecom Networks -
Hardik Mehta
Rosalia D’ Alessandro
Loay Abdelrazek
-
2018/09/27
Talk : Rootcon
: Defending cloud Infrastructures with Cloud Security Suite -
Shivankar Madaan
-
2018/09/27
Talk : Rootcon
: Expl-iot: Hacking IoT like a boss -
Aseem Jakhar
-
2018/10/05
Talk : C0c0n
: Defending cloud Infrastructures with Cloud Security Suite -
Jayesh Chauhan
Shivankar Madaan
-
2018/10/05
Talk : C0c0n
: DNS Exfiltration and Out of Band Attacks -
Nitesh Shilpkar
-
2018/10/05
Talk : C0c0n
: Pentesting GraphQL Applications -
Neelu Tripathy
-
2018/10/05
Talk : C0c0n
: Adaptive GRC -
Mahesh Kalyanaraman
-
2018/10/05
Talk : C0c0n
: Artificial Intelligence and Social Media Analytics in Criminal Investigation -
Amit Dubey
-
2018/10/05
Talk : C0c0n
: Blockchains as techno-power structures: towards emergence of P2P Politics -
Sunil Aggarwal
-
2018/10/05
Talk : C0c0n
: Cyber security in Health Care Industry -
Noorul Haq
-
2018/10/05
Talk : C0c0n
: Cybersecurity Embedded Digital Transformation - The Future -
Sunil Kanchi
-
2018/10/05
Talk : C0c0n
: Data management challenge for Privacy compliance -
Maria Bellarmine
-
2018/10/05
Talk : C0c0n
: Dealing with Changing Threat Landscape -
Vijendra Katiyar
-
2018/10/05
Talk : C0c0n
: Defending Healthcare Base -
Jiggyasu Sharma
-
2018/10/05
Talk : C0c0n
: Digital Innovation revolution in Kerala Government -
Sunil Varkey
-
2018/10/05
Talk : C0c0n
: DomGoat - the DOM Security Playground -
Lavakumar Kuppan
-
2018/10/05
Talk : C0c0n
: Future of Mobility & Cyber Security -
Suja Chandy
-
2018/10/05
Talk : C0c0n
: How can we use machine learning to prevent Frauds and password breaches -
Tamaghna Basu
-
2018/10/05
Talk : C0c0n
: OSINT : Indian Citizen Edition -
Anant Shrivastava
-
2018/10/05
Talk : C0c0n
: Predictive policing using Big Data analytics. -
Tarun Wig
-
2018/10/05
Talk : C0c0n
: Privacy And Data Protection: Stakeholders’ Perspectives -
Rahul Sharma
-
2018/10/05
Talk : C0c0n
: Resiliency Focus alongside Digital Disruption -
Lince Lawrence
-
2018/10/05
Talk : C0c0n
: SCANDA: To Unbosom Malware Behavior -
Rajesh Nikam
Parmanand Mishra
-
2018/10/05
Talk : C0c0n
: Taking cyber security to the board room -
Amit Pradhan
-
2018/10/05
Talk : C0c0n
: Unconventional vulnerabilities in Google Cloud Platform -
Pranav Venkat
-
2018/10/05
Talk : C0c0n
: Using Fault Injection for Forensics -
Yashin Mehaboobe
-
2018/10/05
Talk : C0c0n
: Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? -
Roshy John
-
2018/10/10
Talk : Brucon
: Forging Trusts for Deception in Active Directory -
Nikhil Mittal
-
2018/10/10
Talk : Brucon
: Simplifying the art of instrumentation -
Krishnakant Patil
Rushikesh D Nandedkar
-
2018/10/15
Talk : Hacklu
: Come to the dark side! We have radical insurance groups & ransomware -
Ankit Gangwal
Eireann Leverett
-
2018/10/15
Talk : Hacklu
: Make ARM Shellcode Great Again -
Saumil Shah
-
2018/10/19
Talk : App Sec Day Australia
: Continuous Integration and Delivery with Docker Containers -
Vasant Kumar
-
2018/10/19
Talk : App Sec Day Australia
: Threat Modeling-as-Code & Automation for DevSecOps wins -
Abhay Bhargav
-
2018/11/02
Talk : Hitb Sec Conf
: Defending The Enterprise in 2018 -
Saumil Shah
-
2018/11/02
Talk : Hackfest
: Exploiting Connected Medical Devices: Lessons Learned & Data Earned -
Saurabh Harit
-
2018/11/27
Talk : Hitb Sec Conf
: BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit -
Rewanth Tammana
-
2018/11/27
Talk : Hitb Sec Conf
: COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding -
Vikash Yadav
-
2018/11/27
Talk : Hitb Sec Conf
: COMMSEC: Taking Over Telecom Networks -
Hardik Mehta
Loay Hassan Abdelrazek
-
2018/11/27
Talk : Hitb Sec Conf
: Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit -
Himanshu Mehta
Sachine Wagh
-
2018/11/29
Talk : Deepsec
: DNS Exfiltration and Out-of-Band Attacks -
Nitesh Shilpkar
-
2018/12/05
Tool Demo : Blackhat
: Arsenal
: Kurukshetra: Playground for Interactive Security Learning -
Anirudh Anand
Mohan Kallepalli
-
2018/12/05
Tool Demo : Blackhat
: Arsenal
: Mafia: Mobile Security Automation Framework for Intelligent Auditing -
Ankur Bhargava
Mohan Kallepalli
-
2018/12/05
Talk : Blackhat
: The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols -
N Asokan
Lachlan Gunn
Ricardo Vieitez Parra
-
2018/12/06
Talk : Blackhat
: AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace -
Vijay Thaware
Niranjan Agnihotri
-
2018/12/06
Tool Demo : Blackhat
: Arsenal
: Astra: Automated Security Testing For REST APIs -
Sagar Popat
Harsh Grover
-
2018/12/06
Tool Demo : Blackhat
: Arsenal
: Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit -
Jayesh Chauhan
-
2019/02/28
Talk : Nullcon
: A Hacker Walks into a Co-working Space -
Rahul Binjve
-
2019/02/28
Talk : Nullcon
: Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida -
Shivang Desai
-
2019/02/28
Talk : Nullcon
: Attacking & Securing HealthCare Standards & hospital secured systems -
Ajay Pratap Singh
-
2019/02/28
Talk : Nullcon
: Building Hardened IoT Implementations with LangSec -
Prashant Anantharaman
-
2019/02/28
Talk : Nullcon
: Dirty use of USSD Codes -
Ravishankar Borgaonkar
-
2019/02/28
Talk : Nullcon
: Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases -
Lavakumar Kuppan
Ankit Gupta
-
2019/03/01
Panel : Nullcon
: Breached? – Here is how I responded! -
Muslim Koser
Mrudul Uchil
Sachin Burman
Venkata Satish Guttula
Vijay K Verma
-
2019/03/01
Panel : Nullcon
: Clash of the Titans; who will survive? -
Burgess Cooper
Durga Dube
Vasanthika Srinath
Jaya Baloo
Shan Lee
-
2019/03/01
Panel : Nullcon
: Clear and Present Danger: Cyber Wars will Target Critical Infrastructure -
Sourabh Issar
Sachin Burman
Sudarshan Rajagopal
Somenath Kundu
-
2019/03/01
Panel : Nullcon
: Cybersecurity: Is Machine Learning the Answer? -
Rahul Sasi
Sitesh Behera
Sumeet Khokhani
Rui Bastos
-
2019/03/02
Panel : Nullcon
: Actionable Intelligence and Cyber Security -
Durga Dube
M Sheshadri
Rahul Sasi
Shrikant Shitole
Alan White
-
2019/03/02
Panel : Nullcon
: CISO Strategy for OT and IoT risk and Threat Management -
Gaurav Shukla
Gomeet Pant
Rakesh Viswanathan
Sudarshan Rajagopal
-
2019/03/02
Panel : Nullcon
: Navigating Risk in the Changing Business and Technology Landscape -
Rahul Neel Mani
Burgess Cooper
Manish Tiwari
Mannan Godil
-
2019/03/02
Panel : Nullcon
: The Myth of Sisyphus Secure Product Development -
Bipin Upadhyay
Minatee Mishra
Neelu Tripathy
Vaibhav Gupta
Vishal Sahani
-
2019/03/21
Talk : Troopers
: Evolution of kernel fuzzers in NetBSD -
Siddharth M
-
2019/03/28
Tool Demo : Blackhat
: Arsenal
: Archery - Open Source Vulnerability Assessment and Management- 2.0 -
Anand Tiwari
-
2019/03/28
Tool Demo : Blackhat
: Arsenal
: Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit -
Jayesh Chauhan
-
2019/03/28
Talk : Blackhat
: DevSecOps : What, Why and How -
Anant Shrivastava
-
2019/03/28
Talk : Blackhat
: Investigating Malware Using Memory Forensics - A Practical Approach -
Monnappa K A
-
2019/03/28
Tool Demo : Blackhat
: Arsenal
: Kurukshetra: Playground for Interactive Security Learning -
Anirudh Anand
Mohan Kallepalli
Ankur Bhargava
-
2019/03/28
Tool Demo : Blackhat
: Arsenal
: MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research -
Nilaksh Das
Evan Yang
Li Chen
-
2019/03/28
Tool Demo : Blackhat
: Arsenal
: OWASP Nettacker: Automated Penetration Testing Framework -
Sri Harsha Gajavalli
Ali Razmjoo Qalaei
Ehsan Nezami
-
2019/03/28
Tool Demo : Blackhat
: Arsenal
: pytm: A Pythonic Framework for Threat Modeling -
Rohit Shambhuni
Izar Tarandach
-
2019/03/28
Tool Demo : Blackhat
: Arsenal
: RTS: Real Time Scrapper -
Naveen Rudrappa
-
2019/03/28
Tool Demo : Blackhat
: Arsenal
: VoIP Wireshark Attack-Defense Toolkit -
Nishant Sharma
Jeswin Mathai
Ashish Bhangale
-
2019/03/29
Tool Demo : Blackhat
: Arsenal
: Halcyon IDE: Nmap Script Development IDE -
Sanoop Thomas
-
2019/05/09
Talk : Hitb Sec Conf
: GDALR: Duplicating Black Box Machine Learning Models -
Rewanth Tammana
Nikhil Joshi
-
2019/05/09
Talk : Hitb Sec Conf
: HAXPO: WiCy: Monitoring 802.11AC Networks at Scale -
Vivek Ramachandran
-
2019/05/09
Talk : Hitb Sec Conf
: Make ARM Shellcode Great Again -
Saumil Shah
-
2019/05/10
Talk : Hitb Sec Conf
: HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR -
Himanshu Mehta
Harshit Agrawal
-
2019/05/21
Talk : Phdays
: Active defense using Honeypots v2 -
Rahul Binjve
-
2019/05/21
Talk : Phdays
: Breaking Microsoft Edge extensions security policies -
Nikhil Mittal
-
2019/05/21
Talk : Phdays
: Fuzzing 101 -
Dhiraj Mishra
Zubin Devnani
-
2019/05/21
Talk : Phdays
: GDALR: an efficient model duplication attack on black-box machine learning models -
Rewanth Tammana
Nikhil Joshi
-
2019/05/21
Talk : Phdays
: How to fail in hardware hacking -
Arun Magesh
-
2019/05/21
Talk : Phdays
: Rapid hardware hacking 101 -
Arun Magesh
-
2019/06/02
Tool Demo : Defcon
: DemoLabs : VoIPShark: Open Source VoIP Analysis Platform -
Nishant Sharma
Jeswin Mathai
Ashish Bhangale
-
2019/08/05
Tool Demo : Blackhat
: Arsenal
: CertPivot: Infra-Chaining + Cert-Check -
Ajit Hatti
-
2019/08/07
Talk : Blackhat
: Defense Against Rapidly Morphing DDOS -
Mudit Tyagi
Mikhail Fedorov
-
2019/08/07
Tool Demo : Blackhat
: Arsenal
: Medaudit: Auditing Medical Devices and Healthcare Infrastructure -
Anirudh Duggal
-
2019/08/07
Talk : Blackhat
: New Vulnerabilities in 5G Networks -
Ravishankar Borgaonkar
Altaf Shaik
-
2019/08/07
Tool Demo : Blackhat
: Arsenal
: PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit -
Manish Gupta
-
2019/08/07
Tool Demo : Blackhat
: Arsenal
: RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting -
Sudhanshu Chauhan
Kunal Aggarwal
-
2019/08/07
Tool Demo : Blackhat
: Arsenal
: SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration/ -
Rushikesh D Nandedkar
Lalit Bhandari
-
2019/08/08
Talk : Blackhat
: 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans -
Jatin Kataria
Richard Housley
Ang Cui
-
2019/08/08
Talk : Defcon : Cloud Village
: Anatomy of cloud hacking -
Pratik Shah
-
2019/08/08
Tool Demo : Blackhat
: Arsenal
: Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit -
Jayesh Chauhan
-
2019/08/08
Tool Demo : Blackhat
: Arsenal
: CSF: Container Security Framework -
Vaibhav Gupta
-
2019/08/08
Talk : Blackhat
: Death to the IOC: What’s Next in Threat Intelligence -
Bhavna Soman
-
2019/08/08
Talk : Blackhat
: DevSecOps : What, Why and How -
Anant Shrivastava
-
2019/08/08
Tool Demo : Blackhat
: Arsenal
: EXPLIoT: IoT Security Testing and Exploitation Framework -
Aseem Jakhar
Murtuja Bharmal
-
2019/08/08
Tool Demo : Defcon
: DemoLabs : Hachi: An Intelligent threat mapper -
Parmanand Mishra
-
2019/08/08
Talk : Defcon : Lockpick Village
: Hacking ICS devices for Fun Penetration Testing of Vehicle Components -
Arun Mane
-
2019/08/08
Tool Demo : Defcon
: DemoLabs : Let’s Map Your Network -
Pramod Rana
-
2019/08/08
Tool Demo : Defcon
: DemoLabs : PcapXray -
Srinivas Piskala Ganesh Babu
-
2019/08/08
Talk : Defcon : Cloud Village
: Phishing in the cloud era -
Ashwin Vamshi
Abhinav Singh
-
2019/08/08
Talk : Blackhat
: Preventing Authentication Bypass: A Tale of Two Researchers -
Ravi Jaiswal
Terry Zhang
Ron Chan
-
2019/08/08
Tool Demo : Blackhat
: Arsenal
: RWDD: Remote Web Deface Detection Tool -
K v Prashant
Ade Yoseman Putra
-
2019/08/08
Talk : Defcon : Packethacking Village
: YOUR PHONE IS USING TOR AND LEAKING YOUR PII -
Milind Bhargava
Adam Podgorski
-
2019/08/09
Tool Demo : Defcon
: DemoLabs : EXPLIoT - IoT Security Testing and Exploitation Framework -
Aseem Jakhar
Murtuja Bharmal
-
2019/08/09
Tool Demo : Defcon
: DemoLabs : PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit -
Manish Gupta
-
2019/08/09
Tool Demo : Defcon
: DemoLabs : Srujan: Safer Networks for Smart Homes -
Sanket Karpe
Parmanand Mishra
-
2019/08/10
Tool Demo : Defcon
: DemoLabs : Local Sheriff -
Konark Modi
-
2019/08/10
Talk : Defcon
: RACE - Minimal Rights and ACE for Active Directory Dominance -
Nikhil Mittal
-
2019/08/11
Talk : Defcon : Appsec Village
: Exploiting and Securing iOS Apps using OWASP iGoat -
Swaroop Yermalkar
-
2019/08/11
Talk : Defcon : Appsec Village
: Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants -
Vandana Verma Sehgal
-
2019/08/29
Tool Demo : Hitb Sec Conf
: Halcyon IDE: An IDE for NMAP script developers -
Sanoop Thomas
-
2019/08/29
Keynote : Hitb Sec Conf
: The CISO’s Dilemma -
Saumil Shah
-
2019/08/29
Talk : Hitb Sec Conf
: Understanding, Attacking & Securing Medical Devices -
Ajay Pratap Singh
-
2019/08/30
Talk : Hitb Sec Conf
: COMMSEC: PErfidious: Make PE Backdooring Great Again! -
Shreyans Doshi
-
2019/09/13
Talk : 44 Con
: One Person Army – Playbook on how to be the first Security Engineer at a company -
Kashish Mittal
-
2019/09/13
Talk : 44 Con
: The CISO’s Dilemma -
Saumil Shah
-
2019/09/23
Talk : Rootcon
: APAD: An EDR Grade Agent for Wi-Fi Access Points -
Vivek Ramachandran
-
2019/09/23
Talk : Rootcon
: Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking -
Arun Mane
-
2019/09/23
Talk : Rootcon
: Hunting Threats with Wireshark Plugins -
Nishant Sharma
Jeswin Mathai
Shivam Bathla
-
2019/09/23
Talk : Rootcon
: Identity crisis: war stories from authentication failures -
Vishal Chauhan
-
2019/09/23
Talk : Rootcon
: Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) -
Arun Mane
Nikhil Bogam
-
2019/09/27
Talk : C0c0n
: A Day in the Life of a CISO -
Sridhar Govardhan
-
2019/09/27
Talk : C0c0n
: Advanced Persistent Threat and counter measures -
A a Gafoor
-
2019/09/27
Talk : C0c0n
: AI, ML and Security -
Varun Kohli
-
2019/09/27
Talk : C0c0n
: autoSource an automated framework for Source Code Review -
Malkit Singh
-
2019/09/27
Talk : C0c0n
: Block Chain for Secured Automation -
Sanat Bhat
-
2019/09/27
Talk : C0c0n
: Building a cloud security monitoring and auditing framework -
Nirali Shah
Prasoon Dwivedi
-
2019/09/27
Talk : C0c0n
: CISO Mind Set -
Dr Lopa Mudraa Basuu
-
2019/09/27
Talk : C0c0n
: Cyber Hygiene from Enterprise point of view -
Noorul Haq
-
2019/09/27
Talk : C0c0n
: Defense in Depth for Embedded Systems -
Jiggyasu Sharma
-
2019/09/27
Talk : C0c0n
: Demystifying HealthCare Security -
Ajay Pratap Singh
-
2019/09/27
Talk : C0c0n
: Detection of TOR Sources using Artificial Intelligence -
Roshy John
-
2019/09/27
Panel : C0c0n
: Digital Transformation and Evolving Governance Structure -
A Shiju Rawther
Ajith Balagopal
Balakrishnan A
Sreekumar Balachandran
-
2019/09/27
Talk : C0c0n
: Doing SecOps for the Cloud using Cloud Native Services -
Akash Mahajan
-
2019/09/27
Talk : C0c0n
: Golang for Pentesters / RedTeamers -
Anant Shrivastava
-
2019/09/27
Talk : C0c0n
: Hacking ICS devices for Fun -
Arun Mane
-
2019/09/27
Talk : C0c0n
: Industry 4.0 - Security and Compliance -
Santhosh Srinivasan
-
2019/09/27
Talk : C0c0n
: Lessons learned form data breaches in the cloud -
Ajay Agrawal
-
2019/09/27
Talk : C0c0n
: Looking a decade ahead: Big data, drones , Robots and cyber security. -
Rahul Sasi
-
2019/09/27
Talk : C0c0n
: Offensive Machine Learning for Pentesters and Red Teams -
Tamaghna Basu
-
2019/09/27
Talk : C0c0n
: Practical Approach to Cyber Security for financial institutions -
Georgie Kurien
-
2019/09/27
Talk : C0c0n
: RANSOMWARE - to pay or not to pay -
Seshaprakash Kusuma Sreenivasa
-
2019/09/27
Talk : C0c0n
: Securing Payment Data with PCI Security Standards and Programs -
Nitin Bhatnagar
-
2019/09/27
Talk : C0c0n
: Security @scale for startups -
Shivanath Somanathan
-
2019/09/27
Talk : C0c0n
: Serverless SOAR -
Sabyasachi Dhal
Suresh Sharma
-
2019/09/27
Panel : C0c0n
: Shouldn’t Organization disclose breaches - The need for a shared platform -
Sunil Varkey
Jacxine Fernandez
Rahul Sasi
K K Chaudhary
-
2019/09/27
Talk : C0c0n
: Stepping into Password Less Economy -
Ajit Hatti
-
2019/09/27
Talk : C0c0n
: VyAPI - The Vulnerable Hybrid Android App -
Riddhi Shree
-
2019/09/28
Panel : C0c0n
: Align security and risk management strategies with enterprise objectives -
Abdul Karim Vettiyanickal
George Eapen
Ranjeet Rai
Amit Dubey
Biju K
Kanu Pathania
-
2019/09/28
Panel : C0c0n
: Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions -
B R Nath
Jijy Oommen
Maya R Nair
Ajay Porus
Georgie Kurien
-
2019/09/28
Talk : C0c0n
: Vulnerability Prioritization with Threat Intelligence -
Muslim Koser
Devesh Vatsa
Rohit Srivastwa
Dinesh O Bareja
-
2019/10/10
Talk : Brucon
: Security transition from 4G to 5G: are we secure enough? -
Altaf Shaik
Ravishankar Borgaonkar
-
2019/10/14
Talk : Hitb Sec Conf
: CALL OF DUTY: MODERN BROWSER WARFARE -
Dhiraj Mishra
-
2019/10/14
Talk : Hitb Sec Conf
: IoT Pentesting The Right Way -
Yogesh Ojha
-
2019/10/14
Talk : Hitb Sec Conf
: ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES -
Harshit Agrawal
Himanshu Mehta
-
2019/10/15
Talk : Hitb Sec Conf
: Car Hacking: Practical Guide to Automotive Security -
Yogesh Ojha
-
2019/10/16
Tool Demo : Hitb Sec Conf
: Introducing ARM-X - The ARM IoT Firmware Emulation Framework -
Saumil Shah
-
2019/10/17
Talk : Hitb Sec Conf
: Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure -
Anima Anandkumar
-
2019/10/22
Talk : Hacklu
: Intro to Dark Arts: Getting Started with CTFs -
Geethna T K
Shruti Dixit
Sowmya Potluri
-
2019/11/01
Talk : App Sec Day Australia
: A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
-
2019/11/01
Talk : App Sec Day Australia
: Protecting the Damned: Deploying Insecure Applications at Scale -
Vivek Ramachandran
-
2019/11/01
Talk : Hackfest
: The Mechanics of Malware’s Darkside -
Yagnesh Waran P
Laura Harris
-
2019/11/28
Talk : Deepsec
: Mastering AWS Pentesting and Methodology -
Ankit Giri
-
2019/12/04
Talk : Blackhat
: Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing -
Karthik Ramasamy
Eric Hampshire
-
2019/12/04
Tool Demo : Blackhat
: Arsenal
: Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit -
Jayesh Chauhan
-
2019/12/04
Talk : Blackhat
: ClusterFuzz: Fuzzing at Google Scale -
Abhishek Arya
Oliver Chang
-
2019/12/04
Tool Demo : Blackhat
: Arsenal
: DumpTheGit -
Malkit Singh
-
2019/12/04
Tool Demo : Blackhat
: Arsenal
: RTTM: Real Time Threat Monitoring Tool -
Naveen Rudrappa
Murali Krishna Segu
-
2020/03/06
Talk : Nullcon
: Automated Classification of Web-Application Attacks for Intrusion Detection -
Aneet Kumar Dutta
-
2020/03/06
Tool Demo : Nullcon
: Callidus -
Chirag Savla
-
2020/03/06
Talk : Nullcon
: Cloud As an Attack vector -
Ashwin Vamshi
Rushikesh Vishwakarma
-
2020/03/06
Panel : Nullcon
: Complication in security practices -
Himanshu Das
Neelu Tripathy
Kushal Das
Ankur Bhargava
Vaibhav Gupta
-
2020/03/06
Tool Demo : Nullcon
: F.R.I.D.A.Y -
Shyam Sundar Ramaswami
-
2020/03/06
Tool Demo : Nullcon
: FRISPY -
Tejas Girme
Parmanand Mishra
-
2020/03/06
Tool Demo : Nullcon
: FuzzCube -
Anto Joseph
-
2020/03/06
Tool Demo : Nullcon
: Hachi -
Parmanand Mishra
-
2020/03/06
Talk : Nullcon
: InfoSec Deep Learning in Action -
Satnam Singh
-
2020/03/06
Panel : Nullcon
: Lessons from the Cyber Trenches -
Shivkumar Pandey
Manish Tiwari
Venkatesh Subramaniam
Jacxine Fernandez
Burgess Cooper
Ramesh Kumar
-
2020/03/06
Tool Demo : Nullcon
: Mobexler -
Abhinav Mishra
Abhishek Jaiswal
-
2020/03/06
Tool Demo : Nullcon
: Omniscient -
Pramod Rana
-
2020/03/06
Tool Demo : Nullcon
: Phishing Simulation -
Jyoti Raval
-
2020/03/06
Tool Demo : Nullcon
: PivotSuite -
Manish Gupta
-
2020/03/06
Panel : Nullcon
: Predicting Danger: Building the Ideal Threat Intelligence Model -
Saikat Datta
Sandeep Sharma
Muslim Koser
Shankar Jadhav
-
2020/03/06
Tool Demo : Nullcon
: Providence -
Swapnil Kumbhar
Akshay Shah
-
2020/03/06
Talk : Nullcon
: Putting it all together: building an iOS jailbreak from scratch -
Umang Raghuvanshi
-
2020/03/06
Tool Demo : Nullcon
: SASTRI -
Rushikesh D Nandedkar
Lalit Bhandari
-
2020/03/06
Panel : Nullcon
: Securing the Human Factor -
Rahul Neel Mani
Phoram Mehta
Burgess Cooper
Manish Tiwari
Venkatesh Subramaniam
-
2020/03/06
Tool Demo : Nullcon
: spike2kill -
Manish Singh
-
2020/03/06
Tool Demo : Nullcon
: Talisman -
Suhas Vishwanath
-
2020/03/06
Tool Demo : Nullcon
: VyAPI -
Riddhi Shree
-
2020/03/06
Tool Demo : Nullcon
: Wolverine -
Furqan Khan
Siddharth Anbalahan
-
2020/03/07
Panel : Nullcon
: Economics Of Data Breach And Attack -
Bhaskar Medhi
Manu Zacharia
Suchit Mishra
Yash Kadakia
-
2020/03/07
Panel : Nullcon
: Hack the law: Protection for cybersecurity research in India -
Apar Gupta
Manu Zacharia
Raman Jit Singh Chima
Neelu Tripathy
-
2020/03/07
Panel : Nullcon
: Supply Chain Security In Critical Infrastructure Systems -
Manish Tiwari
Suchit Mishra
Faruk Kazi
Cristofaro Mune
-
2020/03/18
Talk : Can Sec West
: The ARM-X Firmware Emulation Framework -
Saumil Shah
-
2020/04/24
Talk : Hitb Sec Conf
: COMMSEC: The State of ICS Security : Then and Now -
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
-
2020/04/25
Talk : Hitb Sec Conf
: THE STATE OF ICS SECURITY: THEN AND NOW -
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
-
2020/07/05
Tool Demo : Blackhat
: Arsenal
: Mobile Security Framework - MobSF -
Ajin Abraham
-
2020/07/26
Talk : Hitb Sec Conf
: Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company -
Himanshu Sharma
Aman Sachdev
-
2020/08/05
Talk : Blackhat
: Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic -
Harini Kannan
Nick Gregory
-
2020/08/05
Tool Demo : Blackhat
: Arsenal
: vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) -
Pramod Rana
-
2020/08/06
Tool Demo : Blackhat
: Arsenal
: Dynamic Labs: Windows & Active Directory Exploitation -
Rohan Durve
-
2020/08/06
Tool Demo : Blackhat
: Arsenal
: FuzzCube -
Anto Joseph
-
2020/08/06
Talk : Blackhat
: How I Created My Clone Using AI - Next-Gen Social Engineering -
Tamaghna Basu
-
2020/08/06
Panel : Blackhat
: Locknote: Conclusions and Key Takeaways from Day 2 -
Aanchal Gupta
Kymberlee Price
Rodrigo Rubira Branco
Stefano Zanero
-
2020/08/06
Talk : Blackhat
: Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community -
Vandana Verma Sehgal
-
2020/08/06
Tool Demo : Blackhat
: Arsenal
: MSTICpy: The Security Analysis Swiss Army Knife -
Ashwin Patil
Pete Bryan
Ian Hellen
-
2020/08/07
Panel : Defcon
: D0 N0 H4RM: A Healthcare Security Conversation -
Vidha Murthy
Christian Dameff
Jeff Tully
Jessica Wilkerson
Veronica Schmitt
Ash Luft
-
2020/08/09
Talk : Defcon : Appsec Village
: Running an appsec program with open source projects -
Vandana Verma Sehgal
-
2020/09/18
Talk : C0c0n
: Herd Immunity, in the Cyber World -
Sunil Varkey
-
2020/09/18
Talk : C0c0n
: How I created my clone using AI - next-gen Social Engineering -
Tamaghna Basu
-
2020/09/18
Talk : C0c0n
: Introducing SniperPhish: A Web-Email Spear Phishing Toolkit -
Sreehari Haridas
Gem George
-
2020/09/18
Talk : C0c0n
: Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment -
Madhu Akula
-
2020/09/18
Talk : C0c0n
: Web Application hacking with WebZGround -
Parveen Yadav
Narendra Kumar
-
2020/09/18
Talk : C0c0n
: All about IOT Forensics -
Hima Bindu Vejella
-
2020/09/18
Talk : C0c0n
: Automation in Bug Bounties to Work Smarter -
Prerak Mittal
-
2020/09/18
Talk : C0c0n
: Broken Cryptography & Account Takeover -
Harsh Bothra
-
2020/09/18
Talk : C0c0n
: Coping with Digital Transformation - A CISO perspective -
Maya R Nair
-
2020/09/18
Talk : C0c0n
: COVID-19 Cyber impact on financial sector and remote employees -
Amit Dubey
Tal Catran
Yair Feldman
-
2020/09/18
Talk : C0c0n
: Cyber Security Shifts During COVID-19 -
Sunil Kanchi
-
2020/09/18
Keynote : C0c0n
: Data protection and Privacy Data protection and Privacy -
Kris Gopalakrishnan
-
2020/09/18
Talk : C0c0n
: Deep Learning for Intrusion Attempt Detection -
Varun Kohli
-
2020/09/18
Talk : C0c0n
: Demystifying Zero Trust - A Real world -
Sandeep Variyam
-
2020/09/18
Talk : C0c0n
: My top 3 findings in bug Bounty journey | Aiming for high impact issues -
Ankit Giri
-
2020/09/18
Talk : C0c0n
: Offensive & Scope Based Recon -
Harsh Bothra
-
2020/09/18
Talk : C0c0n
: Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
Kaustubh Padwad
-
2020/09/18
Talk : C0c0n
: Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux -
Munawwar Hussain Shelia
-
2020/09/18
Talk : C0c0n
: Supercharging your initial foothold in Red Team engagements -
Sachin S Kamath
-
2020/09/19
Talk : C0c0n
: Automate your Recon with ReconNote -
Prasoon Gupta
-
2020/10/01
Tool Demo : Blackhat
: Arsenal
: Adhrit: Android Security Suite -
Abhishek Jm
Akhil Mahendra
-
2020/10/01
Talk : Blackhat
: Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community -
Vandana Verma Sehgal
-
2020/10/01
Tool Demo : Blackhat
: Arsenal
: Mobexler: An All-in-One Mobile Pentest VM -
Abhinav Mishra
-
2020/10/01
Tool Demo : Blackhat
: Arsenal
: OWASP Python Honeypot -
Sri Harsha Gajavalli
Ali Razmjoo
-
2020/10/01
Tool Demo : Blackhat
: Arsenal
: Wi-Fi Access Point Rootkits -
Nishant Sharma
Jeswin Mathai
-
2020/10/02
Tool Demo : Blackhat
: Arsenal
: MalViz.ai -
Vasu Sethia
Shivam Kataria
-
2020/10/02
Tool Demo : Blackhat
: Arsenal
: OWASP Nettacker -
Sri Harsha Gajavalli
Ali Razmjoo Qalaei
Sam Stepanyan
-
2020/10/02
Tool Demo : Blackhat
: Arsenal
: Phishing Simulation Assessment -
Jyoti Raval
-
2020/10/07
Talk : Rootcon
: Automating Threat Hunting on the Dark Web and other nitty-gritty thingso -
Apurv Singh Gautam
-
2020/10/07
Talk : Rootcon
: Blockchain Based OT Monitoring Solution (BBOTMS) -
Asif Hameed Khan
Gagan Jattana
-
2020/10/07
Talk : Rootcon
: How I Pwned the ICS data during my internship -
Shail Patel
-
2020/10/07
Talk : Rootcon
: Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
Kaustubh Padwad
-
2020/10/07
Talk : Rootcon
: ReconPal: Leveraging NLP for Infosec -
Nishant Sharma
Jeswin Mathai
-
2020/10/07
Talk : Rootcon
: Zero Trust in the Era of Cloud -
Vandana Verma Sehgal
-
2020/11/20
Talk : Deepsec
: What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis -
Shyam Sundar Ramaswami
-
2020/12/09
Tool Demo : Blackhat
: Arsenal
: ArcherySec 2.0 - Open Source Vulnerability Assessment and Management -
Anand Tiwari
-
2020/12/09
Tool Demo : Blackhat
: Arsenal
: HosTaGe: mobile honeypots for rapid deployment -
Shreyas Srinivasa
Emmanouil Vasilomanolakis
Eirini Lygerou
-
2020/12/09
Tool Demo : Blackhat
: Arsenal
: Strafer: A Tool to Detect Infections in Elasticsearch Instances -
Rohit Bansal
Aditya K Sood
-
2020/12/10
Tool Demo : Blackhat
: Arsenal
: AndroGoat: Learn Android Application Security Testing -
Satish Patnayak
-
2020/12/10
Talk : Blackhat
: Effective Vulnerability Discovery with Machine Learning -
Asankhaya Sharma
Ming Yi Ang
-
2020/12/10
Tool Demo : Blackhat
: Arsenal
: reNgine: an automated reconnaissance Framework -
Yogesh Ojha
-
2021/03/05
Talk : Nullcon
: Arbitrary code execution on RISC-V using fault injection -
Praveen Vadnala
Nils Wiersma
-
2021/03/05
Panel : Nullcon
: CyberPhysical Systems Security - Trends, challenges & opportunities -
Frank Sanjay
Khushwant Pawar
Mayur Mehta
Faruk Kazi
-
2021/03/05
Panel : Nullcon
: Tech Startups/Businesses and Infonomics -
Sourabh Issar
Burgess Cooper
Joerg Simon
-
2021/03/05
Talk : Nullcon
: Telecom Security Challenges in 5G -
Akib Sayyed
-
2021/03/06
Talk : Nullcon
: Bug hunter adventures -
Shreyas Dighe
Yuvraj Dighe
-
2021/03/06
Panel : Nullcon
: From Reactive to Proactive - Operationalizing your Threat Intel -
Akshat Jain
Amit Ghodekar
Suhas Desai
Ambuj Bhalla
-
2021/05/06
Tool Demo : Blackhat
: Arsenal
: Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way -
Vasant Kumar
Rupali Dash
-
2021/05/06
Tool Demo : Blackhat
: Arsenal
: FalconEye: Windows Process Injection Techniques - Catch Them All -
Rajiv Kulkarni
Sushant Paithane
-
2021/05/06
Talk : Blackhat
: Threat Hunting in Active Directory Environment -
Anurag Khanna
Thirumalai Natarajan Muthiah
-
2021/05/07
Tool Demo : Blackhat
: Arsenal
: CANalyse: A Vehicle Network Analysis and Attack Tool -
Kartheek Lade
-
2021/05/07
Panel : Blackhat
: Insights and Predictions: What’s Next in InfoSec -
Vandana Verma Sehgal
Neil R. Wyler
Lidia Giuliano
Jeff Wilson
Vitaly Kamluk
-
2021/08/04
Tool Demo : Blackhat
: Arsenal
: Attack Surface Framework -
Prajwal Panchmahalkar
Mauricio Espinosa
-
2021/08/04
Tool Demo : Blackhat
: Arsenal
: Automated Attack Path Planning and Validation (A2P2V) -
Subir Das
Fukutomo Nakanishi
Jason Youzwak
Michael Hylkema
Santoshi Aoki
-
2021/08/04
Tool Demo : Blackhat
: Arsenal
: Counterfit: Attacking Machine Learning in Blackbox Settings -
Raja Sekhar Rao Dheekonda
Will Pearce
-
2021/08/04
Tool Demo : Blackhat
: Arsenal
: Joern: An Interactive Shell for Code Analysis -
Suchakra Sharma
Vickie Li
Fabian Yamaguchi
-
2021/08/04
Tool Demo : Blackhat
: Arsenal
: Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool -
Pralhad Chaskar
Vasant Kumar
-
2021/08/04
Tool Demo : Blackhat
: Arsenal
: ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing -
Parbati Kumar Manna
-
2021/08/04
Talk : Blackhat
: Siamese Neural Networks for Detecting Brand Impersonation -
Jugal Parikh
Nitin Kumar Goel
Justin Grana
Yuchao Dai
-
2021/08/05
Talk : Blackhat
: 5G IMSI Catchers Mirage -
Ravishankar Borgaonkar
Altaf Shaik
-
2021/08/05
Talk : Blackhat
: PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors -
Hareesh Khattri
Nagaraju N Kodalapura
Nam N Nguyen
-
2021/08/05
Tool Demo : Blackhat
: Arsenal
: reNgine: An Automated Reconnaissance Framework -
Yogesh Ojha
-
2021/08/05
Talk : Defcon : Recon Village
: The Bug Hunter’s Recon Methodology -
Tushar Verma
-
2021/08/05
Talk : Blackhat
: The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks -
Ambrish Rawat
Killian Levacher
Mathieu Sinn
-
2021/08/06
Panel : Defcon : Adversary Village
: Adversary simulation, emulation or purple teaming - How would you define it? -
Anant Shrivastava
Vincent Yiu
Martin Ingesen
Jean Marie Bourbon
Samuel Kimmons
Joe Vest
-
2021/08/06
Talk : Defcon : Adversary Village
: Adversary village Kick-off -
Abhijith B R
-
2021/08/06
Talk : Defcon : Iot Village
: Defending IoT in the Future of High-Tech Warfare -
Harshit Agrawal
-
2021/08/07
Tool Demo : Defcon : Adversary Village
: DemoLabs : Red Team Credentials Reconnaissance (OLD with a TWIST) -
Shantanu Khandelwal
-
2021/08/07
Tool Demo : Defcon : Adversary Village
: DemoLabs : Tenacity- An Adversary Emulation Tool for Persistence -
Atul Nair
Harshal Tupsamudre
-
2021/08/07
Talk : Defcon : Appsec Village
: The Curious Case of Knowing the Unknown -
Vandana Verma Sehgal
-
2021/08/08
Talk : Defcon : Appsec Village
: AppSec 101: A Journey from Engineer to Hacker -
Arjun Gopalakrishna
-
2021/08/08
Panel : Defcon : Adversary Village
: Resilient cyber space: The role of hacker and security communities -
Manu Zacharia
Aseem Jakhar
Abhijith B R
Jay Turla
Omar Santos
Dave Lewis
Dhillon Kannabhiran
-
2021/08/08
Talk : Defcon : Ics Village
: Top 20 Secure PLC Coding Practices -
Vivek Ponnada
Sarah Fluchs
-
2021/08/26
Talk : Hitb Sec Conf
: Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade -
Harshit Agrawal
-
2021/08/27
Talk : Hitb Sec Conf
: Securing Webviews and The Story Behind CVE-2021–21136 -
Shiv Sahni
Imdadullah Mohammed
-
2021/10/13
Tool Demo : Rootcon
: Buzzard : Crafting your post exploitation framework against odds -
Aravindha Hariharan
Subhajeet Singha
-
2021/10/13
Talk : Rootcon
: The Kill Chain: Future of Cyber in Defense -
Harshit Agrawal
-
2021/10/15
Talk : Rootcon
: The Curious case of knowing the unknown -
Vandana Verma Sehgal
-
2021/11/04
Talk : Ekoparty
: DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system -
Saransh Rana
Divyanshu Mehta
Harsh Varagiya
-
2021/11/10
Tool Demo : Blackhat
: Arsenal
: Adhrit: Android Security Suite -
Abhishek Jaiswal
Abhishek Jm
Rahul Sani
-
2021/11/10
Tool Demo : Blackhat
: Arsenal
: Kubestriker: A Blazing Fast Security Auditing Tool -
Vasant Kumar
-
2021/11/10
Tool Demo : Blackhat
: Arsenal
: RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot -
Abhimanyu Rawat
Shreyas Srinivasa
Emmanouil Vasilomanolakis
-
2021/11/10
Tool Demo : Blackhat
: Arsenal
: Wireshark Forensics Toolkit -
Rishikesh Bhide
-
2021/11/11
Tool Demo : Blackhat
: Arsenal
: Damn Vulnerable Bank -
Akshansh Jaiswal
Hrushikesh Kakade
Rewanth Tammana
-
2021/11/11
Tool Demo : Blackhat
: Arsenal
: DejaVu ++ -
Bhadreshkumar Patel
Harish Ramadoss
-
2021/11/11
Tool Demo : Blackhat
: Arsenal
: Kubernetes Goat: Interactive Kubernetes Security Learning Playground -
Madhu Akula
-
2021/11/11
Tool Demo : Blackhat
: Arsenal
: vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10) -
Tushar Kulkarni
-
2021/11/12
Talk : C0c0n
: “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering -
Ruchira Pokhriyal
Shashi Karhail
-
2021/11/12
Talk : C0c0n
: 2021 Supply Chain Attacks Analysis -
Ajit Hatti
-
2021/11/12
Panel : C0c0n
: Cyber Security - Crystal Gazing in to the future -
Burgess Cooper
-
2021/11/12
Talk : C0c0n
: Data Security and Privacy -
Abhilasha Vyas
-
2021/11/12
Talk : C0c0n
: Dissecting Malicious Software and Analysis -
Shrutirupa Banerjiee
-
2021/11/12
Panel : C0c0n
: Diversity and Inclusion -
Aarushi Koolwal
Hussaina Begum
Nehal Mehta
Shivani Sharma
-
2021/11/12
Talk : C0c0n
: Enterprise Governance and Risk Management -
Arathy Nair
Muskan Mangla
-
2021/11/12
Talk : C0c0n
: Executive Presence….a cardinal of the cyber rostrum -
Bishakha Jain
-
2021/11/12
Talk : C0c0n
: ICS Security —- A need, a challenge and a new change in Mindset -
Dhruv Gupta
-
2021/11/12
Talk : C0c0n
: IoT Security Guidelines & Standards -
Yashodhan Vivek Mandke
-
2021/11/12
Talk : C0c0n
: Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches -
Illyas Kooliyankal
-
2021/11/12
Talk : C0c0n
: Regulating Social Media Platforms : Should it be done in Democratic Societies ? -
J Sam Daniel Stalin
Apar Gupta
Dinesh O Bareja
Prashant Mali
Jiten Jain
-
2021/11/12
Panel : C0c0n
: Stopping Breaches with CrowdStrike -
Sandeep Rao
-
2021/11/12
Talk : C0c0n
: The evolving nature of cyber community -
Aastha Sahni
-
2021/11/12
Talk : C0c0n
: Understanding the Psychology Behind Threats - adding Twists to your Turns -
Saman Fatima
-
2021/11/13
Talk : C0c0n
: Decoding new age hackers and Criminal Investigation -
Amit Dubey
-
2021/11/13
Talk : C0c0n
: A look into cyber-espionage activities targeting critical infrastructure in India -
Saurabh Sharma
Kurt Baumgartner
-
2021/11/13
Talk : C0c0n
: Building Global Cyber Security Company Out of India: Key Lessons Learnt During My Entrepreneurship Journey -
Bikash Barai
-
2021/11/13
Talk : C0c0n
: Case Study - Cyber Heist in a Bank and Recovery of Systems and Money -
Prashant Choudhary
-
2021/11/13
Talk : C0c0n
: Case study - E-crime group targeting mobile users -
Rahul Sasi
-
2021/11/13
Talk : C0c0n
: Changing Cyber Security Paradigm & Cyber Tsunami -
Sunil Varkey
-
2021/11/13
Talk : C0c0n
: Cloud Threat landscape -
Gunjan Chhillar
-
2021/11/13
Talk : C0c0n
: Connecting the dots between customers and security teams -
Shruthi Kamath
-
2021/11/13
Talk : C0c0n
: Crisis Capitalization in a Pandemic -
Greeshma M R
-
2021/11/13
Talk : C0c0n
: Cyber Warfare & Securing Critical Infrastructures -
Faruk Kazi
-
2021/11/13
Talk : C0c0n
: Cybersecurity in the era of Resilience - A walk through people, process and technology -
Babitha B P
-
2021/11/13
Talk : C0c0n
: Emerging trends in cyber crimes : Investigation tools & techniques -
Triveni Singh
-
2021/11/13
Talk : C0c0n
: Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics -
Kiran Kumar Pg
-
2021/11/13
Talk : C0c0n
: Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application -
Gayatri Nayak
-
2021/11/13
Panel : C0c0n
: Human errors & system misconfigurations- We can handle it! -
Amit Dubey
Maninder Singh
Tulika Pandey
Tal Catran
Dunston Pereira
Angel Redoble
-
2021/11/13
Talk : C0c0n
: Introducing Free & Open Elastic Limitless XDR -
Ravindra Ramnani
-
2021/11/13
Talk : C0c0n : Adversary Village
: Light Basin - Telecom roaming network attack case study -
Akib Sayyed
-
2021/11/13
Talk : C0c0n
: Machine learning to detect Chia mining -
Varun Kohli
-
2021/11/13
Talk : C0c0n
: Mature Your Threat Hunting Program -
Neha Dhyani
-
2021/11/13
Talk : C0c0n
: Need for Zero Trust in Banking -
Biju K
-
2021/11/13
Talk : C0c0n
: New way of looking at the hidden mysteries in the code -
Vandana Verma Sehgal
-
2021/11/13
Talk : C0c0n : Adversary Village
: Painting Your Organizations with Shades of Red, Blue & Purple -
Hidayath Khan
-
2021/11/13
Talk : C0c0n
: Post pandemic Transformation - A CISO’s perspective -
Sridhar Govardhan
-
2021/11/13
Talk : C0c0n
: Securing OT in O&G Industry -
George Eapen
-
2021/11/13
Talk : C0c0n
: Server-side javascript Injection -
Kavisha Sheth
-
2021/11/13
Talk : C0c0n
: Third Party Risk Management -
Mahesh Kalyanaraman
-
2021/11/13
Talk : C0c0n
: Zero Trust & Micro-segmentation -
Suresh Menon
-
2021/11/18
Talk : Hackinparis
: {Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets -
Aditya K Sood
-
2021/11/18
Talk : Hackinparis
: Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS -
Kavisha Sheth
-
2021/11/25
Tool Demo : Hitb Sec Conf
: reNgine: Using reNgine for automated reconnaissance and continous monitoring, how and why! -
Yogesh Ojha
-
2021/11/25
Tool Demo : Hitb Sec Conf
: vAPI: Vulnerable Adversely Programmed Interface -
Tushar Kulkarni
-
2022/04/08
Talk : Nullcon
: Attack Surfaces for 5G Networks -
Altaf Shaik
-
2022/04/08
Talk : Nullcon
: Bheem OS - A next-generation reasonably secure OS using Rust MicroVM -
Akram Ansari
Subash Sn
-
2022/04/08
Panel : Nullcon
: Digital Identity In The Age Of Fintech -
Sheetal Joseph
Alessandro Avagliano
Guido Reismueller
Benoit Flippen
Travis Carelock
-
2022/05/12
Keynote : Blackhat
: Keynote: #HackingDemocracy: Will Our Societies Hold? -
Samir Saran
-
2022/05/12
Panel : Blackhat
: Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 -
Vandana Verma Sehgal
Jeff Moss
Ryan Flores
Lidia Giuliano
Stefano Zanero
-
2022/05/12
Tool Demo : Blackhat
: Arsenal
: Mitigating Open Source Software Supply Chain Attacks -
Ajinkya Rajput
Ashish Bijlani
-
2022/05/12
Tool Demo : Blackhat
: Arsenal
: Nightingale: Docker for Pentesters -
Raja Nagori
-
2022/05/12
Tool Demo : Blackhat
: Arsenal
: Node Security Shield -
Lavakumar Kuppan
Sukesh Pappu
-
2022/05/12
Talk : Blackhat
: Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems -
Prashant Rajput
Michail Maniatakos
-
2022/05/12
Tool Demo : Blackhat
: Arsenal
: Patronus: Swiss Army Knife SAST Toolkit -
Akhil Mahendra
Akshansh Jaiswal
Ashwin Shenoi
-
2022/05/12
Tool Demo : Blackhat
: Arsenal
: ReconPal: Leveraging NLP for Infosec -
Jeswin Mathai
Shantanu Kale
Sherin Stephen
-
2022/05/12
Tool Demo : Blackhat
: Arsenal
: ThunderCloud: Attack Cloud Without Keys! -
Shivankar Madaan
-
2022/05/18
Panel : Phdays
: Challenges for cybersecurity conferences. Part II -
Aseem Jakhar
Timur Yunusov
Igor Lukic
Dhillon Andrew Kannabhiran
-
2022/05/18
Talk : Can Sec West
: Launching EMUX - A framework for emulating ARM and MIPS IoT Devices -
Saumil Shah
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: Adhrit: Android Security Suite -
Amrudesh Balakrishnan
Rahul Sani
Abhishek Jm
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: ArcherySec - Manage and Automate your Vulnerability Assessment -
Anand Tiwari
-
2022/08/10
Talk : Blackhat
: Attacks From a New Front Door in 4G & 5G Mobile Networks -
Altaf Shaik
Shinjo Park
Matteo Strada
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: AWSGoat : A Damn Vulnerable AWS Infrastructure -
Nishant Sharma
Jeswin Mathai
Sanjeev Mahunta
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: AzureGoat : A Damn Vulnerable Azure Infrastructure -
Jeswin Mathai
Nishant Sharma
Rachna Umaraniya
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: CANalyse (2.0): A vehicle network analysis and attack tool -
Kartheek Lade
Rahul J
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: CASPR - Code Trust Audit Framework -
Ajit Hatti
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: HazProne : Cloud Hacking -
Devansh Patel
Staford Titus S
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: Node Security Shield - A Lightweight RASP for NodeJS Applications -
Lavakumar Kuppan
Sukesh Pappu
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) -
Parbati Kumar Manna
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: ReconPal: Leveraging NLP for Infosec -
Jeswin Mathai
Shantanu Kale
Sherin Stephen
-
2022/08/10
Talk : Blackhat
: The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting -
Sameer Koranne
John Dwyer
Neil Wyler
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: Vajra - Your Weapon To Cloud -
Raunak Parmar
-
2022/08/10
Tool Demo : Blackhat
: Arsenal
: What’s new in reNgine? -
Yogesh Ojha
-
2022/08/11
Talk : Blackhat
: ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron -
Mohan Sri Rama Krishna Pedhapati
Aaditya Purani
Max Garrett
William Bowling
-
2022/08/11
Talk : Blackhat
: Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol -
Subhechha Subudhi
Clara Maine
Akke Toeter
Victoria Bosch
-
2022/08/11
Tool Demo : Blackhat
: Arsenal
: Octopii - AI-powered Personal Identifiable Information (PII) scanner -
Owais Shaikh
-
2022/08/11
Tool Demo : Blackhat
: Arsenal
: Patronus: Swiss Army Knife SAST Toolkit -
Akhil Mahendra
Akshansh Jaiswal
Ashwin Shenoi
-
2022/08/11
Talk : Blackhat
: RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems -
Soundarya Ramesh
Levente Csikor
Hoon Wei Lim
Jun Wen Wong
Rohini Poolat Parameswarath
Chan Mun Choon
-
2022/08/12
Panel : Defcon : Appsec Village
: Agility Broke AppSec. Now It’s Going to Fix It. -
Vandana Verma Sehgal
Roy Erlich
Emil Vaagland
Seth Kirschner
-
2022/08/12
Talk : Defcon : Ics Village
: Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years -
Vivek Ponnada
-
2022/08/13
Panel : Defcon : Adversary Village
: Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs -
Niru Ragupathy
-
2022/08/14
Talk : Defcon : Ics Village
: Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right -
Vivek Ponnada
-
2022/08/25
Talk : Hitb Sec Conf
: Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle -
Rahul Sasi
Vishal Singh
-
2022/08/25
Talk : Hitb Sec Conf
: MPT: Pentest In Action -
Jyoti Raval
-
2022/08/26
Talk : Hitb Sec Conf
: CAN A FUZZER MATCH A HUMAN -
Bhargava Shastry
-
2022/09/06
Panel : Nullcon
: Securing the Software -
Mrudul Uchil
Abhisek Datta
Harish Goel
Matthew Bohne
-
2022/09/06
Panel : Nullcon
: Cloud Services for Financial Inclusion: Possibilities & Challenges -
Nandkumar Saravade
Ganesh Ar
Himanshu Das
Navin Kumar Singh
-
2022/09/06
Panel : Nullcon
: Consumer Tech Bug Bounty Panel: Hear from the Program Managers -
Sandeep Singh
Rishika Hooda
Omar Benbouazza
-
2022/09/06
Panel : Nullcon
: Does your SOC sucks? -
Krishna Pandey
Shweta Kshirsagar
Vivek Gopalan
Yogi Kapur
-
2022/09/06
Panel : Nullcon
: Impact of disruptive technologies on CISO’s career & progression -
Burgess Cooper
Sandeep Karan
Jacxine Fernandez
Ravi Kumar
Ankur Bhargava
-
2022/09/06
Panel : Nullcon
: IoT Supply Chain Blues and the way forward -
Aseem Jakhar
Kedar Sovani
Anantharaman Iyer
Suvabrata Sinha
Sudarshan Rajagopal
Sachin Jain
-
2022/09/06
Panel : Nullcon
: PAM Maturity From Zero Trust To Least Privilege -
Ajay Bongirwar
Charanjit Bhatia
Bala Ramanan
-
2022/09/06
Panel : Nullcon
: Secure Service Edge (SSE): Challenges & Upsides of Adoption -
Rahul Neel Mani
Anuprita Daga
Rajesh Hemrajani
-
2022/09/06
Panel : Nullcon
: Securing India The CERTIn Way -
Saikat Datta
Sanjay Bahl
Ajit Menon
Anuprita Daga
-
2022/09/06
Panel : Nullcon
: Unlocking Security Collaboration With Cyber Threat Intelligence -
Avkash Kathiriya
Varun Singla
Mathan Babu Kasilingam
Amol Naik
-
2022/09/07
Talk : Nullcon
: Do PDF Tools Conform To The Specification? -
Prashant Anantharaman
-
2022/09/07
Talk : Nullcon
: ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron -
Mohan Sri Rama Krishna Pedhapati
Maxwell Garrett
-
2022/09/07
Talk : Nullcon
: Hack The Bridge -
Anto Joseph
-
2022/09/07
Talk : Nullcon
: Hacking 5G Is No Rocket Science -
Altaf Shaik
Matteo Strada
-
2022/09/07
Talk : Nullcon
: Hacking Android Foreground Services Escalation Of Privileges -
Rony Das
-
2022/09/07
Talk : Nullcon
: Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls -
Shyam Sundar Ramaswami
Rakesh Mahanthi
-
2022/09/07
Talk : Nullcon
: Scale hacking to secure your cloud and beyond -
Anand Prakash
-
2022/09/07
Talk : Nullcon
: Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj -
Devdutt Patnaik
Ashish Bijlani
-
2022/09/08
Talk : Nullcon
: Automate Your Whatsapp Chats -
Aditi Bhatnagar
-
2022/09/08
Talk : Nullcon
: Hack the Source: Securing Open Source Software – One bug at a time -
Sandeep Singh
Laurie Mercer
-
2022/09/08
Talk : Nullcon
: Handling A Bug Bounty program From A Blue Team Perspective -
Ashwath Kumar
Ankit Anurag
-
2022/09/08
Talk : Nullcon
: Pushing Security Left By Mutating Byte Code -
Gaurav Gogia
-
2022/09/08
Talk : Nullcon
: Raining CVEs On WordPress Plugins With Semgrep -
Shreya Pohekar
Syed Sheeraz Ali
-
2022/09/08
Talk : Nullcon
: The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple -
Amit Malik
Pratik Jeware
-
2022/09/08
Tool Demo : Nullcon
: Vajra - Your Weapon To Cloud -
Raunak Parmar
-
2022/09/08
Talk : Nullcon
: vPrioritizer: Art of Risk Prioritization -
Pramod Rana
-
2022/09/08
Talk : Nullcon
: Web3.0 - Smart Contracts Could Be Leaky -
Riddhi Shree
-
2022/09/08
Tool Demo : Nullcon
: ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs -
Rohit Sehgal
Varun Kakumani
-
2022/09/23
Talk : C0c0n
: A Tale of Credential Leak of a Popular Cloud Threat Actor -
Nitesh Surana
-
2022/09/23
Talk : C0c0n
: Attacking connected industries in 5G networks -
Altaf Shaik
-
2022/09/23
Talk : C0c0n
: Battle of 300 Crore - how they lost it and got most of it back -
Prashant Choudhary
-
2022/09/23
Talk : C0c0n
: Bridging the gap between Security and Operations -
Sujay Rajashekar Gundagatti
-
2022/09/23
Talk : C0c0n
: Building a Safer and Innovative Digital Ecosystem -
Vijay Pamarathi
-
2022/09/23
Talk : C0c0n
: Collaborative efforts for safe digital banking -
Biju K
-
2022/09/23
Talk : C0c0n
: Common Misconfigurations in your Kubernetes Cluster and What can you do about it? -
Kumar Ashwin
-
2022/09/23
Panel : C0c0n
: Customer, Credit & Risk - Fintech trends 2022 -
Maya R Nair
Balakrishnan A
A Shiju Rawther
Linson Paul
Shivanath Somanathan
-
2022/09/23
Panel : C0c0n
: Cybersecurity Dissonance: Perception vs Reality -
Dinesh O Bareja
George Eapen
Jairam Ramesh
Rajesh Hemrajani
Suresh Sharma
-
2022/09/23
Talk : C0c0n
: Cybersecurity for Manufacturing -
Santhosh Srinivasan
-
2022/09/23
Panel : C0c0n
: Digital Apocalypse: Emerging cybersecurity challenges and future Crimes -
Nidhish Bhatnagar
Amit Dubey
Philip Varughese Vayarakunnil
Rahul Sasi
Saranga Rajan
Suhel Daud
-
2022/09/23
Talk : C0c0n
: Hacking SmartContracts -
Anto Joseph
-
2022/09/23
Talk : C0c0n
: Hyperledger Fabric & Ethereum Apps: Security Deep Dive -
Alex Devassy
Dhanith Krishna
-
2022/09/23
Talk : C0c0n
: Log4j vulnerability continuous to be favourite for APT groups through mid 2022 -
Niranjan Jayanand
-
2022/09/23
Talk : C0c0n
: Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? -
Abhijith B R
-
2022/09/23
Talk : C0c0n
: Pwning Android Apps at Scale -
Sparsh Kulshrestha
Shashank Barthwal
-
2022/09/23
Talk : C0c0n
: Ransomware: Prevention, Early Detection and Response -
Babitha Bp
-
2022/09/23
Talk : C0c0n
: Rolling out Central Bank Digital Currency - Technical Design Considerations -
Sunil Raveendran
-
2022/09/23
Talk : C0c0n
: Securing your APIs for a cloud native future -
Navendu Pottekkat
-
2022/09/23
Talk : C0c0n
: Startup Ecosystem and Investments in Post Covid Era -
Sunil Kanchi
-
2022/09/23
Talk : C0c0n
: Technological Reliance for Resilience -
Tulika Pandey
-
2022/09/23
Talk : C0c0n
: Threats Landscape and Intelligence of API & Shield to protect -
Navaneethan M
-
2022/09/23
Talk : C0c0n
: Tracking the Bad guys. An interesting story of how the criminal underground operates -
Aarushi Koolwal
Anjana Sathyan
-
2022/09/23
Talk : C0c0n
: TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor -
Saurabh Sharma
Noushin Shabab
-
2022/09/23
Panel : C0c0n
: What ails the Indian cybersecurity startup ecosystem? -
Sunil Varkey
Ajit Hatti
Akash Mahajan
Aseem Jakhar
Shubham Mittal
-
2022/09/24
Talk : C0c0n
: BEC, still the sure shot trap -
Georgie Kurien
-
2022/09/24
Talk : C0c0n
: Building Smart, Resilient and Sustainable Cyber Eco System -
Navin Kumar Singh
-
2022/09/24
Talk : C0c0n
: CANalyse: A Vehicle Network Analysis and Attack Tool -
Kartheek Lade
-
2022/09/24
Talk : C0c0n
: Citizen Mobile Security (ICAMPS) -
Satyendra Verma
-
2022/09/24
Talk : C0c0n
: Cryptocurrency Forensics -
Bhushan Gulabrao Borase
-
2022/09/24
Talk : C0c0n
: Cyber Defence and Role of private players - public private partnership -
Jasbir Singh Solanki
-
2022/09/24
Panel : C0c0n
: Data sovereignty - Challenges and the road ahead -
Sanjeev Sharma
Saranga Rajan
A Muralidhar
Jojy Joy
-
2022/09/24
Talk : C0c0n
: Deep Learning to detect Network Attacks -
Varun Kohli
-
2022/09/24
Talk : C0c0n
: In production with GRC for cloud -
Mahesh Kalyanaraman
-
2022/09/24
Talk : C0c0n
: Introduction to RFID/NFC Hacking -
Davis Sojan
-
2022/09/24
Talk : C0c0n
: Know Your Organization? : Mapping Entities in Google Workspace -
Manish Gupta
Yash Bharadwaj
-
2022/09/24
Panel : C0c0n
: MoonWorking’ and associated legal, ethical, security aspects -
Georgie Kurien
Sreekumar Balachandran
Sony A
Robin Joy
-
2022/09/24
Talk : C0c0n
: Need for Advanced SOC -
Vijayakumar K M
-
2022/09/24
Talk : C0c0n
: OSINT Tools and Techniques -
Brijesh Singh
-
2022/09/24
Talk : C0c0n
: Power of Narratives in Cyber Security -
Sunil Varkey
-
2022/09/24
Talk : C0c0n
: Raining CVEs on Wordpress plugins with Semgrep -
Shreya Pohekar
Syed Sheeraz Ali
-
2022/09/24
Panel : C0c0n
: Ransom Trends in India -
Pardhasaradhi Ch
Srikanta Prasad
Jacxine Fernandez
Diwakar Sheoran
-
2022/09/24
Talk : C0c0n
: Rationalizing Cyber Security Risk in Risk Language -
Anish Koshy
-
2022/09/24
Talk : C0c0n
: Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks -
Manesh Thankappan
-
2022/09/24
Talk : C0c0n
: Weaponising Social Media for Psychological Operations -
A a Gafoor
-
2022/09/24
Talk : C0c0n
: Web3 Security - Security in MetaVerse, and the new world of web3 -
Rohit Srivastwa
-
2022/09/28
Talk : Rootcon
: AWSGoat : A Damn Vulnerable AWS Infrastructure -
Jeswin Mathai
Shantanu Kale
Sanjeev Mahunta
-
2022/09/28
Talk : Rootcon
: Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations -
Harshit Agrawal
-
2022/09/29
Talk : Brucon
: 0wn-premises: Bypassing Microsoft Defender for Identity -
Nikhil Mittal
-
2022/12/07
Tool Demo : Blackhat
: Arsenal
: h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. -
Subhash Popuri
-
2022/12/07
Tool Demo : Blackhat
: Arsenal
: Patronus: Swiss Army Knife SAST Toolkit -
Akhil Mahendra
Akshansh Jaiswal
Ashwin Shenoi
-
2022/12/07
Tool Demo : Blackhat
: Arsenal
: vAPI: Vulnerable Adversely Programmed Interface -
Tushar Kulkarni
-
2022/12/08
Talk : Blackhat
: Exploring a New Class of Kernel Exploit Primitive -
Rohit Mothe
Andrew Ruddick
-
2022/12/08
Tool Demo : Blackhat
: Arsenal
: Industrial Control Systems: Capture the Train! -
Dhruv Sharan
Arnaud Soullié
-
2022/12/08
Panel : Blackhat
: Locknote: Conclusions and Key Takeaways from Day 2 -
Anant Shrivastava
Jeff Moss
Jiska Classen
Leigh Anney Galloway
Federico Maggi
-
2022/12/08
Tool Demo : Blackhat
: Arsenal
: Node Security Shield - A Lightweight RASP for NodeJS Applications -
Lavakumar Kuppan
Sukesh Pappu
-
2022/12/08
Tool Demo : Blackhat
: Arsenal
: ThunderCloud: Attack Cloud Without Keys! -
Shivankar Madaan
-
2023/03/09
Panel : Nullcon
: Elements of a Successful Security Strategy: A Comprehensive Approach -
Sheetal Joseph
Sybe Izzak Rispens
Travis Carelock
-
2023/03/09
Panel : Nullcon
: How to make security easier for your developers -
Santosh Yadav
Frida Kiriakos
Marie Theresa Brosig
Xavier Rene Corail
-
2023/03/09
Talk : Nullcon
: Not So Famous Attack Vectors In The World Of Smart Contract Security! -
Tejaswa Rastogi
-
2023/04/20
Talk : Hitb Sec Conf
: BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES -
Rohan Aggarwal
-
2023/04/21
Talk : Hitb Sec Conf
: LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS -
Saumil Shah
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: APKHunt | OWASP MASVS Static Analyzer -
Mrunal Chawda
Sumit Kalaria
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: AzureGoat : A Damn Vulnerable Azure Infrastructure -
Nishant Sharma
Dasari Yashwanth Babu
-
2023/05/11
Talk : Blackhat
: Bypassing Anti-Cheats & Hacking Competitive Games -
Rohan Aggarwal
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool -
Kartheek Lade
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: CASPR - Code Trust Auditing Framework -
Atharva Chincholkar
Srishti Chaubey
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: Damn Vulnerable Bank -
Rewanth Tammana
Hrushikesh Kakade
Akshansh Jaiswal
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: KernelGoat -
Shivankar Madaan
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: Kubernetes Goat: Interactive Kubernetes Security Learning Playground -
Madhu Akula
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: MORF - Mobile Reconnaissance Framework -
Abhishek Jm
Amrudesh Balakrishnan
Himanshu Das
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: Nightingale: Docker for Pentesters -
Raja Nagori
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: Post-Quantum Cryptography Library -
Sagar Bhure
Shain Singh
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: reNgine: An Open-Source Automated Reconnaissance/Attack Surface Management tool -
Yogesh Ojha
-
2023/05/11
Tool Demo : Blackhat
: Arsenal
: ThreatSeeker - Threat Hunting via Windows Event Logs -
Ashish Bhangale
G Khartheesvar
Arafat Ansari
-
2023/05/12
Talk : Blackhat
: Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators -
Sravan Akkaram
Nestori Syynimaa
-
2023/05/12
Tool Demo : Blackhat
: Arsenal
: eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF -
Sagar Bhure
-
2023/05/12
Talk : Blackhat
: Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines -
Rohit Sehgal
-
2023/05/12
Tool Demo : Blackhat
: Arsenal
: GCPGoat : A Damn Vulnerable GCP Infrastructure -
Shantanu Kale
Rishappreet Singh Moonga
Ravi Verma
Govind Krishna
-
2023/05/12
Tool Demo : Blackhat
: Arsenal
: Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration -
Ravi Rajput
-
2023/05/12
Tool Demo : Blackhat
: Arsenal
: SCodeScanner - An Open-Source Source-Code Scanner -
Utkarsh Agrawal
-
2023/05/12
Panel : Blackhat
: Trends and Top Takeaways from Black Hat Asia -
Sudhanshu Chauhan
Ty Miller
Jeff Moss
Asuka Nakajima
Pamela O Shea
-
2023/05/12
Tool Demo : Blackhat
: Arsenal
: Vajra - Your Weapon To Cloud -
Raunak Parmar
-
2023/08/06
Talk : C0c0n
: A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things -
Panchami V
Mahima Mary Mathews
-
2023/08/06
Talk : C0c0n
: AI in Cyber Security and Crime Prevention -
Vishal Salvi
-
2023/08/06
Talk : C0c0n
: CBDC and future of Finance -
Sunil Raveendran
-
2023/08/06
Talk : C0c0n
: Cryptocurrencies and challenges to Law Enforcement Agencies -
Bhushan Gulabrao Borase
-
2023/08/06
Talk : C0c0n
: Cybercrimes Victim Compensation : Legal Remedies and Process -
Nisheeth Dixit
-
2023/08/06
Talk : C0c0n
: Cybersecurity in the Era of AI -
Suvin Mullaseril
-
2023/08/06
Talk : C0c0n
: Dark web for investigations -
Amit Lokhande
-
2023/08/06
Talk : C0c0n
: Developments in Deep Fake detection -
Tapas Saini
-
2023/08/06
Talk : C0c0n
: Digital Innovation and its Impact on CIOs, CISOs and DPOs -
Navaneethan M
-
2023/08/06
Talk : C0c0n
: Emerging crimes and threat landscape in cyber domain and the need for international cooperation -
Kiran Sivakumar
-
2023/08/06
Talk : C0c0n
: Expanding capability horizons : Homelabs and beyond -
Anant Shrivastava
-
2023/08/06
Panel : C0c0n
: Generative AI - An Industry Perspective -
Georgie Kurien
Balakrishnan A
Sreekumar Balachandran
V v Jacob
Sony A
-
2023/08/06
Talk : C0c0n
: Influence of Artificial Intelligence in GRC Space -
Mahesh Kalyanaraman
-
2023/08/06
Talk : C0c0n
: Insider Threats - Best Practices and Common Pitfalls -
Georgie Kurien
-
2023/08/06
Talk : C0c0n
: Mitigating SSRF at scale the right way with IMDSv2! -
Ayush Priya
-
2023/08/06
Panel : C0c0n
: nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge -
Murli Nambiar
A Shiju Rawther
Jacxine Fernandez
Vishal Salvi
Sridhar Govardhan
-
2023/08/06
Talk : C0c0n
: Playing cat and mouse with the Adversary: Sometimes a breach is inevitable -
Abhijith B R
-
2023/08/06
Panel : C0c0n
: Power of Control: Navigating the PDP Act -
Prem Kamath
K Kamaneesh
Swapnil Bangali
Rahul Sharma
Dinesh O Bareja
-
2023/08/06
Talk : C0c0n
: Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape -
Jaydev Joshi
Simran Kothari
-
2023/08/06
Talk : C0c0n
: Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G -
Altaf Shaik
-
2023/08/06
Talk : C0c0n
: Subduing Adversaries with Information Superiority -
Antony K M
-
2023/08/06
Talk : C0c0n
: Survivability in the Cyber World -
Sunil Varkey
-
2023/08/06
Talk : C0c0n
: Surviving In Dependency Hell -
Kumar Ashwin
-
2023/08/06
Talk : C0c0n
: Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector -
Anshu Kumar
Pavan Sorab
-
2023/08/06
Talk : C0c0n
: The new way to be secure -
Sakshi Bhutani
-
2023/08/06
Talk : C0c0n
: Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management -
Kumar Ritesh
-
2023/08/07
Talk : C0c0n
: Cellibrite Premium Mobile Forensic tool iPhone analysis -
Vaibhav Kumar
-
2023/08/07
Talk : C0c0n
: Chinese APT against Government officials using G7 summit lure -
Niranjan Jayanand
-
2023/08/07
Panel : C0c0n
: CII Protection: How can the c0c0n community contribute ? -
Navin Kumar Singh
-
2023/08/07
Talk : C0c0n
: Citizen Mobile Security: Responsibilities, Accountability, and Impacts -
Satyendra Verma
-
2023/08/07
Talk : C0c0n
: Cyber Threats to Global Financial Systems -
Lince Lawrence
-
2023/08/07
Talk : C0c0n
: Darkweb Investigations -
Amit Dubey
-
2023/08/07
Panel : C0c0n
: DPDP Act - Transformation challenges for BFSI -
Linson Paul
Venugopal Parameswara
Biju K
Babitha B P
Santosh Khadsare
-
2023/08/07
Talk : C0c0n
: Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux -
Pranav Sivvam
-
2023/08/07
Talk : C0c0n
: ESOC Trinetra Project -
Pankaj Kumar Dalela
-
2023/08/07
Talk : C0c0n
: Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs -
Sathwik RAM Prakki
-
2023/08/07
Panel : C0c0n
: Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity -
Vikas Arora
Sanjay Singh
Baidyanath Kumar
Saurabh Gugnani
Gokulavan Jayaraman
Vijay Nair
-
2023/08/07
Talk : C0c0n
: Exploring Threats in Operational Technology -
Manjunath Hiregange
-
2023/08/07
Panel : C0c0n
: Frictionless Security…Experience Simplified. -
A Shiju Rawther
Maya R Nair
Suresh Sharma
Himanshu Das
-
2023/08/07
Talk : C0c0n
: Generative AI and Cyber Crimes -
Brijesh Singh
-
2023/08/07
Talk : C0c0n
: Homomorphic Encryption - Myth to Reality -
Anish Koshy
-
2023/08/07
Talk : C0c0n
: Putting a leash on AI -
Aditya Vasekar
-
2023/08/07
Talk : C0c0n
: Serverless Siege: AWS Lambda Pentesting -
Anjali Singh Shukla
Divyanshu Shukla
-
2023/08/07
Talk : C0c0n
: Shifting left blockchain development for safer DApps -
Dhanith Krishna
-
2023/08/07
Talk : C0c0n
: Smart Contract Phishing : Attack & Defense -
Tejaswa Rastogi
-
2023/08/07
Talk : C0c0n
: Start Left SDLC Security with Open-Source DevSecOps Tooling -
Aswin Raj
Shruti M G
-
2023/08/07
Talk : C0c0n
: Tackling Advanced Threat Landscape with MDR - Best Practices -
Vijayakumar K M
-
2023/08/07
Talk : C0c0n
: The DPDPA Effect: Jubilation, Twinge and Reticence that followed -
Rahul Sharma
-
2023/08/07
Talk : C0c0n
: Trust Resiliency - A Lesson Learned from Russia Ukraine War -
Ajit Hatti
-
2023/08/07
Talk : C0c0n
: Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities -
Nitesh Surana
-
2023/08/07
Talk : C0c0n
: Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos -
Nikhil Prabhakar
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: Akto - Open Source API Security Tool -
Ankush Jain
Ankita Gupta 1
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: AntiSquat - An AI-Powered Phishing Domain Finder -
Owais Shaikh
Umair Nehri
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections -
Ankit Anurag
Ashwath Kumar
Manikandan Rajappan
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: BucketLoot - An Automated S3 Bucket Inspector -
Owais Shaikh
Umair Nehri
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: CASPR - Code Trust Auditing Framework -
Ajit Hatti
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: Damn Vulnerable Bank -
Akshansh Jaiswal
Hrushikesh Kakade
Rewanth Tammana
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: DIAL - Did I Alert Lambda? Centralised Security Misconfiguration Detection Framework -
Saransh Rana
Rashid Feroze
Harsh Varagiya
-
2023/08/09
Talk : Blackhat
: Diversity Microtalks: Perspectives on Creating Change -
Aastha Sahni
Andy Ellis
Meghan Jacquot
Sherri Davidoff
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. -
Sagar Bhure
-
2023/08/09
Talk : Blackhat
: Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach -
Pankaj Moolrajani
-
2023/08/09
Tool Demo : Blackhat
: Arsenal
: MORF - Mobile Reconnaissance Framework -
Abhishek Jm
Amrudesh Balakrishnan
Himanshu Das
-
2023/08/10
Talk : Blackhat
: AI Assisted Decision Making of Security Review Needs for New Features -
Mrityunjay Gautam
Pavan Kolachoor
-
2023/08/10
Talk : Defcon : Lockpick Village
: Attacking Vehicle Fleet Management Systems -
Yashin Mehaboobe
-
2023/08/10
Talk : Blackhat
: Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? -
Amit Deokar
Ali Ahmed
Brian Lee
-
2023/08/10
Talk : Defcon : Lockpick Village
: Hardware Backdooring an e-Scooter -
Arun Mane
-
2023/08/10
Tool Demo : Blackhat
: Arsenal
: MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments -
Aditya K Sood
-
2023/08/10
Tool Demo : Blackhat
: Arsenal
: SCodeScanner - An Open-Source Source-Code Scanner -
Utkarsh Agrawal
-
2023/08/10
Talk : Blackhat
: Uncovering Azure’s Silent Threats: A Journey into Cloud Vulnerabilities -
Nitesh Surana
Magno Logan
David Fiser
-
2023/08/10
Tool Demo : Blackhat
: Arsenal
: vAPI: Vulnerable Adversely Programmed Interface -
Tushar Kulkarni
-
2023/08/10
Talk : Defcon : Lockpick Village
: Wheels of Wonder: Unveiling Car Hacking Poetry -
Hrishikesh Somchatwar
-
2023/08/11
Talk : Defcon : Appsec Village
: Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications -
Ankur Chowdhary
-
2023/08/11
Talk : Defcon
: Getting a Migraine - uncovering a unique SIP bypass on macOS -
Anurag Bohra
Jonathan Bar Or
Michael Pearse
-
2023/08/11
Tool Demo : Defcon : Appsec Village
: DemoLabs : vAPI : Vulnerable Adversely Programmed Interface -
Tushar Kulkarni
-
2023/08/12
Talk : Defcon : Appsec Village
: Getting More Bang for your Buck:Appsec on a Limited Budget -
Vandana Verma Sehgal
Viraj Gandhi
-
2023/08/12
Panel : Defcon : Appsec Village
: Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert -
Trupti Shiralkar
Kiran Shirali
-
2023/08/12
Tool Demo : Defcon : Appsec Village
: DemoLabs : Open Source API Security for devsecops -
Ankush Jain
Ankita Gupta 1
-
2023/08/13
Tool Demo : Blackhat
: Arsenal
: Advanced ROP Framework: Pushing ROP to Its Limits -
Shiva Shashank
Bramwell Brizendine
-
2023/08/24
Tool Demo : Hitb Sec Conf
: Vajra -
Raunak Parmar
-
2023/08/25
Talk : Hitb Sec Conf
: Breaking ML Services: Finding 0-days in Azure Machine Learning -
Nitesh Surana
-
2023/08/25
Tool Demo : Hitb Sec Conf
: eBPFShield -
Sagar Bhure
-
2023/08/25
Talk : Hitb Sec Conf
: Hacking into iOS’s VOLTE implementation -
Hardik Mehta
Rajanish Pathak
-
2023/08/25
Tool Demo : Hitb Sec Conf
: iGoat -
Swaroop Yermalkar
-
2023/09/23
Panel : Nullcon
: INSIDE THE INVESTOR’S MIND: A FIRESIDE CHAT OF ENTREPRENEUR-VC (AAP KI ADALAT) -
Akshat Jain
Ajey Gore
Sateesh Andra
Prayank Swaroop
-
2023/09/23
Talk : Nullcon
: Android-SigMorph: Covert Communication Exploiting Android Signing Schemes -
Ayan Saha
Achute Sharma
-
2023/09/23
Panel : Nullcon
: CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE -
Saikat Datta
Mv Shashadri
Madhavi Purandare
Mathan Babu Kasilingam
Navin Kumar Singh
-
2023/09/23
Panel : Nullcon
: DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY -
Burgess Cooper
Ashish Bhadouria
Jimmi Thakkar
Sunil Bajpai
-
2023/09/23
Talk : Nullcon
: Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In iOS -
Shubham Sharma
-
2023/09/23
Talk : Nullcon
: How I hacked your bank account: A detailed look at UPI Security -
Abhay Rana
-
2023/09/23
Talk : Nullcon
: Journey in setting up OT SOC -
Ramandeep Singh Walia
-
2023/09/23
Talk : Nullcon
: Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers -
Rishit Bansal
-
2023/09/23
Talk : Nullcon
: Secure Coding: Fix From The Root -
Saddam Hussain
Gopika Subramanian
-
2023/09/23
Talk : Nullcon
: Secure Your Angular App Using JWT And GraphQL -
Ankit Sharma
-
2023/09/23
Panel : Nullcon
: SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAM’S JOURNEY TO EXCELLENCE -
Dinesh Varma
Satish Kumar Dwibhashi
Manoj Kumar
-
2023/09/23
Talk : Nullcon
: The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis -
Nikhil Ashok Hegde
-
2023/09/23
Talk : Nullcon
: The Curious Case Of The Rogue SOAR -
Mukesh Sai Kumar
Jaden Furtado
-
2023/09/23
Panel : Nullcon
: THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY -
Ramandeep Singh Walia
Yask Sharma
Sanjeev Sharma
Britto Sidhan
Rohit Sharma
-
2023/09/23
Talk : Nullcon
: Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities -
Nitesh Surana
-
2023/09/23
Panel : Nullcon
: WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI -
Rahul Neel Mani
Manish Tiwari
Alan J White
Yogesh Kulkarni
Ambarish Kumar Singh
-
2023/09/23
Talk : Nullcon
: Your App Is Probably A Spyware…Or Is It? -
Gaurav Gogia
Pandurang Patil
-
2023/09/24
Panel : Nullcon
: A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY -
Kunal Korgaonkar
Kapil Jaiswal
Malcolm Dsouza
Manoj Aggarwal
Niraj Sharma
-
2023/09/24
Panel : Nullcon
: ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT -
Shomiron Das Gupta
Yogi Kapur
Manish Tiwari
-
2023/09/24
Panel : Nullcon
: C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE -
Saikat Datta
Akash Mahajan
Varun Singla
Navin Kumar Singh
Phil Rodrigues
-
2023/09/24
Panel : Nullcon
: Cyber Operations, Doctrine, And Geo-Politics -
Anand Venkatanarayanan
Manu Zacharia
John Lambert
-
2023/09/24
Panel : Nullcon
: INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI -
Avkash Kathiriya
Mathan Babu Kasilingam
Sanjay Bahl
Krishna Pandey
Travis Carelock
-
2023/09/28
Talk : Hackinparis
: How to have visibility and security OF CICD ecosystem -
Pramod Rana
-
2023/09/29
Talk : Hackinparis
: A Tale of Credential Leak of a Popular Cloud Threat Actor -
Nitesh Surana
-
2023/10/13
Talk : Hackfest
: Exploring RAM Forensic Analysis for Effective Digital Investigations -
Sneha Banerjee
-
2023/11/17
Talk : Deepsec
: Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption -
Shubham Dubey
-
2023/12/06
Talk : Blackhat
: AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers -
Ankit Gangwal
Shubham Singh
Abhijeet Srivastava
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: AndroCop: One Click Forensic Investigation & Data Extraction Tool -
Abhinand N
Aswin M Guptha
Varun Nair
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: BucketLoot - An Automated S3-compatible Bucket Inspector -
Owais Shaikh
Umair Nehri
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: DetectiveSQ: A Extension Auditing Framework -
Jeswin Mathai
Shourya Pratap Singh
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: Docker Exploitation Framework -
Rohit Pitke
Emmanuel Law
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services -
Rohit Kumar
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: Honeyscanner: a vulnerability analyzer for Honeypots -
Shreyas Srinivasa
Emmanouil Vasilomanolakis
Aristofanis Chionis Koufakos
Ricardo Yaben
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: MORF - Mobile Reconnaissance Framework -
Abhishek Jm
Amrudesh Balakrishnan
Himanshu Das
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: Octopii v2 -
Owais Shaikh
Umair Nehri
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: SSH into any device from anywhere with ZERO Open Network ports -
Anthony Prakash
Colin Constable
-
2023/12/06
Tool Demo : Blackhat
: Arsenal
: SupplyShield: Protecting your software supply chain -
Akhil Mahendra
Hritik Vijay
-
2023/12/07
Tool Demo : Blackhat
: Arsenal
: Akto - Open Source API Security Tool -
Ankush Jain
-
2023/12/07
Panel : Blackhat
: Locknote: Conclusions and Key Takeaways from Day 2 -
Vandana Verma Sehgal
Jeff Moss
Ali Abbasi
Jiska Classen
Kenneth White
-
2023/12/07
Tool Demo : Blackhat
: Arsenal
: Mantis - Asset Discovery at Scale -
Prateek Thakare
Bharath Kumar
Praveen Kanniah
-
2023/12/07
Tool Demo : Blackhat
: Arsenal
: Mobile Security Framework - MobSF -
Ajin Abraham
-
2023/12/07
Tool Demo : Blackhat
: Arsenal
: Route53Sweep: Empowering AWS Route53 Security with Automated Scanning & Comprehensive Inventory Management -
Divyanshu Shukla
Anjali Singh Shukla
-
2023/12/07
Talk : Blackhat
: Unmasking APTs: An Automated Approach for Real-World Threat Attribution -
Aakansha Saha
-
2024/03/11
Talk : Nullcon
: Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC -
Arpan Jati
-
2024/03/11
Talk : Nullcon
: Hacking Trains -
Jaden Furtado
-
2024/03/12
Talk : Nullcon
: Secure Web Gateways are dead. What’s next? -
Vivek Ramachandran
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: APKDeepLens - Android security insights in full spectrum -
Atul Singh
Deepanshu Gajbhiye
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: BinderAPI Scanner & BASS -
Krishnaprasad Subramaniam
Jeffrey Gaor
Valen Sai
Eric Tee Hock Nian
-
2024/04/18
Talk : Blackhat
: Breaking Managed Identity Barriers In Azure Services -
Nitesh Surana
David Fiser
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: Catching adversaries on Azure - Deception on Cloud -
Subhash Popuri
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: Damn Vulnerable Browser Extension (DVBE) - Unfold the risks for your Browser Supplements -
Abhinav Khanna
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows -
Soumyanil Biswas
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: DetectiveSQ: A Extension Auditing Framework Version 2 -
Govind Krishna
Xian Xiang Chang
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security -
Sagar Bhure
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: findmytakeover - find dangling domains in a multi cloud environment -
Aniruddha Biyani
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: Genzai - The IoT Security Toolkit -
Umair Nehri
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: Mantis - Asset Discovery at Scale -
Ankur Bhargava
Prateek Thakare
Saddam Hussain
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: MORF - Mobile Reconnaissance Framework -
Amrudesh Balakrishnan
Abhishek Jm
Himanshu Das
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: Nightingale: Docker for Pentesters -
Raja Nagori
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: R0fuzz -
Season Cherian
Vishnu Dev
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: RedCloud OS : Cloud Adversary Simulation Operating System -
Manish Gupta
Yash Bharadwaj
-
2024/04/18
Tool Demo : Blackhat
: Arsenal
: Secure Local Vault - Git Based Secret Manager -
Sriram Krishnan
Shibly Meeran
-
2024/04/18
Talk : Blackhat
: The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition -
Arun Kanuparthi
Hareesh Khattri
Jeyavijayan Jv Rajendran
Jason Fung
Ahmad Reza Sadeghi
-
2024/04/19
Tool Demo : Blackhat
: Arsenal
: AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs -
Asankhaya Sharma
-
2024/04/19
Tool Demo : Blackhat
: Arsenal
: AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud -
Sherin Stephen
Nishant Sharma
Rishappreet Singh Moonga
-
2024/04/19
Tool Demo : Blackhat
: Arsenal
: BucketLoot - An Automated S3 Bucket Inspector -
Umair Nehri
-
2024/04/19
Talk : Blackhat
: China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? -
Pukhraj Singh
-
2024/04/19
Talk : Blackhat
: Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems -
Anirban Chakraborty
Nimish Mishra
Debdeep Mukhopadhyay
-
2024/04/19
Tool Demo : Blackhat
: Arsenal
: GearGoat : Car Vulnerabilities Simulator -
Nishant Sharma
Pranjal Soni
Sanjeev Mahunta
-
2024/04/19
Panel : Blackhat
: Locknote: Conclusions and Key Takeaways -
Anant Shrivastava
Vitaly Kamluk
Ty Miller
Jeff Moss
Pamela O'shea
-
2024/04/19
Tool Demo : Blackhat
: Arsenal
: Malware clustering using unsupervised ML : CalMal -
Himanshu Anand
-
2024/04/19
Tool Demo : Blackhat
: Arsenal
: Monitoring and Detecting Leaks with GitAlerts -
Nikhil Mittal 1
-
2024/04/19
Tool Demo : Blackhat
: Arsenal
: vet: Policy Driven vetting of Open Source Software Components -
Abhisek Datta
-
2024/08/07
Tool Demo : Blackhat
: Arsenal
: BucketLoot - An Automated S3 Bucket Inspector -
Kunal Aggarwal
Umair Nehri
-
2024/08/07
Tool Demo : Blackhat
: Arsenal
: DarkWidow: Dropper/PostExploitation Tool targeting Windows -
Soumyanil Biswas
-
2024/08/07
Tool Demo : Blackhat
: Arsenal
: Hacking generative AI with PyRIT -
Raja Sekhar Rao Dheekonda
-
2024/08/07
Tool Demo : Blackhat
: Arsenal
: RedCloud OS : Cloud Adversary Simulation Operating System -
Manish Gupta
Yash Bharadwaj
-
2024/08/07
Talk : Blackhat
: The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition -
Arun Kanuparthi
Hareesh Khattri
Jeyavijayan Jv Rajendran
Jason Fung
Ahmad Reza Sadeghi
-
2024/08/07
Tool Demo : Blackhat
: Arsenal
: TrafficWardenX: OpenWRT Security & Monitoring -
Sampad Adhikary
Tripti Sharma
-
2024/08/08
Tool Demo : Blackhat
: Arsenal
: Active Directory Cyber Deception using Huginn -
Rohan Durve
Paul Laine
-
2024/08/08
Tool Demo : Blackhat
: Arsenal
: Cloud Offensive Breach and Risk Assessment (COBRA) -
Anand Tiwari
Harsha Koushik
-
2024/08/08
Tool Demo : Blackhat
: Arsenal
: ICSGoat: A Damn Vulnerable ICS Infrastructure -
Shantanu Kale
Divya Nain
-
2024/08/08
Tool Demo : Blackhat
: Arsenal
: Octopii v2 -
Owais Shaikh
-
2024/08/08
Tool Demo : Blackhat
: Arsenal
: Open Source LLM Security -
Ankita Gupta 1
Ankush Jain