Timeline
This page captures the listings in chronological order with latest on top.
Jump to: 2025 (93) | 2024 (135) | 2023 (168) | 2022 (136) | 2021 (94) | 2020 (97) | 2019 (143) | 2018 (145) | 2017 (123) | 2016 (86) | 2015 (108) | 2014 (90) | 2013 (76) | 2012 (105) | 2011 (87) | 2010 (46) | 2009 (49) | 2008 (28) | 2007 (23) | 2006 (11) | 2005 (10) | 2004 (7) | 2003 (7) | 2002 (2) | 2001 (4) | 1998 (1) | 1997 (1) 2025
Dec 10 -
Blackhat (Arsenal) -
Tool demo -
OWASP EKS Goat - Hands-on AWS EKS Security -
-
Divyanshu Shukla , Anjali Singh Shukla
Dec 10 -
Blackhat (Arsenal) -
Tool demo -
EKSi-lite: Simple & Lightweight EKS Cluster Listing & Security Tool -
-
Divyanshu Shukla , Anjali Singh Shukla
Nov 13 -
Defcamp -
Tool demo -
Car Hacking Village -
Hrishikesh Somchatwar
Oct 10 -
C0c0n -
Talk -
Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits -
Suchith Narayan
Oct 01 -
Sector -
Tool demo -
KubeShadow - Advanced Offensive Kubernetes Red-Team Framework -
-
Aashita Pandey , Binayak Choudhury
Aug 07 -
Blackhat -
Talk -
Weaponizing Apple AI for Offensive Operations -
Hari Shanmugam
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Spotter – Universal Kubernetes Security Scanner & Policy Enforcer -
-
Madhu Akula
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Q-TIP (QR Code Threat Inspection Platform) -
Rushikesh D Nandedkar
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Pentest Copilot: Cursor for Pentesters -
-
Dhruva Goyal , Sitaraman S
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Kubernetes Security Scanner -
-
Krishna Priya
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Kubernetes Goat - A Hands-on Interactive Kubernetes Security Playground -
-
Madhu Akula
Aug 07 -
Blackhat -
Talk -
Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale -
-
Vedang Parasnis
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Halberd : Multi-Cloud Agentic Attack Tool -
-
Arpan Abani Sarkar
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Frogy 2.0 - Automated external attack surface analysis toolkit -
-
Chintan Gurjar
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Cloud Offensive Breach and Risk Assessment (COBRA) -
-
Harsha Koushik , Anand Tiwari
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
AzDevRecon - Azure DevOps Enumeration Tool -
-
Raunak Parmar
Aug 06 -
Blackhat -
Talk -
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach -
-
Varun Sharma , Ashish Kurmi
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
vet: Proactive Guardrails against Malicious OSS using Code Analysis -
-
Abhisek Datta
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
Varunastra: Securing the Depths of Docker V2 -
-
Devang Solanki
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
ThreatShield - The Intelligent way of Threat Modelling -
Ashwin Shenoi , Satyam Nagpal , Sayooj B Kumar
Aug 06 -
Blackhat -
Talk -
The 5G Titanic -
-
Altaf Shaik
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
SmuggleShield - Protection Against HTML Smuggling -
-
Dhiraj Mishra
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
ShadowSeek: Combining Ghidra and Large Language Models for Advanced Binary Analysis -
Mohammed Tanveer
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
ROP ROCKET: Advanced Framework for Return-Oriented Programming -
-
Shiva Shashank , Bramwell Brizendine
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
RedInfraCraft : Automate Complex Red Team Infra -
-
Yash Bharadwaj , Manish Gupta
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
Realtic -
Sohan Simha Prabhakar , Samarth Bhaskar Bhat , Danindu Gammanpilage
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
ProcessInjection -
Chirag Savla
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
ParseAndC 4.0 - The Final Cut -
-
Parbati Kumar Manna
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
Open-Source API Firewall by Wallarm - Advanced Protection for REST and GraphQL APIs -
-
Satinder Khasriya
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
MORF – Mobile Reconnaissance Framework -
-
Amrudesh Balakrishnan , Abhishek Jm
Aug 06 -
Blackhat -
Panel -
Hacking the Status Quo: Tales From Leading Women in Cybersecurity -
Vandana Verma Sehgal , Chi en Shen , Natalie Silvanovich , Maddie Stone
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements -
-
Abhinav Khanna , Krishna Chaganti
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
CloudLens -
Gaurav Joshi , Hare Krishna Rai , Prashant Venkatesh
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
ARC – Artifact Reuse Comparator -
Rushikesh D Nandedkar
Aug 06 -
Blackhat -
Talk -
Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience -
-
Shanit Gupta , Zhisheng Hu , Cooper De Nicola
Apr 30 -
Rsac -
Talk -
Got Supply Pain? A Real-World Approach to Supply Chain SDL -
-
Mohit Arora , Richard Tonry
Apr 29 -
Rsac -
Talk -
XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World -
-
Aanchal Gupta , Abhilasha Bhargav Spantzel , John Leo Jr , Stefano Zanero
Apr 29 -
Rsac -
Talk -
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security -
Akash Mukherjee , Saurabh Shintre
Apr 29 -
Rsac -
Talk -
It’s Always Risky in IT: Frontline Stories and Strategic Insights -
Gourav Nagar , Rohit Bansal
Apr 15 -
Stackx Cybersecurity -
Talk -
AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates -
-
Pawan Kinger
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
TrackGuard: Browser Fingerprint Detection and Defence -
Pankaj Sharma , Yuvraj Khanna , Ishan Verma
Apr 04 -
Blackhat -
Talk -
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM -
-
Vikas Gupta , Peter Garba
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
SHIVA Spampot: Actionable Spam and Phishing Intelligence -
-
Rahul Binjve , Viren Kapadia
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
RedInfraCraft : Automate Complex Red Team Infra -
-
Yash Bharadwaj , Manish Gupta
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
MORF - Mobile Reconnaissance Framework -
-
Amrudesh Balakrishnan , Abhishek Jm , Himanshu Das
Apr 04 -
Blackhat -
Panel -
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025 -
Vandana Verma Sehgal , Daniel Cuthbert , Ryan Flores , Vitaly Kamluk , Jeff Moss , Asuka Nakajima
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
Kubernetes Goat: A Hands-on Interactive Kubernetes Security Playground -
-
Madhu Akula
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
KernelGoat -
-
Shivankar Madaan
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
Intro to CICDGuard - How to have visibility and security OF CICD ecosystem -
-
Pramod Rana
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
Decoy Mutex -
-
Madhukar Raina
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
CompartIoT -
-
Sreesankar S , Aditya Krishna Vinod , Season Cherian
Apr 04 -
Blackhat (Arsenal) -
Tool demo -
Agneyastra - Firebase Misconfiguration Detection Toolkit V2 -
-
Bhavarth Karmarkar , Devang Solanki
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
VulnScout -
Samaksh K , Nimit Jain
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
Varunastra: Securing the Depths of Docker V2 -
-
Devang Solanki , Bhavarth Karmarkar
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
SupplyShield: Protecting your software supply chain -
-
Yadhu Krishna M , Akhil Mahendra , Hritik Vijay
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
SmuggleShield 2.0 - Basic Protection Against HTML Smuggling -
-
Dhiraj Mishra
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application -
-
Hare Krishna Rai , Gaurav Joshi , K v Prashant
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
R0fuzz: A Collaborative Fuzzer -
-
Season Cherian , Anikait Panigrahi , Aparna Balaji
Apr 03 -
Blackhat -
Talk -
ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! -
-
Vivek Balachandran , Nikhil Bartake , Zi Jie See Toh , Michael Kasper
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
MobXplore -
-
Aman Pareek , Akarsh Singh
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
Mantis - Asset Discovery at Scale -
-
Hitesh Thakur , Praveen Kanniah , Prateek Thakare
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
KubeSF V1.2 - Kubernetes Security Posture Audit Suite -
Abhishek S , Ajith Prabhu
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
Halberd : Multi-Cloud Security Testing Tool -
-
Arpan Abani Sarkar
Apr 03 -
Blackhat -
Talk -
Determining Exploitability of Vulnerabilities with SBOM and VEX -
-
Anusha Penumacha , Srinija Kammari
Apr 03 -
Blackhat (Arsenal) -
Tool demo -
CompartIoT -
-
Sreesankar S , Aditya Krishna Vinod , Season Cherian
Apr 03 -
Blackhat -
Talk -
Cloud Security: Building Connections in the Cloud -
Vandana Verma Sehgal , Lidia Giuliano
Mar 14 -
Insomnihack -
Talk -
The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) -
Dhiraj Mishra
Mar 13 -
Insomnihack -
Talk -
Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation -
-
Priyank Nigam
Mar 02 -
Nullcon -
Panel -
Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships -
Atul Kumar , Savita Utreja
Mar 02 -
Nullcon -
Panel -
Tackling Automotive Hardware Vulnerabilities -
Aseem Jakhar , Sachin Jain , Adam Laurie
Mar 02 -
Nullcon -
Talk -
Securing the chains: Building defensive layers for software supply chains -
-
Yadhu Krishna M , Akhil Mahendra , Hritik Vijay
Mar 02 -
Nullcon -
Talk -
Satellite Communications: Analyzing and Protecting Space-Based Assets -
-
Drishti Jain
Mar 02 -
Nullcon -
Panel -
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? -
Ketan Vyas , Prajal Kulkarni , Satyavathi Divadari , Srihari Kotni
Mar 02 -
Nullcon -
Talk -
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell -
-
Alla Vamsi Krishna , Kandi Abhishek Reddy
Mar 02 -
Nullcon -
Panel -
How can organisations protect themselves against Advanced Cyber Threats -
Bithal Bhardwaj , Vishal Salvi
Mar 02 -
Nullcon -
Talk -
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms -
-
Kumar Ashwin
Mar 02 -
Nullcon -
Panel -
From Code to Defense: Why Developers Are the New Security Leaders -
Vaibhav Gupta , Vikas Goyal , Hilal Lone , Gene Golovinsky
Mar 02 -
Nullcon -
Panel -
Enterprise Readiness for Supply Chain Attacks -
Sanjay Bahl , Cassie Crossley
Mar 02 -
Nullcon -
Talk -
eKYC Crisis: Securing the Lockers -
-
Kartik Lalan
Mar 02 -
Nullcon -
Talk -
Cyber Security from Telco lens -
Sanjeev Dhallam
Mar 02 -
Nullcon -
Panel -
Cyber Fusion Center: The Command Center for Integrated Cyber Defense -
Avkash Kathiriya , Mathan Babu Kasilingam , Yogi Kapur
Mar 02 -
Nullcon -
Talk -
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks -
-
Shyam Kumar Arshid , Chinmay Krishna
Mar 01 -
Nullcon -
Talk -
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties -
-
Anto Joseph
Mar 01 -
Nullcon -
Talk -
Reversing Large Deep learning AI Models -
-
Yashodhan Vivek Mandke
Mar 01 -
Nullcon -
Panel -
Navigating Data Protection in the age of globalisation -
Saikat Datta , Krishan Dev
Mar 01 -
Nullcon -
Talk -
MLOps Under Attack: Threat Modeling Modern AI Systems -
-
Sandeep Singh
Mar 01 -
Nullcon -
Talk -
MacOS Lockdown Mode: A Forensic Deep Dive -
-
Bhargav Rathod
Mar 01 -
Nullcon -
Talk -
Drawing parallels between iOS and macOS Pentesting with DVMA -
Vaibhav Lakhani
Mar 01 -
Nullcon -
Panel -
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense -
Ajit Hatti , Varun Singla
Mar 01 -
Nullcon -
Panel -
Converging IT and OT Security: Unified strategies for protection, detection and response -
Burgess Cooper , Kuldeep Singh , Shailendra Fuloria , Rohit Sharma , Sachin Burman , Yask Sharma
Mar 01 -
Nullcon -
Panel -
Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking -
Krishna Pandey
Mar 01 -
Nullcon -
Panel -
AI versus AI : Reimagining Security Operation -
Arnav Khorana , Prithvi Raju Alluri , Vinay Jain
Mar 01 -
Nullcon -
Panel -
AI in SecOps: Enhancing Incident Response with Intelligence -
Mrudul Uchil , Parag Deodhar , Felix Mohan 2024
Dec 20 -
Book -
Cyber Security Kill Chain - Tactics and Strategies -
Gourav Nagar , Shreyas Kumar
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
RedCloud OS : Cloud Adversary Simulation Operating System -
-
Yash Bharadwaj , Manish Gupta
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
MPT: Pentest In Action! -
-
Jyoti Raval
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
MORF - Mobile Reconnaissance Framework -
-
Amrudesh Balakrishnan , Abhishek Jm , Himanshu Das
Dec 12 -
Blackhat -
Panel -
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024 -
Vandana Verma Sehgal , Jeff Moss , Stefano Zanero , James Forshaw , Meadow Ellis
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
Halberd : Cloud Security Testing Tool -
-
Arpan Abani Sarkar
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
GoatPen: Hack, Hone, Harden -
-
Nishant Sharma , Shantanu Kale
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
Genzai - The IoT Security Toolkit -
-
Umair Nehri
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
DarkWidow: Customizable Dropper Tool Targeting Windows -
-
Soumyanil Biswas
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
Damn Vulnerable Browser Extension (DVBE) - Knowing the risks of your Browser Supplements -
-
Abhinav Khanna , Krishna Chaganti
Dec 12 -
Blackhat (Arsenal) -
Tool demo -
Cloud Offensive Breach and Risk Assessment (COBRA) -
-
Harsha Koushik , Anand Tiwari
Dec 11 -
Blackhat -
Talk -
The CVSS Deception: How We’ve Been Misled on Vulnerability Severity -
-
Ankur Sand
Dec 11 -
Blackhat (Arsenal) -
Tool demo -
SCAGoat - Exploiting Damn Vulnerable SCA Application -
-
Hare Krishna Rai , Gaurav Joshi , K v Prashant
Dec 11 -
Blackhat (Arsenal) -
Tool demo -
Open Source Tool to Shift Left Security Testing by Leveraging AI -
Shivam Rawat , Shivansh Agrawal
Dec 11 -
Blackhat (Arsenal) -
Tool demo -
findmytakeover - find dangling domains in a multi cloud environment -
-
Aniruddha Biyani
Dec 11 -
Blackhat (Arsenal) -
Tool demo -
Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel -
-
Amit Parjapat , Vedant Wayal
Dec 11 -
Blackhat (Arsenal) -
Tool demo -
Agneyastra - Firebase Misconfiguration Detection Toolkit -
-
Bhavarth Karmarkar , Devang Solanki
Dec 11 -
Blackhat (Arsenal) -
Tool demo -
Active Directory Cyber Deception using Huginn -
-
Rohan Durve , Paul Laine
Nov 29 -
Book -
Mastering Windows 365 -
Sandeep Patnaik , Christiaan Brinkhoff , Morten Pedholt
Nov 21 -
Securityfest -
Talk -
Wheels of Wonder -
-
Hrishikesh Somchatwar
Nov 21 -
Securityfest -
Talk -
UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities -
-
Priyank Nigam
Nov 21 -
Deepsec -
Talk -
Hacking with Physics v2.0 -
Hrishikesh Somchatwar
Nov 21 -
Securityfest -
Talk -
Breaking Container Boundary Using Side Channel Attack -
-
Adhokshaj Mishra
Nov 16 -
C0c0n -
Talk -
Who is holding the Marauders map? -
Maya R Nair
Nov 16 -
C0c0n -
Panel -
When Falcon Strikes Back: The Defender’s Dilemma -
Burgess Cooper , Shivkumar Pandey , A Shiju Rawther , Padnya Manwar , Kishan Kendre
Nov 16 -
C0c0n -
Talk -
We got the Shiny SBoM; what next? -
-
Anant Shrivastava
Nov 16 -
C0c0n -
Panel -
Transitioning from CTF to real world VAPT -
Aseem Jakhar , Akhilesh Variar , Dhruv Bisani , Anant Shrivastava
Nov 16 -
C0c0n -
Talk -
The subtle art of checkmating CISOs -
Sunil Varkey
Nov 16 -
C0c0n -
Talk -
The Stealth Code Conspiracy: Unmasking Hidden Threats in CI/CD Pipelines -
Arpith Rajagopal , Suchith Narayan
Nov 16 -
C0c0n -
Talk -
Serverless Phishing Factory: Automate, Attack, Adapt -
Yash Bharadwaj , Manish Gupta
Nov 16 -
C0c0n -
Talk -
Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides -
Rakesh Seal , Diptisha Samanta
Nov 16 -
C0c0n -
Panel -
Post-Quantum Security: Balancing Opportunities and Overcoming Challenges -
Anant Shrivastava , Sapan Talwar , Ajit Hatti , Sridhar Govardhan , Abhilasha Vyas
Nov 16 -
C0c0n -
Talk -
Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape -
Dharani Sanjaiy
Nov 16 -
C0c0n -
Talk -
KEY NOTE -
Navin Kumar Singh
Nov 16 -
C0c0n -
Talk -
Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac -
Ajay Sk
Nov 16 -
C0c0n -
Talk -
Breach of the borderless: Cyber threat actors targeting India’s cyberspace -
Abhijith B R
Nov 16 -
C0c0n -
Talk -
Active Directory Deception Strategies -
Madhukar Raina , Sayan Mitra
Nov 16 -
C0c0n -
Talk -
Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers -
Nihar Sawant , Jaydev Joshi
Nov 16 -
C0c0n -
Talk -
Invisible Invaders: Bypassing Email Security with Legitimate Tools -
Dhruv Bisani
Nov 15 -
C0c0n -
Panel -
The Pager Attack: A Wake-Up Call for Global Cyber Defense Strategies -
Aseem Jakhar , M Nagarajan , Tarun Wig , Philip Varughese Vayarakunnil , Nikhil Shrivastava
Nov 15 -
C0c0n -
Talk -
Remote Whispers of Mobile Sim -
Vipin Kumar
Nov 15 -
C0c0n -
Talk -
PCI 4.0, Javascript Security for product security teams -
Anand Kumar Ganesan , Mohammad Arif
Nov 15 -
C0c0n -
Talk -
Know your Enemies: Deep Dive into Ransomware Threat Groups -
Niranjan Jayanand
Nov 15 -
C0c0n -
Panel -
Intelligence led security -
Midhun Babu , Sameer Ratolikar , M v Sheshadri , A Shiju Rawther , Maya R Nair , Balakrishnan A
Nov 15 -
C0c0n -
Talk -
Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate -
Kartik Lalan
Nov 15 -
C0c0n -
Talk -
GenAI and Autonomous Security in the Age of Zero Trust -
Philip Varughese Vayarakunnil
Nov 15 -
C0c0n -
Talk -
CISO’s take on BYOAI -
Venugopal Parameswara
Nov 15 -
C0c0n -
Talk -
Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques -
Adrip Mukherjee , Vinay Kumar
Nov 15 -
C0c0n -
Talk -
Automated Security Engineer Co-Pilot: Leveraging Large Language Models for Enhanced Code Security -
Ashwath Kumar , Hariprasad Pujari
Nov 15 -
C0c0n -
Talk -
[Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool -
-
Gaurav Joshi , Hare Krishna Rai
Nov 15 -
C0c0n -
Talk -
[Yodha] RedCloud : A Multi-Cloud Hacking OS -
-
Yash Bharadwaj , Manish Gupta
Nov 15 -
C0c0n -
Talk -
[Yodha] Nightingale: Docker for Pentesters -
-
Raja Nagori
Nov 13 -
Book -
Supply Chain Software Security -
Aamiruddin Syed
Nov 06 -
Blackalps -
Talk -
IDAT Loader: The Malware’s Camouflaged Weapon -
Niranjan Jayanand
Oct 29 -
Blackhat -
Talk -
Hacking Deepfake Image Detection System with White and Black Box Attacks -
-
Sagar Bhure
Oct 23 -
Blackhat (Arsenal) -
Tool demo -
R0fuzz: A Collaborative Fuzzer -
-
Season Cherian , Vishnu Dev , Vivek N J
Oct 23 -
Blackhat -
Talk -
Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks -
-
Shruti Ranjit , Mangatas Tondang
Oct 23 -
Blackhat (Arsenal) -
Tool demo -
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security -
-
Sagar Bhure
Oct 23 -
Blackhat (Arsenal) -
Tool demo -
DarkWidow: Customizable Dropper Tool Targeting Windows -
-
Soumyanil Biswas
Oct 23 -
Blackhat (Arsenal) -
Tool demo -
Cyber Arsenal47 -
Simardeep Singh
Oct 02 -
Virus Bulletin -
Talk -
From code to crime: exploring threats in GitHub Codespaces -
-
Nitesh Surana , Jaromir Horejsi
Oct 02 -
Virus Bulletin -
Talk -
Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study -
-
Sathwik RAM Prakki
Sep 30 -
Book -
Offensive Security Using Python -
Rejah Rehim , Manindar Mohan
Sep 26 -
Rootcon -
Talk -
How to have visibility and security OF CICD ecosystem -
-
Pramod Rana
Sep 20 -
44 Con -
Talk -
Unveiling the ghosts of mobile networks: When will old bugs die? -
Altaf Shaik
Aug 30 -
Hitb Sec Conf -
Talk -
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles -
-
Ravi Rajput
Aug 29 -
Hitb Sec Conf -
Tool demo -
Mantis -
-
Bharath Kumar , Akshay Jain
Aug 29 -
Hitb Sec Conf -
Tool demo -
eBPFShield -
-
Sagar Bhure
Aug 29 -
Hitb Sec Conf -
Talk -
COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts -
-
Chetan Raghuprasad , Joey Chen
Aug 29 -
Hitb Sec Conf -
Tool demo -
CICDGuard -
-
Pramod Rana
Aug 29 -
Hitb Sec Conf -
Tool demo -
AI Assisted Code Reviewer -
Rajanish Pathak , Hardik Mehta
Aug 15 -
Usenix -
Talk -
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks -
-
Aravind Machiry , Adam Doupe , Chang Zhu , Yibo Liu , Ruoyu Wang , Tiffany Bao , Yan Shoshitaishvili , Ati Bajaj , Wil Gibbs , Ziyang Li , Anton Xue , Rajeev Alur , Hanjun Dai , Mayur Naik
Aug 14 -
Usenix -
Talk -
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors -
-
Anirban Chakraborty , Nimish Mishra , Debdeep Mukhopadhyay
Aug 10 -
Defcon -
Talk -
Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming -
-
Shiva Shashank , Bramwell Brizendine
Aug 10 -
Defcon (Adversary Village) -
Talk -
Sneaky Extensions: The MV3 Escape Artists -
Vivek Ramachandran , Shourya Pratap Singh
Aug 10 -
Defcon -
Talk -
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm -
-
Rik Chatterjee , Jake Jepson
Aug 10 -
Defcon (Makers Community) -
Panel -
Color Blasted Badge Making: How Hard Could It Be ? -
Abhinav Panda , Hamster , Bradan Lane
Aug 09 -
Defcon (Bug Bounty Village) -
Talk -
Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways -
-
Nikhil Shrivastava , Charles Waterhouse
Aug 09 -
Defcon (Adversary Village) -
Panel -
Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors -
Abhijith B R , Nikhil Mittal , Adam Pennington , Ken Kato , Ashley Stryker
Aug 09 -
Defcon -
Talk -
Breaking Secure Web Gateways (SWG) for Fun and Profit -
-
Vivek Ramachandran , Jeswin Mathai
Aug 09 -
Defcon -
Talk -
Breaking Secure Web Gateways (SWG) for Fun and Profit -
Vivek Ramachandran , Jeswin Mathai
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Open Source LLM Security -
-
Ankita Gupta 1 , Ankush Jain
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Octopii v2 -
-
Owais Shaikh
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
ICSGoat: A Damn Vulnerable ICS Infrastructure -
-
Shantanu Kale , Divya Nain
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Cloud Offensive Breach and Risk Assessment (COBRA) -
-
Anand Tiwari , Harsha Koushik
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Active Directory Cyber Deception using Huginn -
-
Rohan Durve , Paul Laine
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
TrafficWardenX: OpenWRT Security & Monitoring -
Sampad Adhikary , Tripti Sharma
Aug 07 -
Blackhat -
Talk -
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition -
-
Arun Kanuparthi , Hareesh Khattri , Jeyavijayan Jv Rajendran , Jason Fung , Ahmad Reza Sadeghi
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
RedCloud OS : Cloud Adversary Simulation Operating System -
-
Manish Gupta , Yash Bharadwaj
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Hacking generative AI with PyRIT -
-
Raja Sekhar Rao Dheekonda
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
DarkWidow: Dropper/PostExploitation Tool targeting Windows -
-
Soumyanil Biswas , Chirag Savla
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
BucketLoot - An Automated S3 Bucket Inspector -
-
Kunal Aggarwal , Umair Nehri
Jul 31 -
Book -
The Complete Guide to Defense in Depth -
Akash Mukherjee
Jun 27 -
Troopers -
Talk -
The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps -
-
Priyank Nigam
Jun 21 -
Book -
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide -
Navya Lakshmana , Omar A. Turner
May 09 -
Rsac -
Talk -
The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft -
-
Aanchal Gupta , Katie Moussouris
May 08 -
Rsac -
Talk -
How to CTF Infra - Beyond the Challenges and Flags -
-
Jayesh Chauhan , Max Gartman
May 08 -
Blackhat -
Talk -
Cloud and Platform Agnostic Security Posture Management (xSPM) -
-
Sunil Arora , Parthasarthi Chakraborty
May 07 -
Rsac -
Talk -
Anatomy of a Vulnerability Response - A View from the Inside -
-
Mohit Arora , Richard Tonry
May 07 -
Rsac -
Talk -
A Proven Approach on Automated Security Architectural Pattern Validation -
-
Sunil Arora , Parthasarathi Chakraborty
May 06 -
Rsac -
Talk -
Headspace’s Privacy Operations Center and Vault -
Shobhit Mehta , Puneet Thapliyal
Apr 30 -
Book -
Rust for Blockchain Application Development -
Akhil Sharma
Apr 19 -
Blackhat (Arsenal) -
Tool demo -
vet: Policy Driven vetting of Open Source Software Components -
-
Abhisek Datta
Apr 19 -
Blackhat (Arsenal) -
Tool demo -
Monitoring and Detecting Leaks with GitAlerts -
-
Nikhil Mittal 1
Apr 19 -
Blackhat (Arsenal) -
Tool demo -
Malware clustering using unsupervised ML : CalMal -
-
Himanshu Anand
Apr 19 -
Blackhat -
Panel -
Locknote: Conclusions and Key Takeaways -
Anant Shrivastava , Vitaly Kamluk , Ty Miller , Jeff Moss , Pamela O'shea
Apr 19 -
Blackhat (Arsenal) -
Tool demo -
GearGoat : Car Vulnerabilities Simulator -
-
Nishant Sharma , Pranjal Soni , Sanjeev Mahunta
Apr 19 -
Blackhat -
Talk -
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems -
-
Anirban Chakraborty , Nimish Mishra , Debdeep Mukhopadhyay
Apr 19 -
Blackhat -
Talk -
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? -
-
Pukhraj Singh
Apr 19 -
Blackhat (Arsenal) -
Tool demo -
BucketLoot - An Automated S3 Bucket Inspector -
-
Umair Nehri
Apr 19 -
Blackhat (Arsenal) -
Tool demo -
AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud -
-
Sherin Stephen , Nishant Sharma , Rishappreet Singh Moonga
Apr 19 -
Blackhat (Arsenal) -
Tool demo -
AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs -
-
Asankhaya Sharma
Apr 18 -
Blackhat -
Talk -
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition -
-
Arun Kanuparthi , Hareesh Khattri , Jeyavijayan Jv Rajendran , Jason Fung , Ahmad Reza Sadeghi
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
Secure Local Vault - Git Based Secret Manager -
-
Sriram Krishnan , Shibly Meeran
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
RedCloud OS : Cloud Adversary Simulation Operating System -
-
Manish Gupta , Yash Bharadwaj
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
R0fuzz -
-
Season Cherian , Vishnu Dev
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
Nightingale: Docker for Pentesters -
-
Raja Nagori
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
MORF - Mobile Reconnaissance Framework -
-
Amrudesh Balakrishnan , Abhishek Jm , Himanshu Das
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
Mantis - Asset Discovery at Scale -
-
Ankur Bhargava , Prateek Thakare , Saddam Hussain
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
Genzai - The IoT Security Toolkit -
-
Umair Nehri
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
findmytakeover - find dangling domains in a multi cloud environment -
-
Aniruddha Biyani
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security -
-
Sagar Bhure
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
DetectiveSQ: A Extension Auditing Framework Version 2 -
Govind Krishna , Xian Xiang Chang
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows -
-
Soumyanil Biswas
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
Damn Vulnerable Browser Extension (DVBE) - Unfold the risks for your Browser Supplements -
-
Abhinav Khanna
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
Catching adversaries on Azure - Deception on Cloud -
-
Subhash Popuri
Apr 18 -
Blackhat -
Talk -
Breaking Managed Identity Barriers In Azure Services -
-
Nitesh Surana , David Fiser
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
BinderAPI Scanner & BASS -
-
Krishnaprasad Subramaniam , Jeffrey Gaor , Valen Sai , Eric Tee Hock Nian
Apr 18 -
Blackhat (Arsenal) -
Tool demo -
APKDeepLens - Android security insights in full spectrum -
-
Atul Singh , Deepanshu Gajbhiye
Apr 12 -
Book -
Security Monitoring with Wazuh -
Rajneesh Gupta
Mar 21 -
Can Sec West -
Talk -
Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server -
Arif Hussain , George Hughey
Mar 12 -
Nullcon -
Talk -
Secure Web Gateways are dead. What’s next? -
Vivek Ramachandran
Mar 11 -
Nullcon -
Talk -
Hacking Trains -
-
Jaden Furtado
Mar 11 -
Nullcon -
Talk -
Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC -
-
Arpan Jati
Feb 22 -
Book -
Cloud Forensics Demystified -
Ganesh Ramakrishnan , Mansoor Haqanee 2023
Dec 22 -
Book -
Implementing DevSecOps Practices -
Vandana Verma Sehgal
Dec 07 -
Blackhat -
Talk -
Unmasking APTs: An Automated Approach for Real-World Threat Attribution -
-
Aakansha Saha
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
Route53Sweep: Empowering AWS Route53 Security with Automated Scanning & Comprehensive Inventory Management -
-
Divyanshu Shukla , Anjali Singh Shukla
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
Mobile Security Framework - MobSF -
-
Ajin Abraham
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
Mantis - Asset Discovery at Scale -
-
Prateek Thakare , Bharath Kumar , Praveen Kanniah
Dec 07 -
Blackhat -
Panel -
Locknote: Conclusions and Key Takeaways from Day 2 -
Vandana Verma Sehgal , Jeff Moss , Ali Abbasi , Jiska Classen , Kenneth White
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
Akto - Open Source API Security Tool -
-
Ankush Jain
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
SupplyShield: Protecting your software supply chain -
-
Akhil Mahendra , Hritik Vijay
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
SSH into any device from anywhere with ZERO Open Network ports -
-
Anthony Prakash , Colin Constable
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
Octopii v2 -
-
Owais Shaikh , Umair Nehri
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
MORF - Mobile Reconnaissance Framework -
-
Abhishek Jm , Amrudesh Balakrishnan , Himanshu Das
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
Honeyscanner: a vulnerability analyzer for Honeypots -
-
Shreyas Srinivasa , Emmanouil Vasilomanolakis , Aristofanis Chionis Koufakos , Ricardo Yaben
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services -
-
Rohit Kumar
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
Docker Exploitation Framework -
-
Rohit Pitke , Emmanuel Law
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
DetectiveSQ: A Extension Auditing Framework -
Jeswin Mathai , Shourya Pratap Singh
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
BucketLoot - An Automated S3-compatible Bucket Inspector -
-
Owais Shaikh , Umair Nehri
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
AndroCop: One Click Forensic Investigation & Data Extraction Tool -
Abhinand N , Aswin M Guptha , Varun Nair
Dec 06 -
Blackhat -
Talk -
AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers -
-
Ankit Gangwal , Shubham Singh , Abhijeet Srivastava
Nov 17 -
Deepsec -
Talk -
Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption -
Shubham Dubey
Oct 13 -
Hackfest -
Talk -
Exploring RAM Forensic Analysis for Effective Digital Investigations -
-
Sneha Banerjee
Sep 29 -
Hackinparis -
Talk -
A Tale of Credential Leak of a Popular Cloud Threat Actor -
Nitesh Surana
Sep 28 -
Hackinparis -
Talk -
How to have visibility and security OF CICD ecosystem -
Pramod Rana
Sep 28 -
Rootcon -
Talk -
Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation -
-
Raunak Parmar
Sep 24 -
Nullcon -
Panel -
INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI -
Avkash Kathiriya , Mathan Babu Kasilingam , Sanjay Bahl , Krishna Pandey , Travis Carelock
Sep 24 -
Nullcon -
Panel -
Cyber Operations, Doctrine, And Geo-Politics -
-
Anand Venkatanarayanan , Manu Zacharia , John Lambert
Sep 24 -
Nullcon -
Panel -
C4CII - SECURING USE OF CLOUD IN CRITICAL INFORMATION INFRASTRUCTURE -
Saikat Datta , Akash Mahajan , Varun Singla , Navin Kumar Singh , Phil Rodrigues
Sep 24 -
Nullcon -
Panel -
ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT -
Shomiron Das Gupta , Yogi Kapur , Manish Tiwari
Sep 24 -
Nullcon -
Panel -
A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY -
Kunal Korgaonkar , Kapil Jaiswal , Malcolm Dsouza , Manoj Aggarwal , Niraj Sharma
Sep 23 -
Nullcon -
Talk -
Your App Is Probably A Spyware…Or Is It? -
-
Gaurav Gogia , Pandurang Patil
Sep 23 -
Nullcon -
Panel -
WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI -
Rahul Neel Mani , Manish Tiwari , Yogesh Kulkarni , Ambarish Kumar Singh , Alan J White
Sep 23 -
Nullcon -
Talk -
Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities -
-
Nitesh Surana
Sep 23 -
Nullcon -
Panel -
THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY -
Ramandeep Singh Walia , Yask Sharma , Sanjeev Sharma , Britto Sidhan , Rohit Sharma
Sep 23 -
Nullcon -
Talk -
The Curious Case Of The Rogue SOAR -
-
Mukesh Sai Kumar , Jaden Furtado
Sep 23 -
Nullcon -
Talk -
The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis -
-
Nikhil Ashok Hegde
Sep 23 -
Nullcon -
Panel -
SHIFTING LEFT WITH SECURITY AND THE EVOLUTION OF YOUR DEVSECOPS TEAM’S JOURNEY TO EXCELLENCE -
Dinesh Varma , Satish Kumar Dwibhashi , Manoj Kumar
Sep 23 -
Nullcon -
Talk -
Secure Your Angular App Using JWT And GraphQL -
-
Ankit Sharma
Sep 23 -
Nullcon -
Talk -
Secure Coding: Fix From The Root -
-
Saddam Hussain , Gopika Subramanian
Sep 23 -
Nullcon -
Talk -
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers -
-
Rishit Bansal
Sep 23 -
Nullcon -
Talk -
Journey in setting up OT SOC -
-
Ramandeep Singh Walia
Sep 23 -
Nullcon -
Talk -
How I hacked your bank account: A detailed look at UPI Security -
-
Abhay Rana
Sep 23 -
Nullcon -
Talk -
Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In iOS -
-
Shubham Sharma
Sep 23 -
Nullcon -
Panel -
DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY -
Burgess Cooper , Ashish Bhadouria , Jimmi Thakkar , Sunil Bajpai
Sep 23 -
Nullcon -
Panel -
CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE -
-
Saikat Datta , M v Sheshadri , Madhavi Purandare , Mathan Babu Kasilingam , Navin Kumar Singh
Sep 23 -
Nullcon -
Talk -
Android-SigMorph: Covert Communication Exploiting Android Signing Schemes -
-
Ayan Saha , Achute Sharma
Sep 23 -
Nullcon -
Panel -
INSIDE THE INVESTOR’S MIND: A FIRESIDE CHAT OF ENTREPRENEUR-VC (AAP KI ADALAT) -
Akshat Jain , Ajey Gore , Sateesh Andra , Prayank Swaroop
Sep 16 -
Romhack -
Talk -
Hacking into the iOS’s VOLTE implementation -
-
Hardik Mehta , Rajanish Pathak
Sep 08 -
Book -
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide -
Shobhit Mehta
Aug 30 -
Book -
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide -
Ankush Chowdhary , Prashant Kulkarni
Aug 25 -
Hitb Sec Conf -
Tool demo -
iGoat -
-
Swaroop Yermalkar
Aug 25 -
Hitb Sec Conf -
Talk -
Hacking into iOS’s VOLTE implementation -
-
Hardik Mehta , Rajanish Pathak
Aug 25 -
Hitb Sec Conf -
Tool demo -
eBPFShield -
-
Sagar Bhure
Aug 25 -
Book -
Cloud Native Software Security Handbook -
Mihir Shah
Aug 25 -
Hitb Sec Conf -
Talk -
Breaking ML Services: Finding 0-days in Azure Machine Learning -
-
Nitesh Surana
Aug 24 -
Hitb Sec Conf -
Tool demo -
Vajra -
-
Raunak Parmar
Aug 24 -
Hitb Sec Conf -
Talk -
Hardware Backdooring an eScooter -
-
Arun Mane
Aug 13 -
Blackhat (Arsenal) -
Tool demo -
Advanced ROP Framework: Pushing ROP to Its Limits -
-
Shiva Shashank , Bramwell Brizendine
Aug 12 -
Defcon (Appsec Village) -
Tool demo -
Open Source API Security for devsecops -
-
Ankush Jain , Ankita Gupta 1
Aug 12 -
Defcon (Appsec Village) -
Panel -
Not All Alerts Are Born Equal: Insights from AppSec Experts on Prioritizing Security Alert -
Trupti Shiralkar , Kiran Shirali
Aug 12 -
Defcon (Appsec Village) -
Talk -
Getting More Bang for your Buck:Appsec on a Limited Budget -
Vandana Verma Sehgal , Viraj Gandhi
Aug 11 -
Defcon (Appsec Village) -
Tool demo -
vAPI : Vulnerable Adversely Programmed Interface -
-
Tushar Kulkarni
Aug 11 -
Book -
Mastering Information Security Compliance Management -
Adarsh Nair , Greeshma M R
Aug 11 -
Defcon -
Talk -
Getting a Migraine - uncovering a unique SIP bypass on macOS -
-
Anurag Bohra , Jonathan Bar Or , Michael Pearse
Aug 11 -
Defcon (Appsec Village) -
Talk -
Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications -
Ankur Chowdhary
Aug 10 -
Defcon (Lockpick Village) -
Talk -
Wheels of Wonder: Unveiling Car Hacking Poetry -
-
Hrishikesh Somchatwar
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
vAPI: Vulnerable Adversely Programmed Interface -
-
Tushar Kulkarni
Aug 10 -
Blackhat -
Talk -
Uncovering Azure’s Silent Threats: A Journey into Cloud Vulnerabilities -
-
Nitesh Surana , Magno Logan , David Fiser
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
SCodeScanner - An Open-Source Source-Code Scanner -
-
Utkarsh Agrawal
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
MELEE: A Tool to Identify Ransomware Infections in MySQL Deployments -
-
Aditya K Sood
Aug 10 -
Defcamp -
Talk -
Hardware Backdooring an e-Scooter -
-
Arun Mane
Aug 10 -
Blackhat -
Talk -
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? -
-
Amit Deokar , Ali Ahmed , Brian Lee
Aug 10 -
Defcon (Lockpick Village) -
Talk -
Attacking Vehicle Fleet Management Systems -
-
Yashin Mehaboobe
Aug 10 -
Blackhat -
Talk -
AI Assisted Decision Making of Security Review Needs for New Features -
-
Mrityunjay Gautam , Pavan Kolachoor
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
MORF - Mobile Reconnaissance Framework -
-
Abhishek Jm , Amrudesh Balakrishnan , Himanshu Das
Aug 09 -
Blackhat -
Talk -
Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach -
-
Pankaj Moolrajani
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. -
-
Sagar Bhure
Aug 09 -
Blackhat -
Talk -
Diversity Microtalks: Perspectives on Creating Change -
-
Aastha Sahni , Andy Ellis , Meghan Jacquot , Sherri Davidoff
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
DIAL - Did I Alert Lambda? Centralised Security Misconfiguration Detection Framework -
-
Saransh Rana , Rashid Feroze , Harsh Varagiya
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
Damn Vulnerable Bank -
-
Akshansh Jaiswal , Hrushikesh Kakade , Rewanth Tammana
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
CASPR - Code Trust Auditing Framework -
-
Ajit Hatti
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
BucketLoot - An Automated S3 Bucket Inspector -
-
Owais Shaikh , Umair Nehri
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections -
-
Ankit Anurag , Ashwath Kumar , Manikandan Rajappan
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
AntiSquat - An AI-Powered Phishing Domain Finder -
-
Owais Shaikh , Umair Nehri
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
Akto - Open Source API Security Tool -
-
Ankush Jain , Ankita Gupta 1
Aug 07 -
C0c0n -
Talk -
Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos -
-
Nikhil Prabhakar
Aug 07 -
C0c0n -
Talk -
Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities -
-
Nitesh Surana
Aug 07 -
C0c0n -
Talk -
Trust Resiliency - A Lesson Learned from Russia Ukraine War -
-
Ajit Hatti
Aug 07 -
C0c0n -
Talk -
The DPDPA Effect: Jubilation, Twinge and Reticence that followed -
-
Rahul Sharma
Aug 07 -
C0c0n -
Talk -
Tackling Advanced Threat Landscape with MDR - Best Practices -
-
Vijayakumar K M
Aug 07 -
C0c0n -
Talk -
Start Left SDLC Security with Open-Source DevSecOps Tooling -
-
Aswin Raj , Shruti M G
Aug 07 -
C0c0n -
Talk -
Smart Contract Phishing : Attack & Defense -
-
Tejaswa Rastogi
Aug 07 -
C0c0n -
Talk -
Shifting left blockchain development for safer DApps -
-
Dhanith Krishna
Aug 07 -
C0c0n -
Talk -
Serverless Siege: AWS Lambda Pentesting -
-
Anjali Singh Shukla , Divyanshu Shukla
Aug 07 -
C0c0n -
Talk -
Putting a leash on AI -
-
Aditya Vasekar
Aug 07 -
C0c0n -
Talk -
Homomorphic Encryption - Myth to Reality -
-
Anish Koshy
Aug 07 -
C0c0n -
Talk -
Generative AI and Cyber Crimes -
-
Brijesh Singh
Aug 07 -
C0c0n -
Panel -
Frictionless Security…Experience Simplified. -
-
A Shiju Rawther , Maya R Nair , Suresh Sharma , Himanshu Das
Aug 07 -
C0c0n -
Talk -
Exploring Threats in Operational Technology -
Manjunath Hiregange
Aug 07 -
C0c0n -
Panel -
Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity -
Vikas Arora , Sanjay Singh , Baidyanath Kumar , Saurabh Gugnani , Gokulavan Jayaraman , Vijay Nair
Aug 07 -
C0c0n -
Talk -
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs -
-
Sathwik RAM Prakki
Aug 07 -
C0c0n -
Talk -
ESOC Trinetra Project -
Pankaj Kumar Dalela
Aug 07 -
C0c0n -
Talk -
Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux -
-
Pranav Sivvam
Aug 07 -
C0c0n -
Panel -
DPDP Act - Transformation challenges for BFSI -
-
Linson Paul , Venugopal Parameswara , Biju K , Babitha B P , Santosh Khadsare
Aug 07 -
C0c0n -
Talk -
Darkweb Investigations -
Amit Dubey
Aug 07 -
C0c0n -
Talk -
Cyber Threats to Global Financial Systems -
-
Lince Lawrence
Aug 07 -
C0c0n -
Talk -
Citizen Mobile Security: Responsibilities, Accountability, and Impacts -
Satyendra Verma
Aug 07 -
C0c0n -
Panel -
CII Protection: How can the c0c0n community contribute ? -
Navin Kumar Singh
Aug 07 -
C0c0n -
Talk -
Chinese APT against Government officials using G7 summit lure -
-
Niranjan Jayanand
Aug 07 -
C0c0n -
Talk -
Cellibrite Premium Mobile Forensic tool iPhone analysis -
Vaibhav Kumar
Aug 06 -
C0c0n -
Talk -
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management -
-
Kumar Ritesh
Aug 06 -
C0c0n -
Talk -
The new way to be secure -
-
Sakshi Bhutani
Aug 06 -
C0c0n -
Talk -
Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector -
-
Anshu Kumar , Pavan Sorab
Aug 06 -
C0c0n -
Talk -
Surviving In Dependency Hell -
-
Kumar Ashwin
Aug 06 -
C0c0n -
Talk -
Survivability in the Cyber World -
-
Sunil Varkey
Aug 06 -
C0c0n -
Talk -
Subduing Adversaries with Information Superiority -
-
Antony K M
Aug 06 -
C0c0n -
Talk -
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G -
-
Altaf Shaik
Aug 06 -
C0c0n -
Talk -
Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape -
-
Jaydev Joshi , Simran Kothari
Aug 06 -
C0c0n -
Panel -
Power of Control: Navigating the PDP Act -
-
Prem Kamath , K Kamaneesh , Swapnil Bangali , Rahul Sharma , Dinesh O Bareja
Aug 06 -
C0c0n -
Talk -
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable -
-
Abhijith B R
Aug 06 -
C0c0n -
Panel -
nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge -
Murli Nambiar , A Shiju Rawther , Jacxine Fernandez , Vishal Salvi , Sridhar Govardhan
Aug 06 -
C0c0n -
Talk -
Mitigating SSRF at scale the right way with IMDSv2! -
-
Ayush Priya
Aug 06 -
C0c0n -
Talk -
Insider Threats - Best Practices and Common Pitfalls -
-
Georgie Kurien
Aug 06 -
C0c0n -
Talk -
Influence of Artificial Intelligence in GRC Space -
Mahesh Kalyanaraman
Aug 06 -
C0c0n -
Panel -
Generative AI - An Industry Perspective -
-
Georgie Kurien , Balakrishnan A , Sreekumar Balachandran , V v Jacob , Sony A
Aug 06 -
C0c0n -
Talk -
Expanding capability horizons : Homelabs and beyond -
-
Anant Shrivastava
Aug 06 -
C0c0n -
Talk -
Emerging crimes and threat landscape in cyber domain and the need for international cooperation -
-
Kiran Sivakumar
Aug 06 -
C0c0n -
Talk -
Digital Innovation and its Impact on CIOs, CISOs and DPOs -
Navaneethan M
Aug 06 -
C0c0n -
Talk -
Developments in Deep Fake detection -
Tapas Saini
Aug 06 -
C0c0n -
Talk -
Dark web for investigations -
Amit Lokhande
Aug 06 -
C0c0n -
Talk -
Cybersecurity in the Era of AI -
-
Suvin Mullaseril
Aug 06 -
C0c0n -
Talk -
Cybercrimes Victim Compensation : Legal Remedies and Process -
Nisheeth Dixit
Aug 06 -
C0c0n -
Talk -
Cryptocurrencies and challenges to Law Enforcement Agencies -
Bhushan Gulabrao Borase
Aug 06 -
C0c0n -
Talk -
CBDC and future of Finance -
-
Sunil Raveendran
Aug 06 -
C0c0n -
Talk -
AI in Cyber Security and Crime Prevention -
Vishal Salvi
Aug 06 -
C0c0n -
Talk -
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things -
-
Panchami V , Mahima Mary Mathews
Jun 28 -
Book -
Building a Next-Gen SOC with IBM QRadar -
Ashish Kothekar
Jun 01 -
Securityfest -
Talk -
Bypassing Anti-Cheats & Hacking Competitive Games -
-
Rohan Aggarwal
Jun 01 -
Securityfest -
Talk -
Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud -
-
Sriraam Natarajan , Venkatraman Kumar
May 12 -
Blackhat (Arsenal) -
Tool demo -
Vajra - Your Weapon To Cloud -
-
Raunak Parmar
May 12 -
Blackhat -
Panel -
Trends and Top Takeaways from Black Hat Asia -
Sudhanshu Chauhan , Ty Miller , Jeff Moss , Asuka Nakajima , Pamela O Shea
May 12 -
Blackhat (Arsenal) -
Tool demo -
SCodeScanner - An Open-Source Source-Code Scanner -
-
Utkarsh Agrawal
May 12 -
Blackhat (Arsenal) -
Tool demo -
Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration -
Ravi Rajput
May 12 -
Blackhat (Arsenal) -
Tool demo -
GCPGoat : A Damn Vulnerable GCP Infrastructure -
-
Shantanu Kale , Rishappreet Singh Moonga , Ravi Verma , Govind Krishna
May 12 -
Blackhat -
Talk -
Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines -
-
Rohit Sehgal
May 12 -
Blackhat (Arsenal) -
Tool demo -
eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF -
-
Sagar Bhure
May 12 -
Blackhat -
Talk -
Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators -
-
Sravan Akkaram , Nestori Syynimaa
May 11 -
Blackhat (Arsenal) -
Tool demo -
ThreatSeeker - Threat Hunting via Windows Event Logs -
-
Ashish Bhangale , G Khartheesvar , Arafat Ansari
May 11 -
Blackhat (Arsenal) -
Tool demo -
Post-Quantum Cryptography Library -
-
Sagar Bhure , Shain Singh
May 11 -
Blackhat (Arsenal) -
Tool demo -
Nightingale: Docker for Pentesters -
-
Raja Nagori
May 11 -
Blackhat (Arsenal) -
Tool demo -
MORF - Mobile Reconnaissance Framework -
-
Abhishek Jm , Amrudesh Balakrishnan , Himanshu Das
May 11 -
Blackhat (Arsenal) -
Tool demo -
Kubernetes Goat: Interactive Kubernetes Security Learning Playground -
-
Madhu Akula
May 11 -
Blackhat (Arsenal) -
Tool demo -
KernelGoat -
-
Shivankar Madaan
May 11 -
Blackhat (Arsenal) -
Tool demo -
Damn Vulnerable Bank -
-
Rewanth Tammana , Hrushikesh Kakade , Akshansh Jaiswal
May 11 -
Blackhat (Arsenal) -
Tool demo -
CASPR - Code Trust Auditing Framework -
-
Atharva Chincholkar , Srishti Chaubey
May 11 -
Blackhat (Arsenal) -
Tool demo -
CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool -
-
Kartheek Lade
May 11 -
Blackhat -
Talk -
Bypassing Anti-Cheats & Hacking Competitive Games -
-
Rohan Aggarwal
May 11 -
Blackhat (Arsenal) -
Tool demo -
AzureGoat : A Damn Vulnerable Azure Infrastructure -
-
Nishant Sharma , Dasari Yashwanth Babu
May 11 -
Blackhat (Arsenal) -
Tool demo -
APKHunt | OWASP MASVS Static Analyzer -
-
Mrunal Chawda , Sumit Kalaria
Apr 26 -
Rsac -
Talk -
Is Increasing Security Maturity And Decreasing Operational Load Possible? -
-
Rohit Dhamankar
Apr 26 -
Rsac -
Talk -
Designing Product Security for a Brighter Smile and a Healthier Tomorrow -
-
Lokesh Pidawekar , Apoorva Phadke
Apr 21 -
Hitb Sec Conf -
Talk -
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS -
-
Saumil Shah
Apr 20 -
Hitb Sec Conf -
Talk -
BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES -
-
Rohan Aggarwal
Apr 14 -
Book -
Managing Risks in Digital Transformation -
Ashish Kumar , Shashank Kumar , Abbas Kudrati
Mar 30 -
Book -
IoT and OT Security Handbook -
Smita Jain , Vasantha Lakshmi
Mar 09 -
Nullcon -
Talk -
Not So Famous Attack Vectors In The World Of Smart Contract Security! -
-
Tejaswa Rastogi
Mar 09 -
Nullcon -
Panel -
How to make security easier for your developers -
-
Santosh Yadav , Frida Kiriakos , Marie Theresa Brosig , Xavier Rene Corail
Mar 09 -
Nullcon -
Panel -
Elements of a Successful Security Strategy: A Comprehensive Approach -
-
Sheetal Joseph , Sybe Izzak Rispens , Travis Carelock
Feb 17 -
Book -
Cybersecurity Blue Team Strategies -
Kunal Sehgal , Nikolaos Thymianis
Jan 26 -
Usenix -
Talk -
Building an Automated Machine for Discovering Privacy Violations at Scale -
-
Suchakra Sharma 2022
Dec 08 -
Blackhat (Arsenal) -
Tool demo -
ThunderCloud: Attack Cloud Without Keys! -
-
Shivankar Madaan
Dec 08 -
Blackhat (Arsenal) -
Tool demo -
Node Security Shield - A Lightweight RASP for NodeJS Applications -
-
Lavakumar Kuppan , Sukesh Pappu
Dec 08 -
Blackhat -
Panel -
Locknote: Conclusions and Key Takeaways from Day 2 -
Anant Shrivastava , Jeff Moss , Jiska Classen , Leigh Anney Galloway , Federico Maggi
Dec 08 -
Blackhat (Arsenal) -
Tool demo -
Industrial Control Systems: Capture the Train! -
Dhruv Sharan , Arnaud Soullié
Dec 08 -
Blackhat -
Talk -
Exploring a New Class of Kernel Exploit Primitive -
-
Rohit Mothe , Andrew Ruddick
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
vAPI: Vulnerable Adversely Programmed Interface -
-
Tushar Kulkarni
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
Patronus: Swiss Army Knife SAST Toolkit -
-
Akhil Mahendra , Akshansh Jaiswal , Ashwin Shenoi
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. -
-
Subhash Popuri
Dec 07 -
Blackhat -
Talk -
Cross-Contract Ricochet Attacks & Off-Chain-On-Chain Manipulation of Billion Dollar NFT Collections -
-
Nitesh Dhanjani
Nov 18 -
Book -
Hybrid Cloud Security Patterns -
Sreekanth Iyer
Oct 26 -
Book -
Network Protocols for Security Professionals -
Deepanshu Khanna , Yoram Orzach
Sep 29 -
Brucon -
Talk -
0wn-premises: Bypassing Microsoft Defender for Identity -
-
Nikhil Mittal
Sep 28 -
Rootcon -
Talk -
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations -
Harshit Agrawal
Sep 28 -
Rootcon -
Talk -
AWSGoat : A Damn Vulnerable AWS Infrastructure -
-
Jeswin Mathai , Shantanu Kale , Sanjeev Mahunta
Sep 24 -
C0c0n -
Talk -
Web3 Security - Security in MetaVerse, and the new world of web3 -
Rohit Srivastwa
Sep 24 -
C0c0n -
Talk -
Weaponising Social Media for Psychological Operations -
A a Gafoor
Sep 24 -
C0c0n -
Talk -
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks -
Manesh Thankappan
Sep 24 -
C0c0n -
Talk -
Rationalizing Cyber Security Risk in Risk Language -
Anish Koshy
Sep 24 -
C0c0n -
Panel -
Ransom Trends in India -
Pardhasaradhi Ch , Srikanta Prasad , Jacxine Fernandez , Diwakar Sheoran
Sep 24 -
C0c0n -
Talk -
Raining CVEs on Wordpress plugins with Semgrep -
Shreya Pohekar , Syed Sheeraz Ali
Sep 24 -
C0c0n -
Talk -
Power of Narratives in Cyber Security -
Sunil Varkey
Sep 24 -
C0c0n -
Talk -
OSINT Tools and Techniques -
Brijesh Singh
Sep 24 -
C0c0n -
Talk -
Need for Advanced SOC -
Vijayakumar K M
Sep 24 -
C0c0n -
Panel -
MoonWorking’ and associated legal, ethical, security aspects -
Georgie Kurien , Sreekumar Balachandran , Sony A , Robin Joy
Sep 24 -
C0c0n -
Talk -
Know Your Organization? : Mapping Entities in Google Workspace -
Manish Gupta , Yash Bharadwaj
Sep 24 -
C0c0n -
Talk -
Introduction to RFID/NFC Hacking -
Davis Sojan
Sep 24 -
C0c0n -
Talk -
In production with GRC for cloud -
Mahesh Kalyanaraman
Sep 24 -
C0c0n -
Talk -
Deep Learning to detect Network Attacks -
Varun Kohli
Sep 24 -
C0c0n -
Panel -
Data sovereignty - Challenges and the road ahead -
Sanjeev Sharma , Saranga Rajan , A Muralidhar , Jojy Joy
Sep 24 -
C0c0n -
Talk -
Cyber Defence and Role of private players - public private partnership -
Jasbir Singh Solanki
Sep 24 -
C0c0n -
Talk -
Cryptocurrency Forensics -
Bhushan Gulabrao Borase
Sep 24 -
C0c0n -
Talk -
Citizen Mobile Security (ICAMPS) -
Satyendra Verma
Sep 24 -
C0c0n -
Talk -
CANalyse: A Vehicle Network Analysis and Attack Tool -
Kartheek Lade
Sep 24 -
C0c0n -
Talk -
Building Smart, Resilient and Sustainable Cyber Eco System -
Navin Kumar Singh
Sep 24 -
C0c0n -
Talk -
BEC, still the sure shot trap -
Georgie Kurien
Sep 23 -
C0c0n -
Panel -
What ails the Indian cybersecurity startup ecosystem? -
Sunil Varkey , Ajit Hatti , Akash Mahajan , Aseem Jakhar , Shubham Mittal
Sep 23 -
C0c0n -
Talk -
TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor -
Saurabh Sharma , Noushin Shabab
Sep 23 -
C0c0n -
Talk -
Tracking the Bad guys. An interesting story of how the criminal underground operates -
Aarushi Koolwal , Anjana Sathyan
Sep 23 -
C0c0n -
Talk -
Threats Landscape and Intelligence of API & Shield to protect -
Navaneethan M
Sep 23 -
C0c0n -
Talk -
Technological Reliance for Resilience -
Tulika Pandey
Sep 23 -
C0c0n -
Talk -
Startup Ecosystem and Investments in Post Covid Era -
Sunil Kanchi
Sep 23 -
C0c0n -
Talk -
Securing your APIs for a cloud native future -
Navendu Pottekkat
Sep 23 -
C0c0n -
Talk -
Rolling out Central Bank Digital Currency - Technical Design Considerations -
Sunil Raveendran
Sep 23 -
C0c0n -
Talk -
Ransomware: Prevention, Early Detection and Response -
Babitha Bp
Sep 23 -
C0c0n -
Talk -
Pwning Android Apps at Scale -
Sparsh Kulshrestha , Shashank Barthwal
Sep 23 -
C0c0n -
Talk -
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? -
-
Abhijith B R
Sep 23 -
C0c0n -
Talk -
Log4j vulnerability continuous to be favourite for APT groups through mid 2022 -
Niranjan Jayanand
Sep 23 -
C0c0n -
Talk -
Hyperledger Fabric & Ethereum Apps: Security Deep Dive -
Alex Devassy , Dhanith Krishna
Sep 23 -
C0c0n -
Talk -
Hacking SmartContracts -
Anto Joseph
Sep 23 -
C0c0n -
Panel -
Digital Apocalypse: Emerging cybersecurity challenges and future Crimes -
Nidhish Bhatnagar , Amit Dubey , Philip Varughese Vayarakunnil , Rahul Sasi , Saranga Rajan , Suhel Daud
Sep 23 -
C0c0n -
Talk -
Cybersecurity for Manufacturing -
Santhosh Srinivasan
Sep 23 -
C0c0n -
Panel -
Cybersecurity Dissonance: Perception vs Reality -
Dinesh O Bareja , George Eapen , Jairam Ramesh , Rajesh Hemrajani , Suresh Sharma
Sep 23 -
C0c0n -
Panel -
Customer, Credit & Risk - Fintech trends 2022 -
Maya R Nair , Balakrishnan A , A Shiju Rawther , Linson Paul , Shivanath Somanathan
Sep 23 -
C0c0n -
Talk -
Common Misconfigurations in your Kubernetes Cluster and What can you do about it? -
Kumar Ashwin
Sep 23 -
C0c0n -
Talk -
Collaborative efforts for safe digital banking -
Biju K
Sep 23 -
C0c0n -
Talk -
Building a Safer and Innovative Digital Ecosystem -
Vijay Pamarathi
Sep 23 -
C0c0n -
Talk -
Bridging the gap between Security and Operations -
Sujay Rajashekar Gundagatti
Sep 23 -
C0c0n -
Talk -
Battle of 300 Crore - how they lost it and got most of it back -
Prashant Choudhary
Sep 23 -
C0c0n -
Talk -
Attacking connected industries in 5G networks -
Altaf Shaik
Sep 23 -
C0c0n -
Talk -
A Tale of Credential Leak of a Popular Cloud Threat Actor -
Nitesh Surana
Sep 08 -
Nullcon -
Tool demo -
ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ APIs -
-
Rohit Sehgal , Varun Kakumani
Sep 08 -
Nullcon -
Talk -
Web3.0 - Smart Contracts Could Be Leaky -
-
Riddhi Shree
Sep 08 -
Nullcon -
Talk -
vPrioritizer: Art of Risk Prioritization -
-
Pramod Rana
Sep 08 -
Nullcon -
Tool demo -
Vajra - Your Weapon To Cloud -
-
Raunak Parmar
Sep 08 -
Nullcon -
Talk -
The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple -
-
Amit Malik , Pratik Jeware
Sep 08 -
Nullcon -
Talk -
Raining CVEs On WordPress Plugins With Semgrep -
-
Shreya Pohekar , Syed Sheeraz Ali
Sep 08 -
Nullcon -
Talk -
Pushing Security Left By Mutating Byte Code -
-
Gaurav Gogia
Sep 08 -
Nullcon -
Talk -
Handling A Bug Bounty program From A Blue Team Perspective -
-
Ashwath Kumar , Ankit Anurag
Sep 08 -
Nullcon -
Talk -
Hack the Source: Securing Open Source Software – One bug at a time -
-
Sandeep Singh , Laurie Mercer
Sep 08 -
Nullcon -
Talk -
Automate Your Whatsapp Chats -
-
Aditi Bhatnagar
Sep 07 -
Nullcon -
Talk -
Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj -
-
Devdutt Patnaik , Ashish Bijlani
Sep 07 -
Nullcon -
Talk -
Scale hacking to secure your cloud and beyond -
-
Anand Prakash
Sep 07 -
Nullcon -
Talk -
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls -
-
Shyam Sundar Ramaswami , Rakesh Mahanthi
Sep 07 -
Nullcon -
Talk -
Hacking Android Foreground Services Escalation Of Privileges -
-
Rony Das
Sep 07 -
Nullcon -
Talk -
Hacking 5G Is No Rocket Science -
-
Altaf Shaik , Matteo Strada
Sep 07 -
Nullcon -
Talk -
Hack The Bridge -
-
Anto Joseph
Sep 07 -
Nullcon -
Talk -
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron -
-
Mohan Sri Rama Krishna Pedhapati , Maxwell Garrett
Sep 07 -
Nullcon -
Talk -
Do PDF Tools Conform To The Specification? -
-
Prashant Anantharaman
Sep 06 -
Nullcon -
Panel -
Unlocking Security Collaboration With Cyber Threat Intelligence -
-
Avkash Kathiriya , Varun Singla , Mathan Babu Kasilingam , Amol Naik
Sep 06 -
Nullcon -
Panel -
Securing India The CERTIn Way -
-
Saikat Datta , Sanjay Bahl , Ajit Menon , Anuprita Daga
Sep 06 -
Nullcon -
Panel -
Secure Service Edge (SSE): Challenges & Upsides of Adoption -
-
Rahul Neel Mani , Anuprita Daga , Rajesh Hemrajani
Sep 06 -
Nullcon -
Panel -
PAM Maturity From Zero Trust To Least Privilege -
-
Ajay Bongirwar , Charanjit Bhatia , Bala Ramanan
Sep 06 -
Nullcon -
Panel -
IoT Supply Chain Blues and the way forward -
-
Aseem Jakhar , Kedar Sovani , Anantharaman Iyer , Suvabrata Sinha , Sudarshan Rajagopal , Sachin Jain
Sep 06 -
Nullcon -
Panel -
Impact of disruptive technologies on CISO’s career & progression -
-
Burgess Cooper , Sandeep Karan , Jacxine Fernandez , Ravi Kumar , Ankur Bhargava
Sep 06 -
Nullcon -
Panel -
Does your SOC sucks? -
-
Krishna Pandey , Shweta Kshirsagar , Vivek Gopalan , Yogi Kapur
Sep 06 -
Nullcon -
Panel -
Consumer Tech Bug Bounty Panel: Hear from the Program Managers -
-
Sandeep Singh , Rishika Hooda , Omar Benbouazza
Sep 06 -
Nullcon -
Panel -
Cloud Services for Financial Inclusion: Possibilities & Challenges -
-
Nandkumar Saravade , Ganesh Ar , Himanshu Das , Navin Kumar Singh
Sep 06 -
Nullcon -
Panel -
Securing the Software -
-
Mrudul Uchil , Abhisek Datta , Harish Goel , Matthew Bohne
Aug 26 -
Hitb Sec Conf -
Talk -
CAN A FUZZER MATCH A HUMAN -
-
Bhargava Shastry
Aug 25 -
Hitb Sec Conf -
Talk -
MPT: Pentest In Action -
-
Jyoti Raval
Aug 25 -
Hitb Sec Conf -
Talk -
Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle -
-
Rahul Sasi , Vishal Singh
Aug 14 -
Defcon (Ics Village) -
Talk -
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right -
Vivek Ponnada
Aug 13 -
Defcon (Adversary Village) -
Panel -
Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs -
Niru Ragupathy
Aug 12 -
Defcon (Ics Village) -
Talk -
Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years -
-
Vivek Ponnada
Aug 12 -
Defcon (Appsec Village) -
Panel -
Agility Broke AppSec. Now It’s Going to Fix It. -
-
Vandana Verma Sehgal , Roy Erlich , Emil Vaagland , Seth Kirschner
Aug 11 -
The Diana Initiative -
Talk -
The Real Cost of Free: What you need to know before downloading a free app -
Ruchira Pokhriyal
Aug 11 -
Blackhat -
Talk -
RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems -
-
Soundarya Ramesh , Levente Csikor , Hoon Wei Lim , Jun Wen Wong , Rohini Poolat Parameswarath , Chan Mun Choon
Aug 11 -
Blackhat (Arsenal) -
Tool demo -
Patronus: Swiss Army Knife SAST Toolkit -
-
Akhil Mahendra , Akshansh Jaiswal , Ashwin Shenoi
Aug 11 -
Blackhat (Arsenal) -
Tool demo -
Octopii - AI-powered Personal Identifiable Information (PII) scanner -
-
Owais Shaikh
Aug 11 -
Blackhat -
Talk -
Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol -
-
Subhechha Subudhi , Clara Maine , Akke Toeter , Victoria Bosch
Aug 11 -
Blackhat -
Talk -
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron -
-
Mohan Sri Rama Krishna Pedhapati , Aaditya Purani , Max Garrett , William Bowling
Aug 11 -
The Diana Initiative -
Talk -
Connecting Dots Between Security Teams & Customer Expectations -
Shruthi Kamath
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
Vajra - Your Weapon To Cloud -
-
Raunak Parmar
Aug 10 -
Blackhat -
Talk -
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting -
-
Sameer Koranne , John Dwyer , Neil Wyler
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
ReconPal: Leveraging NLP for Infosec -
-
Jeswin Mathai , Shantanu Kale , Sherin Stephen
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) -
-
Parbati Kumar Manna
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
Node Security Shield - A Lightweight RASP for NodeJS Applications -
-
Lavakumar Kuppan , Sukesh Pappu
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
HazProne : Cloud Hacking -
-
Devansh Patel , Staford Titus S
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
CASPR - Code Trust Audit Framework -
-
Ajit Hatti
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
CANalyse (2.0): A vehicle network analysis and attack tool -
-
Kartheek Lade , Rahul Jeyasingh
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
AzureGoat : A Damn Vulnerable Azure Infrastructure -
-
Jeswin Mathai , Nishant Sharma , Rachna Umaraniya
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
AWSGoat : A Damn Vulnerable AWS Infrastructure -
-
Nishant Sharma , Jeswin Mathai , Sanjeev Mahunta
Aug 10 -
Blackhat -
Talk -
Attacks From a New Front Door in 4G & 5G Mobile Networks -
-
Altaf Shaik , Shinjo Park , Matteo Strada
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
ArcherySec - Manage and Automate your Vulnerability Assessment -
-
Anand Tiwari
Aug 10 -
Blackhat (Arsenal) -
Tool demo -
Adhrit: Android Security Suite -
-
Amrudesh Balakrishnan , Rahul Sani , Abhishek Jm
Jul 24 -
May Contain Hackers -
Talk -
No Permissions Needed! -
Aditi Bhatnagar
Jul 23 -
May Contain Hackers -
Talk -
How would a real life social media be like? -
Aditi Bhatnagar
Jul 23 -
Hope -
Talk -
Combating Ransom-War: Evolving Landscape of Ransomware Infections in Cloud Databases -
Aditya K Sood
Jun 07 -
Rsac -
Talk -
Continuous Security - Integrating Pipeline Security -
-
Vandana Verma Sehgal
Jun 01 -
Securityfest -
Talk -
Exploitation and automated detection of threats to modern cloud infrastructure -
-
Krishnaa Srinivasa , Maithri Nadig
May 27 -
Book -
Mobile App Reverse Engineering -
Abhinav Mishra
May 18 -
Can Sec West -
Talk -
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices -
-
Saumil Shah
May 18 -
Phdays -
Panel -
Challenges for cybersecurity conferences. Part II -
Aseem Jakhar , Timur Yunusov , Igor Lukic , Dhillon Andrew Kannabhiran
May 12 -
Blackhat (Arsenal) -
Tool demo -
ThunderCloud: Attack Cloud Without Keys! -
-
Shivankar Madaan
May 12 -
Blackhat (Arsenal) -
Tool demo -
ReconPal: Leveraging NLP for Infosec -
-
Jeswin Mathai , Shantanu Kale , Sherin Stephen
May 12 -
Blackhat (Arsenal) -
Tool demo -
Patronus: Swiss Army Knife SAST Toolkit -
-
Akhil Mahendra , Akshansh Jaiswal , Ashwin Shenoi
May 12 -
Blackhat -
Talk -
Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems -
-
Prashant Rajput , Michail Maniatakos
May 12 -
Blackhat (Arsenal) -
Tool demo -
Node Security Shield -
-
Lavakumar Kuppan , Sukesh Pappu
May 12 -
Blackhat (Arsenal) -
Tool demo -
Nightingale: Docker for Pentesters -
-
Raja Nagori
May 12 -
Blackhat (Arsenal) -
Tool demo -
Mitigating Open Source Software Supply Chain Attacks -
-
Ajinkya Rajput , Ashish Bijlani
May 12 -
Blackhat -
Panel -
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2022 -
Vandana Verma Sehgal , Jeff Moss , Ryan Flores , Lidia Giuliano , Stefano Zanero
May 12 -
Blackhat -
Keynote -
Keynote: #HackingDemocracy: Will Our Societies Hold? -
Samir Saran
Apr 08 -
Nullcon -
Panel -
Digital Identity In The Age Of Fintech -
-
Sheetal Joseph , Alessandro Avagliano , Guido Reismueller , Benoit Flippen , Travis Carelock
Apr 08 -
Nullcon -
Talk -
Bheem OS - A next-generation reasonably secure OS using Rust MicroVM -
-
Akram Ansari , Subash Sn
Apr 08 -
Nullcon -
Talk -
Attack Surfaces for 5G Networks -
-
Altaf Shaik
Feb 28 -
Book -
Mastering Kali Linux for Advanced Penetration Testing – Fourth Edition -
Vijay Kumar Velu 2021
Nov 26 -
Book -
Certified Information Security Manager Exam Prep Guide -
Hemang Doshi
Nov 25 -
Hitb Sec Conf -
Tool demo -
vAPI: Vulnerable Adversely Programmed Interface -
-
Tushar Kulkarni
Nov 19 -
Hackfest -
Talk -
Hacking with Physics -
Hrishikesh Somchatwar
Nov 18 -
Hackinparis -
Talk -
Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS -
Kavisha Sheth
Nov 18 -
Hackinparis -
Talk -
{Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets -
-
Aditya K Sood
Nov 13 -
C0c0n -
Talk -
Zero Trust & Micro-segmentation -
Suresh Menon
Nov 13 -
C0c0n -
Talk -
Third Party Risk Management -
Mahesh Kalyanaraman
Nov 13 -
C0c0n -
Talk -
Server-side javascript Injection -
-
Kavisha Sheth
Nov 13 -
C0c0n -
Talk -
Securing OT in O&G Industry -
George Eapen
Nov 13 -
C0c0n -
Talk -
Post pandemic Transformation - A CISO’s perspective -
Sridhar Govardhan
Nov 13 -
C0c0n (Adversary Village) -
Talk -
Painting Your Organizations with Shades of Red, Blue & Purple -
-
Hidayath Khan
Nov 13 -
C0c0n -
Talk -
New way of looking at the hidden mysteries in the code -
Vandana Verma Sehgal
Nov 13 -
C0c0n -
Talk -
Need for Zero Trust in Banking -
Biju K
Nov 13 -
C0c0n -
Talk -
Mature Your Threat Hunting Program -
Neha Dhyani
Nov 13 -
C0c0n -
Talk -
Machine learning to detect Chia mining -
Varun Kohli
Nov 13 -
C0c0n (Adversary Village) -
Talk -
Light Basin - Telecom roaming network attack case study -
-
Akib Sayyed
Nov 13 -
C0c0n -
Talk -
Introducing Free & Open Elastic Limitless XDR -
Ravindra Ramnani
Nov 13 -
C0c0n -
Panel -
Human errors & system misconfigurations- We can handle it! -
Amit Dubey , Maninder Singh , Tulika Pandey , Tal Catran , Dunston Pereira , Angel Redoble
Nov 13 -
C0c0n -
Talk -
Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application -
Gayatri Nayak
Nov 13 -
C0c0n -
Talk -
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics -
Kiran Kumar Pg
Nov 13 -
C0c0n -
Talk -
Emerging trends in cyber crimes : Investigation tools & techniques -
Triveni Singh
Nov 13 -
C0c0n -
Talk -
Cybersecurity in the era of Resilience - A walk through people, process and technology -
Babitha B P
Nov 13 -
C0c0n -
Talk -
Cyber Warfare & Securing Critical Infrastructures -
Faruk Kazi
Nov 13 -
C0c0n -
Talk -
Crisis Capitalization in a Pandemic -
Greeshma M R
Nov 13 -
C0c0n -
Talk -
Connecting the dots between customers and security teams -
Shruthi Kamath
Nov 13 -
C0c0n -
Talk -
Cloud Threat landscape -
Gunjan Chhillar
Nov 13 -
C0c0n -
Talk -
Changing Cyber Security Paradigm & Cyber Tsunami -
Sunil Varkey
Nov 13 -
C0c0n -
Talk -
Case study - E-crime group targeting mobile users -
Rahul Sasi
Nov 13 -
C0c0n -
Talk -
Case Study - Cyber Heist in a Bank and Recovery of Systems and Money -
Prashant Choudhary
Nov 13 -
C0c0n -
Talk -
Building Global Cyber Security Company Out of India: Key Lessons Learnt During My Entrepreneurship Journey -
Bikash Barai
Nov 13 -
C0c0n -
Talk -
A look into cyber-espionage activities targeting critical infrastructure in India -
Saurabh Sharma , Kurt Baumgartner
Nov 13 -
C0c0n -
Talk -
Decoding new age hackers and Criminal Investigation -
Amit Dubey
Nov 12 -
C0c0n -
Talk -
Understanding the Psychology Behind Threats - adding Twists to your Turns -
Saman Fatima
Nov 12 -
C0c0n -
Talk -
The evolving nature of cyber community -
Aastha Sahni
Nov 12 -
C0c0n -
Panel -
Stopping Breaches with CrowdStrike -
Sandeep Rao
Nov 12 -
C0c0n -
Talk -
Regulating Social Media Platforms : Should it be done in Democratic Societies ? -
J Sam Daniel Stalin , Apar Gupta , Dinesh O Bareja , Prashant Mali , Jiten Jain
Nov 12 -
C0c0n -
Talk -
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches -
Illyas Kooliyankal
Nov 12 -
C0c0n -
Talk -
IoT Security Guidelines & Standards -
Yashodhan Vivek Mandke
Nov 12 -
C0c0n -
Talk -
ICS Security —- A need, a challenge and a new change in Mindset -
Dhruv Gupta
Nov 12 -
C0c0n -
Talk -
Executive Presence….a cardinal of the cyber rostrum -
Bishakha Jain
Nov 12 -
C0c0n -
Talk -
Enterprise Governance and Risk Management -
Arathy Nair , Muskan Mangla
Nov 12 -
C0c0n -
Panel -
Diversity and Inclusion -
Aarushi Koolwal , Hussaina Begum , Nehal Mehta , Shivani Sharma
Nov 12 -
C0c0n -
Talk -
Dissecting Malicious Software and Analysis -
Shrutirupa Banerjiee
Nov 12 -
C0c0n -
Talk -
Data Security and Privacy -
Abhilasha Vyas
Nov 12 -
C0c0n -
Panel -
Cyber Security - Crystal Gazing in to the future -
Burgess Cooper
Nov 12 -
C0c0n -
Talk -
2021 Supply Chain Attacks Analysis -
Ajit Hatti
Nov 12 -
C0c0n -
Talk -
“Let’s Go Phishing”: Discerning the insidious nature of Social Engineering -
Ruchira Pokhriyal , Shashi Karhail
Nov 11 -
Blackhat (Arsenal) -
Tool demo -
vAPI: Vulnerable Adversely Programmed Interface (OWASP API Top 10) -
-
Tushar Kulkarni
Nov 11 -
Blackhat (Arsenal) -
Tool demo -
Kubernetes Goat: Interactive Kubernetes Security Learning Playground -
-
Madhu Akula
Nov 11 -
Blackhat (Arsenal) -
Tool demo -
DejaVu ++ -
-
Bhadreshkumar Patel , Harish Ramadoss
Nov 11 -
Blackhat (Arsenal) -
Tool demo -
Damn Vulnerable Bank -
-
Akshansh Jaiswal , Hrushikesh Kakade , Rewanth Tammana
Nov 10 -
Blackhat (Arsenal) -
Tool demo -
Wireshark Forensics Toolkit -
-
Rishikesh Bhide
Nov 10 -
Blackhat (Arsenal) -
Tool demo -
RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot -
-
Abhimanyu Rawat , Shreyas Srinivasa , Emmanouil Vasilomanolakis
Nov 10 -
Blackhat (Arsenal) -
Tool demo -
Kubestriker: A Blazing Fast Security Auditing Tool -
-
Vasant Kumar
Nov 10 -
Blackhat (Arsenal) -
Tool demo -
Adhrit: Android Security Suite -
-
Abhishek Jaiswal , Abhishek Jm , Rahul Sani
Nov 04 -
Ekoparty -
Talk -
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system -
-
Saransh Rana , Divyanshu Mehta , Harsh Varagiya
Oct 15 -
Rootcon -
Talk -
The Curious case of knowing the unknown -
-
Vandana Verma Sehgal
Oct 13 -
Rootcon -
Talk -
The Kill Chain: Future of Cyber in Defense -
-
Harshit Agrawal
Oct 13 -
Rootcon -
Tool demo -
Buzzard : Crafting your post exploitation framework against odds -
-
Aravindha Hariharan , Subhajeet Singha
Oct 08 -
Shell Con -
Keynote -
Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking -
-
Tamaghna Basu
Aug 27 -
Hitb Sec Conf -
Talk -
Securing Webviews and The Story Behind CVE-2021–21136 -
-
Shiv Sahni , Imdadullah Mohammed
Aug 26 -
Hitb Sec Conf -
Talk -
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade -
-
Harshit Agrawal
Aug 08 -
Defcon (Ics Village) -
Talk -
Top 20 Secure PLC Coding Practices -
-
Vivek Ponnada , Sarah Fluchs
Aug 08 -
Defcon (Adversary Village) -
Panel -
Resilient cyber space: The role of hacker and security communities -
-
Manu Zacharia , Aseem Jakhar , Abhijith B R , Jay Turla , Omar Santos , Dave Lewis , Dhillon Kannabhiran
Aug 08 -
Defcon (Appsec Village) -
Talk -
AppSec 101: A Journey from Engineer to Hacker -
-
Arjun Gopalakrishna
Aug 07 -
Defcon (Appsec Village) -
Talk -
The Curious Case of Knowing the Unknown -
-
Vandana Verma Sehgal
Aug 07 -
Defcon (Adversary Village) -
Tool demo -
Tenacity- An Adversary Emulation Tool for Persistence -
-
Atul Nair , Harshal Tupsamudre
Aug 07 -
Defcon (Adversary Village) -
Tool demo -
Red Team Credentials Reconnaissance (OLD with a TWIST) -
-
Shantanu Khandelwal
Aug 06 -
Defcon (Iot Village) -
Talk -
Defending IoT in the Future of High-Tech Warfare -
-
Harshit Agrawal
Aug 06 -
Defcon (Adversary Village) -
Talk -
Adversary village Kick-off -
-
Abhijith B R
Aug 06 -
Defcon (Adversary Village) -
Panel -
Adversary simulation, emulation or purple teaming - How would you define it? -
-
Anant Shrivastava , Vincent Yiu , Martin Ingesen , Jean Marie Bourbon , Samuel Kimmons , Joe Vest
Aug 05 -
Blackhat -
Talk -
The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks -
-
Ambrish Rawat , Killian Levacher , Mathieu Sinn
Aug 05 -
Defcon (Recon Village) -
Talk -
The Bug Hunter’s Recon Methodology -
-
Tushar Verma
Aug 05 -
Blackhat -
Talk -
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors -
-
Hareesh Khattri , Nagaraju N Kodalapura , Nam N Nguyen
Aug 05 -
Blackhat -
Talk -
5G IMSI Catchers Mirage -
-
Ravishankar Borgaonkar , Altaf Shaik
Aug 04 -
Blackhat -
Talk -
Siamese Neural Networks for Detecting Brand Impersonation -
-
Jugal Parikh , Nitin Kumar Goel , Justin Grana , Yuchao Dai
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
ParseAndC: A Universal Parser and Data Visualization Tool for Security Testing -
-
Parbati Kumar Manna
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
Kubestriker: A Blazing Fast Kubernetes Security Auditing Tool -
-
Pralhad Chaskar , Vasant Kumar
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
Joern: An Interactive Shell for Code Analysis -
-
Suchakra Sharma , Vickie Li , Fabian Yamaguchi
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
Counterfit: Attacking Machine Learning in Blackbox Settings -
-
Raja Sekhar Rao Dheekonda , Will Pearce
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
Automated Attack Path Planning and Validation (A2P2V) -
-
Subir Das , Fukutomo Nakanishi , Jason Youzwak , Michael Hylkema , Santoshi Aoki
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
Attack Surface Framework -
-
Prajwal Panchmahalkar , Mauricio Espinosa
Jun 11 -
Book -
Zscaler Cloud Security Essentials -
Ravi Devarasetty
May 07 -
Blackhat -
Panel -
Insights and Predictions: What’s Next in InfoSec -
Vandana Verma Sehgal , Neil R. Wyler , Lidia Giuliano , Jeff Wilson , Vitaly Kamluk
May 07 -
Blackhat (Arsenal) -
Tool demo -
CANalyse: A Vehicle Network Analysis and Attack Tool -
-
Kartheek Lade
May 06 -
Blackhat -
Talk -
Threat Hunting in Active Directory Environment -
-
Anurag Khanna , Thirumalai Natarajan Muthiah
May 06 -
Blackhat (Arsenal) -
Tool demo -
FalconEye: Windows Process Injection Techniques - Catch Them All -
-
Rajiv Kulkarni , Sushant Paithane
May 06 -
Blackhat (Arsenal) -
Tool demo -
Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way -
-
Vasant Kumar , Rupali Dash
Mar 06 -
Nullcon -
Panel -
From Reactive to Proactive - Operationalizing your Threat Intel -
-
Akshat Jain , Amit Ghodekar , Suhas Desai , Ambuj Bhalla
Mar 06 -
Nullcon -
Talk -
Bug hunter adventures -
-
Shreyas Dighe , Yuvraj Dighe
Mar 05 -
Nullcon -
Talk -
Telecom Security Challenges in 5G -
-
Akib Sayyed
Mar 05 -
Nullcon -
Panel -
Tech Startups/Businesses and Infonomics -
-
Sourabh Issar , Burgess Cooper , Joerg Simon
Mar 05 -
Nullcon -
Panel -
CyberPhysical Systems Security - Trends, challenges & opportunities -
-
Frank Sanjay , Khushwant Pawar , Mayur Mehta , Faruk Kazi
Mar 05 -
Nullcon -
Talk -
Arbitrary code execution on RISC-V using fault injection -
-
Praveen Vadnala , Nils Wiersma 2020
Dec 10 -
Blackhat -
Talk -
Effective Vulnerability Discovery with Machine Learning -
-
Asankhaya Sharma , Ming Yi Ang
Dec 10 -
Blackhat (Arsenal) -
Tool demo -
AndroGoat: Learn Android Application Security Testing -
-
Satish Patnayak
Dec 09 -
Blackhat (Arsenal) -
Tool demo -
Strafer: A Tool to Detect Infections in Elasticsearch Instances -
-
Rohit Bansal , Aditya K Sood
Dec 09 -
Blackhat (Arsenal) -
Tool demo -
HosTaGe: mobile honeypots for rapid deployment -
-
Shreyas Srinivasa , Emmanouil Vasilomanolakis , Eirini Lygerou
Dec 09 -
Blackhat (Arsenal) -
Tool demo -
ArcherySec 2.0 - Open Source Vulnerability Assessment and Management -
-
Anand Tiwari
Nov 21 -
App Sec Indonesia -
Talk -
Threat Defense: Defending the ATT&CK with TTP’s -
Avkash Kathiriya
Nov 21 -
App Sec Indonesia -
Talk -
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration -
Ashwin Vamshi
Nov 21 -
App Sec Indonesia -
Talk -
Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory -
Abhi M Balakrishnan
Nov 20 -
Deepsec -
Talk -
What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis -
-
Shyam Sundar Ramaswami
Nov 06 -
Book -
Network Security Strategies -
Aditya Mukherjee
Oct 09 -
Shell Con -
Talk -
How I Created My Clone Using AI - Next-Gen Social Engineering -
-
Tamaghna Basu
Oct 07 -
Rootcon -
Talk -
Zero Trust in the Era of Cloud -
-
Vandana Verma Sehgal
Oct 07 -
Rootcon -
Talk -
ReconPal: Leveraging NLP for Infosec -
-
Nishant Sharma , Jeswin Mathai
Oct 07 -
Rootcon -
Talk -
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
-
Kaustubh Padwad
Oct 07 -
Rootcon -
Talk -
How I Pwned the ICS data during my internship -
-
Shail Patel
Oct 07 -
Rootcon -
Talk -
Blockchain Based OT Monitoring Solution (BBOTMS) -
-
Asif Hameed Khan , Gagan Jattana
Oct 07 -
Rootcon -
Talk -
Automating Threat Hunting on the Dark Web and other nitty-gritty thingso -
-
Apurv Singh Gautam
Oct 02 -
Blackhat (Arsenal) -
Tool demo -
Phishing Simulation Assessment -
-
Jyoti Raval
Oct 02 -
Blackhat (Arsenal) -
Tool demo -
OWASP Nettacker -
-
Sri Harsha Gajavalli , Ali Razmjoo Qalaei , Sam Stepanyan
Oct 02 -
Blackhat (Arsenal) -
Tool demo -
MalViz.ai -
-
Vasu Sethia , Shivam Kataria
Oct 02 -
Blackhat -
Talk -
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale -
-
Aravind Machiry , Nilo Redini , Andrea Continella , Ruoyu Wang , Yan Shoshitaishvili , Cristopher Kruegel , Giovanni Vigna , Chad Spensky
Oct 01 -
Blackhat (Arsenal) -
Tool demo -
Wi-Fi Access Point Rootkits -
Nishant Sharma , Jeswin Mathai
Oct 01 -
Blackhat (Arsenal) -
Tool demo -
OWASP Python Honeypot -
-
Sri Harsha Gajavalli , Ali Razmjoo
Oct 01 -
Blackhat (Arsenal) -
Tool demo -
Mobexler: An All-in-One Mobile Pentest VM -
-
Abhinav Mishra
Oct 01 -
Blackhat -
Talk -
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community -
-
Vandana Verma Sehgal
Oct 01 -
Blackhat (Arsenal) -
Tool demo -
Adhrit: Android Security Suite -
-
Abhishek Jm , Akhil Mahendra
Sep 19 -
C0c0n -
Talk -
Automate your Recon with ReconNote -
-
Prasoon Gupta
Sep 18 -
C0c0n -
Talk -
Supercharging your initial foothold in Red Team engagements -
Sachin S Kamath
Sep 18 -
C0c0n -
Talk -
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux -
Munawwar Hussain Shelia
Sep 18 -
C0c0n -
Talk -
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
-
Kaustubh Padwad
Sep 18 -
C0c0n -
Talk -
Offensive & Scope Based Recon -
-
Harsh Bothra
Sep 18 -
C0c0n -
Talk -
My top 3 findings in bug Bounty journey | Aiming for high impact issues -
Ankit Giri
Sep 18 -
C0c0n -
Talk -
Demystifying Zero Trust - A Real world -
-
Sandeep Variyam
Sep 18 -
C0c0n -
Talk -
Deep Learning for Intrusion Attempt Detection -
Varun Kohli
Sep 18 -
C0c0n -
Keynote -
Data protection and Privacy Data protection and Privacy -
-
Kris Gopalakrishnan
Sep 18 -
C0c0n -
Talk -
Cyber Security Shifts During COVID-19 -
-
Sunil Kanchi
Sep 18 -
C0c0n -
Talk -
COVID-19 Cyber impact on financial sector and remote employees -
-
Amit Dubey , Tal Catran , Yair Feldman
Sep 18 -
C0c0n -
Talk -
Coping with Digital Transformation - A CISO perspective -
-
Maya R Nair
Sep 18 -
C0c0n -
Talk -
Broken Cryptography & Account Takeover -
Harsh Bothra
Sep 18 -
C0c0n -
Talk -
Automation in Bug Bounties to Work Smarter -
Prerak Mittal
Sep 18 -
C0c0n -
Talk -
All about IOT Forensics -
Hima Bindu Vejella
Sep 18 -
C0c0n -
Talk -
Web Application hacking with WebZGround -
-
Parveen Yadav , Narendra Kumar
Sep 18 -
C0c0n -
Talk -
Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment -
-
Madhu Akula
Sep 18 -
C0c0n -
Talk -
Introducing SniperPhish: A Web-Email Spear Phishing Toolkit -
-
Sreehari Haridas , Gem George
Sep 18 -
C0c0n -
Talk -
How I created my clone using AI - next-gen Social Engineering -
-
Tamaghna Basu
Sep 18 -
C0c0n -
Talk -
Herd Immunity, in the Cyber World -
Sunil Varkey
Aug 22 -
The Diana Initiative -
Talk -
Internal Red Team Operations Framework - Building your practical internal Red Team -
-
Abhijith B R
Aug 22 -
The Diana Initiative -
Talk -
Hacking into Android Ecosystem -
-
Aditi Bhatnagar
Aug 22 -
The Diana Initiative -
Talk -
Deploying discreet infrastructure for targeted phishing campaigns -
-
Sreehari Haridas
Aug 22 -
The Diana Initiative -
Talk -
Automating Threat Hunting on the Dark Web and other nitty-gritty things -
-
Apurv Singh Gautam
Aug 21 -
The Diana Initiative -
Talk -
Trust, No Trust or Zero Trust - Myth Demystifying -
Vandana Verma Sehgal
Aug 21 -
Book -
CISA – Certified Information Systems Auditor Study Guide -
Hemang Doshi
Aug 09 -
Defcon (Appsec Village) -
Talk -
Running an appsec program with open source projects -
-
Vandana Verma Sehgal
Aug 07 -
Defcon -
Panel -
D0 N0 H4RM: A Healthcare Security Conversation -
-
Vidha Murthy , Christian Dameff , Jeff Tully , Jessica Wilkerson , Veronica Schmitt , Ash Luft
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
MSTICpy: The Security Analysis Swiss Army Knife -
-
Ashwin Patil , Pete Bryan , Ian Hellen
Aug 06 -
Blackhat -
Talk -
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community -
-
Vandana Verma Sehgal
Aug 06 -
Blackhat -
Panel -
Locknote: Conclusions and Key Takeaways from Day 2 -
Aanchal Gupta , Kymberlee Price , Rodrigo Rubira Branco , Stefano Zanero
Aug 06 -
Blackhat -
Talk -
How I Created My Clone Using AI - Next-Gen Social Engineering -
-
Tamaghna Basu
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
FuzzCube -
-
Anto Joseph
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
Dynamic Labs: Windows & Active Directory Exploitation -
-
Rohan Durve
Aug 05 -
Blackhat (Arsenal) -
Tool demo -
vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) -
-
Pramod Rana
Aug 05 -
Blackhat -
Talk -
Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic -
-
Harini Kannan , Nick Gregory
Jul 26 -
Hitb Sec Conf -
Talk -
Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company -
Himanshu Sharma , Aman Sachdev
Jul 09 -
Book -
Learn Kubernetes Security -
Pranjal Jumde , Kaizhe Huang
Jul 05 -
Blackhat (Arsenal) -
Tool demo -
Mobile Security Framework - MobSF -
-
Ajin Abraham
May 22 -
Book -
Hands-On Web Penetration Testing with Metasploit -
Harpreet Singh , Himanshu Sharma
Apr 25 -
Hitb Sec Conf -
Talk -
THE STATE OF ICS SECURITY: THEN AND NOW -
Praveen Soni , Shivbihari Pandey , Ashish Kumar Gahlot
Apr 24 -
Hitb Sec Conf -
Talk -
COMMSEC: The State of ICS Security : Then and Now -
Praveen Soni , Shivbihari Pandey , Ashish Kumar Gahlot
Apr 10 -
Book -
Metasploit 5.0 for Beginners -
Sagar Rahalkar
Mar 18 -
Can Sec West -
Talk -
The ARM-X Firmware Emulation Framework -
-
Saumil Shah
Mar 07 -
Nullcon -
Panel -
Supply Chain Security In Critical Infrastructure Systems -
-
Manish Tiwari , Suchit Mishra , Faruk Kazi , Cristofaro Mune
Mar 07 -
Nullcon -
Panel -
Hack the law: Protection for cybersecurity research in India -
-
Apar Gupta , Manu Zacharia , Raman Jit Singh Chima , Neelu Tripathy
Mar 07 -
Nullcon -
Panel -
Economics Of Data Breach And Attack -
-
Bhaskar Medhi , Manu Zacharia , Suchit Mishra , Yash Kadakia
Mar 06 -
Nullcon -
Tool demo -
Wolverine -
-
Furqan Khan , Siddharth Anbalahan
Mar 06 -
Nullcon -
Tool demo -
VyAPI -
-
Riddhi Shree
Mar 06 -
Nullcon -
Tool demo -
Talisman -
-
Suhas Vishwanath
Mar 06 -
Nullcon -
Tool demo -
spike2kill -
-
Manish Singh
Mar 06 -
Nullcon -
Panel -
Securing the Human Factor -
-
Rahul Neel Mani , Phoram Mehta , Burgess Cooper , Manish Tiwari , Venkatesh Subramaniam
Mar 06 -
Nullcon -
Tool demo -
SASTRI -
-
Rushikesh D Nandedkar , Lalit Bhandari
Mar 06 -
Nullcon -
Talk -
Putting it all together: building an iOS jailbreak from scratch -
-
Umang Raghuvanshi
Mar 06 -
Nullcon -
Tool demo -
Providence -
-
Swapnil Kumbhar , Akshay Shah
Mar 06 -
Nullcon -
Panel -
Predicting Danger: Building the Ideal Threat Intelligence Model -
-
Saikat Datta , Sandeep Sharma , Muslim Koser , Shankar Jadhav
Mar 06 -
Nullcon -
Tool demo -
PivotSuite -
-
Manish Gupta
Mar 06 -
Nullcon -
Tool demo -
Phishing Simulation -
-
Jyoti Raval
Mar 06 -
Nullcon -
Tool demo -
Omniscient -
-
Pramod Rana
Mar 06 -
Nullcon -
Tool demo -
Mobexler -
-
Abhinav Mishra , Abhishek Jaiswal
Mar 06 -
Nullcon -
Panel -
Lessons from the Cyber Trenches -
-
Shivkumar Pandey , Manish Tiwari , Venkatesh Subramaniam , Jacxine Fernandez , Burgess Cooper , Ramesh Kumar
Mar 06 -
Nullcon -
Talk -
InfoSec Deep Learning in Action -
-
Satnam Singh
Mar 06 -
Nullcon -
Tool demo -
Hachi -
-
Parmanand Mishra
Mar 06 -
Nullcon -
Tool demo -
FuzzCube -
-
Anto Joseph
Mar 06 -
Nullcon -
Tool demo -
FRISPY -
-
Tejas Girme , Parmanand Mishra
Mar 06 -
Nullcon -
Tool demo -
F.R.I.D.A.Y -
-
Shyam Sundar Ramaswami
Mar 06 -
Nullcon -
Panel -
Complication in security practices -
-
Himanshu Das , Neelu Tripathy , Kushal Das , Ankur Bhargava , Vaibhav Gupta
Mar 06 -
Nullcon -
Talk -
Cloud As an Attack vector -
-
Ashwin Vamshi , Rushikesh Vishwakarma
Mar 06 -
Nullcon -
Tool demo -
Callidus -
-
Chirag Savla
Mar 06 -
Nullcon -
Talk -
Automated Classification of Web-Application Attacks for Intrusion Detection -
Aneet Kumar Dutta
Feb 27 -
Book -
AWS Security Cookbook -
Heartin Kanikathottu 2019
Dec 04 -
Blackhat (Arsenal) -
Tool demo -
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response -
-
Kshitij Kumar , Jai Musunuri
Dec 04 -
Blackhat (Arsenal) -
Tool demo -
RTTM: Real Time Threat Monitoring Tool -
-
Naveen Rudrappa , Murali Krishna Segu
Dec 04 -
Blackhat (Arsenal) -
Tool demo -
DumpTheGit -
-
Malkit Singh
Dec 04 -
Blackhat -
Talk -
ClusterFuzz: Fuzzing at Google Scale -
-
Abhishek Arya , Oliver Chang
Dec 04 -
Blackhat (Arsenal) -
Tool demo -
Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit -
-
Jayesh Chauhan
Dec 04 -
Blackhat -
Talk -
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing -
-
Karthik Ramasamy , Eric Hampshire
Nov 28 -
Deepsec -
Talk -
Mastering AWS Pentesting and Methodology -
-
Ankit Giri
Nov 09 -
Toor Con -
Talk -
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans -
-
Jatin Kataria , Ang Cui
Nov 05 -
Book -
Security Designs for the Cloud, IoT, and Social Networking -
Chintan Bhatt , Mani Madhukar , Dac Nhuong Le
Nov 01 -
Hackfest -
Talk -
The Mechanics of Malware’s Darkside -
-
Yagnesh Waran P , Laura Harris
Nov 01 -
App Sec Day Australia -
Talk -
Protecting the Damned: Deploying Insecure Applications at Scale -
-
Vivek Ramachandran
Nov 01 -
App Sec Day Australia -
Talk -
A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
Oct 22 -
Hacklu -
Talk -
Intro to Dark Arts: Getting Started with CTFs -
Geethna T K , Shruti Dixit , Sowmya Potluri
Oct 17 -
Hitb Sec Conf -
Talk -
Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure -
-
Anima Anandkumar
Oct 16 -
Hitb Sec Conf -
Tool demo -
Introducing ARM-X - The ARM IoT Firmware Emulation Framework -
-
Saumil Shah
Oct 15 -
Hitb Sec Conf -
Talk -
Car Hacking: Practical Guide to Automotive Security -
-
Yogesh Ojha
Oct 14 -
Hitb Sec Conf -
Talk -
ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES -
-
Harshit Agrawal , Himanshu Mehta
Oct 14 -
Hitb Sec Conf -
Talk -
IoT Pentesting The Right Way -
-
Yogesh Ojha
Oct 14 -
Hitb Sec Conf -
Talk -
CALL OF DUTY: MODERN BROWSER WARFARE -
-
Dhiraj Mishra
Oct 12 -
Texas Cyber Summit -
Talk -
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style -
Sudheendra Bhat
Oct 12 -
Texas Cyber Summit -
Talk -
HX-3012 PErfidious: Make PE Backdooring Great Again! -
Shreyans Doshi
Oct 11 -
Texas Cyber Summit -
Talk -
Exploit The State of Embedded Web Security in IoT Devices ! -
Aditya K Sood
Oct 10 -
Brucon -
Talk -
Security transition from 4G to 5G: are we secure enough? -
-
Altaf Shaik , Ravishankar Borgaonkar
Oct 03 -
Virus Bulletin -
Talk -
Curious tale of 8.t used by multiple campaigns against South Asia -
Niranjan Jayanand , Ivan Macalintal , Debalina Ghosh
Sep 28 -
C0c0n -
Talk -
Vulnerability Prioritization with Threat Intelligence -
Muslim Koser , Devesh Vatsa , Rohit Srivastwa , Dinesh O Bareja
Sep 28 -
ROM Hack -
Talk -
Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it -
-
Samit Anwer
Sep 28 -
C0c0n -
Panel -
Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions -
B R Nath , Jijy Oommen , Maya R Nair , Ajay Porus , Georgie Kurien
Sep 28 -
C0c0n -
Panel -
Align security and risk management strategies with enterprise objectives -
-
Abdul Karim Vettiyanickal , George Eapen , Ranjeet Rai , Amit Dubey , Biju K , Kanu Pathania
Sep 27 -
C0c0n -
Talk -
VyAPI - The Vulnerable Hybrid Android App -
-
Riddhi Shree
Sep 27 -
C0c0n -
Talk -
Stepping into Password Less Economy -
Ajit Hatti
Sep 27 -
C0c0n -
Panel -
Shouldn’t Organization disclose breaches - The need for a shared platform -
-
Sunil Varkey , Jacxine Fernandez , Rahul Sasi , K K Chaudhary
Sep 27 -
C0c0n -
Talk -
Serverless SOAR -
-
Sabyasachi Dhal , Suresh Sharma
Sep 27 -
C0c0n -
Talk -
Security @scale for startups -
Shivanath Somanathan
Sep 27 -
C0c0n -
Talk -
Securing Payment Data with PCI Security Standards and Programs -
Nitin Bhatnagar
Sep 27 -
C0c0n -
Talk -
RANSOMWARE - to pay or not to pay -
Seshaprakash Kusuma Sreenivasa
Sep 27 -
C0c0n -
Talk -
Practical Approach to Cyber Security for financial institutions -
Georgie Kurien
Sep 27 -
C0c0n -
Talk -
Offensive Machine Learning for Pentesters and Red Teams -
Tamaghna Basu
Sep 27 -
C0c0n -
Talk -
Looking a decade ahead: Big data, drones , Robots and cyber security. -
Rahul Sasi
Sep 27 -
C0c0n -
Talk -
Lessons learned form data breaches in the cloud -
Ajay Agrawal
Sep 27 -
C0c0n -
Talk -
Industry 4.0 - Security and Compliance -
Santhosh Srinivasan
Sep 27 -
C0c0n -
Talk -
Hacking ICS devices for Fun -
Arun Mane
Sep 27 -
C0c0n -
Talk -
Golang for Pentesters / RedTeamers -
-
Anant Shrivastava
Sep 27 -
C0c0n -
Talk -
Doing SecOps for the Cloud using Cloud Native Services -
Akash Mahajan
Sep 27 -
C0c0n -
Panel -
Digital Transformation and Evolving Governance Structure -
-
A Shiju Rawther , Ajith Balagopal , Balakrishnan A , Sreekumar Balachandran
Sep 27 -
C0c0n -
Talk -
Detection of TOR Sources using Artificial Intelligence -
Roshy John
Sep 27 -
C0c0n -
Talk -
Demystifying HealthCare Security -
Ajay Pratap Singh
Sep 27 -
C0c0n -
Talk -
Defense in Depth for Embedded Systems -
-
Jiggyasu Sharma
Sep 27 -
C0c0n -
Talk -
Cyber Hygiene from Enterprise point of view -
Noorul Haq
Sep 27 -
C0c0n -
Talk -
CISO Mind Set -
Lopa Mudraa Basuu
Sep 27 -
C0c0n -
Talk -
Building a cloud security monitoring and auditing framework -
Nirali Shah , Prasoon Dwivedi
Sep 27 -
C0c0n -
Talk -
Block Chain for Secured Automation -
Sanat Bhat
Sep 27 -
C0c0n -
Talk -
autoSource an automated framework for Source Code Review -
-
Malkit Singh
Sep 27 -
C0c0n -
Talk -
AI, ML and Security -
Varun Kohli
Sep 27 -
C0c0n -
Talk -
Advanced Persistent Threat and counter measures -
A a Gafoor
Sep 27 -
C0c0n -
Talk -
A Day in the Life of a CISO -
Sridhar Govardhan
Sep 23 -
Rootcon -
Talk -
Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) -
-
Arun Mane , Nikhil Bogam
Sep 23 -
Rootcon -
Talk -
Identity crisis: war stories from authentication failures -
-
Vishal Chauhan
Sep 23 -
Rootcon -
Talk -
Hunting Threats with Wireshark Plugins -
-
Nishant Sharma , Jeswin Mathai , Shivam Bathla
Sep 23 -
Rootcon -
Talk -
Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking -
-
Arun Mane
Sep 23 -
Rootcon -
Talk -
APAD: An EDR Grade Agent for Wi-Fi Access Points -
-
Vivek Ramachandran
Sep 13 -
44 Con -
Talk -
The CISO’s Dilemma -
-
Saumil Shah
Sep 13 -
Global App Sec -
Talk -
Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center -
Amol Sarwate
Sep 13 -
44 Con -
Talk -
One Person Army – Playbook on how to be the first Security Engineer at a company -
-
Kashish Mittal
Sep 13 -
Global App Sec -
Talk -
A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
Sep 12 -
Global App Sec -
Keynote -
Making a Change, One at a time - Diversity: More than just Gender -
Vandana Verma Sehgal
Aug 30 -
Hitb Sec Conf -
Talk -
COMMSEC: PErfidious: Make PE Backdooring Great Again! -
-
Shreyans Doshi
Aug 29 -
Hitb Sec Conf -
Talk -
Understanding, Attacking & Securing Medical Devices -
-
Ajay Pratap Singh
Aug 29 -
Hitb Sec Conf -
Keynote -
The CISO’s Dilemma -
-
Saumil Shah
Aug 29 -
Hitb Sec Conf -
Tool demo -
Halcyon IDE: An IDE for NMAP script developers -
-
Sanoop Thomas
Aug 11 -
Defcon (Appsec Village) -
Talk -
Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants -
-
Vandana Verma Sehgal
Aug 11 -
Defcon (Appsec Village) -
Talk -
Exploiting and Securing iOS Apps using OWASP iGoat -
Swaroop Yermalkar
Aug 10 -
Defcon -
Talk -
RACE - Minimal Rights and ACE for Active Directory Dominance -
-
Nikhil Mittal
Aug 10 -
Defcon (DemoLabs) -
Tool demo -
Local Sheriff -
-
Konark Modi
Aug 09 -
Defcon (DemoLabs) -
Tool demo -
Srujan: Safer Networks for Smart Homes -
-
Sanket Karpe , Parmanand Mishra
Aug 09 -
Defcon (DemoLabs) -
Tool demo -
PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit -
-
Manish Gupta
Aug 09 -
Defcon (DemoLabs) -
Tool demo -
EXPLIoT - IoT Security Testing and Exploitation Framework -
-
Aseem Jakhar , Murtuja Bharmal
Aug 09 -
Defcon -
Talk -
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans -
-
Jatin Kataria , Rick Housley , Ang Cui
Aug 08 -
Defcon (Packethacking Village) -
Talk -
YOUR PHONE IS USING TOR AND LEAKING YOUR PII -
-
Milind Bhargava , Adam Podgorski
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
RWDD: Remote Web Deface Detection Tool -
-
K v Prashant , Ade Yoseman Putra
Aug 08 -
Blackhat -
Talk -
Preventing Authentication Bypass: A Tale of Two Researchers -
-
Ravi Jaiswal , Terry Zhang , Ron Chan
Aug 08 -
Defcon (Cloud Village) -
Talk -
Phishing in the cloud era -
-
Ashwin Vamshi , Abhinav Singh
Aug 08 -
Defcon (DemoLabs) -
Tool demo -
PcapXray -
-
Srinivas Piskala Ganesh Babu
Aug 08 -
Defcon (DemoLabs) -
Tool demo -
Let’s Map Your Network -
-
Pramod Rana
Aug 08 -
Defcon (Lockpick Village) -
Talk -
Hacking ICS devices for Fun Penetration Testing of Vehicle Components -
-
Arun Mane
Aug 08 -
Defcon (DemoLabs) -
Tool demo -
Hachi: An Intelligent threat mapper -
-
Parmanand Mishra
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
EXPLIoT: IoT Security Testing and Exploitation Framework -
-
Aseem Jakhar , Murtuja Bharmal
Aug 08 -
Blackhat -
Talk -
DevSecOps : What, Why and How -
-
Anant Shrivastava
Aug 08 -
Blackhat -
Talk -
Death to the IOC: What’s Next in Threat Intelligence -
-
Bhavna Soman
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
CSF: Container Security Framework -
-
Vaibhav Gupta
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit -
-
Jayesh Chauhan
Aug 08 -
Defcon (Cloud Village) -
Talk -
Anatomy of cloud hacking -
Pratik Shah
Aug 08 -
Blackhat -
Talk -
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans -
Jatin Kataria , Richard Housley , Ang Cui
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
SASTRI: Plug and Play VM for SAST/Static Application Security Testing Realtime Integration / -
-
Rushikesh D Nandedkar , Lalit Bhandari
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting -
-
Sudhanshu Chauhan , Kunal Aggarwal
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit -
-
Manish Gupta
Aug 07 -
Blackhat -
Talk -
New Vulnerabilities in 5G Networks -
-
Ravishankar Borgaonkar , Altaf Shaik
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
Medaudit: Auditing Medical Devices and Healthcare Infrastructure -
-
Anirudh Duggal
Aug 07 -
Blackhat -
Talk -
Defense Against Rapidly Morphing DDOS -
-
Mudit Tyagi , Mikhail Fedorov
Aug 05 -
Blackhat (Arsenal) -
Tool demo -
CertPivot: Infra-Chaining + Cert-Check -
Ajit Hatti
Jun 02 -
Defcon (DemoLabs) -
Tool demo -
VoIPShark: Open Source VoIP Analysis Platform -
-
Nishant Sharma , Jeswin Mathai , Ashish Bhangale
May 28 -
Securityfest -
Talk -
RF Exploitation: Demystifying IoT/OT hacks with SDR -
-
Himanshu Mehta , Harshit Agrawal
May 28 -
Securityfest -
Talk -
Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it -
-
Samit Anwer
May 27 -
Book -
Cybersecurity: The Beginner’s Guide -
Deepayan Chanda , Dr. Erdal Ozkaya
May 21 -
Phdays -
Talk -
Rapid hardware hacking 101 -
Arun Magesh
May 21 -
Phdays -
Talk -
How to fail in hardware hacking -
-
Arun Magesh
May 21 -
Phdays -
Talk -
GDALR: an efficient model duplication attack on black-box machine learning models -
-
Rewanth Tammana , Nikhil Joshi
May 21 -
Phdays -
Talk -
Fuzzing 101 -
Dhiraj Mishra , Zubin Devnani
May 21 -
Phdays -
Talk -
Breaking Microsoft Edge extensions security policies -
-
Nikhil Mittal
May 21 -
Phdays -
Talk -
Active defense using Honeypots v2 -
-
Rahul Binjve
May 10 -
Hitb Sec Conf -
Talk -
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR -
-
Himanshu Mehta , Harshit Agrawal
May 09 -
Hitb Sec Conf -
Talk -
Make ARM Shellcode Great Again -
-
Saumil Shah
May 09 -
Hitb Sec Conf -
Talk -
HAXPO: WiCy: Monitoring 802.11AC Networks at Scale -
-
Vivek Ramachandran
May 09 -
Hitb Sec Conf -
Talk -
GDALR: Duplicating Black Box Machine Learning Models -
-
Rewanth Tammana , Nikhil Joshi
May 04 -
Thot Con -
Talk -
What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing -
Priyank Nigam
Mar 29 -
Blackhat (Arsenal) -
Tool demo -
Halcyon IDE: Nmap Script Development IDE -
-
Sanoop Thomas
Mar 28 -
Blackhat (Arsenal) -
Tool demo -
VoIP Wireshark Attack-Defense Toolkit -
-
Nishant Sharma , Jeswin Mathai , Ashish Bhangale
Mar 28 -
Blackhat (Arsenal) -
Tool demo -
RTS: Real Time Scrapper -
-
Naveen Rudrappa
Mar 28 -
Blackhat (Arsenal) -
Tool demo -
pytm: A Pythonic Framework for Threat Modeling -
-
Rohit Shambhuni , Izar Tarandach
Mar 28 -
Blackhat (Arsenal) -
Tool demo -
OWASP Nettacker: Automated Penetration Testing Framework -
-
Sri Harsha Gajavalli , Ali Razmjoo Qalaei , Ehsan Nezami
Mar 28 -
Blackhat (Arsenal) -
Tool demo -
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research -
-
Nilaksh Das , Evan Yang , Li Chen
Mar 28 -
Blackhat (Arsenal) -
Tool demo -
Kurukshetra: Playground for Interactive Security Learning -
-
Anirudh Anand , Mohan Kallepalli , Ankur Bhargava
Mar 28 -
Blackhat -
Talk -
Investigating Malware Using Memory Forensics - A Practical Approach -
-
Monnappa K A
Mar 28 -
Blackhat -
Talk -
DevSecOps : What, Why and How -
-
Anant Shrivastava
Mar 28 -
Blackhat (Arsenal) -
Tool demo -
Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit -
-
Jayesh Chauhan
Mar 28 -
Blackhat (Arsenal) -
Tool demo -
Archery - Open Source Vulnerability Assessment and Management- 2.0 -
-
Anand Tiwari
Mar 21 -
Troopers -
Talk -
Evolution of kernel fuzzers in NetBSD -
-
Siddharth M
Mar 02 -
Nullcon -
Panel -
The Myth of Sisyphus Secure Product Development -
-
Bipin Upadhyay , Minatee Mishra , Neelu Tripathy , Vaibhav Gupta , Vishal Sahani
Mar 02 -
Nullcon -
Panel -
Navigating Risk in the Changing Business and Technology Landscape -
-
Rahul Neel Mani , Burgess Cooper , Manish Tiwari , Mannan Godil
Mar 02 -
Nullcon -
Panel -
CISO Strategy for OT and IoT risk and Threat Management -
-
Gaurav Shukla , Gomeet Pant , Rakesh Viswanathan , Sudarshan Rajagopal
Mar 02 -
Nullcon -
Panel -
Actionable Intelligence and Cyber Security -
-
Durga Dube , M v Sheshadri , Rahul Sasi , Shrikant Shitole , Alan White
Mar 01 -
Nullcon -
Panel -
Cybersecurity: Is Machine Learning the Answer? -
-
Rahul Sasi , Sitesh Behera , Sumeet Khokhani , Rui Bastos
Mar 01 -
Nullcon -
Panel -
Clear and Present Danger: Cyber Wars will Target Critical Infrastructure -
-
Sourabh Issar , Sachin Burman , Sudarshan Rajagopal , Somenath Kundu
Mar 01 -
Nullcon -
Panel -
Clash of the Titans; who will survive? -
-
Burgess Cooper , Durga Dube , Vasanthika Srinath , Jaya Baloo , Shan Lee
Mar 01 -
Nullcon -
Panel -
Breached? – Here is how I responded! -
-
Muslim Koser , Mrudul Uchil , Sachin Burman , Venkata Satish Guttula , Vijay K Verma
Feb 28 -
Nullcon -
Talk -
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases -
-
Lavakumar Kuppan , Ankit Gupta
Feb 28 -
Book -
Hands-On Application Penetration Testing with Burp Suite -
Dhruv Shah , Riyaz Walikar , Carlos A. Lozano
Feb 28 -
Nullcon -
Talk -
Dirty use of USSD Codes -
Ravishankar Borgaonkar
Feb 28 -
Nullcon -
Talk -
Building Hardened IoT Implementations with LangSec -
-
Prashant Anantharaman
Feb 28 -
Nullcon -
Talk -
Attacking & Securing HealthCare Standards & hospital secured systems -
-
Ajay Pratap Singh
Feb 28 -
Nullcon -
Talk -
Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida -
-
Shivang Desai
Feb 28 -
Nullcon -
Talk -
A Hacker Walks into a Co-working Space -
-
Rahul Binjve
Jan 31 -
Book -
Hands-On Penetration Testing with Python -
Furqan Khan
Jan 30 -
Book -
Mastering Kali Linux for Advanced Penetration Testing -
Vijay Kumar Velu , Robert Beggs 2018
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit -
-
Jayesh Chauhan
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
Astra: Automated Security Testing For REST APIs -
-
Sagar Popat , Harsh Grover
Dec 06 -
Blackhat -
Talk -
AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace -
-
Vijay Thaware , Niranjan Agnihotri
Dec 05 -
Blackhat -
Talk -
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols -
-
N Asokan , Lachlan Gunn , Ricardo Vieitez Parra
Dec 05 -
Blackhat (Arsenal) -
Tool demo -
Mafia: Mobile Security Automation Framework for Intelligent Auditing -
-
Ankur Bhargava , Mohan Kallepalli
Dec 05 -
Blackhat (Arsenal) -
Tool demo -
Kurukshetra: Playground for Interactive Security Learning -
-
Anirudh Anand , Mohan Kallepalli
Nov 29 -
Deepsec -
Talk -
DNS Exfiltration and Out-of-Band Attacks -
-
Nitesh Shilpkar
Nov 27 -
Hitb Sec Conf -
Talk -
Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit -
-
Himanshu Mehta , Sachine Wagh
Nov 27 -
Hitb Sec Conf -
Talk -
COMMSEC: Taking Over Telecom Networks -
-
Hardik Mehta , Loay Hassan Abdelrazek
Nov 27 -
Hitb Sec Conf -
Talk -
COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding -
-
Vikash Yadav
Nov 27 -
Hitb Sec Conf -
Talk -
BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit -
-
Rewanth Tammana
Nov 02 -
Hackfest -
Talk -
Exploiting Connected Medical Devices: Lessons Learned & Data Earned -
-
Saurabh Harit
Nov 02 -
Hitb Sec Conf -
Talk -
Defending The Enterprise in 2018 -
Saumil Shah
Oct 19 -
App Sec Day Australia -
Talk -
Threat Modeling-as-Code & Automation for DevSecOps wins -
-
Abhay Bhargav
Oct 19 -
App Sec Day Australia -
Talk -
Continuous Integration and Delivery with Docker Containers -
-
Vasant Kumar
Oct 15 -
Hacklu -
Talk -
Make ARM Shellcode Great Again -
-
Saumil Shah
Oct 15 -
Hacklu -
Talk -
Come to the dark side! We have radical insurance groups & ransomware -
-
Ankit Gangwal , Eireann Leverett
Oct 10 -
Brucon -
Talk -
Simplifying the art of instrumentation -
Krishnakant Patil , Rushikesh D Nandedkar
Oct 10 -
Brucon -
Talk -
Forging Trusts for Deception in Active Directory -
-
Nikhil Mittal
Oct 05 -
C0c0n -
Talk -
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? -
Roshy John
Oct 05 -
C0c0n -
Talk -
Using Fault Injection for Forensics -
Yashin Mehaboobe
Oct 05 -
C0c0n -
Talk -
Unconventional vulnerabilities in Google Cloud Platform -
Pranav Venkat
Oct 05 -
C0c0n -
Talk -
Taking cyber security to the board room -
Amit Pradhan
Oct 05 -
C0c0n -
Talk -
SCANDA: To Unbosom Malware Behavior -
Rajesh Nikam , Parmanand Mishra
Oct 05 -
C0c0n -
Talk -
Resiliency Focus alongside Digital Disruption -
Lince Lawrence
Oct 05 -
C0c0n -
Talk -
Privacy And Data Protection: Stakeholders’ Perspectives -
Rahul Sharma
Oct 05 -
C0c0n -
Talk -
Predictive policing using Big Data analytics. -
Tarun Wig
Oct 05 -
C0c0n -
Talk -
OSINT : Indian Citizen Edition -
Anant Shrivastava
Oct 05 -
C0c0n -
Talk -
How can we use machine learning to prevent Frauds and password breaches -
Tamaghna Basu
Oct 05 -
C0c0n -
Talk -
Future of Mobility & Cyber Security -
Suja Chandy
Oct 05 -
C0c0n -
Talk -
DomGoat - the DOM Security Playground -
-
Lavakumar Kuppan
Oct 05 -
C0c0n -
Talk -
Digital Innovation revolution in Kerala Government -
Sunil Varkey
Oct 05 -
C0c0n -
Talk -
Defending Healthcare Base -
Jiggyasu Sharma
Oct 05 -
C0c0n -
Talk -
Dealing with Changing Threat Landscape -
Vijendra Katiyar
Oct 05 -
C0c0n -
Talk -
Data management challenge for Privacy compliance -
Maria Bellarmine
Oct 05 -
C0c0n -
Talk -
Cybersecurity Embedded Digital Transformation - The Future -
Sunil Kanchi
Oct 05 -
C0c0n -
Talk -
Cyber security in Health Care Industry -
Noorul Haq
Oct 05 -
C0c0n -
Talk -
Blockchains as techno-power structures: towards emergence of P2P Politics -
Sunil Aggarwal
Oct 05 -
C0c0n -
Talk -
Artificial Intelligence and Social Media Analytics in Criminal Investigation -
Amit Dubey
Oct 05 -
C0c0n -
Talk -
Adaptive GRC -
Mahesh Kalyanaraman
Oct 05 -
C0c0n -
Talk -
Pentesting GraphQL Applications -
-
Neelu Tripathy
Oct 05 -
C0c0n -
Talk -
DNS Exfiltration and Out of Band Attacks -
Nitesh Shilpkar
Oct 05 -
C0c0n -
Talk -
Defending cloud Infrastructures with Cloud Security Suite -
-
Jayesh Chauhan , Shivankar Madaan
Oct 04 -
Brucon -
Talk -
Disrupting the Kill Chain -
-
Vineet Bhatia
Oct 03 -
Blackhat (Arsenal) -
Tool demo -
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization -
-
Ankur Tyagi
Sep 28 -
Book -
Hands-On Red Team Tactics -
Himanshu Sharma , Harpreet Singh
Sep 27 -
Rootcon -
Talk -
Expl-iot: Hacking IoT like a boss -
-
Aseem Jakhar
Sep 27 -
Rootcon -
Talk -
Defending cloud Infrastructures with Cloud Security Suite -
-
Shivankar Madaan
Sep 27 -
Rootcon -
Talk -
Cyber Security Threats to Telecom Networks -
-
Hardik Mehta , Rosalia D’ Alessandro , Loay Abdelrazek
Sep 27 -
Rootcon -
Talk -
Bug Bounty Hunting on Steroids -
-
Anshuman Bhartiya
Sep 12 -
44 Con -
Talk -
Make ARM Shellcode Great Again -
-
Saumil Shah
Sep 12 -
Book -
Hands-On Bug Hunting for Penetration Testers -
Himanshu Sharma , Joe Marshall
Sep 06 -
Grrcon -
Talk -
Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI -
-
Pranshu Bajpai , Richard Enbody
Sep 06 -
Grrcon -
Talk -
Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
-
Ankur Tyagi
Sep 06 -
Grrcon -
Talk -
Analyzing Multi-Dimensional Malware Dataset -
-
Ankur Tyagi
Aug 30 -
Hitb Sec Conf -
Talk -
Exploiting Automation in LTE Mobile Networks -
-
Ravishankar Borgaonkar , Altaf Shaik
Aug 16 -
Usenix -
Talk -
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer -
-
Siddharth Rao , Thanh Bui , Markku Antikainen , Viswanathan Manihatty Bojan , Tuomas Aura
Aug 16 -
Usenix -
Talk -
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale -
-
Vijay Balasubramaniyan
Aug 12 -
Defcon -
Talk -
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication -
-
Siddharth Rao , Thanh Bui
Aug 12 -
Defcon (DemoLabs) -
Tool demo -
Expl-iot—IoT Security Testing and Exploitation framework -
-
Aseem Jakhar
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
Sh00t—An open platform for manual security testers & bug hunters -
-
Pavan Mohan
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
PA Toolkit—Wireshark plugins for Pentesters -
-
Nishant Sharma , Jeswin Mathai
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
Local Sheriff -
-
Konark Modi
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
HealthyPi—Connected Health -
-
Ashwin Whitchurch
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
Halcyon IDE -
-
Sanoop Thomas
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
DejaVU—An Open Source Deception Framework -
-
Harish Ramadoss , Bhadreshkumar Patel
Aug 11 -
Defcon -
Talk -
Compression Oracle Attacks on VPN Networks -
-
Ahamed Nafeez
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit -
-
Jayesh Chauhan
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
BLEMystique—Affordable custom BLE target -
-
Nishant Sharma , Jeswin Mathai
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
Archery—Open Source Vulnerability Assessment and Management -
-
Anand Tiwari
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
-
Ankur Tyagi
Aug 11 -
Defcon (DemoLabs) -
Tool demo -
ADRecon: Active Directory Recon -
-
Prashant Mahajan
Aug 10 -
Defcon (Recon Village) -
Talk -
Building visualisation platforms for OSINT data using open source solutions -
-
Bharath Kumar , Madhu Akula
Aug 10 -
Defcon (Packethacking Village) -
Talk -
AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION -
-
Lokesh Pidawekar
Aug 09 -
Blackhat -
Talk -
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina -
-
Bhargava Shastry , Vincent Ulitzsch , Dominik Maier
Aug 09 -
Blackhat -
Talk -
Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key -
-
Sanchari Das , Andrew C Dingman , Gianpaolo Russo , L Jean Camp
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style -
-
Sudheendra Bhat , Ismael Valenzuela
Aug 09 -
Blackhat -
Talk -
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks -
-
Jugal Parikh , Randy Treit , Holly Stewart
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
OWASP Offensive Web Testing Framework -
-
Viyat Bhalodia
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
Mafia: Mobile Security Automation Framework for Intelligent Auditing -
-
Ankur Bhargava , Sagar Popat , Mohan Kallepalli
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
Jackhammer: One Security Vulnerability Assessment/Management Tool -
-
Madhusudhan Konda , Rajagopal Vr , Shreyas Chidambara
Aug 09 -
Blackhat (Arsenal) -
Tool demo -
BLEMystique: Affordable Custom BLE Target -
-
Nishant Sharma , Jeswin Mathai
Aug 09 -
Defcon (Lockpick Village) -
Talk -
Backdooring DVR/NVR devices -
Arun Mane
Aug 09 -
Defcon (Crypto&privacy Village) -
Talk -
Anonymous rate-limiting in services with Direct Anonymous Attestation -
-
Konark Modi , Alex Catarineu
Aug 09 -
Defcon -
Talk -
4G—Who is paying your cellular phone bill? -
-
Isha Singh , Dr Silke Holtmanns
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response -
-
Kshitij Kumar , Jai Musunuri
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
V2X Validation Tool -
-
Raashid Ansari , Jonathan Petit
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
ThreatPlaybook -
-
Abhay Bhargav , Sharath Kumar
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
SCoDA: Smart COntract Defender and Analyzer -
Ajit Hatti
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting -
-
Sudhanshu Chauhan
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
PA Toolkit: Wireshark Plugins for Pentesters -
-
Nishant Sharma , Jeswin Mathai
Aug 08 -
Blackhat -
Talk -
LTE Network Automation Under Threat -
-
Ravishankar Borgaonkar , Altaf Shaik
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Halcyon IDE: For Nmap Script Developers -
-
Sanoop Thomas
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Expl-iot: IoT Security Testing and Exploitation Framework -
-
Aseem Jakhar
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
DejaVu: An Open Source Deception Framework -
-
Bhadreshkumar Patel , Harish Ramadoss
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
DataSploit 2.0 -
-
Kunal Aggarwal , Shubham Mittal
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
DARWIN: Real World Use Cases for Covert Wireless -
Arun Mane , Rushikesh D Nandedkar
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Damn Vulnerable iOS App: Swift Edition -
-
Prateek Gianchandani
Aug 08 -
Blackhat -
Talk -
Compression Oracle Attacks on VPN Networks -
-
Ahamed Nafeez
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit -
-
Divya S John , Jayesh Chauhan , Shivankar Madaan
Aug 08 -
Blackhat -
Talk -
Back to the Future: A Radical Insecure Design of KVM on ARM -
-
Baibhav Singh , Rahul Kashyap
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Astra: Automated Security Testing For REST APIs -
-
Ankur Bhargava , Prajal Kulkarni , Sagar Popat
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
Archerysec Tool Demo -
-
Anand Tiwari
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
ANWI (All New Wireless IDS): The $5 WIDS -
-
Rishikesh Bhide , Sanket Karpe
Aug 08 -
Blackhat (Arsenal) -
Tool demo -
ADRecon: Active Directory Recon -
-
Prashant Mahajan
Jul 30 -
Book -
Practical Industrial Internet of Things Security -
Sravani Bhattacharjee
Jul 30 -
Book -
Network Security with pfSense -
Manuj Aggarwal
Jul 21 -
Hope -
Talk -
Evidential Study of IoT Botnets - The Bad and The Ugly! -
-
Aditya K Sood
Jun 29 -
Book -
Learning Malware Analysis -
Monnappa K A
Jun 29 -
Hackinparis -
Talk -
Hunting PBX for Vulnerabilities -
-
Himanshu Mehta , Sachin Wagh
Jun 27 -
First -
Talk -
Securing your in-ear fitness coach: Challenges in hardening next generation wearables -
-
Sumanth Naropanth , Sunil Kumar
Jun 15 -
Book -
CCNA Security 210-260 Certification Guide -
Vijay Anandh , Glen D. Singh , Michael Vinod
May 29 -
Award -
Data Exfiltration via Formula Injection #Part1 -
-
Ajay Prashar , Balaji Gopal
May 13 -
Defcon -
Talk -
Androsia: Securing ‘Data in Process’ for your Android Apps -
-
Samit Anwer
Mar 28 -
Book -
Cloud Security Automation -
Prashant Priyam
Mar 23 -
Blackhat (Arsenal) -
Tool demo -
Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit -
-
Jayesh Chauhan , Shivankar Madaan
Mar 22 -
Blackhat -
Talk -
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot -
-
Ravi Sahita , Daiping Liu , Mingwei Zhang
Mar 22 -
Blackhat -
Talk -
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables -
-
Sumanth Naropanth , Kavya Racharla
Mar 22 -
Blackhat (Arsenal) -
Tool demo -
Mobile Security Framework - MobSF -
-
Ajin Abraham
Mar 22 -
Blackhat (Arsenal) -
Tool demo -
Jackhammer - One Security Vulnerability Assessment/Management Tool -
-
Rajagopal Vr , Krishna Chaitanya Yarramsetty
Mar 22 -
Blackhat (Arsenal) -
Tool demo -
Archery - Open Source Vulnerability Assessment and Management -
-
Anand Tiwari
Mar 22 -
Blackhat (Arsenal) -
Tool demo -
Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data -
-
Samit Anwer
Mar 22 -
Blackhat (Arsenal) -
Tool demo -
ADRecon: Active Directory Recon -
-
Prashant Mahajan
Mar 15 -
Troopers -
Talk -
Defending Microsoft Environments at Scale -
-
Vineet Bhatia
Mar 13 -
Troopers -
Talk -
Securing your in-ear fitness coach: Challenges in hardening next generation wearables -
-
Sumanth Naropanth , Kavya Racharla
Mar 03 -
Nullcon -
Panel -
Next generation cyber SOC -
-
K K Mookhey , Mathan Babu Kasilingam , Hidayath Khan , Shivkumar Pandey , Michael Smith
Mar 03 -
Nullcon -
Panel -
Managing Cyber Risk in the Connected Environment -
-
Gaurav Shukla , Ramachandra Hegde , Sudarshan Rajagopal , Kabir Mulchandani
Mar 03 -
Nullcon -
Panel -
IoT : How long till D Day? -
-
Aseem Jakhar , Shobha Jagathpal , Rishikesh Kamat , Daniel Cisowski , Michael Pyle
Mar 03 -
Nullcon -
Panel -
Forensic Challenges and Road Ahead -
-
Manu Zacharia , Brijesh Singh , Sanjay Bahl , Vladimir Katalov
Mar 02 -
Nullcon -
Panel -
The complexity of regulation & cybersecurity -
-
Saikat Datta , Maya R Nair , Nandkumar Saravade , Sanjay Bahl
Mar 02 -
Nullcon -
Panel -
Should all ciso promote hall of fame” within their organizations -
-
Burgess Cooper , Durga Dube , Thom Langford , Harish Pillay
Mar 02 -
Nullcon -
Panel -
Should all ciso promote hall of fame” within their organizations -
-
Shomiron Das Gupta , Hariprasad Chede , Keyur Desai , Subramanian Kumaraswamy
Mar 02 -
Nullcon -
Panel -
Economics of Hacks & Data Breaches Who Pays, Who Secures & Who Wins -
Vinayak Godse , Ashutosh Jain , Bhishma Maheshwari , Manish Tiwari , Suchit Mishra
Mar 01 -
Nullcon -
Talk -
White-Stingray: Bypassing stingray detectors -
-
Altaf Shaik
Mar 01 -
Nullcon -
Talk -
Unleashing D* on Android Kernel Drivers -
-
Aravind Machiry
Mar 01 -
Nullcon -
Talk -
SpotPhish: Zero-Hour Phishing Protection -
-
Ganesh Varadarajan
Mar 01 -
Nullcon -
Talk -
Software Supply Chain Cyberattack -
-
Samiran Ghatak
Mar 01 -
Nullcon -
Talk -
Security through obscurity and fear -
-
Abhinav Srivastava
Mar 01 -
Nullcon -
Talk -
Looting your bank savings using Digital India -
-
Indrajeet Bhuyan
Mar 01 -
Nullcon -
Talk -
DARWIN (A parasite covert wireless network) -
-
Rushikesh D Nandedkar
Mar 01 -
Nullcon -
Talk -
Breaking Into Container Orchestrators -
-
Nadeem Hussain
Mar 01 -
Nullcon -
Talk -
Abusing and Attacking Content Sharing Solutions -
-
Pratap Chandra Allena
Mar 01 -
Nullcon -
Talk -
A Game between Adversary and AI Scientist -
-
Satnam Singh
Feb 26 -
Book -
Metasploit Penetration Testing Cookbook -
Nipun Jaswal , Abhinav Singh , Monika Agarwal , Daniel Teixeira
Jan 31 -
Owasp App Sec California -
Talk -
Hunter – Optimize your Pentesters time -
-
Kiran Shirali 2017
Dec 30 -
Blackhat (Arsenal) -
Tool demo -
Cloud Security Suite - One Stop Tool for AWS Security Audit -
-
Shivankar Madaan , Prajal Kulkarni , Jayesh Chauhan
Dec 29 -
Book -
Enterprise Cloud Security and Governance -
Zeal Vora
Dec 28 -
Book -
Kali Linux Wireless Penetration Testing Beginner’s Guide : Third Edition -
Vivek Ramachandran , Dieterle , Cameron Buchanan
Dec 13 -
Book -
Security Automation with Ansible 2 -
Akash Mahajan , Madhu Akula
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL -
-
Raghudeep Kannavara
Dec 07 -
Blackhat (Arsenal) -
Tool demo -
DataSploit - OSINT Framework -
-
Shubham Mittal
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK -
-
Aseem Jakhar
Dec 06 -
Blackhat -
Talk -
DIFUZZING ANDROID KERNEL DRIVERS -
-
Aravind Machiry , Chris Salls , Yan Shoshitaishvili , Jake Corina , Shuang Hao
Dec 06 -
Blackhat -
Talk -
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES -
-
Saurabh Harit
Dec 06 -
Blackhat (Arsenal) -
Tool demo -
ANWI (All New Wireless IDS) - The £5 WIDS -
-
Sanket Karpe
Nov 29 -
Book -
IoT Penetration Testing Cookbook -
Aditya Gupta , Aaron Guzman
Nov 28 -
Book -
Python Penetration Testing Cookbook -
Rejah Rehim
Nov 20 -
Hackfest -
Talk -
How my SV Machine nailed your Malware -
Nikhil Prabhakar
Nov 17 -
Deepsec -
Talk -
Intel AMT: Using & Abusing The Ghost In The Machine -
-
Parth Shukla
Nov 17 -
Deepsec -
Talk -
How Secure Are Your VoLTE And VoWiFi Calls? -
-
Sreepriya Chalakkal
Nov 14 -
Blackhat -
Talk -
Pwning a Smart Home in Under 10 Minutes -
-
Aditya Gupta
Oct 19 -
Hacklu -
Talk -
Intel AMT: Using & Abusing the Ghost in the Machine -
-
Parth Shukla
Oct 19 -
Hacklu -
Talk -
Bug hunting using symbolic virtual machines! -
-
Anto Joseph
Oct 19 -
Hacklu -
Talk -
Are your VoLTE and VoWiFi calls secure? -
-
Sreepriya Chalakkal
Oct 05 -
Virus Bulletin -
Talk -
The router of all evil: more than just default passwords and silly scripts -
-
Himanshu Anand , Chastine Menrige
Oct 05 -
Brucon -
Talk -
Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) -
Rushikesh D Nandedkar , Sampada Nandedkar
Sep 21 -
App Sec Usa -
Talk -
iGoat – A Self Learning Tool for iOS App Pentesting and Security -
-
Swaroop Yermalkar
Sep 21 -
App Sec Usa -
Talk -
Androsia: A tool for securing in memory sensitive data -
-
Samit Anwer
Sep 13 -
44 Con -
Talk -
Red Team Revenge : Attacking Microsoft ATA -
-
Nikhil Mittal
Aug 19 -
C0c0n -
Talk -
Trust, the foundation of Digital Mastery -
Sunil Varkey
Aug 19 -
C0c0n -
Talk -
The Public Private Partnership - Navigating the Govt -
Saikat Datta
Aug 19 -
C0c0n -
Panel -
Security in Banking - Being one step aheadt -
Sunil Varkey , Rajesh Hemrajani , Biju K , Bhavin Bhansali , B R Nath , V George Antony
Aug 19 -
C0c0n -
Talk -
Building Trust for Digital Transactions in India’s COD Culture -
Parry Aftab , Betsy Broder , Sridhara R Sidhu , Mirza Faizan
Aug 18 -
C0c0n -
Talk -
Your friendly neighbourhood exploit -
Aseem Jakhar
Aug 18 -
C0c0n -
Talk -
Yarafying Android Malware: A Missing Step Before Malware Analysis -
Shivang Desai
Aug 18 -
C0c0n -
Talk -
What Security Managers can learn from story tellers? -
Anup Narayanan
Aug 18 -
C0c0n -
Talk -
The Internet Of Things: Essentials of Secur(IOT)y -
Arpit Bajpai , Ronald Michael
Aug 18 -
C0c0n -
Talk -
The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ -
Rushikesh D Nandedkar
Aug 18 -
C0c0n -
Talk -
The card hack - Lessons from the Hitachi Payments Breach -
Saikat Datta
Aug 18 -
C0c0n -
Talk -
Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure -
Manas Pratim Sarma
Aug 18 -
C0c0n -
Talk -
Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis -
Furqan Khan , Siddharth Anbalahan
Aug 18 -
C0c0n -
Talk -
OSINT and Privacy -
Rohit Srivastwa
Aug 18 -
C0c0n -
Talk -
Moving from Cybersecurity Awareness to Cybersecurity Competence -
Anup Narayanan
Aug 18 -
C0c0n -
Talk -
Mobile Banking (In)Security -
Sneha Rajguru
Aug 18 -
C0c0n -
Talk -
iGoat – A Self Learning Tool for iOS App Pentesting and Security -
-
Swaroop Yermalkar
Aug 18 -
C0c0n -
Talk -
Hunting the Hunters – Fighting CyberCrime at the Source -
Valan Sivasubramanian
Aug 18 -
C0c0n -
Talk -
Hacking Homes: A hardware insight for IoT [in]Security -
Jiggyasu Sharma
Aug 18 -
C0c0n -
Talk -
Exploiting the smartness of BLE Stack -
Apoorva Gupta
Aug 18 -
C0c0n -
Talk -
Dynamic Binary Instrumentation -
Vivek Arora , Bhaskar Rastogi
Aug 18 -
Usenix -
Talk -
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers -
-
Aravind Machiry , Chad Spensky , Jake Corina , Nick Stephens , Christopher Kruegel , Giovanni Vigna
Aug 18 -
C0c0n -
Talk -
Cyber Threat Intelligence - Are We There , Yet…? -
A Shiju Rawther
Aug 18 -
C0c0n -
Talk -
Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! -
Illyas Kooliyankal
Aug 18 -
C0c0n -
Talk -
CoAP versus MQTT: IoT Protocol Vulnerability analysis -
Rajiv Pandey
Aug 18 -
C0c0n -
Talk -
Cloud_Security Suite - One stop tool for auditing cloud infrastructure -
-
Shivankar Madaan , Jayesh Chauhan
Aug 18 -
C0c0n -
Talk -
Challenges in Digital Banking -
Biju K
Aug 18 -
C0c0n -
Talk -
Catching Network anomalies using Deep learning -
Aditya Vasekar
Aug 18 -
C0c0n -
Talk -
Case study: Security of Digital Wallet apps in India -
Ashwath Kumar , Sandesh Mysore Anand
Aug 18 -
C0c0n -
Talk -
Call Centre Frauds -
Parry Aftab , Betsy Broder
Aug 18 -
C0c0n -
Talk -
Blockchain for Information security -
Shobha Jagathpal
Aug 18 -
C0c0n -
Talk -
Big Data Analytics with pattern matching for smarter analytics -
Tarun Wig
Aug 18 -
C0c0n -
Talk -
Bank on Compliance for Cyber Security -
Dinesh O Bareja
Aug 18 -
C0c0n -
Talk -
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! -
-
Abhinav Biswas
Aug 18 -
C0c0n -
Talk -
Anti-Virus Bypassing for Fun and Profit -
Vanshit Malhotra
Aug 18 -
C0c0n -
Talk -
Androsia: A tool for securing in memory sensitive data -
-
Samit Anwer
Aug 18 -
C0c0n -
Talk -
10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work -
Rahul Binjve
Aug 18 -
C0c0n -
Talk -
Phishing threats to customers and mitigation -
Bhavin Bhansali
Aug 18 -
C0c0n -
Talk -
Hunting Botnets with Analytics -
Shomiron Das Gupta
Aug 17 -
Usenix -
Talk -
BootStomp: On the Security of Bootloaders in Mobile Devices -
-
Aravind Machiry , Dipanjan Das , Nilo Redini , Yanick Fratantonio , Antonio Bianchi , Eric Gustafson , Yan Shoshitaishvali , Christopher Kruegel , Giovanni Vigna
Aug 04 -
Sha -
Talk -
Attacking OpenSSL using Side-channel Attacks: The RSA case study -
-
Praveen Vadnala , Lukasz Chmielewski
Jul 30 -
Blackhat (Arsenal) -
Tool demo -
Yasuo -
-
Saurabh Harit
Jul 29 -
Defcon (DemoLabs) -
Tool demo -
WiMonitor - an OpenWRT package for remote WiFi sniffing -
Vivek Ramachandran , Nishant Sharma , Ashish Bhangale
Jul 29 -
Defcon (DemoLabs) -
Tool demo -
WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED -
Vivek Ramachandran , Nishant Sharma , Ashish Bhangale
Jul 29 -
Defcon (DemoLabs) -
Tool demo -
Fuzzapi -
-
Abhijeth Dugginapeddi , Lalith Rallabhandi , Srinivas Rao
Jul 28 -
Defcon (DemoLabs) -
Tool demo -
Lamma 1.0 -
-
Ajit Hatti , Antriksh Shah
Jul 28 -
Defcon (DemoLabs) -
Tool demo -
GibberSense -
-
Ajit Hatti
Jul 28 -
Defcon (DemoLabs) -
Tool demo -
Android Tamer -
-
Anant Shrivastava
Jul 27 -
Defcon (Recon Village) -
Talk -
Recon and bug bounties what a great love story -
-
Abhijeth Dugginapeddi
Jul 27 -
Blackhat (Arsenal) -
Tool demo -
Kubebot - Scaleable and Automated Testing Slackbot with the Backend Running on Kubernetes -
-
Anshuman Bhartiya
Jul 27 -
Defcon (Lockpick Village) -
Talk -
ICS Humla -
-
Sneha Rajguru , Arun Mane
Jul 27 -
Blackhat (Arsenal) -
Tool demo -
Gibber Sense -
-
Ajit Hatti
Jul 27 -
Blackhat (Arsenal) -
Tool demo -
Fuzzapi - Fuzzing Your RESTAPIs Since Yesterday -
-
Lalith Rallabhandi , Abhijeth Dugginapeddi , Srinivas Rao
Jul 27 -
Blackhat -
Talk -
Evading Microsoft ATA for Active Directory Domination -
-
Nikhil Mittal
Jul 27 -
Blackhat (Arsenal) -
Tool demo -
Android Tamer -
-
Anant Shrivastava
Jul 26 -
Blackhat -
Talk -
Wire Me Through Machine Learning -
-
Ankit Singh , Vijay Thaware
Jul 26 -
Blackhat -
Talk -
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor -
-
Ravishankar Borgaonkar , Altaf Shaik , Shinjo Park , Lucca Hirschi , Andrew Martin , Jean Pierre Seifert
Jul 26 -
Blackhat (Arsenal) -
Tool demo -
Devknox - Autocorrect Security Issues from Android Studio -
-
Subho Halder
Jul 26 -
Blackhat (Arsenal) -
Tool demo -
Datasploit - Automated Open Source Intelligence (OSINT) Tool -
-
Kunal Aggarwal , Shubham Mittal , Sudhanshu Chauhan
Jul 21 -
Book -
Metasploit for Beginners -
Sagar Rahalkar
Jun 30 -
Book -
Mastering Kali Linux for Advanced Penetration Testing, Second Edition -
Vijay Kumar Velu
Jun 26 -
Blackhat (Arsenal) -
Tool demo -
DiffDroid -
-
Anto Joseph
Jun 23 -
Hackinparis -
Talk -
Injecting Security into Web apps with Runtime Patching and Context Learning -
-
Ajin Abraham
May 25 -
Book -
Metasploit Bootcamp -
Nipun Jaswal
May 23 -
Phdays -
Talk -
Practical machine learning in infosecurity -
-
Anto Joseph , Clarence Chio
May 23 -
Phdays -
Talk -
Injecting security into web apps in the runtime -
-
Ajin Abraham
May 23 -
Phdays -
Talk -
How we hacked distributed configuration management systems -
-
Bharadwaj Machiraju , Francis Alexander
Apr 21 -
Book -
Kali Linux Intrusion and Exploitation Cookbook -
Dhruv Shah , Ishan Girdhar
Apr 19 -
Brucon -
Talk -
Evading Microsoft ATA for Active Directory Domination -
-
Nikhil Mittal
Apr 14 -
Hitb Sec Conf -
Talk -
Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure -
-
Anirudh Duggal
Apr 14 -
Hitb Sec Conf -
Talk -
COMMSEC: IoT Hacking Simplified -
-
Aseem Jakhar
Apr 13 -
Hitb Sec Conf -
Keynote -
Redefining Defense -
-
Saumil Shah
Mar 31 -
Blackhat -
Talk -
WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION -
-
Monnappa K A
Mar 31 -
Blackhat -
Talk -
The Seven Axioms of Security -
-
Saumil Shah
Mar 31 -
Blackhat -
Talk -
Mobile-Telephony Threats in Asia -
-
Payas Gupta , Marco Balduzzi , Lion Gu
Mar 30 -
Blackhat (Arsenal) -
Tool demo -
LAMMA 1.0 -
-
Ajit Hatti
Mar 30 -
Blackhat (Arsenal) -
Tool demo -
Datasploit - Automated Open Source Intelligence (OSINT) Tool -
-
Shubham Mittal
Mar 30 -
Blackhat (Arsenal) -
Tool demo -
WiDy: WiFi 0wnage in Under $5 -
Vivek Ramachandran , Nishant Sharma , Ashish Bhangale
Mar 30 -
Blackhat (Arsenal) -
Tool demo -
Devknox - Autocorrect Security Issues from Android Studio -
-
Subho Halder
Mar 30 -
Blackhat (Arsenal) -
Tool demo -
DAMN VULNERABLE SS7 NETWORK -
-
Akib Sayyed
Mar 23 -
Troopers -
Talk -
How we hacked Distributed Configuration Management Systems -
Francis Alexander
Mar 23 -
Troopers -
Talk -
How we hacked Distributed Configuration Management Systems -
Bharadwaj Machiraju , Francis Alexander
Mar 21 -
Troopers -
Talk -
New attacks in 4G technologies -
Ravishankar Borgaonkar
Mar 15 -
Can Sec West -
Talk -
Inside Stegosploit -
-
Saumil Shah
Mar 04 -
Nullcon -
Panel -
Cyber-Security Blue-Print for the Future! -
Kapil Awasthi , Mathan Babu Kasilingam , Partha Sengupta , Sumit Malhotra
Mar 04 -
Nullcon -
Panel -
Challenges in securing the cloud -
Vinayak Hegde , Manish Tiwari , Subramanian Kumar , David Lenoe , Lucas Moody
Mar 04 -
Nullcon -
Panel -
Application Security Opportunities and Challenges in a DevOps World -
-
Abhay Bhargav , Ajay Bongirwar , Arun Jadhav , Pravesh Sharma , Adam Leaonard
Mar 03 -
Nullcon -
Talk -
Tale of training a Web Terminator! -
-
Bharadwaj Machiraju
Mar 03 -
Nullcon -
Talk -
Securing Critical National Infrastructure -
-
Shailendra Fuloria , R Sarangapani , Rahul Tongia , Michael Pyle , Justin Searle
Mar 03 -
Nullcon -
Talk -
Injecting Security into Web apps with Runtime Patching and Context Learning -
-
Ajin Abraham
Mar 03 -
Nullcon -
Panel -
Hardware Security: Foundational Block of Cyber Battlefield -
Vinayak Godse , Amit Sharma , Aseem Jakhar , Minatee Mishra
Mar 03 -
Nullcon -
Talk -
Hacking medical devices and infrastructure -
-
Anirudh Duggal
Mar 03 -
Nullcon -
Panel -
Digital warriors: India and the Future of Conflict on the Internet -
-
Saikat Datta , Brijesh Datta , Muktesh Chander , Cmde Anand , Anja Kovacs
Mar 03 -
Nullcon -
Talk -
DevOpSec: Rapid Security in the Cloud with AWS and CIS -
-
Mikhail Advani , Rajesh Tamhane
Mar 03 -
Nullcon -
Talk -
Case Study on RFID (proximity cards) hacking -
-
Sarwar Jahan , Ashwath Kumar
Mar 03 -
Nullcon -
Talk -
Case study of SS7/Sigtran assessment -
-
Akib Sayyed
Mar 03 -
Nullcon -
Talk -
Breach Response - Time to shake up the status quo -
-
K K Mookhey , Pranesh Prakash , Sahir Hidayatullah , Shobha Jagathpal
Mar 03 -
Nullcon -
Talk -
Agility with security mitigations in Windows 10 -
Swamy Shivaganga Nagaraju
Jan 25 -
Owasp App Sec California -
Talk -
OCSP Stapling in the Wild -
Devdatta Akhawe , Emily Stark
Jan 25 -
Owasp App Sec California -
Talk -
DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context -
-
Kiran Shirali , Srinivasa Rao Chirathanagandla 2016
Nov 11 -
Deepsec -
Talk -
Human vs Artificial intelligence – Battle of Trust -
Hemil Shah
Nov 11 -
Deepsec -
Talk -
AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That -
-
Nikhil Mittal
Nov 06 -
Ground Zero Summit -
Talk -
Hacking The Droids -
Anto Joseph
Nov 05 -
Hackfest -
Talk -
LockPicker: Leaking data from live LUKS partition -
Adhokshaj Mishra
Nov 04 -
Blackhat (Arsenal) -
Tool demo -
Yasuo -
-
Saurabh Harit
Nov 04 -
Blackhat -
Talk -
Randomization Can’t Stop BPF JIT Spray -
-
N Asokan , Filippo Bonazzi , Elena Reshetova
Nov 04 -
Blackhat (Arsenal) -
Tool demo -
Firmware Analysis Toolkit (FAT) -
-
Aditya Gupta
Nov 04 -
Blackhat -
Talk -
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk -
-
Siddharth Rao , Bhanu Kotte , Dr. Silke Holtmanns
Nov 04 -
Blackhat (Arsenal) -
Tool demo -
AppMon: Runtime Security Testing & Profiling Framework for Native Apps -
-
Nishant Das Patnaik
Nov 03 -
Blackhat -
Talk -
WiFi-Based IMSI Catcher -
-
Ravishankar Borgaonkar , Piers O Hanlon
Nov 03 -
Blackhat (Arsenal) -
Tool demo -
DataSploit -
-
Shubham Mittal , Nutan Kumar Panda
Oct 28 -
Book -
Mastering Modern Web Penetration Testing -
Prakhar Prasad , Rafay Baloch
Oct 27 -
Brucon -
Talk -
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! -
-
Rushikesh D Nandedkar , Amrita C Iyer , Krishnakant Patil
Oct 19 -
Hacklu -
Talk -
2016: The Infosec Crossroads -
-
Saumil Shah
Oct 14 -
App Sec Usa -
Talk -
DevOps to DevSecOps: a 2-dimensional view of security for DevOps -
Sanjeev Sharma
Oct 14 -
App Sec Usa -
Talk -
Automating API Penetration Testing using fuzzapi -
-
Abhijeth Dugginapeddi , Lalith Rallabhandi
Oct 13 -
App Sec Usa -
Talk -
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE -
-
Sumanth Naropanth , Kavya Racharla , Chandra Prakash Gopalaiah
Oct 13 -
App Sec Usa -
Talk -
Lightning Talk - Demystifying Windows Application -
Rupali Dash
Oct 07 -
Deepsec -
Talk -
Inside Stegosploit -
-
Saumil Shah
Oct 05 -
Virus Bulletin -
Talk -
One-Click Fileless Infection -
-
Himanshu Anand , Chastine Menrige
Sep 30 -
Book -
Mastering Metasploit -
Nipun Jaswal
Sep 23 -
Rootcon -
Talk -
Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
-
Sanoop Thomas
Sep 14 -
44 Con -
Talk -
2016: The Infosec Crossroads -
-
Saumil Shah
Aug 19 -
C0c0n -
Talk -
Threats in Connected World -
-
Bhavin Gandhi
Aug 19 -
C0c0n -
Talk -
The Art of Social Hacking -
Gaurav Trivedi , Rugved Mehta
Aug 19 -
C0c0n -
Talk -
SSD Forensics : A Nightmare for Forensic Investigators -
Santosh Khadsare
Aug 19 -
C0c0n -
Talk -
Kill the password - A new era of authentication -
Tamaghna Basu
Aug 19 -
C0c0n -
Talk -
How (in)secure are Indian GSM networks? -
Ajay Fuloria
Aug 19 -
C0c0n -
Talk -
Evading Corporate Security – You’re as secure as the weakest link -
Prajwal Panchmahalkar
Aug 19 -
C0c0n -
Talk -
Esoteric XSS Payloads -
-
Riyaz Walikar
Aug 19 -
C0c0n -
Talk -
Breaking into Gas stations! -
Suraj Pratap
Aug 19 -
C0c0n -
Talk -
Backdooring my Enemies with a Proxy for Threat Intelligence -
Jovin Lobo , Aditya Vasekar
Aug 19 -
C0c0n -
Talk -
Attacking and crashing IOT devices via Bluetooth LE Protocol -
-
Pratap Chandra Allena , Ajay Pratap Singh
Aug 19 -
C0c0n -
Talk -
App Sec in the Time of Docker Containers -
Akash Mahajan
Aug 19 -
C0c0n -
Talk -
Abusing Digital Certificates : Malware Style -
Ajit Hatti
Aug 07 -
Defcon -
Talk -
Cyber Grand Shellphish -
-
Aravind Machiry , Yan Shoshitaishvili , Antonio Bianchi , Kevin Borgolte , Jacopo Corbetta , Francensco Disperati , Andrew Dutcher , Giovanni Vigna , Chris Salls , Nick Stephens , Fish Wang , John Grosen
Aug 06 -
Defcon (DemoLabs) -
Tool demo -
Visual Network and File Forensics using Rudra -
-
Ankur Tyagi
Aug 06 -
Defcon (DemoLabs) -
Tool demo -
LAMMA (beta) -
-
Ajit Hatti
Aug 06 -
Defcon (DemoLabs) -
Tool demo -
Datasploit -
-
Shubham Mittal
Aug 06 -
Defcon (DemoLabs) -
Tool demo -
Android-InsecureBank -
-
Dinesh Shetty
Aug 05 -
Defcon -
Talk -
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors -
Jatin Kataria , Ang Cui , Francois Charbonneau
Aug 04 -
Blackhat -
Talk -
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages -
-
Anirudh Duggal
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
Maltese (Malware Traffic Emulating Software) -
-
Sasi Siddharth
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
LAMMA -
-
Ajit Hatti
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
Droid-FF: Android Fuzzing Framework -
-
Anto Joseph
Aug 04 -
Blackhat -
Talk -
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes -
-
Rohit Mothe , Rodrigo Rubira Branco
Aug 04 -
Blackhat (Arsenal) -
Tool demo -
AppMon -
-
Nishant Das Patnaik
Aug 03 -
Blackhat (Arsenal) -
Tool demo -
Android-InsecureBankv2 -
-
Dinesh Shetty
Aug 03 -
Blackhat (Arsenal) -
Tool demo -
Android Tamer -
-
Anant Shrivastava
Aug 03 -
Blackhat (Arsenal) -
Tool demo -
Visual Network and File Forensics Using Rudra -
-
Ankur Tyagi
Aug 03 -
Blackhat (Arsenal) -
Tool demo -
Nishang: The Goodness of Offensive PowerShell -
-
Nikhil Mittal
Aug 03 -
Blackhat (Arsenal) -
Tool demo -
DataSploit -
-
Sudhanshu Chauhan , Shubham Mittal , Nutan Kumar Panda
Aug 03 -
Blackhat -
Talk -
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It -
-
Nikhil Mittal
Jul 28 -
Book -
Hacking Android -
Mohammed Imran , Srinivas Rao
Jul 01 -
Hackinparis -
Talk -
DIFFDroid - Dynamic Analysis Made Easier for Android -
-
Anto Joseph
Jun 30 -
Book -
Mobile Device Exploitation Cookbook -
Prashant Verma , Akshay Dixit
Jun 30 -
Book -
CISSP in 21 Days -
M L Srinivasan
Jun 29 -
Book -
Effective Python Penetration Testing -
Rejah Rehim
Jun 18 -
Recon -
Talk -
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors -
-
Jatin Kataria , Ang Cui , Francois Charbonneau
May 26 -
Hitb Sec Conf -
Talk -
HITB Lab: Mobile Application Security for iOS and Android -
-
Tushar Dalvi , Tony Trummer
May 26 -
Hitb Sec Conf -
Talk -
HITB Lab: Droid-FF: The First Android Fuzzing Framework -
-
Anto Joseph
May 20 -
Book -
Practical Mobile Forensics : Second Edition -
Rohit Tamma , Satish Bommisetty , Heather Mahalik
May 17 -
Phdays -
Talk -
Security Automation Based on Artificial Intelligence -
-
Rahul Sasi
May 17 -
Phdays -
Talk -
Fingerprinting and Attacking a Healthcare Infrastructure -
-
Anirudh Duggal
Apr 29 -
Book -
Practical Linux Security Cookbook -
Tajinder Kalsi , Michael a Lindner
Apr 08 -
Groundzerosummit -
Panel -
Make in India for Makers of India -
Sachin Burman , Nandkumar Saravade , Govind , Bikram Singh , Shri Srinath
Apr 01 -
Blackhat (Arsenal) -
Tool demo -
Rudra: The Destroyer of Evil -
-
Ankur Tyagi
Apr 01 -
Blackhat (Arsenal) -
Tool demo -
LIMON-SANDBOX FOR ANALYZING LINUX MALWARES -
-
Monnappa K A
Apr 01 -
Blackhat (Arsenal) -
Tool demo -
Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
-
Sanoop Thomas
Apr 01 -
Blackhat (Arsenal) -
Tool demo -
HackSys Extreme Vulnerable Driver -
-
Ashfaq Ansari
Apr 01 -
Blackhat (Arsenal) -
Tool demo -
Android Tamer -
-
Anant Shrivastava
Mar 15 -
Groundzerosummit -
Talk -
Web App Security -
Harpreet Singh , Himanshu Sharma , Nipun Jaswal
Mar 15 -
Groundzerosummit -
Talk -
r00tKidz and Hacking -
Triveni Singh , Lea Paul
Mar 11 -
Nullcon -
Talk -
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day -
-
Pallav Jakhotiya , Vipul Sawant
Mar 11 -
Nullcon -
Talk -
Privacy leaks on 4G-LTE networks -
-
Altaf Shaik
Mar 11 -
Nullcon -
Talk -
Physical Lock Security -
Amey Gat , Swapnil Wadwalkar
Mar 11 -
Book -
Mobile Application Penetration Testing -
Vijay Kumar Velu
Mar 11 -
Nullcon -
Talk -
Million Dollar Baby: Towards ANGRly conquering DARPA CGC -
Aravind Machiry
Mar 11 -
Nullcon -
Talk -
Making Machines think about security for fun and profit -
-
Rahul Sasi
Mar 11 -
Nullcon -
Talk -
Hitchhiker’s guide to hacking Industrial Control systems (ICS) -
Arun Mane
Mar 11 -
Nullcon -
Talk -
Automated Mobile Application Security Assessment with MobSF -
-
Ajin Abraham
Mar 11 -
Nullcon -
Talk -
Attacking and defending healthcare - EMR solutions -
-
Anirudh Duggal
Feb 29 -
Book -
Learning Network Forensics -
Samir Datt
Feb 25 -
Book -
Mastering Kali Linux Wireless Pentesting -
Raghu Rami Reddy , Brian Sak
Jan 29 -
Book -
iOS Forensics Cookbook -
Bhanu Birani , Mayank Birani
Jan 07 -
Book -
Learning iOS Penetration Testing -
Swaroop Yermalkar 2015
Nov 27 -
Book -
ASP.NET Web API Security Essentials -
Rajesh Gunasundaram
Nov 19 -
Deepsec -
Talk -
Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. -
-
Nikhil Mittal
Nov 13 -
Blackhat (Arsenal) -
Tool demo -
Rudra - The Destroyer of Evil -
-
Ankur Tyagi
Nov 13 -
Blackhat -
Talk -
Continuous Intrusion: Why CI tools are an Attacker’s Best Friends -
-
Nikhil Mittal
Nov 13 -
Blackhat -
Talk -
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX -
-
Monnappa K A
Nov 13 -
Blackhat -
Talk -
LTE & IMSI Catcher Myths -
-
Ravishankar Borgaonkar , N Asokan , Altaf Shaik , Valtteri Niemi , Jean Pierre Seifert
Nov 12 -
Blackhat -
Talk -
Stegosploit - Exploit Delivery with Steganography and Polyglots -
-
Saumil Shah
Nov 12 -
Blackhat (Arsenal) -
Tool demo -
Nishang - Tracking A Windows User -
-
Nikhil Mittal
Nov 12 -
Blackhat (Arsenal) -
Tool demo -
Kautilya: Fastest shells you will ever get -
-
Nikhil Mittal
Nov 12 -
Blackhat (Arsenal) -
Tool demo -
Android Tamer -
-
Anant Shrivastava
Nov 12 -
Blackhat (Arsenal) -
Tool demo -
Android InsecureBank -
-
Dinesh Shetty
Nov 05 -
Ground Zero Summit -
Talk -
XSS - The art of evading web application filters! -
Anirudh Anand
Nov 05 -
Ground Zero Summit -
Talk -
Wolves Among Sheep: Defeating Targeted Attacks With Deception -
Sahir Hidayatullah , Raviraj Doshi
Nov 05 -
Ground Zero Summit -
Talk -
Trailing Terror in the Darknets -
Shesh Sarangdhar
Nov 05 -
Ground Zero Summit -
Talk -
Thanks for the free cookies -
Anshul Saxena , Nishant Yadav
Nov 05 -
Ground Zero Summit -
Talk -
Sanctioned to Hack: Your SCADA HMIs Belong to Us! -
Aditya K Sood
Nov 05 -
Ground Zero Summit -
Talk -
OSINT Black Magic: Listen who whispers your name in the dark!!! -
-
Sudhanshu Chauhan , Nutan Kumar Panda
Nov 05 -
Ground Zero Summit -
Talk -
Hacking RFIDs under 2000INR -
Jayesh Chauhan
Nov 05 -
Ground Zero Summit -
Talk -
Elliptical Curve Cryptography -
Aneesha S
Nov 05 -
Ground Zero Summit -
Talk -
Economics of Post Quantum Crypto Systems : Do we really Need it -
Ajit Hatti
Nov 05 -
Ground Zero Summit -
Talk -
Dissecting Android Malware -
Anto Joseph
Nov 05 -
Ground Zero Summit -
Talk -
Credit Card Frauds – The money making Ecosystem for Cyber criminals -
Abhinav Singh
Nov 05 -
Ground Zero Summit -
Talk -
chellam – a Wi-Fi IDS/Firewall for Windows -
Vivek Ramachandran
Nov 05 -
Ground Zero Summit -
Talk -
Browser based Malware attacks -
Harsh Daftary
Nov 05 -
Ground Zero Summit -
Talk -
Authentication flaw in Automatic Bank Passbook printing machine. -
Indrajeet Bhuyan
Nov 05 -
Ground Zero Summit -
Talk -
Western Air Command -
B S Singh Deo
Nov 05 -
Ground Zero Summit -
Talk -
Exposing Cyber Espionage: Hello from Pakistan- IIC Session -
Jiten Jain
Nov 05 -
Ground Zero Summit -
Talk -
Cyber Security in Hospitals:Hospitals Under Seige -
Anirudh Duggal
Oct 30 -
T2 -
Talk -
LTE (in) Security -
Ravishankar Borgaonkar , Altaf Shaik
Oct 25 -
Toor Con -
Talk -
PixelCAPTCHA – A Unicode Based CAPTCHA Scheme -
Gursev Singh Kalra
Oct 21 -
Hacklu -
Talk -
Stegosploit - Delivering Drive-By Exploits With Only Images -
-
Saumil Shah
Oct 08 -
Brucon -
Talk -
The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed -
-
Rushikesh D Nandedkar , Amrita C Iyer
Sep 25 -
App Sec Usa -
Talk -
The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)! -
Aditya K Sood
Sep 24 -
App Sec Usa -
Talk -
QARK: Android App Exploit and SCA Tool -
-
Tushar Dalvi , Tony Trummer
Sep 24 -
App Sec Usa -
Talk -
Encouraging Diversity and Advancing Cybersecurity Education -
Shruthi Kamath , Apoorva Giri , Elissa Shevinsky
Sep 24 -
App Sec Usa -
Talk -
Continuous Cloud Security Automation -
-
Rohit Pitke
Sep 11 -
44 Con -
Talk -
Stegosploit – Drive-by Browser Exploits using only Images -
-
Saumil Shah
Aug 28 -
Blackhat (Arsenal) -
Tool demo -
Damn Vulnerable iOS App (DVIA) -
-
Prateek Gianchandani
Aug 09 -
Defcon (Packetcapture Village) -
Talk -
802.11 Monitoring with PCAP2XML/SQLite -
-
Vivek Ramachandran
Aug 08 -
Defcon (DemoLabs) -
Tool demo -
Rudra -
-
Ankur Tyagi
Aug 08 -
Defcon -
Talk -
QARK: Android App Exploit and SCA Tool -
-
Tushar Dalvi , Tony Trummer
Aug 08 -
Defcon (Packetcapture Village) -
Talk -
Powershell for Penetraton Testers -
-
Nikhil Mittal
Aug 08 -
Defcon -
Talk -
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities -
-
Aditya K Sood
Aug 08 -
Defcon -
Talk -
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics -
-
Vivek Ramachandran
Aug 07 -
Defcon (Packetcapture Village) -
Talk -
Hacker’s Practice Ground -
-
Lokesh Pidawekar
Aug 07 -
Defcon (Crypto&privacy Village) -
Talk -
Getting into the Trust Store We Trust -
Ajit Hatti
Aug 07 -
Defcon -
Talk -
Chellam – a Wi-Fi IDS/Firewall for Windows -
-
Vivek Ramachandran
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
Kautilya -
-
Nikhil Mittal
Aug 06 -
Blackhat -
Talk -
Harnessing Intelligence from Malware Repositories -
-
Arun Lakhotia , Vivek Notani
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
Chellam -
Vivek Ramachandran
Aug 05 -
Blackhat (Arsenal) -
Tool demo -
Rudra - The Destroyer of Evil -
-
Ankur Tyagi
Aug 05 -
Blackhat (Arsenal) -
Tool demo -
QARK - Android Application SCA and Exploit Tool -
-
Tushar Dalvi
Aug 05 -
Blackhat (Arsenal) -
Tool demo -
PixelCaptcha: A unicode based captcha scheme -
-
Gursev Singh Kalra
Aug 01 -
C0c0n -
Talk -
Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities -
-
Anant Shrivastava
Aug 01 -
C0c0n -
Talk -
S3curi7y at 36K feet -
Rugved Mehta , Gaurav Trivedi
Aug 01 -
C0c0n -
Talk -
Reversing and Deciphering the Cyber Espionage Malware Communications -
Monnappa K A
Aug 01 -
C0c0n -
Talk -
NoPo - The NoSQL HoneyPot Framework -
-
Francis Alexander
Aug 01 -
C0c0n -
Talk -
Medical device security and critical infrastructure inside hospitals -
Anirudh Duggal
Aug 01 -
C0c0n -
Talk -
Hacking RFIDs under 2000 INR -
Jayesh Chauhan , Divya S John
Aug 01 -
C0c0n -
Talk -
From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) -
Anto Joseph
Aug 01 -
C0c0n -
Talk -
Demystifying and Breaking BLE -
Yashin Mehaboobe
Aug 01 -
C0c0n -
Talk -
Breaking into Infosec Research -
Vivek Ramachandran
Aug 01 -
C0c0n -
Talk -
Blockchains in Security -
Harsh Patel
Aug 01 -
C0c0n -
Talk -
Automated Security Analysis of Android & iOS Applications with Mobile Security Framework -
-
Ajin Abraham
Aug 01 -
C0c0n -
Talk -
Attack chaining for web exploitation- From Information leakage to gaining Root access -
Abhijeth Dugginapeddi
Aug 01 -
C0c0n -
Talk -
A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. -
Riyaz Walikar
Jul 29 -
Book -
Wireshark Network Security -
Piyush Verma
Jul 06 -
Blackhat -
Talk -
DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS -
-
Ahamed Nafeez
Jun 16 -
Blackhat -
Talk -
The Savage Curtain: Mobile SSL Failures -
-
Tushar Dalvi , Tony Trummer
May 29 -
Hitb Sec Conf -
Talk -
PowerShell for Penetration Testers -
-
Nikhil Mittal
May 29 -
Hitb Sec Conf -
Talk -
Hacking Samsung’s Tizen: The OS of Everything -
-
Ajin Abraham
May 28 -
Hitb Sec Conf -
Talk -
The Savage Curtain: Mobile SSL Failures -
-
Tushar Dalvi , Tony Trummer
May 28 -
Hitb Sec Conf -
Talk -
Stegosploit: Hacking With Pictures -
-
Saumil Shah
May 26 -
Phdays -
Talk -
iOS Application Exploitation -
-
Prateek Gianchandani , Egor Tolstoy
May 26 -
Phdays -
Talk -
Invisible Backdoors In Your Code -
Debasis Mohanty
Apr 30 -
Book -
Learning Android Forensics -
Rohit Tamma , Donnie Tindall
Mar 30 -
Book -
Kali Linux: Wireless Penetration Testing Beginner’s Guide, Second Edition -
Vivek Ramachandran , Cameron Buchanan
Mar 27 -
Syscan -
Talk -
Stegosploit - Hacking with Pictures -
-
Saumil Shah
Mar 27 -
Blackhat -
Talk -
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence -
-
Preeti Subramanian
Mar 26 -
Blackhat (Arsenal) -
Tool demo -
YSO Mobile Security Framework -
-
Ajin Abraham
Mar 26 -
Blackhat -
Talk -
The underground Ecosystem of Credit Card frauds -
-
Abhinav Singh
Mar 26 -
Blackhat (Arsenal) -
Tool demo -
SecPod Saner -
-
Preeti Subramanian
Mar 26 -
Blackhat (Arsenal) -
Tool demo -
OWASP Xenotix XSS Exploit Framework -
-
Ajin Abraham
Mar 15 -
Defcon -
Talk -
TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER -
Anamika Singh
Mar 15 -
Defcon -
Talk -
TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION -
-
Adhokshaj Mishra
Mar 15 -
Defcon -
Talk -
TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS -
Lavakumar Kuppan
Mar 15 -
Hitb Sec Conf -
Talk -
Sniffing the Airwaves with RTLSDR -
-
Yashin Mehaboobe
Mar 15 -
Blackhat -
Talk -
2015 State of Vulnerability Exploits -
-
Amol Sarwate
Mar 03 -
Award -
FREAK Attack -
-
Karthikeyan Bhargavan , Mi Tls Team
Feb 07 -
Nullcon -
Panel -
Startup panel – Make in India -
Aseem Jakhar , Radha Shelat , Sumit D Chowdhury , Shomiron Das Gupta , Sastry Tumuluri , Shiju Sathyadevan
Feb 06 -
Nullcon -
Panel -
Why CISO should promote more of such technical events - pros and cons, benefits etc -
Burgess Cooper , Maya Viswanathan , Sanjay Burman , Sridharan Sankaran , Massoud Issa , Katie Moussouris
Feb 06 -
Nullcon -
Talk -
Toliman, a Hadoop Pentesting Tool -
-
Jitendra Chauhan
Feb 06 -
Nullcon -
Talk -
Pentesting a website with million lines of Javascript -
-
Lavakumar Kuppan , Ahamed Nafeez
Feb 06 -
Nullcon -
Talk -
Hunting and Decrypting Ghost communications using Memory Forensics -
-
Monnappa K A
Feb 06 -
Nullcon -
Talk -
Hacking Tizen: The OS of Everything -
-
Ajin Abraham
Feb 06 -
Nullcon -
Talk -
Generic Executable Unpacking using Dynamic Binary Instrumentation -
-
Shubham Bansal
Feb 06 -
Nullcon -
Talk -
Drone Attacks: How I hijacked a drone -
-
Rahul Sasi
Feb 06 -
Nullcon -
Panel -
Defender’s Diary: Who’s attacking? What are my options? -
Sastry Tumuluri , Amit Sharma , Venkatesh Subramaniam , Sachin Burman , Deepak Singla
Feb 06 -
Nullcon -
Talk -
Building security and compliance into the software delivery process -
Anubhav Bathla , Dinesh Pillai , S Chandrasekhar , Harish Pillay
Feb 06 -
Nullcon -
Talk -
Building custom scans for real world enterprise network -
-
Sanoop Thomas
Feb 06 -
Nullcon -
Talk -
Attack and Defence in Radio and Communication Warfare -
-
Akib Sayyed
Feb 06 -
Nullcon -
Talk -
Anatomy of a credit card stealing POS malware -
-
Amol Sarwate
Feb 06 -
Nullcon -
Talk -
Analyzing Chrome crash reports at scale -
-
Abhishek Arya
Feb 06 -
Nullcon -
Panel -
2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys -
Shomiron Das Gupta , K S Narayanan , Shantanu Ghosh , Subrahmanya Gupta Boda , Vishal Salvi , Benjamin Rivera
Jan 28 -
Book -
Python Penetration Testing Essentials -
Mohit Raj
Jan 27 -
Owasp App Sec California -
Talk -
The Savage Curtain : Mobile SSL Failures -
Tushar Dalvi , Tony Trummer
Jan 27 -
Owasp App Sec California -
Talk -
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers -
-
Devdatta Akhawe
Jan 27 -
Owasp App Sec California -
Talk -
Anatomy of memory scraping, credit card stealing POS malware -
-
Amol Sarwate 2014
Nov 21 -
Deepsec -
Talk -
Mobile SSL Failures -
-
Tushar Dalvi , Tony Trummer
Nov 13 -
Ground Zero Summit -
Talk -
Vulnerability Reproduction using Zest -
Deep Shah
Nov 13 -
Ground Zero Summit -
Talk -
SCADA Exploitation through Firmware -
Ashish Saxena
Nov 13 -
Ground Zero Summit -
Talk -
National Cyber Policy and its impact on Business -
Vaishali Bhagwat
Nov 13 -
Ground Zero Summit -
Talk -
Mobile security Automation Framework for Intelligent Auditing -
Ankur Bhargava
Nov 13 -
Ground Zero Summit -
Talk -
Making and Breaking Embedded Security -
-
Yashin Mehaboobe
Nov 13 -
Ground Zero Summit -
Talk -
Internet Governance -
Anjana Kovacs
Nov 13 -
Ground Zero Summit -
Talk -
How I won Browser Fuzzing -
Amol Naik
Nov 13 -
Ground Zero Summit -
Talk -
Hacking consumer electronics for Fun -
Atul Alex
Nov 13 -
Ground Zero Summit -
Talk -
Fuzzing Asynchronous Protocols built over Websockets -
Lavakumar Kuppan
Nov 13 -
Ground Zero Summit -
Talk -
Financial Integrity and Cyber Security -
Karnal Singh
Nov 13 -
Ground Zero Summit -
Talk -
Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF -
Bhaumik Merchant
Nov 13 -
Ground Zero Summit -
Talk -
Enterprise Security -
Mano Paul
Nov 13 -
Ground Zero Summit -
Talk -
Detecting Fake Cell Phone Towers -
Vijay Mukhi
Nov 13 -
Ground Zero Summit -
Talk -
Cyber ‘BrahMos’ - Static analysis driven secure coding -
Joy Sen
Nov 13 -
Ground Zero Summit -
Talk -
Attacking Web-Proxies like never before -
Ahamed Nafeez
Nov 13 -
Ground Zero Summit -
Talk -
APT protection for the Enterprise -
Deepak Singla
Nov 13 -
Ground Zero Summit -
Talk -
9 Cell Cyber Diplomacy -
Alok Vijayant
Nov 13 -
Ground Zero Summit -
Talk -
Security vulnerabilities in DVB-C networks: Hacking Cable TV network -
Rahul Sasi
Nov 13 -
Ground Zero Summit -
Talk -
Network Time Protocol in Amplification Inferno -
Sriram Krishnan
Nov 13 -
Ground Zero Summit -
Talk -
Identity theft and its impact on Cyber - Warfare -
Tarun Wig
Nov 13 -
Ground Zero Summit -
Talk -
Attacking Cryptography & PKI Implementations -
Ajit Hatti
Oct 29 -
Ekoparty -
Talk -
Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 -
-
Rahul Sasi
Oct 23 -
Hacklu -
Talk -
WiHawk - Router Vulnerability Scanner -
-
Anamika Singh
Oct 23 -
Hacklu -
Talk -
Hacking with Images - Evil Pictures -
-
Saumil Shah
Oct 23 -
T2 -
Talk -
Darshak: how to turn your phone into a low cost IMSI catcher device -
Ravishankar Borgaonkar , Swapnil Udar
Oct 17 -
Blackhat -
Talk -
Android Kernel and OS Security Assessment with Iron Crow -
-
Akhil Arora , Sumanth Naropanth
Oct 16 -
Grrcon -
Talk -
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design -
Aditya K Sood , Dr. Richard J Enbody
Sep 28 -
Blackhat -
Talk -
Understanding IMSI Privacy -
-
Swapnil Udar , Ravishankar Borgaonkar
Sep 26 -
Virus Bulletin -
Talk -
Evolution of Android exploits from a static analysis tools perspective -
-
Jagadeesh Chandraiah , Anna Szalay
Sep 25 -
Virus Bulletin -
Talk -
Optimized mal-ops. Hack the ad network like a boss -
-
Rahul Kashyap , Vadim Kotov
Sep 24 -
Brucon -
Talk -
OWASP: OWTF -
-
Bharadwaj Machiraju
Sep 18 -
App Sec Usa -
Talk -
Anatomy of memory scraping, credit card stealing POS malware -
-
Amol Sarwate
Sep 16 -
Deepsec -
Talk -
Advanced Powershell Threat – Lethal Client Side Attacks -
-
Nikhil Mittal
Sep 12 -
44con -
Talk -
Pentesting NoSQL DB’s Using NoSQL Exploitation Framework -
-
Francis Alexander
Sep 11 -
44 Con -
Talk -
Darshak: how to turn your phone into a low cost IMSI catcher device -
-
Ravishankar Borgaonkar , Swapnil Udar
Aug 22 -
C0c0n -
Talk -
The Curious Case of ProtoBufs - Demystifying Google’s hottest binary protocol -
-
Prasanna Kanagasabai , Jovin Lobo
Aug 22 -
C0c0n -
Talk -
Still Single with a bleeding heart (Tool Release) -
Tamaghna Basu
Aug 22 -
C0c0n -
Talk -
Piracy Tracker -
Vargheese Babu
Aug 22 -
C0c0n -
Talk -
My tryst with Source Code Review -
-
Anant Shrivastava
Aug 22 -
C0c0n -
Talk -
Making and breaking security in embedded devices -
-
Yashin Mehaboobe
Aug 22 -
C0c0n -
Talk -
Lesser Known Attack - XML Injection -
Amol Naik
Aug 22 -
C0c0n -
Talk -
Idle Machines doing Bounty Hunting (Behind your Back) -
Mrityunjay Gautam
Aug 22 -
C0c0n -
Talk -
Hacking Communication -
Akib Sayyed
Aug 22 -
C0c0n -
Talk -
Exploiting NoSQL Like Never Before -
Francis Alexander
Aug 22 -
C0c0n -
Talk -
Cryptographic Backdoors: Subverting the RSA -
Adhokshaj Mishra
Aug 22 -
C0c0n -
Talk -
Cryptocalypse, Heart Bleed : Is our Government Listening? -
Ajit Hatti
Aug 22 -
C0c0n -
Talk -
Breaking and Securing Mobile Apps - Automagically -
Aditya Gupta
Aug 22 -
C0c0n -
Talk -
APT: Case Study of attackers targeting public tendering -
Rahul Sasi
Aug 21 -
Usenix -
Talk -
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers -
-
Devdatta Akhawe , Zhiwei Li , Warren He , Dawn Song
Aug 07 -
Blackhat -
Talk -
Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies -
-
Vijay Balasubramaniyan , Raj Bandyopadhyay , Telvis Calhoun
Aug 07 -
Blackhat (Arsenal) -
Tool demo -
C-SCAD: Assessing Security flaws in clearscada Web_X client! -
-
Aditya K Sood
Aug 06 -
Blackhat -
Talk -
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! -
-
Aditya K Sood
Aug 06 -
Blackhat (Arsenal) -
Tool demo -
Flowinspect: Yet another network inspection tool -
-
Ankur Tyagi
Jun 23 -
Hackinparis -
Talk -
Pentesting NoSQL DB’s with NoSQL Exploitation Framework -
-
Francis Alexander
May 29 -
Hitb Sec Conf -
Talk -
LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit -
-
Rahul Kashyap , Rafal Wojtzcuk
May 29 -
Hitb Sec Conf -
Talk -
Hacking Your Cable TV Network: Die Hard Style -
-
Rahul Sasi
May 29 -
Hitb Sec Conf -
Talk -
Exploiting NoSQL Like Never Before -
-
Francis Alexander
May 21 -
Phdays -
Talk -
ARM Exploitation -
-
Aseem Jakhar
May 21 -
Phdays -
Talk -
Android Exploitation -
-
Aditya Gupta
Mar 27 -
Blackhat -
Talk -
JS Suicide: Using JavaScript Security Features to Kill JS Security -
-
Ahamed Nafeez
Mar 18 -
Troopers -
Talk -
Evolution of SIM Card Security -
-
Ravishankar Borgaonkar
Mar 15 -
Hitb Sec Conf -
Talk -
JS Suicide: Using Javascript Security Features to Kill Itself -
-
Ahamed Nafeez
Mar 15 -
Blackhat -
Talk -
Anatomy of a Credit Card Stealing POS Malware -
-
Amol Sarwate
Mar 08 -
Defcon -
Talk -
WI-Hawk -
-
Anamika Singh
Feb 15 -
Nullcon -
Tool demo -
XMLChor -
-
Harshal Jamdade
Feb 15 -
Nullcon -
Tool demo -
OWASP Xenotix XSS Exploit Framerwork -
-
Ajin Abraham
Feb 15 -
Nullcon -
Tool demo -
OWASP OWTF - The Offensive (Web) Testing Framework -
-
Bharadwaj Machiraju , Abraham Aranguren
Feb 15 -
Nullcon -
Tool demo -
NoSQL Exploitation Framework -
-
Francis Alexander
Feb 15 -
Nullcon -
Tool demo -
DrupSnipe -
Ranjeet Sengar , Sukesh Pappu
Feb 14 -
Nullcon -
Talk -
Wi-Hawk Password Auditing Tool -
-
Anamika Singh
Feb 14 -
Nullcon -
Talk -
User Privacy in Cellular Networks -
Ravishankar Borgaonkar
Feb 14 -
Nullcon -
Talk -
The Security Challenge -
-
Shantanu Ghosh
Feb 14 -
Nullcon -
Talk -
Strategic Information Warfare: When Ends define the means -
Amit Sharma
Feb 14 -
Nullcon -
Talk -
phoneypdf: A Virtual PDF Analysis Framework -
-
Kiran Bandla
Feb 14 -
Nullcon -
Talk -
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases -
-
Ankita Gupta , Lavakumar Kuppan
Feb 14 -
Nullcon -
Talk -
o’Dea Assertions - Untwining the Security of the SAML Protocol -
-
Achin Kulshrestha
Feb 14 -
Nullcon -
Talk -
Null Hardware Badge 101 (Desi Jugaad) -
-
Amey Gat , Umesh
Feb 14 -
Nullcon -
Talk -
Multi-value W-Fi What the Heck is it -
-
Abhijeet Ghosh
Feb 14 -
Nullcon -
Talk -
In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} -
-
Rushikesh D Nandedkar , Amrita C Iyer
Feb 14 -
Nullcon -
Talk -
Hardware Attack Vectors -
-
Yashin Mehaboobe
Feb 14 -
Nullcon -
Talk -
Hacking YOu’r Cable TV Network. -
-
Rahul Sasi , Ahamed Nafeez
Feb 14 -
Nullcon -
Talk -
Flowinspect - A Network Inspection Tool -
-
Ankur Tyagi
Feb 14 -
Nullcon -
Talk -
Chrome - OS Security 2014: New and future hotness -
-
Sumit Gwalani
Feb 14 -
Nullcon -
Talk -
Attacking WPA/WPA2 in the Cloud -
-
Vivek Ramachandran
Feb 14 -
Nullcon -
Talk -
Attack of the setuid bit - pt_chown and pwning root terminals -
-
Siddhesh Poyarekar
Feb 14 -
Nullcon -
Talk -
A security analysis of Browser Extensions -
-
Abhay Rana
Feb 14 -
Nullcon -
Talk -
2014 The year in which we cannot ignore SCADA -
-
Amol Sarwate
Feb 14 -
Nullcon -
Talk -
12 YEARS AND A BAKER’S DOZEN -
-
Saumil Shah
Jan 28 -
Owasp App Sec California -
Talk -
Application Sandboxes: Know thy limits -
-
Rahul Kashyap 2013
Nov 21 -
Appsec Usa -
Talk -
Wassup MOM? Owning the Message Oriented Middleware -
-
Gursev Singh Kalra
Nov 21 -
Deepsec -
Talk -
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy -
-
Parth Shukla
Nov 21 -
Deepsec -
Talk -
Automation In Android & iOS Application Security Review -
Hemil Shah
Nov 20 -
App Sec Usa -
Talk -
Why is SCADA Security an Uphill Battle? -
-
Amol Sarwate
Nov 20 -
App Sec Usa -
Talk -
Project Talk: OWASP OpenSAMM Project -
Pravir Chandra , Seba Deleersnyder
Nov 20 -
App Sec Usa -
Panel -
Aim-Ready-Fire -
Pravir Chandra , Ajoy Kumar , Suprotik Ghose , Jason Rottaupt , Ramin Safai , Sean Barnum , Wendy Nather
Nov 07 -
Ground Zero Summit -
Talk -
Understanding the anatomy of advanced targeted attacks – The Trend Micro approach -
Tarun Gupta
Nov 07 -
Ground Zero Summit -
Talk -
Towards a next generation secure Internet -
Sanjay Deshpande
Nov 07 -
Ground Zero Summit -
Talk -
The seven sins of Wi-Fi security -
Vivek Ramachandran
Nov 07 -
Ground Zero Summit -
Talk -
Setting the Data Center on fire -
Ajit Hatti
Nov 07 -
Ground Zero Summit -
Talk -
Serial killing of embedded systems -
Atul Alex
Nov 07 -
Ground Zero Summit -
Talk -
Securing government Critical Information Infrastructure -
Kapil Awasthi
Nov 07 -
Ground Zero Summit -
Talk -
Malware for Firefox Mobile OS -
Shantanu Gawde
Nov 07 -
Ground Zero Summit -
Talk -
IronWASP -
-
Lavakumar Kuppan
Nov 07 -
Ground Zero Summit -
Talk -
Internet – Transforming terrorism -
Sameer Saxena
Nov 07 -
Ground Zero Summit -
Talk -
How I built a pentest lab in under 70 USD -
Swaroop Yermalkar
Nov 07 -
Ground Zero Summit -
Talk -
Evolution of network security around Software Defined Networking (SDN) – The intelligent network -
Diwakar Dayal
Nov 07 -
Ground Zero Summit -
Talk -
Cloud Security: Enabling continuous, scalable security for today’s hyper connected world -
Sumedh Thakar
Nov 07 -
Ground Zero Summit -
Talk -
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state -
Vaishali Bhagwat
Nov 07 -
Ground Zero Summit -
Talk -
Approach to containing the outbreak of malicious information in online social networks -
Sriniketh Vijayaraghavan
Nov 07 -
Ground Zero Summit -
Talk -
Advanced security for advanced threats -
Kartik Shahani
Nov 07 -
Ground Zero Summit -
Talk -
Abusing Google Apps: Google is my command and control center -
-
Ajin Abraham
Oct 19 -
Toor Con -
Talk -
Static Malware Analysis with PyTriage -
Yashin Mehaboobe
Oct 17 -
Hitb Sec Conf -
Talk -
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis -
-
Rahul Sasi
Sep 27 -
C0c0n -
Talk -
The Secure Software Development Life Cycle -
Harshal Jamdade
Sep 27 -
C0c0n -
Talk -
The Art and Science of Anamoly based Vulnerability Detection -
Lavakumar Kuppan
Sep 27 -
C0c0n -
Talk -
Static analysis of malware with PyTriage -
-
Yashin Mehaboobe
Sep 27 -
C0c0n -
Talk -
SSRF / XSPA - Real World Attacks and Mitigations -
Riyaz Walikar
Sep 27 -
C0c0n -
Talk -
Snake Bites -
-
Anant Shrivastava
Sep 27 -
C0c0n -
Talk -
Sandy - The Malicious Analysis -
-
Rahul Sasi
Sep 27 -
C0c0n -
Talk -
Risk and challenges in virtual currencies. -
Harsh Patel , Swatantra Kumar Gupta
Sep 27 -
C0c0n -
Talk -
Pwning WiFi Devices! -
Swaroop Yermalkar
Sep 27 -
C0c0n -
Talk -
Lets Play - Applanting on new Grounds -
Ajit Hatti
Sep 27 -
C0c0n -
Talk -
Infiltrating the Intranet with Skanda -
-
Jayesh Chauhan
Sep 27 -
C0c0n -
Talk -
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? -
Anup Narayanan
Sep 27 -
C0c0n -
Talk -
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global -
Vivek Ramachandran
Sep 27 -
C0c0n -
Talk -
Disclosing Vulnerabilities: The Bug Bounty Style -
Nikhil Prabhakar
Sep 27 -
C0c0n -
Talk -
Blur Captcha -
Anirudh Duggal , Abhinav Mohanty
Sep 27 -
C0c0n -
Talk -
ARM, Thumb and the Finger -
Aseem Jakhar
Sep 13 -
Rootcon -
Talk -
My Experiments with truth: a different route to bug hunting -
Devesh Bhatt
Sep 13 -
Grrcon -
Talk -
Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution -
Prajwal Panchmahalkar
Sep 12 -
Grrcon -
Talk -
The Droid Exploitation Saga – All Over Again! -
Aditya Gupta , Subho Halder
Aug 16 -
Usenix -
Talk -
Building Securable Infrastructure: Open-Source Private Clouds -
Pravir Chandra
Aug 15 -
Usenix -
Talk -
An Empirical Study of Vulnerability Rewards Programs -
-
Devdatta Akhawe , David Wagner , Matthew Finifter
Aug 15 -
Usenix -
Talk -
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness -
-
Devdatta Akhawe , Adrienne Felt
Aug 03 -
Defcon -
Talk -
PowerPreter: Post Exploitation Like a Boss -
-
Nikhil Mittal
Aug 02 -
Defcon -
Talk -
Interactive Web Security Testing with IronWASP -
Lavakumar Kuppan
Aug 01 -
Blackhat (Arsenal) -
Tool demo -
XENOTIX xBOT -
-
Ajin Abraham
Aug 01 -
Blackhat (Arsenal) -
Tool demo -
Sparty -
-
Aditya K Sood
Aug 01 -
Blackhat (Arsenal) -
Tool demo -
OWASP Xenotix XSS Exploit Framework -
-
Ajin Abraham
Aug 01 -
Blackhat -
Talk -
Hot knives through butter: Bypassing automated analysis systems -
-
Abhishek Singh , Zheng Bu
Jul 31 -
Blackhat -
Talk -
LTE booms with vulnerabilities -
-
Ankit Gupta
Jul 31 -
Blackhat (Arsenal) -
Tool demo -
JMSDigger -
-
Gursev Singh Kalra
Jul 31 -
Blackhat -
Talk -
Javascript static security analysis made easy with JSPrime -
-
Nishant Das Patnaik , Sarathi Sabyasachi Sahoo
Jul 31 -
Blackhat -
Talk -
Clickjacking revisited: A perceptual view of UI security -
-
Devdatta Akhawe
Apr 21 -
Defcon -
Talk -
LTE boom in vulnerabilities -
Ankit Gupta
Mar 15 -
Blackhat -
Talk -
Vulnerability analysis of 2013 SCADA issues -
-
Amol Sarwate
Mar 15 -
Blackhat -
Talk -
The Sandbox Roulette- Are you ready for the gamble? -
-
Rahul Kashyap , Rafal Wojtczuk
Mar 15 -
Blackhat (Arsenal) -
Tool demo -
Prasadhak (And Offensive Powershell) -
-
Nikhil Mittal
Mar 15 -
Blackhat (Arsenal) -
Tool demo -
OWASP Xenotix XSS Exploit Framework -
-
Ajin Abraham
Mar 14 -
Blackhat -
Talk -
Lets play - Applanting -
-
Ajit Hatti
Mar 12 -
Troopers -
Talk -
Dirty use of USSD Codes in Cellular Network -
-
Ravishankar Borgaonkar
Mar 07 -
Can Sec West -
Talk -
SMS to Meterpreter - Fuzzing USB Modems -
-
Rahul Sasi
Mar 01 -
Nullcon -
Talk -
Vulnerability research anyone? -
Omair
Mar 01 -
Nullcon -
Talk -
SMS to Meterpreter - Fuzzing USB Modems -
-
Rahul Sasi
Mar 01 -
Nullcon -
Talk -
Sensitive Campus Security with Network -
-
Aravind Sitaraman
Mar 01 -
Nullcon -
Talk -
Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks -
-
Naga Rohit Samineni
Mar 01 -
Nullcon -
Talk -
Pawing the Droid: Twisting the ARM -
Divyanshu Shekhar , Anshul Kumar
Mar 01 -
Nullcon -
Talk -
Mobile Code mining for discovery and exploits -
-
Hemil Shah
Mar 01 -
Nullcon -
Talk -
Inception of graphical passwords -
-
Rishi Narang
Mar 01 -
Nullcon -
Talk -
Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework -
-
Ajin Abraham
Mar 01 -
Nullcon -
Talk -
CSRF Finder as a Mozilla Addon -
-
Piyush Pattanayak
Mar 01 -
Nullcon -
Talk -
Capturing Zero-Day Information -
-
Dinesh O Bareja , Sumit Sharma
Mar 01 -
Nullcon -
Talk -
BYOD: How will it shape your wireless network security in future? -
-
Kiran Deshpande
Mar 01 -
Nullcon -
Talk -
Bug Bounty Hunter’s confession -
-
Amol Naik
Mar 01 -
Nullcon -
Talk -
Automating JavaScript Static Analysis -
Lavakumar Kuppan 2012
Dec 06 -
Blackhat -
Talk -
The art of exploiting logical flaws in web apps -
-
Sumit Siddharth , Richard Dean
Dec 06 -
Blackhat -
Talk -
Poking servers with Facebook(and other web applications) -
-
Riyaz Walikar
Dec 06 -
Blackhat -
Talk -
HTML5 top 10 threats – Stealth Attack and Silent Exploits -
-
Shreeraj Shah
Dec 06 -
Blackhat -
Talk -
Attacking ODATA -
-
Gursev Singh Kalra
Dec 05 -
Blackhat -
Talk -
Droid Exploitation Saga -
-
Aditya Gupta , Subho Halder
Dec 01 -
Clubhack -
Talk -
XSSshell -
-
Vandan Joshi
Dec 01 -
Clubhack -
Talk -
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being -
-
Thomas Kurian Ambattu
Dec 01 -
Clubhack -
Talk -
Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC -
-
Aditya Gupta , Subho Halder
Dec 01 -
Clubhack -
Talk -
Smart Grid Security -
-
Falgun Rathod
Dec 01 -
Clubhack -
Talk -
Legal Nuances to the Cloud -
-
Ritambhara Agrawal
Dec 01 -
Clubhack -
Talk -
Infrastructure Security -
-
Sivamurthy Hiremath
Dec 01 -
Clubhack -
Talk -
HAWAS – Hybrid Analyzer for Web Application Security -
-
Lavakumar Kuppan
Dec 01 -
Clubhack -
Talk -
Hacking and Securing iOS applications -
-
Satish Bommisetty
Dec 01 -
Clubhack -
Talk -
FatCat Web Based SQL Injector -
-
Sandeep Kamble
Dec 01 -
Clubhack -
Talk -
Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher -
-
Vishal Kalro
Dec 01 -
Clubhack -
Talk -
Real Time Event Recording System, the tool for Digital Forensics Investigation -
-
Madhav Limaye
Dec 01 -
Clubhack -
Talk -
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework -
-
Ajin Abraham
Dec 01 -
Clubhack -
Talk -
Content-Type attack -Dark hole in the secure environment -
-
Raman Gupta
Nov 29 -
Deepsec -
Talk -
Bad Things in Good Packages - Creative Exploit Delivery -
-
Saumil Shah
Nov 23 -
Malcon -
Talk -
Windows Phone 8 Malware Prototype -
Shantanu Gawde
Nov 23 -
Malcon -
Talk -
Tampering in Energy Meters -
-
Mohit Arora
Nov 23 -
Malcon -
Talk -
Surprise paper! -
Atul Alex
Nov 23 -
Malcon -
Talk -
Advances in ROP attacks -
-
Raashid Bhat
Nov 23 -
Malcon -
Talk -
Advanced Malware Engine -
-
Mohit Kumar
Nov 07 -
Award -
Cross Site Port Attack (XSPA) -
-
Riyaz Walikar
Oct 26 -
App Sec Usa -
Talk -
XSS & CSRF with HTML5 - Attack, Exploit and Defense -
Shreeraj Shah
Oct 26 -
App Sec Usa -
Talk -
The 7 Qualities of Highly Secure Software -
-
Mano Paul
Oct 25 -
App Sec Usa -
Talk -
Cross Site Port Scanning -
-
Riyaz Walikar
Oct 25 -
App Sec Usa -
Talk -
Cracking the Code of Mobile Application -
-
Sreenarayan Ashokkumar
Oct 23 -
Hacklu -
Talk -
Buster: Android Security Buster -
Atul Alex
Oct 11 -
Hitb Sec Conf -
Talk -
XSS & CSRF strike back – Powered by HTML5 -
-
Shreeraj Shah
Oct 10 -
Hitb Sec Conf -
Talk -
Innovative Approaches to Exploit Delivery -
-
Saumil Shah
Sep 29 -
Nullcon -
Talk -
Next-gen Forensics -
K K Mookhey
Sep 28 -
Nullcon -
Talk -
Attacking Angry Droids -
Aditya Gupta , Subho Halder
Sep 28 -
Nullcon -
Talk -
Alert(/xss/) - How to catch an XSS before someone exploits / reports it? -
Ahamed Nafeez
Sep 27 -
Grrcon -
Talk -
The Realm of Third Generation Botnet Attacks -
-
Aditya K Sood , Dr. Richard J Enbody
Sep 27 -
Grrcon -
Talk -
Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! -
Bharat Jogi
Sep 27 -
Grrcon -
Talk -
Isn’t it all just SMS-sending trojans?: Real advances in Android Malware -
-
Jimmy Shah
Sep 26 -
Nullcon -
Talk -
The art of Passive Web Vul Analysis with IronWASP -
-
Lavakumar Kuppan
Sep 26 -
Nullcon -
Talk -
Opening the kimono: Automating behavioral analysis for mobile apps -
-
Pradeep Kulkarni , Michael Sutton
Sep 26 -
Nullcon (Delhi) -
Talk -
Nullcon_delhi_2012 -
-
Prasanna Kanagasabai
Sep 26 -
Nullcon -
Talk -
How secure is internet banking in India -
-
Ajit Hatti
Sep 26 -
Nullcon -
Talk -
Highly Harmful Audio Waves aka DTMF Fuzzing -
-
Rahul Sasi
Sep 26 -
Nullcon -
Talk -
Forensics Timeline Analysis -
-
Aashish Kunte
Sep 20 -
Ekoparty -
Talk -
Fuzzing DTMF Input Processing Algorithms -
-
Rahul Sasi
Sep 20 -
Ekoparty -
Talk -
Dirty use of USSD Codes in Cellular Network -
-
Ravishankar Borgaonkar
Sep 05 -
44 Con -
Talk -
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? -
-
Jitender Arora
Aug 29 -
Owasp App Sec India -
Talk -
Find me if you can Smart fuzzing and discovery! -
-
Shreeraj Shah
Aug 15 -
Award -
Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select) -
-
Gursev Singh Kalra
Aug 04 -
C0c0n -
Talk -
Impact of cyber laws on various stakeholders -
Sagar Rahurkar
Aug 03 -
C0c0n -
Talk -
WebApp Remote Code Execution using Server Side Scripting Engines -
-
Rahul Sasi
Aug 03 -
C0c0n -
Talk -
The Weakest Link - Reinforcing the Human Element -
Sandeep Godbole
Aug 03 -
C0c0n -
Talk -
The Management of Information Security – A Corporate Practitioner’s Perspective -
Pawan Kumar Singh
Aug 03 -
C0c0n -
Talk -
Security Incidents – Avoiding the Apocalypse in 2012 -
Ashish Chandra Mishra
Aug 03 -
C0c0n -
Talk -
Layer 8 Exploitation: A threat to National Security -
Aakash Goel
Aug 03 -
C0c0n -
Talk -
I haz you and pwn your maal -
-
Harsimran Singh Walia
Aug 03 -
C0c0n -
Talk -
Gathering security requirements -
K v Prashant , Saleem Ahamed
Aug 03 -
C0c0n -
Talk -
Evil JavaScript -
Bishan Singh
Aug 03 -
C0c0n -
Talk -
Enterprise server security -
Raghav Shandilya
Aug 03 -
C0c0n -
Talk -
Easy Money with UI-Redressing -
Amol Naik
Aug 03 -
C0c0n -
Talk -
Data Security -
Alok Vijayant , S Bhansali
Aug 03 -
C0c0n -
Talk -
Cyber Weapons -
Sameer Saxena
Aug 03 -
C0c0n -
Talk -
Cracking the Mobile Application Source Code -
-
Sreenarayan Ashokkumar
Aug 03 -
C0c0n -
Talk -
Contemporary Transcription and Resource Parasitism -
Arpit Patel
Aug 03 -
C0c0n -
Talk -
Business Continuity and Risk Management in Turbulent Times -
Venkataram Arabolu
Aug 03 -
C0c0n -
Talk -
Building Security Incident Detection & Handling Capabilities in Enterprises -
Sunil Varkey
Aug 03 -
C0c0n -
Talk -
A model to reduce information security risks due to human error -
-
Anup Narayanan
Jul 28 -
Defcon -
Talk -
Botnets Die Hard - Owned and Operated -
-
Aditya K Sood , Richard J Enbody
Jul 26 -
Blackhat -
Talk -
HTML5 top 10 threats – Stealth Attack and Silent Exploits -
-
Shreeraj Shah
Jul 26 -
Blackhat (Arsenal) -
Tool demo -
Bypassing Every CAPTCHA provider with clipcaptcha -
-
Gursev Singh Kalra
Jul 25 -
Blackhat (Arsenal) -
Tool demo -
Oyedata for OData Assessments -
-
Gursev Singh Kalra
Jul 22 -
Blackhat (Arsenal) -
Tool demo -
Kautilya and Nishang -
-
Nikhil Mittal
Jul 14 -
Hope -
Talk -
Advancements in Botnet Attacks and Malware Distribution -
-
Aditya K Sood
May 24 -
Hitb Sec Conf -
Talk -
CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants -
-
Rahul Sasi
May 13 -
Carolina Con -
Talk -
Attacking CAPTCHAs for Fun and Profit -
Gursev Singh Kalra
Mar 21 -
Troopers -
Talk -
More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard -
-
Nikhil Mittal
Mar 16 -
Blackhat -
Talk -
The Pwnage Saga Continues -
-
Nikhil Mittal
Mar 16 -
Blackhat -
Talk -
IVR Security- Internal Network Attack via Phone Lines -
-
Rahul Sasi
Mar 15 -
Owasp App Sec India -
Talk -
The Magic of Passive Web Vulnerability Analysis -
Lavakumar Kuppan
Mar 15 -
Grr Con -
Talk -
SCADA Security: Why is it so hard? -
-
Amol Sarwate
Mar 15 -
Hackinparis -
Talk -
SCADA Security: Why Is It So Hard ? -
-
Amol Sarwate
Mar 15 -
C0c0n -
Talk -
Integrated Dial 100 System for Law Enforcement -
Nandkumar Saravade , R Srikumar
Mar 15 -
Nullcon -
Talk -
An App(le) a day keeps the wallet away -
Antriksh Shah
Mar 14 -
Blackhat -
Talk -
HTML5 top 10 threats – Stealth Attack and Silent Exploits -
-
Shreeraj Shah
Mar 14 -
Blackhat -
Talk -
Hacking XPATH 2.0 -
-
Sumit Siddharth , Tom Forbes
Mar 02 -
Award -
CAPTCHA Re-Riding Attack -
-
Gursev Singh Kalra
Feb 15 -
Nullcon -
Talk -
Your phone is your phone but your calls are now my calls -
Akib Sayyed , Bipul Sahu , Dipesh Goyal , Nitin Agarwal
Feb 15 -
Nullcon -
Talk -
Teensy for fun and jugaad -
Amey Gat
Feb 15 -
Nullcon -
Talk -
Shall we dust Beep ? The Geo-strategic realities of Cyberwar -
-
Pukhraj Singh
Feb 15 -
Nullcon -
Talk -
SCADA Security: Why is it so hard -
Amol Sarwate
Feb 15 -
Nullcon -
Talk -
Sandboxing The deep truth -
-
Disha Agarwal , Manish Pali
Feb 15 -
Nullcon -
Talk -
Ra.2 Blackbox DOM-based XSS scanner -
-
Nishant Das Patnaik , Sarathi Sabyasachi Sahoo
Feb 15 -
Nullcon -
Talk -
Open source revolution :Need Hardware - Software marriage -
Venkatesh
Feb 15 -
Nullcon -
Talk -
Node.js: The good, bad and ugly -
-
Bishan Singh
Feb 15 -
Nullcon -
Talk -
Javascript static analysis with IronWASP -
-
Lavakumar Kuppan
Feb 15 -
Nullcon -
Talk -
IVR Security: Internal Network attacks via phone lines -
-
Rahul Sasi
Feb 15 -
Nullcon -
Talk -
Haxdroid: Empowering Android Handset -
-
Anant Shrivastava , Prashant Mahajan , Pardhasaradhi Ch
Feb 15 -
Nullcon -
Talk -
Friction in the machine -
Dinesh Shenoy
Feb 15 -
Nullcon -
Talk -
Cyberspace: Global commons or a national asset -
Kamlesh Bajaj
Feb 15 -
Nullcon -
Talk -
Content sniffing Algorithm bypassing techniques and possible attack vectors -
-
Anil Aphale , Chaitany Kamble
Feb 15 -
Nullcon -
Talk -
CAPTCHAs for fun and Profit -
-
Gursev Singh Kalra
Feb 15 -
Nullcon -
Talk -
Binary God -
-
Atul Alex
Feb 15 -
Nullcon -
Talk -
Best practices to improve the security grading of your project -
-
Hemant Khandelwal
Feb 15 -
Nullcon -
Talk -
Attacking Backup Software -
-
Nibin Varghese
Feb 15 -
Nullcon -
Talk -
Application security cost management -
-
Ketan Vyas 2011
Dec 15 -
Blackhat -
Talk -
Kautilya: Teensy Beyond Shell -
-
Nikhil Mittal
Dec 14 -
Blackhat -
Talk -
SCADA Security - Why Is It So Hard? -
-
Amol Sarwate
Dec 04 -
Clubhack -
Talk -
Wi-Fi malware for Fun and Profit -
Vivek Ramachandran
Dec 04 -
Clubhack -
Talk -
One Link Facebook -
-
Anand Pandey
Dec 04 -
Clubhack -
Talk -
Mere paas Teensy hai -
-
Nikhil Mittal
Dec 04 -
Clubhack -
Talk -
Handle Exploitation of Remote System From Email Account -
-
Bhaumik Merchant
Dec 04 -
Clubhack -
Talk -
Hacking your Droid -
-
Aditya Gupta
Dec 04 -
Clubhack -
Talk -
Exploit the Exploit Kits -
-
Dhruv Soi
Dec 04 -
Clubhack -
Talk -
DOM XSS – Encounters of the 3rd Kind -
-
Bishan Singh
Dec 04 -
Clubhack -
Talk -
Android Tamer -
-
Anant Shrivastava
Dec 04 -
Clubhack -
Talk -
Android Forensics -
-
Manish Chasta
Dec 04 -
Clubhack -
Talk -
Pen testing Mobile Applications -
-
Prashant Verma
Nov 25 -
Malcon -
Talk -
Mareech : Look it’s a HID made up of gold -
Nikhil Mittal
Nov 25 -
Malcon -
Talk -
Exploit the Exploit kits -
Dhruv Soi
Nov 25 -
Malcon -
Talk -
Advanced Malware for Apple Products -
Atul Alex
Nov 17 -
Deepsec -
Talk -
FakeAntiVirus - Journey from Trojan to a Persisent Threat -
Jagadeesh Chandraiah
Nov 17 -
Award -
CAPTCHA Hax With TesserCap -
-
Gursev Singh Kalra
Nov 17 -
Deepsec -
Talk -
Behavioral Security: 10 steps forward 5 steps backward -
-
Sourabh Satish
Nov 04 -
Hackfest -
Talk -
Here are your keystrokes -
Nikhil Mittal
Oct 13 -
Hitb Sec Conf -
Talk -
Web Wars 3 -
Saumil Shah
Oct 13 -
Hitb Sec Conf -
Talk -
Femtocells: A Poisonous Needle in the Operator’s Hay Stack -
-
Ravishankar Borgaonkar , Kevin Redon , Nico Golde
Oct 08 -
C0c0n -
Talk -
Stratagemizing Security Against Perpetrators In Cloud Infrastructure -
K S Abhiraj
Oct 07 -
C0c0n -
Talk -
Wi-Fi Malware for Fun and Profit -
Vivek Ramachandran
Oct 07 -
C0c0n -
Talk -
Web Application Backdoor Attack,Evasion and Detection -
-
Rahul Sasi
Oct 07 -
C0c0n -
Talk -
Security Threats in Custom ROM’s (Android) -
-
Anant Shrivastava
Oct 07 -
C0c0n -
Talk -
Security and Privacy Risks of Cloud Computing -
Vishnu Tiwari
Oct 07 -
C0c0n -
Talk -
Secure HTTP Headers or How I can finally convince management to let go of IE6 -
-
Akash Mahajan
Oct 07 -
C0c0n -
Talk -
Section 43A IT Act compliance -
Sagar Rahurkar
Oct 07 -
C0c0n -
Talk -
Runtime thread injection and execution in Linux processes -
Aseem Jakhar
Oct 07 -
C0c0n -
Talk -
Pentesting iPhone Applications -
-
Satish Bommisetty
Oct 07 -
C0c0n -
Talk -
Password Less Authentication, Authorization -
-
Srikar Sagi
Oct 07 -
C0c0n -
Talk -
Paranoid Android -
Ankur Bhargava , Mrigesh
Oct 07 -
C0c0n -
Talk -
Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network -
Bala Kumar S , Mohamed Emraanullah
Oct 07 -
C0c0n -
Talk -
Mobile Security -
-
Santosh Satam
Oct 07 -
C0c0n -
Talk -
iPhone Jailbreak -
Antriksh Shah
Oct 07 -
C0c0n -
Talk -
Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution -
-
Ahamed Nafeez
Oct 07 -
C0c0n -
Talk -
Digital Evidence -
Sushanth Samudrala
Oct 07 -
C0c0n -
Talk -
Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications -
Riyaz Walikar
Oct 07 -
Virus Bulletin -
Talk -
Browser exploit packs - exploitation paradigm -
-
Aditya K Sood , Richard J Enbody
Oct 07 -
C0c0n -
Talk -
Automated Malware Analysis - Setting up the Environment -
-
K v Prashant , Pushkar Pashupat
Sep 19 -
Brucon -
Talk -
Wifi malware for fun and profit -
-
Vivek Ramachandran
Sep 19 -
Hacklu -
Talk -
The travelling hacksmith -
Saumil Shah
Sep 19 -
Brucon -
Talk -
Step-by-Step for Software Security (that anyone can follow) -
Pravir Chandra
Sep 19 -
Hacklu -
Talk -
Linux thread injection - The jugaad way -
-
Aseem Jakhar
Sep 19 -
Brucon -
Talk -
Botnets and Browsers, Brothers in a Ghost Shell -
-
Aditya K Sood
Sep 16 -
Grrcon -
Talk -
Mobile App Moolah: Profit taking with Mobile Malware -
-
Jimmy Shah
Sep 07 -
Securitybyte -
Talk -
Web Application Defender -
-
K v Prashant , Mohammed Imran
Sep 07 -
Securitybyte -
Talk -
Social Web & Privacy – An evolving world -
Bala Sathiamurthy , Aridaman Tripathi
Sep 07 -
Securitybyte -
Talk -
Mobile Devices – Boon or Curse? -
-
Kishor Sonawane , Oliver Ng
Sep 07 -
Securitybyte -
Talk -
IronWASP - A Web Application Security Testing Platform -
-
Lavakumar Kuppan
Sep 07 -
Securitybyte -
Talk -
Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit -
-
Vivek Ramachandran
Sep 07 -
Securitybyte -
Talk -
Data Protection -
Dipankar Roy
Sep 06 -
Securitybyte -
Talk -
Application Security Strategies -
-
K K Mookhey
Sep 06 -
Securitybyte -
Talk -
Using Data Analytics for Incident Response -
-
Samir Saklikar
Sep 06 -
Securitybyte -
Talk -
Security Threats on Social Networks -
-
Nithya Raman
Sep 06 -
Securitybyte -
Talk -
Runtime thread injection and execution in Linux processes -
-
Aseem Jakhar
Sep 06 -
Securitybyte -
Talk -
Private Internet Circuits - Towards A Next Generation Internet -
-
Sanjay Deshpande
Sep 06 -
Securitybyte -
Talk -
Enabling Un-trusted Mashups -
-
Bishan Singh
Sep 06 -
Securitybyte -
Talk -
Botnets at Application+ layer -
-
Raj Shastrakar
Aug 07 -
Defcon -
Talk -
VDLDS — All Your Voice Are Belong To Us -
-
Ganesh Devarajan , Don Le Bert
Aug 05 -
Defcon -
Talk -
Jugaad – Linux Thread Injection Kit -
-
Aseem Jakhar
Aug 03 -
Blackhat -
Talk -
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex -
-
Shreeraj Shah
Aug 03 -
Blackhat -
Talk -
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS -
-
Jatin Kataria , Ang Cui , Salvatore Stolfo
Aug 03 -
Blackhat -
Talk -
Femtocells: A poisonous needle in the operator’s hay stack -
-
Ravishankar Borgaonkar , Nico Golde , Kevin Redon
May 20 -
Hitb Sec Conf -
Talk -
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) -
-
Shreeraj Shah
May 19 -
Hitb Sec Conf -
Talk -
Spying on SpyEye – What Lies Beneath? -
-
Aditya K Sood
Mar 30 -
Troopers -
Talk -
Femtocell: Femtostep to the Holy Grail -
-
Ravishankar Borgaonkar , Kevin Redon
Mar 15 -
Nullcon -
Talk -
Information Warfare Ñ The Indian Perspective -
Alok Vijayant
Feb 25 -
Nullcon -
Talk -
SSLSmart – Smart SSL Cipher Enumeration -
-
Gursev Singh Kalra
Feb 25 -
Nullcon -
Talk -
Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower -
-
Hari Krishna Prasad Vemuru
Feb 25 -
Nullcon -
Talk -
Reversing microsoft patches to reveal vulnerable code -
-
Harsimran Singh Walia
Feb 25 -
Nullcon -
Talk -
Protect infrastructure or protect information – Lessons from Wikileaks -
-
Vishal Gupta
Feb 25 -
Nullcon -
Talk -
Penetration Testing a Biometric System -
-
Rahul Sasi
Feb 25 -
Nullcon -
Talk -
Lessons Learned From 2010 -
-
Saumil Shah
Feb 25 -
Nullcon -
Talk -
Jugaad Beta: Linux Thread Injection malware PoC -
-
Aseem Jakhar
Feb 25 -
Nullcon -
Talk -
JSON Fuzzing: New approach to old problems -
-
K v Prashant , Tamaghna Basu
Feb 25 -
Nullcon -
Talk -
Incident Management and Beyond -
Dinesh O Bareja
Feb 25 -
Nullcon -
Talk -
Hacking the Parliament – A classic Social Engineering attack -
Anurag Dhanda
Feb 25 -
Nullcon -
Talk -
Fuzzing with complexities -
-
Vishwas Sharma
Feb 25 -
Nullcon -
Talk -
Future of cyber crimes: Limitations and Challenges -
Pratap Reddy
Feb 25 -
Nullcon -
Talk -
Enterprise Paradigm for Controlling Data Leakage -
-
Deepak Rout
Feb 25 -
Nullcon -
Talk -
Cyber Crime 101 - Cost of cybercrime, trends & analysis -
-
Simran Gambhir , Cn Shashidhar
Feb 25 -
Nullcon -
Talk -
Chupa Rustam -
-
Abhijeet Hatekar
Feb 25 -
Nullcon -
Talk -
Buffer Under Run Exploits -
-
Saurabh Sharma , Chinmaya Kamal
Feb 25 -
Nullcon -
Talk -
Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) -
-
Sunil Kumar
Feb 25 -
Nullcon -
Talk -
(secure) SiteHoster – Disable XSS & SQL Injection -
-
Abhishek Kumar
Feb 15 -
Nullcon -
Talk -
Botnet Detection approach by DNS behavior and clustering analysis -
-
Nilesh Sharma , Pulkit Mehndiratta 2010
Dec 04 -
Clubhack -
Talk -
Windows Memory Forensic Analysis -
-
Aashish Kunte
Dec 04 -
Clubhack -
Talk -
Ultimate Pen Test – Compromising a highly secure environment -
-
Nikhil Mittal
Dec 04 -
Clubhack -
Talk -
Mantra – Free and Open Source security framework based on browser platform -
-
Abhi M Balakrishnan
Dec 04 -
Clubhack -
Talk -
Firefox Security! -
-
Prasanna Kanagasabai
Dec 04 -
Clubhack -
Talk -
Data theft in India -
-
K K Mookhey
Dec 04 -
Clubhack -
Talk -
Attacking with HTML5 -
-
Lavakumar Kuppan
Nov 25 -
Deepsec -
Talk -
Developers are from Mars, Compliance Auditors are from Venus -
-
Neelay S Shah
Nov 11 -
Blackhat -
Talk -
Attacking with HTML5 -
-
Lavakumar Kuppan
Oct 29 -
T2 -
Talk -
Hacking Femtocells -
Ravishankar Borgaonkar , Kevin Redon
Oct 27 -
Hacklu -
Talk -
Exploit Delivery - Tricks and Techniques -
-
Saumil Shah
Oct 14 -
Hitb Sec Conf -
Talk -
Exploit Delivery -
-
Saumil Shah
Oct 13 -
Hitb Sec Conf -
Talk -
Hacking a Browser’s DOM – Exploiting Ajax and RIA -
-
Shreeraj Shah
Aug 01 -
C0c0n -
Talk -
Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle -
Praseed Pai
Aug 01 -
C0c0n -
Talk -
Wireless MITM -
Prashant Mahajan
Aug 01 -
C0c0n -
Talk -
VoIP Security -
Mukund Krishnamurthy
Aug 01 -
C0c0n -
Talk -
Overview of Cyber Legal Systems in India -
Sagar Rahurkar
Aug 01 -
C0c0n -
Talk -
Mobile Security -
Suhas Desai
Aug 01 -
C0c0n -
Talk -
Last line of defense - Host Intrusion Prevention and Secure application development. -
Avinash Shenoi
Aug 01 -
C0c0n -
Talk -
Horses, Rats and Bots -
Jairam Ramesh
Aug 01 -
C0c0n -
Talk -
Hackers’ EcoSystem in India -
Rohit Srivastwa
Aug 01 -
C0c0n -
Talk -
End-point Security -
Laxi Eshwari
Aug 01 -
C0c0n -
Talk -
Dangers and dynamic Malware analysis -
Chandrasekar
Aug 01 -
C0c0n -
Talk -
Concept, Methodology and Challenges in Computer Forensics -
Sebastian Edassery
Aug 01 -
C0c0n -
Talk -
Code Disclosure over HTTP -
Anant Kochhar
Aug 01 -
C0c0n -
Talk -
Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study -
Krishnakumar Kottekkat , Whiteknight
Aug 01 -
C0c0n -
Talk -
Client Side Exploits using PDF -
-
Ankur Bhargava , Tamaghna Basu
Jul 31 -
Defcon -
Talk -
WPA Too! -
-
Md Sohail Ahmad
Jul 30 -
Defcon -
Talk -
Hacking Oracle From Web Apps -
Sumit Siddharth
Jul 29 -
Blackhat -
Talk -
Hacking Oracle From Web Apps -
-
Sumit Siddharth
Jul 29 -
Blackhat -
Talk -
Hacking Browser’s DOM - Exploiting Ajax and RIA -
-
Shreeraj Shah
Jul 01 -
Hitb Sec Conf -
Talk -
Top 10 Web 2.0 Attacks and Exploits -
-
Shreeraj Shah
Jul 01 -
Hitb Sec Conf -
Talk -
The Travelling Hacksmith 2009 – 2010 -
Saumil Shah
Jun 18 -
Syscan -
Talk -
REVERSE ENGINEERING WEB 2.0 APPLICATIONS -
Shreeraj Shah
Apr 21 -
Hitb Sec Conf -
Talk -
Web Security – Going Nowhere? -
-
Saumil Shah
Apr 14 -
Blackhat -
Talk -
Attacking JAVA Serialized Communication -
-
Manish Saindane
Mar 15 -
Blackhat -
Talk -
400 Apps in 40 Days -
-
Nish Bhalla , Sahba Kazerooni
Mar 02 -
Award -
Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution -
-
Lavakumar Kuppan
Feb 25 -
Nullcon -
Talk -
Steganography & Stegananalysis: A Technical & Psychological Perspective -
-
Prince Komal Boonlia , Reena Bhansali
Feb 25 -
Nullcon -
Talk -
Quantum Computing Challenges in the field of security -
-
Navin Pai
Feb 25 -
Nullcon -
Talk -
Penetration Testing versus Source Code -
-
Nikhil Wagholikar
Feb 25 -
Nullcon -
Talk -
Malware Detection Tool for Websites: A Proof-Of-Concept -
-
Anant Kochhar
Feb 25 -
Nullcon -
Talk -
Intelligent debugging and in memory fuzzing. -
-
Vishwas Sharma , Amandeep Bharti
Feb 25 -
Nullcon -
Talk -
Imposter ke karnamey: The Browser Phishing Tool. -
Lavakumar Kuppan
Feb 25 -
Nullcon -
Talk -
Botnet mitigation, monitoring and management. -
-
Harshad Patil
Feb 25 -
Nullcon -
Talk -
Software Fuzzing with Wireplay. -
-
Abhisek Datta
Feb 03 -
Blackhat -
Talk -
Beware of Serialized GUI Objects Bearing Data -
-
Rohini Sulatycki , David Byrne 2009
Dec 05 -
Clubhack -
Talk -
Risk Based Penetration Testing -
-
Nikhil Wagholikar , K K Mookhey
Dec 05 -
Clubhack -
Talk -
Revealing the Secrets: Source Code Disclosure, Techniques and Impacts -
-
Anant Kochhar
Dec 05 -
Clubhack -
Talk -
Open source for securing data with advanced Crypto-Steganography technology -
-
Suhas Desai
Dec 05 -
Clubhack -
Talk -
Mobile Application Security Testing -
-
Gursev Singh Kalra
Dec 05 -
Clubhack -
Talk -
Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
-
Lavakumar Kuppan
Dec 05 -
Clubhack -
Talk -
Indian IT Act 2000 vs 2009 -
-
Rohas Nagpal
Dec 05 -
Clubhack -
Talk -
Incident Handling and Log Analysis for Web Based Incidents -
-
Manindra Kishore
Dec 05 -
Clubhack -
Talk -
Advance Computer Forensic concepts (windows) -
-
Kush Wadhwa
Dec 05 -
Clubhack -
Talk -
India Cyber Crime Scene - Caught in the Crossfire -
-
Vinoo Thomas , Rahul Mohandas
Dec 04 -
Clubhack -
Talk -
Facilitate Collaboration with Information Rights Management -
Abhijit Tannu
Nov 19 -
Deepsec -
Talk -
Top 10 Security Issues Developers Don’t Know About -
-
Neelay S Shah
Nov 19 -
Deepsec -
Talk -
Ownage 2.0 -
-
Saumil Shah
Nov 18 -
Securitybyte -
Talk -
Rumbling Infections – Web Malware Ontology -
-
Aditya K Sood
Nov 18 -
Securitybyte -
Talk -
Risk based Penetration Testing -
-
K K Mookhey
Nov 18 -
Securitybyte -
Talk -
Introduction to Web Protection Library -
-
Anil Chintala
Nov 18 -
Securitybyte -
Talk -
Hacking Oracle From Web -
-
Sumit Siddharth
Nov 18 -
Securitybyte -
Talk -
Cloud Hacking – Distributed Attack & Exploit Platform -
Shreeraj Shah
Nov 17 -
Securitybyte -
Talk -
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors -
-
Nitin Kumar , Vipin Kumar
Nov 17 -
Securitybyte -
Talk -
Usability and Privacy in Security -
-
Ponnurangam Kumaraguru
Nov 17 -
Securitybyte -
Talk -
Threat Modeling -
-
Varun Sharma
Nov 17 -
Securitybyte -
Talk -
Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
-
Lavakumar Kuppan
Nov 17 -
Securitybyte -
Talk -
Business Continuity Case Study -
Venkataram Arabolu
Nov 17 -
Securitybyte -
Talk -
Business Case-Risk Management/Compliance at AMITY -
Js Sodhi
Nov 17 -
Securitybyte -
Talk -
Behind the scenes at the MSRC -
-
Suresh Venkateswaran , Dave Midturi
Nov 17 -
Securitybyte -
Talk -
Applications - The new cyber security frontier -
-
Mano Paul
Oct 28 -
Hacklu -
Talk -
Ownage 2.0 -
Saumil Shah
Oct 07 -
Hitb Sec Conf -
Talk -
How to Own the World – One Desktop at a Time -
-
Saumil Shah
Aug 06 -
C0c0n -
Talk -
Network Intrusions and Hacking -
Manu Zacharia
Aug 06 -
C0c0n -
Talk -
Microsoft Security Strategies -
Binoy VC
Aug 06 -
C0c0n -
Talk -
Management & Security of Large Scale Storage Devices -
Prashant Dinde
Aug 06 -
C0c0n -
Talk -
Know Your Enemy, and Yourself: Demystifying Threat Modelin -
Meera Subbarao
Aug 06 -
C0c0n -
Talk -
Information Warfare -
A a Gafoor , Vinayak Mishra
Aug 06 -
C0c0n -
Talk -
Information security management practices - Technical issues and the impact of risk management. -
Kp Paulson
Aug 06 -
C0c0n -
Talk -
Information Security Audit -
Venkatapathy Subramaniam
Aug 06 -
C0c0n -
Talk -
Cyber Victimisation -
K Jaishankar
Aug 06 -
C0c0n -
Talk -
Cyber Forensics -
Krishna Sastry Pendyal
Aug 02 -
Defcon -
Talk -
Wi-Fish Finder: Who Will Bite the Bait -
-
Md Sohail Ahmad , Prabhash Dhyani
Aug 01 -
Defcon -
Talk -
The Making of the second SQL injection Worm -
-
Sumit Siddharth
Jul 31 -
Defcon -
Talk -
Advancing Video Application Attacks with Video Interception, Recording, and Replay -
-
Arjun Sambamoorthy , Jason Ostrom
Jul 29 -
Blackhat -
Talk -
Psychotronica: Exposure, Control, and Deceit -
-
Nitesh Dhanjani
May 19 -
Syscan -
Talk -
Securing Enterprise Applications -
Shreeraj Shah
May 19 -
Syscan -
Talk -
Securing Applications at Gateway with Web Application Firewalls -
Shreeraj Shah
Apr 22 -
Hitb Sec Conf -
Talk -
Vbootkit 2.0: Attacking Windows 7 via Boot Sectors -
-
Nitin Kumar , Vipin Kumar
Apr 22 -
Troopers -
Talk -
SQL Injections: More Fun and Profit -
-
Sumit Siddharth
Apr 22 -
Hitb Sec Conf -
Talk -
Pwnage 2.0 -
-
Saumil Shah
Apr 22 -
Troopers -
Talk -
Browser Design Flaws – Hacking by Breaking in Architectures -
-
Aditya K Sood
Apr 22 -
Hitb Sec Conf -
Talk -
Application Defense Tactics & Strategies - WAF at the Gateway -
-
Shreeraj Shah
Mar 16 -
Can Sec West -
Talk -
On Approaches and Tools for Automated Vulnerability Analysis -
-
Tanmay Ganacharya , Abhishek Singh , Swapnil Bhalode , Nikola Livic , Scott Lambert
Feb 19 -
Blackhat -
Talk -
Blinded by Flash: Widespread Security Risks Flash Developers Don’t See -
-
Prajakta Jagdale 2008
Dec 06 -
Clubhack -
Talk -
State of Cyber Law in India -
-
Rohas Nagpal
Dec 06 -
Clubhack -
Talk -
Reverse Engineering v/s Secure Coding -
-
Atul Alex
Dec 06 -
Clubhack -
Talk -
Reverse Engineering for exploit writers -
-
Nibin Varghese
Dec 06 -
Clubhack -
Talk -
Introduction to backtrack -
-
Kunal Sehgal
Dec 06 -
Clubhack -
Talk -
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching -
-
Karmendra Kohli
Dec 06 -
Clubhack -
Talk -
Immune IT: Moving from Security to Immunity -
-
Ajit Hatti
Dec 06 -
Clubhack -
Talk -
Hacking Client Side Insecurities -
-
Aditya K Sood
Dec 06 -
Clubhack -
Talk -
Economic offenses through Credit Card Frauds Dissected -
-
Harshad Patil
Dec 06 -
Clubhack -
Talk -
AntiSpam - Understanding the good, the bad and the ugly -
-
Aseem Jakhar
Nov 13 -
Deepsec -
Talk -
Game of Web 2.0 Security - Attacking Next Generation Apps -
Shreeraj Shah
Oct 29 -
Hitb Sec Conf -
Talk -
Top 10 Web 2.0 Attacks -
-
Shreeraj Shah
Oct 29 -
Hitb Sec Conf -
Talk -
Browser Exploits - A New Model for Browser Security -
-
Saumil Shah
Oct 22 -
Hacklu -
Talk -
Browser Exploits - A new model for Browser security -
Saumil Shah
Aug 21 -
Owasp App Sec India -
Talk -
AppSec For Managers -
Nish Bhalla
Aug 20 -
Owasp App Sec India -
Talk -
Web Application Security: Too Costly To Ignore -
-
Rajesh Nayak
Aug 20 -
Owasp App Sec India -
Talk -
Web 2.0 Attacks - Next Generation Threats on the Rise -
-
Shreeraj Shah
Aug 20 -
Owasp App Sec India -
Talk -
Case Study: Testing 200+ applications in a $10 Billion Enterprise -
-
Roshen Chandran
Aug 20 -
Owasp App Sec India -
Talk -
Building Enterprise AppSec Program -
Nish Bhalla
Aug 20 -
Owasp App Sec India -
Talk -
Application Security Trends & Challenges -
-
Kamlesh Bajaj
Aug 09 -
Defcon -
Talk -
Autoimmunity Disorder in Wireless LAN -
-
Jvr Murthy , Amit Vartak , Md Sohail Ahmad
Aug 07 -
Blackhat -
Talk -
Got Citrix, Hack It! -
-
Shanit Gupta
Aug 06 -
Blackhat -
Talk -
Bad Sushi: Beating Phishers at Their Own Game -
-
Nitesh Dhanjani , Billy Rios
Apr 16 -
Hitb Sec Conf -
Talk -
Securing Next Generation Applications – Scan, Detect and Mitigate -
Shreeraj Shah
Mar 28 -
Blackhat -
Talk -
Spam-Evolution -
-
Aseem Jakhar
Mar 27 -
Blackhat -
Talk -
Iron Chef Black Hat: John Henry Challenge -
-
Pravir Chandra , Jacob West , Brian Chess , Sean Fay
Mar 26 -
Can Sec West -
Talk -
Vulnerabilities Die Hard -
Kowsik Guruswamy
Feb 20 -
Blackhat -
Talk -
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools -
-
Shreeraj Shah
Feb 20 -
Blackhat -
Talk -
Hacking VoIP through IPSec Tunnels -
-
Sachin Joglekar , Sudeep Patwardhan 2007
2006
2005
2004
2003
2002
2001
1998
1997
↑