Hackers of India
Home
Timeline
Tools
About
RoadMap
2015th
---- 2015 ----
2015/11/19
Talk
:
Deepsec
:
Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends.
-
Nikhil Mittal
2015/11/13
Tool Demo
:
Blackhat
:
Rudra - The Destroyer of Evil
-
Ankur Tyagi
2015/11/13
Talk
:
Blackhat
:
Continuous Intrusion: Why CI tools are an Attacker’s Best Friends
-
Nikhil Mittal
2015/11/13
Talk
:
Blackhat
:
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX
-
Monnappa K A
2015/11/13
Talk
:
Blackhat
:
LTE & IMSI Catcher Myths
-
Ravishankar Borgaonkar
N Asokan
Altaf Shaik
Valtteri Niemi
Jean Pierre Seifert
2015/11/12
Talk
:
Blackhat
:
Stegosploit - Exploit Delivery with Steganography and Polyglots
-
Saumil Shah
2015/11/12
Tool Demo
:
Blackhat
:
Nishang - Tracking A Windows User
-
Nikhil Mittal
2015/11/12
Tool Demo
:
Blackhat
:
Kautilya: Fastest shells you will ever get
-
Nikhil Mittal
2015/11/12
Tool Demo
:
Blackhat
:
Android Tamer
-
Anant Shrivastava
2015/11/12
Tool Demo
:
Blackhat
:
Android InsecureBank
-
Dinesh Shetty
2015/11/05
Talk
:
Ground Zero Summit
:
XSS - The art of evading web application filters!
-
Anirudh Anand
2015/11/05
Talk
:
Ground Zero Summit
:
Wolves Among Sheep: Defeating Targeted Attacks With Deception
-
Sahir Hidayatullah
Raviraj Doshi
2015/11/05
Talk
:
Ground Zero Summit
:
Trailing Terror in the Darknets
-
Shesh Sarangdhar
2015/11/05
Talk
:
Ground Zero Summit
:
Thanks for the free cookies
-
Anshul Saxena
Nishant Yadav
2015/11/05
Talk
:
Ground Zero Summit
:
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
-
Aditya K Sood
2015/11/05
Talk
:
Ground Zero Summit
:
OSINT Black Magic: Listen who whispers your name in the dark!!!
-
Sudhanshu Chauhan
Nutan Kumar Panda
2015/11/05
Talk
:
Ground Zero Summit
:
Hacking RFIDs under 2000INR
-
Jayesh Chauhan
2015/11/05
Talk
:
Ground Zero Summit
:
Elliptical Curve Cryptography
-
Aneesha S
2015/11/05
Talk
:
Ground Zero Summit
:
Economics of Post Quantum Crypto Systems : Do we really Need it
-
Ajit Hatti
2015/11/05
Talk
:
Ground Zero Summit
:
Dissecting Android Malware
-
Anto Joseph
2015/11/05
Talk
:
Ground Zero Summit
:
Credit Card Frauds – The money making Ecosystem for Cyber criminals
-
Abhinav Singh
2015/11/05
Talk
:
Ground Zero Summit
:
chellam – a Wi-Fi IDS/Firewall for Windows
-
Vivek Ramachandran
2015/11/05
Talk
:
Ground Zero Summit
:
Browser based Malware attacks
-
Harsh Daftary
2015/11/05
Talk
:
Ground Zero Summit
:
Authentication flaw in Automatic Bank Passbook printing machine.
-
Indrajeet Bhuyan
2015/11/05
Talk
:
Ground Zero Summit
:
Western Air Command
-
B S Singh Deo
2015/11/05
Talk
:
Ground Zero Summit
:
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
-
Jiten Jain
2015/11/05
Talk
:
Ground Zero Summit
:
Cyber Security in Hospitals:Hospitals Under Seige
-
Anirudh Duggal
2015/10/21
Talk
:
Hacklu
:
Stegosploit - Delivering Drive-By Exploits With Only Images
-
Saumil Shah
2015/10/08
Talk
:
Brucon
:
The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed
-
Rushikesh D Nandedkar
Amrita C Iyer
2015/09/11
Talk
:
44 Con
:
Stegosploit – Drive-by Browser Exploits using only Images
-
Saumil Shah
2015/08/28
Tool Demo
:
Blackhat
:
Damn Vulnerable iOS App (DVIA)
-
Prateek Gianchandani
2015/08/09
Talk
:
Defcon
:
802.11 Monitoring with PCAP2XML/SQLite
-
Vivek Ramachandran
2015/08/08
Tool Demo
:
Defcon
:
Rudra
-
Ankur Tyagi
2015/08/08
Talk
:
Defcon
:
QARK: Android App Exploit and SCA Tool
-
Tushar Dalvi
Tony Trummer
2015/08/08
Talk
:
Defcon
:
Powershell for Penetraton Testers
-
Nikhil Mittal
2015/08/08
Talk
:
Defcon
:
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
-
Aditya K Sood
2015/08/08
Talk
:
Defcon
:
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics
-
Vivek Ramachandran
2015/08/08
Workshop
:
Defcon
:
Automatic Live WPA/WPA2 Attacks and WPA_Supplicant
-
Vivek Ramachandran
2015/08/07
Workshop
:
Defcon
:
WPA Enterprise Hacking
-
Vivek Ramachandran
Thomas D Otreppe
2015/08/07
Talk
:
Defcon
:
Hacker’s Practice Ground
-
Lokesh Pidawekar
2015/08/07
Talk
:
Defcon
:
Getting into the Trust Store We Trust
-
Ajit Hatti
2015/08/07
Talk
:
Defcon
:
Chellam – a Wi-Fi IDS/Firewall for Windows
-
Vivek Ramachandran
2015/08/06
Tool Demo
:
Blackhat
:
Kautilya
-
Nikhil Mittal
2015/08/06
Talk
:
Blackhat
:
Harnessing Intelligence from Malware Repositories
-
Arun Lakhotia
Vivek Notani
2015/08/06
Tool Demo
:
Blackhat
:
Chellam
-
Vivek Ramachandran
2015/08/05
Tool Demo
:
Blackhat
:
Rudra - The Destroyer of Evil
-
Ankur Tyagi
2015/08/05
Tool Demo
:
Blackhat
:
QARK - Android Application SCA and Exploit Tool
-
Tushar Dalvi
2015/08/05
Tool Demo
:
Blackhat
:
PixelCaptcha: A unicode based captcha scheme
-
Gursev Singh Kalra
2015/08/01
Talk
:
C0c0n
:
Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities
-
Anant Shrivastava
2015/08/01
Talk
:
C0c0n
:
S3curi7y at 36K feet
-
Rugved Mehta
Gaurav Trivedi
2015/08/01
Talk
:
C0c0n
:
Reversing and Deciphering the Cyber Espionage Malware Communications
-
Monnappa K A
2015/08/01
Talk
:
C0c0n
:
NoPo - The NoSQL HoneyPot Framework
-
Francis Alexander
2015/08/01
Talk
:
C0c0n
:
Medical device security and critical infrastructure inside hospitals
-
Anirudh Duggal
2015/08/01
Talk
:
C0c0n
:
Hacking RFIDs under 2000 INR
-
Jayesh Chauhan
Divya S John
2015/08/01
Talk
:
C0c0n
:
From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices )
-
Anto Joseph
2015/08/01
Talk
:
C0c0n
:
Demystifying and Breaking BLE
-
Yashin Mehaboobe
2015/08/01
Talk
:
C0c0n
:
Breaking into Infosec Research
-
Vivek Ramachandran
2015/08/01
Talk
:
C0c0n
:
Blockchains in Security
-
Harsh Patel
2015/08/01
Talk
:
C0c0n
:
Automated Security Analysis of Android & iOS Applications with Mobile Security Framework
-
Ajin Abraham
2015/08/01
Talk
:
C0c0n
:
Attack chaining for web exploitation- From Information leakage to gaining Root access
-
Abhijeth Dugginapeddi
2015/08/01
Talk
:
C0c0n
:
A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws.
-
Riyaz Walikar
2015/07/06
Talk
:
Blackhat
:
DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS
-
Ahamed Nafeez
2015/05/29
Talk
:
Hitb Sec Conf
:
PowerShell for Penetration Testers
-
Nikhil Mittal
2015/05/29
Talk
:
Hitb Sec Conf
:
Hacking Samsung’s Tizen: The OS of Everything
-
Ajin Abraham
2015/05/28
Talk
:
Hitb Sec Conf
:
The Savage Curtain: Mobile SSL Failures
-
Tushar Dalvi
Tony Trummer
2015/05/28
Talk
:
Hitb Sec Conf
:
Stegosploit: Hacking With Pictures
-
Saumil Shah
2015/05/26
Talk
:
Phdays
:
iOS Application Exploitation
-
Prateek Gianchandani
Egor Tolstoy
2015/05/26
Talk
:
Phdays
:
Invisible Backdoors In Your Code
-
Debasis Mohanty
2015/03/27
Talk
:
Syscan
:
Stegosploit - Hacking with Pictures
-
Saumil Shah
2015/03/27
Talk
:
Blackhat
:
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
-
Preeti Subramanian
2015/03/26
Tool Demo
:
Blackhat
:
YSO Mobile Security Framework
-
Ajin Abraham
2015/03/26
Talk
:
Blackhat
:
The underground Ecosystem of Credit Card frauds
-
Abhinav Singh
2015/03/26
Tool Demo
:
Blackhat
:
SecPod Saner
-
Preeti Subramanian
2015/03/26
Tool Demo
:
Blackhat
:
OWASP Xenotix XSS Exploit Framework
-
Ajin Abraham
2015/02/07
Panel
:
Nullcon
:
Startup panel – Make in India
-
Aseem Jakhar
Radha Shelat
Sumit D Chowdhury
Shomiron Das Gupta
Sastry Tumuluri
Shiju Sathyadevan
2015/02/06
Panel
:
Nullcon
:
Why CISO should promote more of such technical events - pros and cons, benefits etc
-
Burgess Cooper
Maya Viswanathan
Sanjay Burman
Sridharan Sankaran
Massoud Issa
Katie Moussouris
2015/02/06
Talk
:
Nullcon
:
Toliman, a Hadoop Pentesting Tool
-
Jitendra Chauhan
2015/02/06
Talk
:
Nullcon
:
Pentesting a website with million lines of Javascript
-
Lavakumar Kuppan
Ahamed Nafeez
2015/02/06
Talk
:
Nullcon
:
Hunting and Decrypting Ghost communications using Memory Forensics
-
Monnappa K A
2015/02/06
Talk
:
Nullcon
:
Hacking Tizen: The OS of Everything
-
Ajin Abraham
2015/02/06
Talk
:
Nullcon
:
Generic Executable Unpacking using Dynamic Binary Instrumentation
-
Shubham Bansal
2015/02/06
Talk
:
Nullcon
:
Drone Attacks: How I hijacked a drone
-
Rahul Sasi
2015/02/06
Panel
:
Nullcon
:
Defender’s Diary: Who’s attacking? What are my options?
-
Sastry Tumuluri
Amit Sharma
Venkatesh Subramaniam
Sachin Burman
Deepak Singla
2015/02/06
Talk
:
Nullcon
:
Building security and compliance into the software delivery process
-
Anubhav Bathla
Dinesh Pillai
S Chandrasekhar
Harish Pillay
2015/02/06
Talk
:
Nullcon
:
Building custom scans for real world enterprise network
-
Sanoop Thomas
2015/02/06
Talk
:
Nullcon
:
Attack and Defence in Radio and Communication Warfare
-
Akib Sayyed
2015/02/06
Talk
:
Nullcon
:
Anatomy of a credit card stealing POS malware
-
Amol Sarwate
2015/02/06
Talk
:
Nullcon
:
Analyzing Chrome crash reports at scale
-
Abhishek Arya
2015/02/06
Panel
:
Nullcon
:
2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys
-
Shomiron Das Gupta
K S Narayanan
Shantanu Ghosh
Subrahmanya Gupta Boda
Vishal Salvi
Benjamin Rivera