No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2024-07-20 Meet Bangalore Building your own threat intel sink Pavan Karthick M
2024-06-23 Meet Kalyan, Maharashtra Introduction to Null Kalyan Rashideo Benvansh
2024-06-15 Meet Bangalore Uncovering GraphQL: Identifying vulnerabilities and mastering penetration testing Maulik Lakhani
2024-06-15 Meet Pune Threat Intelligence and APTs in the Real World Aadesh Shinde
2024-06-15 Meet Pune Introduction to eBPF for Beginners Gaurav Kamathe
2024-06-15 Meet Bangalore Pentesters Approach to AWS IAM Divyanshu shukla
2024-06-15 Meet Bangalore Opsec Safe Red Team Infrastructure Rishi Kanwar
2024-06-15 Meet Bangalore SoC what lies ahead! Aarya Jain
2024-06-01 Humla Bangalore CTF Chandrapal Badshah
2024-06-01 Humla Bangalore Second Session Chandrapal Badshah
2024-06-01 Humla Bangalore First Session Chandrapal Badshah
2024-05-25 Meet Bangalore Microprobing with ICEBite Karthik Ekanathan
2024-05-25 Meet Hyderabad Preparation to the next meet Pavan Mohan (pavanw3b)
2024-05-25 Meet Bangalore Practical Approach to OWASP Machine Learning Top 10 Rallapalli Nagarjun
2024-05-25 Meet Ahmedabad Fuzzing using browser bruter Jafar Pathan
2024-05-25 Meet Hyderabad The Anatomy of a Breach : Lessons learnt from common mistakes Sarwar Jahan M
2024-05-25 Meet Ahmedabad Digital Privacy journey of india Rupesh Mittal
2024-05-25 Meet Bangalore AD Pentesting Surya Dev Singh
2024-05-25 Meet Hyderabad Gen AI Pradeep Kumar Shyamanthula
2024-05-25 Meet Bangalore Zeroclicks Everywhere Mr-IoT
2024-05-25 Meet Hyderabad Uncovering Vulnerabilities - Exploring Application Attack Surfaces MOHAMMAD SAQLAIN
2024-05-25 Meet Ahmedabad The art of interception: Sail across the ethical and legal boundaries of surveilance in the digital age Shivani Patel
2024-05-25 Meet Hyderabad Newsbyte Ikram H
2024-05-25 Meet Hyderabad Introduction to Null Hyderabad SHAIK ARIF ALI
2024-05-25 Meet Bangalore IoS Pentesting abida shariff
2024-05-18 Meet Dubai Feedback and Closing Tamaghna Basu
2024-05-18 Meet Dubai Stealthy Evasion: Bypassing Windows Defender / EDR SHAMEEM P K
2024-05-18 Meet Dubai Understanding the Threat Landscape of the Middle East Region Harleen Kaur
2024-05-18 Meet Dubai Networking Break Abdul Rasheed
2024-05-18 Meet Dubai Hardware Arsenal Dhiraj Ambigapathi
2024-05-18 Meet Dubai Code, Creativity, and Caution: A Security Journey with Generative AI Harleen Kaur
2024-05-18 Meet Dubai Introductions TAS
2024-05-18 Humla Hyderabad Humla: Manual exploitation of SQL Injection Pavan Mohan (pavanw3b)
2024-05-11 Humla Bangalore From Vulnerability to Security: Identifying, Exploiting, and Mitigating Risks in Software Applications Rohit Kumar
2024-05-11 Meet Mumbai Exploring the Depths of Web Vulnerabilities: Protoype Pollution and ReDoS Pavitra Jha
2024-05-11 Meet Chennai Demystifying Compliance vignesh
2024-05-11 Meet Chennai Android 101 for PenTesting Arunraj Radhakrishnan
2024-05-11 Meet Mumbai The Magic That is TLS Sumir Broota
2024-05-11 Meet Chennai LLM Security 101 Anirudh srinivas
2024-05-11 Humla Bangalore Accelerating Source Code Security: Essentials, Technologies, and Best Practices Rohit Kumar
2024-05-04 Meet Pune Flash Talks a
2024-05-04 Meet Pune Guardians of the Cloud: Unleashing the Power of Threat Detection in AWS Shashank Dubey
2024-05-04 Meet Pune Vulnerability Management for the Cloud Place Holder
2024-05-04 Meet Pune Runtime Container Security Frederick Fernando
2024-05-04 Meet Pune Shut The Backdoor: Protecting your workloads against supply chain shoxz Dev Dua
2024-04-27 Meet Vijayawada Safeguarding the Cloud-ed Sky: A Beginner's Guide to Cloud Security geet Hirawat
2024-04-27 Meet Vijayawada Exploring Docker Pentesting Fundamentals - 2 Approaches MUTHUMOHANPRASATH
2024-04-27 Meet Bangalore Firmware diffing to Nday exploits IamAlch3mist
2024-04-27 Meet Hyderabad Preparation to the next meet Pavan Mohan (pavanw3b)
2024-04-27 Meet Bangalore Threat Intel Ashwin Maganahalli