No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2019-11-17 Workshop Chandigarh Essentials of Malware Analysis Preet kamal
2019-11-17 Meet Bhopal CVE in 5 mins Verneet Singh
2019-11-17 Meet Ahmedabad Source Code Analysis - A deep dive Prasad Salvi
2019-11-17 Meet Ahmedabad Stay Relevant in Cyber Security Rajesh hariharan
2019-11-17 Meet Ahmedabad Introduction to Null Community Bhashit Pandya
2019-11-16 Workshop Bangalore Web Security using OWASP Top 10 Philippe De Ryck
2019-11-16 Workshop Bangalore Web Security using OWASP Top 10 Philippe De Ryck
2019-11-16 Humla Bangalore Windows shellcoding Mihir Shah
2019-11-10 Meet Bhopal Hands-on - scanning, exploiting and defending intrusion detection system Himanshu Shrivastava
2019-11-09 Meet Delhi NCR Cyber Espionage - James Bond style vaibhav sharma
2019-11-09 Meet Delhi NCR Dig Deep DevOps Priyam Singh
2019-11-09 Meet Pune Intoduction to the BDD Security framework. Jovin Lobo
2019-11-09 Meet Mumbai Infiltrating Corporate Networks - Part 1 Sanket Solanki
2019-11-09 Meet Delhi NCR Hacking Web using images Chirag Sukhala
2019-11-09 Humla Bangalore Windows Shellcoding Mihir Shah
2019-11-09 Meet Pune Attacking AWS Cloud Services Sayanta Sen
2019-11-09 Meet Delhi NCR News Bytes sana firdaus
2019-11-09 Meet Mumbai WHITE BOX PENTESTING AND EXPLOIT DEVELOPMENT (part 1) Raunak parmar
2019-11-09 Meet Pune Destroying SDR "Script kiddies" Appar Thusoo
2019-11-09 Humla Ahmedabad EXPLOIT DEVELOPMENT 101 Malav Vyas
2019-11-09 Humla Bangalore Primer to Assembly Mihir Shah
2019-11-08 Meet Dubai Hunting PBX for Vulnerabilities Himanshu Mehta
2019-11-08 Meet Dubai JWT Security Seid Yassin
2019-11-08 Meet Dubai Browser Exploitation Dhiraj Mishra
2019-10-20 Meet Ahmedabad Docker and Security Tilak Patel
2019-10-20 Meet Ahmedabad IOT and Security Malav Vyas
2019-10-20 Meet Bhopal Automating security workflows with Ansible Devansh Dubey
2019-10-20 Meet Bhopal Server Hardening Methodologies Shreya Pohekar
2019-10-20 Meet Ahmedabad Hiding a malware into legitimate binary. Ravi Rajput
2019-10-20 Meet Chandigarh Android Application Pentesting Nikhil Mahajan
2019-10-20 Meet Chandigarh News Bytes Puneet Kumar
2019-10-20 Meet Ahmedabad War Walking Nirav Goti
2019-10-20 Meet Bhopal Introduction to owasp juice shop Sheeraz Ali
2019-10-19 Meet Bangalore Api Security Top10 Manjunatha
2019-10-19 Meet Bangalore Network Recon Techniques Swadhin Kumar
2019-10-19 Meet Bangalore Recon on Bash Imran Parray
2019-10-19 Meet Bangalore AD Security Iliyas Ahamed
2019-10-19 Puliya Ahmedabad Programming for Hackers Bhashit Pandya
2019-10-19 Meet Bangalore Primer to Shellcoding Mihir Shah
2019-10-12 Meet Mumbai Attack (Si|Emulation) Chirag Savla
2019-10-12 Meet Mumbai Fileless Persistence in Active Directory Sanket Solanki
2019-10-12 Meet Mumbai Deserialization Raunak parmar
2019-10-12 Humla Bangalore Windows and Linux Priv Esc kishan choudhary
2019-09-29 Humla Ahmedabad Thundering clouds - Hands-on Cloud Security Workshop Jaimin Gohel
2019-09-28 Meet Chennai Challenges in IT Infrastructure sathish kumar
2019-09-28 Meet Chennai Intro to FB bug bounty Rajsek
2019-09-28 Meet Chennai Setting up pentesters lab using Vagrant Joshua
2019-09-28 Meet Chennai Psychological Aspect of Social Engineering Yuvaraj Naresh
2019-09-28 Meet Delhi NCR The significance of mobile exploit applications Ankit Giri