Toggle navigation
n|u
Upcoming Events
Archive
Events
Sessions
Chapter
Bhopal
Hyderabad
Delhi NCR
Kolkata
Ahmedabad
More
Engage
Join Mailing List
Become a Volunteer
Request a Session
Propose a Session
Pages
Projects
About Us
FAQ
Start a Chapter
Mailing List Charter
Hall of Fame
Office Bearers
Research Papers
Security
Sponsors
Supporting Events
API
Blog
Login / Register
About
Sessions Archive
Displaying event sessions
1051 - 1100
of
2562
in total
No filter set
Show sessions with reference (Presentation or Video)
Query
Filter
Date
Topic
Speaker
Resources
2018-11-24
Meet
Mumbai
Abusing MSSQL Part I
Chirag Savla
2018-11-24
Meet
Kolkata
Evolution of Vulnerability Management Practice
Arijit Das
2018-11-24
Meet
Mumbai
NewsByte
ashwani kumar
2018-11-24
Meet
Pune
Introduction to Reverse Engineering with radare2
Sudhakar Verma
2018-11-24
Meet
Mumbai
Dissecting Linux's ELF Fromat
Munawwar Hussain Shelia
2018-11-24
Meet
Pune
Common Crypto Failures : 2
Ajit
2018-11-24
Humla
Bangalore
Firmware Reverse Engineering and Exploitation
Vaibhav Bedi
2018-11-24
Humla
Bangalore
Stepping into IoT Security
Mr-IoT
2018-11-18
Meet
Ahmedabad
Finding W4ld0: How to get noticed by a hiring manager in cyber security
Darshan
2018-11-18
Meet
Ahmedabad
Introduction to reversing using IDA
Bhargav Gajera
2018-11-18
Meet
Ahmedabad
Social engineering case studies
Namrata Brahmkshatriya
2018-11-18
Meet
Ahmedabad
Master The Post exploitation with Metasploit Framework
Ravi Rajput
2018-11-17
Meet
Chennai
Static Analysis of NodeJS
Rajsek
2018-11-17
Meet
Chennai
Pentesting Email
vengatesh
2018-11-17
Meet
Chennai
String Malware
Bhaskar
2018-11-17
Meet
Bangalore
Return Oriented Programming ROP
Mihir Shah
2018-11-17
Meet
Bangalore
Secure Compilation Options
Bharath
2018-11-17
Meet
Bangalore
Vulnerable Implementation of OAuth 2
Neelkamal Singh Gaharwar
2018-11-17
Meet
Bangalore
OWASP Application Security Verification Standard Project (ASVS)
Vandana Verma
2018-11-17
Meet
Bangalore
Intro to Browser Security Features
Bharath
2018-11-03
Bachaav
Chandigarh
Secure Code Warrior Tournament
Jaap Karan Singh
2018-10-28
Meet
Ahmedabad
Introduction to Responder
Parth
2018-10-28
Meet
Ahmedabad
Basics of Metasploit Framework
Sanjay Makwana
2018-10-28
Meet
Ahmedabad
Basics of BlockChain
Sanjay Gondaliya
2018-10-27
Meet
Chennai
Reversing RAT
Bhaskar
2018-10-27
Meet
Chennai
Deception Technology
Sai Ganesh T
2018-10-27
Meet
Chennai
Newsbytes
ashok kumawat
2018-10-27
Humla
Bangalore
Wi-Fi Pen testing and beyond
Harsh Thakur
2018-10-27
Meet
Chennai
Securing S3 bucket, IAM, VPC
Chirag Jariwala
2018-10-27
Workshop
Pune
Basics of SQL Injection and techniques of exploitation
Urvesh Thakkar
2018-10-27
Workshop
Pune
Common Crypto Failures
Ajit
2018-10-27
Humla
Bangalore
Wi-Fi Pen testing and beyond
Mihir Shah
2018-10-26
Meet
Dubai
Techniques for Bypassing NAC - Case Study
Teck_K2
2018-10-26
Meet
Dubai
Intro to Format string attacks
Khalilov
2018-10-26
Meet
Dubai
Application Threat Modelling
Seid Yassin
2018-10-26
Meet
Dubai
Windows Kernel Driver Fuzzing
Michael
2018-10-21
Meet
Bhopal
Pentesting BlackMarket VM
Sahil Khan
2018-10-21
Meet
Bhopal
Newsbytes
Shreyasi
2018-10-20
Meet
Chandigarh
Getting Started with NMAP: Swiss Army Knife for Network Security Testing
Pankaj Mouriya
2018-10-13
Meet
Mumbai
Exploring types of аņtеииаs (Make your own Wi-Fi аņtеииаs)
H
2018-10-13
Meet
Delhi NCR
Phishing Techniques
Naveen
2018-10-13
Meet
Bangalore
Static Malware Analysis
Vikram
2018-10-13
Meet
Delhi NCR
Instrumenting iOS apps on Non Jailbroken Device
manish Rohilla
2018-10-13
Meet
Bangalore
Insecure Deserialization
Bittu Kumar
2018-10-13
Meet
Mumbai
PowerShell modules, bypass and securing
Rajan Christian
2018-10-13
Meet
Delhi NCR
BugBounty Methodology - The Rules and the How To
Avinash Jain
2018-10-13
Meet
Bangalore
Bodhi Vulnerable Application Demo
AMol NAik
2018-10-13
Meet
Delhi NCR
Introduction to Windows Kernel Exploitation
Himanshu Khokhar Jaat
« First
‹ Prev
…
18
19
20
21
22
23
24
25
26
…
Next ›
Last »