No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2018-11-24 Meet Mumbai Abusing MSSQL Part I Chirag Savla
2018-11-24 Meet Kolkata Evolution of Vulnerability Management Practice Arijit Das
2018-11-24 Meet Mumbai NewsByte ashwani kumar
2018-11-24 Meet Pune Introduction to Reverse Engineering with radare2 Sudhakar Verma
2018-11-24 Meet Mumbai Dissecting Linux's ELF Fromat Munawwar Hussain Shelia
2018-11-24 Meet Pune Common Crypto Failures : 2 Ajit
2018-11-24 Humla Bangalore Firmware Reverse Engineering and Exploitation Vaibhav Bedi
2018-11-24 Humla Bangalore Stepping into IoT Security Mr-IoT
2018-11-18 Meet Ahmedabad Finding W4ld0: How to get noticed by a hiring manager in cyber security Darshan
2018-11-18 Meet Ahmedabad Introduction to reversing using IDA Bhargav Gajera
2018-11-18 Meet Ahmedabad Social engineering case studies Namrata Brahmkshatriya
2018-11-18 Meet Ahmedabad Master The Post exploitation with Metasploit Framework Ravi Rajput
2018-11-17 Meet Chennai Static Analysis of NodeJS Rajsek
2018-11-17 Meet Chennai Pentesting Email vengatesh
2018-11-17 Meet Chennai String Malware Bhaskar
2018-11-17 Meet Bangalore Return Oriented Programming ROP Mihir Shah
2018-11-17 Meet Bangalore Secure Compilation Options Bharath
2018-11-17 Meet Bangalore Vulnerable Implementation of OAuth 2 Neelkamal Singh Gaharwar
2018-11-17 Meet Bangalore OWASP Application Security Verification Standard Project (ASVS) Vandana Verma
2018-11-17 Meet Bangalore Intro to Browser Security Features Bharath
2018-11-03 Bachaav Chandigarh Secure Code Warrior Tournament Jaap Karan Singh
2018-10-28 Meet Ahmedabad Introduction to Responder Parth
2018-10-28 Meet Ahmedabad Basics of Metasploit Framework Sanjay Makwana
2018-10-28 Meet Ahmedabad Basics of BlockChain Sanjay Gondaliya
2018-10-27 Meet Chennai Reversing RAT Bhaskar
2018-10-27 Meet Chennai Deception Technology Sai Ganesh T
2018-10-27 Meet Chennai Newsbytes ashok kumawat
2018-10-27 Humla Bangalore Wi-Fi Pen testing and beyond Harsh Thakur
2018-10-27 Meet Chennai Securing S3 bucket, IAM, VPC Chirag Jariwala
2018-10-27 Workshop Pune Basics of SQL Injection and techniques of exploitation Urvesh Thakkar
2018-10-27 Workshop Pune Common Crypto Failures Ajit
2018-10-27 Humla Bangalore Wi-Fi Pen testing and beyond Mihir Shah
2018-10-26 Meet Dubai Techniques for Bypassing NAC - Case Study Teck_K2
2018-10-26 Meet Dubai Intro to Format string attacks Khalilov
2018-10-26 Meet Dubai Application Threat Modelling Seid Yassin
2018-10-26 Meet Dubai Windows Kernel Driver Fuzzing Michael
2018-10-21 Meet Bhopal Pentesting BlackMarket VM Sahil Khan
2018-10-21 Meet Bhopal Newsbytes Shreyasi
2018-10-20 Meet Chandigarh Getting Started with NMAP: Swiss Army Knife for Network Security Testing Pankaj Mouriya
2018-10-13 Meet Mumbai Exploring types of аņtеииаs (Make your own Wi-Fi аņtеииаs) H
2018-10-13 Meet Delhi NCR Phishing Techniques Naveen
2018-10-13 Meet Bangalore Static Malware Analysis Vikram
2018-10-13 Meet Delhi NCR Instrumenting iOS apps on Non Jailbroken Device manish Rohilla
2018-10-13 Meet Bangalore Insecure Deserialization Bittu Kumar
2018-10-13 Meet Mumbai PowerShell modules, bypass and securing Rajan Christian
2018-10-13 Meet Delhi NCR BugBounty Methodology - The Rules and the How To Avinash Jain
2018-10-13 Meet Bangalore Bodhi Vulnerable Application Demo AMol NAik
2018-10-13 Meet Delhi NCR Introduction to Windows Kernel Exploitation Himanshu Khokhar Jaat