No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2019-05-04 Meet Pune GDALR: owning black-box ML models Nikhil
2019-05-04 Puliya Bangalore How to get started in InfoSec Chandrapal Badshah
2019-05-04 Humla Bangalore Humla Session on Red Teaming Active Directory Harsh Thakur
2019-04-28 Meet Ahmedabad Test your skills - CTF Aagam Shah
2019-04-28 Meet Ahmedabad Era of Race Condition Jaimin Gohel
2019-04-28 Meet Ahmedabad Cyber Threat Intelligence Namrata Brahmkshatriya
2019-04-28 Meet Ahmedabad Fuzzing Web Sockets Rohit Jadav
2019-04-27 Meet Bangalore ADHD( Active Directory for Hacker’s Delight) Harsh Thakur
2019-04-27 Meet Bangalore CSP Bypass Pawan Jaiswal
2019-04-27 Meet Bangalore Injection attacks in apps with NoSQL backends Riyaz Walikar
2019-04-27 Humla Ahmedabad Hands-on Windows Exploit Development Ravi Rajput
2019-04-27 Meet Chennai How Muthu Kumar found 5 CVEs in 50mins Chandru J
2019-04-27 Meet Bangalore OWASP Slot Vandana Verma
2019-04-27 Meet Chennai Github Security vinothpkumar
2019-04-27 Humla Mumbai RedTeam Tatics Pratik
2019-04-27 Meet Bangalore Fraud in digital advertising industry Aditya Varma
2019-04-27 Meet Bangalore OSINT mindset to protect your organization Chandrapal Badshah
2019-04-21 Meet Bhopal Basics of Reverse Engineering Saurabh Chaudhary
2019-04-21 Meet Bhopal Experience of internship in a security company Sahil Khan
2019-04-21 Meet Bhopal Exploiting Nullbyte VM Devansh Dubey
2019-04-21 Meet Bhopal Role of Cloud Computing in the growth of DevSecOps Culture Faiz
2019-04-20 Humla Bangalore Overflowing and Gaining a shell Mihir Shah
2019-04-13 Meet Chandigarh The Pentester Blueprint: A Guide to Becoming a Pentester Phillip Wylie
2019-04-13 Workshop Chandigarh Getting started with Blockchain Shubham Gupta
2019-04-13 Puliya Bangalore Hands on with AWS Riyaz Walikar
2019-04-06 Puliya Bangalore Log Analysis Using Command Line Abhinav Chourasia
2019-03-31 Meet Bhopal Getting started with Wireshark lakshyadubey
2019-03-31 Meet Bhopal Reverse Engineering using IDA Shreya Pohekar
2019-03-31 Meet Bhopal Social Engineering Divyansh Rathore
2019-03-31 Meet Bhopal A6 - Security Misconfiguration Megha sahu
2019-03-30 Meet Delhi NCR OWASP Top 10 Vulnerabilities aastha sahni
2019-03-30 Meet Delhi NCR OWASP Top 10 Vulnerabilities Samaan Fatima
2019-03-30 Meet Delhi NCR Conquering Git : The only Version Control System Pankaj Mouriya
2019-03-30 Meet Delhi NCR Introduction to Cloud Security Minali Arora
2019-03-30 Meet Delhi NCR Bringing Left Shift Security Change in India E-Community #BugBounty Avinash Jain
2019-03-30 Meet Mumbai RFID & NFC Hacking Paras Arora
2019-03-30 Meet Delhi NCR News Bytes Siddharth
2019-03-30 Humla Bangalore windows privilege escalation Kartik Lalan
2019-03-29 Meet Dubai Endpoint Malware analysis and response Santosh Neelam
2019-03-29 Meet Dubai Fuzzing and Triaging using AFL Khalilov
2019-03-29 Meet Dubai Road to tfp0 in iOS 12 by Prateek Gianchandani
2019-03-29 Meet Dubai AWS Security Assessment Pralhad Chaskar
2019-03-24 Meet Ahmedabad Malware Analysis SANDIP TIVARI
2019-03-24 Meet Ahmedabad IR & Forensic + Python Santhosh Baswa
2019-03-24 Meet Ahmedabad The Drupalgddon Exploit Dhaval Khairnar
2019-03-23 Workshop Ahmedabad Reverse Engineering Ninja Ravi Rajput
2019-03-17 Humla Chandigarh RFID & NFC Hacking Paras Arora
2019-03-16 Meet Chennai Break the ice - Hardware CTF Raghav
2019-03-16 Meet Chennai Exploiting provider components in Android app for Bug Bounties Shivasurya
2019-03-16 Meet Chennai XXE - Demo Sangi