No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2024-01-07 Humla Ahmedabad Android application instrumentation with FRIDA Part 1 Jaimin Gohel
2024-01-06 Meet Bhubaneswar A history on how the first malware/virus was born Sampad Rout
2024-01-06 Meet Delhi NCR Blockchain Security Basics Sanchay Singh
2024-01-06 Meet Bhubaneswar How to get into Cyber Security Tushar Routray
2024-01-06 Meet Delhi NCR Learnings from the 2023 cyber incidents Jalaj
2024-01-06 Meet Bhubaneswar Demystifying Scams Lagnajeet Mishra
2024-01-06 Meet Delhi NCR Bad USBs are Scary!!(make one with a Raspberry Pi Pico for ₹221) Nilesh Kumar
2023-12-24 Meet Ahmedabad Web Application Pentesting Case Studies Bhashit Pandya
2023-12-24 Meet Ahmedabad Android Native Binary Reverse Engineering Ravi Rajput
2023-12-24 Meet Ahmedabad Application Security Chirag Jariwala
2023-12-24 Meet Ahmedabad Secure Coding Practice Rushabh Shah
2023-12-24 Meet Ahmedabad News Bytes Sabarish Iyer
2023-12-23 Humla Ahmedabad Web Hacking उपदेश _RaviRamesh
2023-12-16 Meet Bangalore RE for windows PE files Ananthakrishnan
2023-12-16 Meet Chennai Basics of Race Conditions Ajay Suresh kumar
2023-12-16 Meet Hyderabad Preparation to the next meet Ravindra Penumarthi
2023-12-16 Meet Chennai AWS Serverless Pentesting & EBS - Defense Strategies Prakash
2023-12-16 Meet Chennai Securing Kubernetes and Misconfigurations PradeepKumar P
2023-12-16 Meet Bangalore Ways to get into Kubernetes Cluster Manoj Deshmukh
2023-12-16 Meet Hyderabad Shodan for Pentesters and bugbounty hunters Rajesh
2023-12-16 Meet Chennai Hacking Cloud Container Deepali
2023-12-16 Meet Hyderabad Secure Coding for Developers Sankita Mandal
2023-12-16 Meet Bangalore Defense in Docker Aditya Gupta
2023-12-16 Meet Hyderabad Security News Bytes K Karthik Goud
2023-12-16 Meet Chennai Broken Access Control SaravanaPriya
2023-12-16 Meet Hyderabad Introduction to Null Hyderabad Pavan Mohan
2023-12-16 Meet Bangalore Hacker's Perspective Abhishek Kumar
2023-12-09 Meet Delhi NCR Safeguarding Data: Decoding DPDP Act for Security Engineers Sukesh
2023-12-09 Meet Kolkata OWASP Top 10 Mukunda Tamly
2023-12-09 Meet Kolkata Beyond Boundaries: The Power of Zero Trust Networking Mohammed Danish Amber
2023-12-09 Meet Delhi NCR Part 2 - Explained: AI, LLMs and Associated Security Risks Sandeep Singh
2023-12-09 Meet Delhi NCR OWASP Top 10 Series | A10:2021 – Server Side Request Forgery (SSRF) Jalaj
2023-12-09 Meet Kolkata Digital Personal Data Protection Act S Ramakrishnan
2023-12-09 Meet Kolkata The Mysterious Paradigm of Fuzzing Rakesh Seal
2023-11-26 Meet Hyderabad Preparation to the next meet Ravindra Penumarthi
2023-11-26 Meet Hyderabad In my Opinion: Growing and Succeeding in Cyber Security Career Pavan Mohan
2023-11-26 Meet Hyderabad Unveiling Secrets: A Journey into Steganography CTF Challenges – Decode, Discover, Dominate Neeraj Singh
2023-11-26 Meet Hyderabad OWASP ML Top 10 M S Nishanth
2023-11-26 Meet Hyderabad Security News Bytes Sohan Daliyet
2023-11-26 Meet Hyderabad Introduction to Null Hyderabad Pavan Mohan
2023-11-25 Meet Dubai Dark Web Intelligence Angel Vladev
2023-11-25 Meet Dubai Malware Development and Initial Access Techniques in .net Suraj Khetani