No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2018-03-30 Meet Dubai Hacking Radio Frequencies Part 2 Abdul Rasheed
2018-03-30 Meet Dubai DevSecOps 101 Shaikh Raashid
2018-03-30 Meet Dubai Computer Forensics Methodology Mousa Alfalayleh
2018-03-25 Meet Chennai The key to Enumeration Nibin
2018-03-25 Meet Chennai XOR Encryption Anmol Maurya
2018-03-25 Meet Chennai Host based IDS Gopi Krishnan S
2018-03-25 Meet Bhopal Vagrant for Devops Deepanshu Gajbhiye
2018-03-25 Meet Chennai Pentesting Series - II - VoIP Pentesting vengatesh
2018-03-25 Meet Bhopal Beef Exploitation Framework Saurabh Chaudhary
2018-03-25 Meet Ahmedabad Can You See My Meterpreter!? Ravi Rajput
2018-03-25 Meet Bhopal News Bytes Yugansh Holani
2018-03-25 Meet Ahmedabad OWASP Top 10 - A1 Injection Explained Jaimin Gohel
2018-03-25 Meet Ahmedabad Red Teaming - A real-world attack simulation Bhashit Pandya
2018-03-25 Meet Ahmedabad Introduction to Wireshark Vishal
2018-03-24 Meet Kolkata Basics of Windows Privilege Escalation Souhardya Sardar
2018-03-24 Meet Kolkata Hack RFID with Live Demo Tanmoy Khanra
2018-03-24 Humla Bangalore Reverse Engineering and Malware Analysis : Part II Faiz
2018-03-24 Meet Delhi NCR Cloud Security Assessments Aakash Goel
2018-03-24 Meet Delhi NCR Docker fundamentals Divneet Singh
2018-03-24 Meet Kolkata Get Your Response Matured, Apply Intelligence. Amiya Dutta
2018-03-24 Meet Delhi NCR Pentesting REST APIs Gaurang Bhatnagar
2018-03-24 Meet Delhi NCR News Bytes Ankit
2018-03-24 Meet Kolkata Acoustic DoS on HDDs Manish Keshri
2018-03-24 Humla Bangalore Reverse Engineering and Malware Analysis :Part I Sunil Kumar
2018-03-10 Meet Bangalore XML External Entities(XXE) Kevin Paul
2018-03-10 Meet Mumbai Penetration Testing Thick Client Application like a Pro Nitesh Malviya
2018-03-10 Meet Bangalore Second Order SQL Injection Riyaz Walikar
2018-03-10 Meet Mumbai Active Directory as a C2 Ankit Joshi
2018-03-10 Meet Bangalore Understanding WMI Bharath
2018-03-10 Meet Mumbai Infosec Compliance Implementation challenges - Part 3 Manasdeep
2018-03-10 Meet Mumbai Penetration Testing using Metaspolit - Part 2 Pratik
2018-03-10 Meet Mumbai NewsBytes Narendra Choyal
2018-03-10 Meet Bangalore Shell on Windows (Bind & Reverse) MUTHUMOHANPRASATH
2018-02-24 Meet Delhi NCR AppSec Testing beyond PenTest by Bhushan Gupta Vaibhav Gupta
2018-02-24 Meet Pune Injection Flaws DANISH INAMDAR
2018-02-24 Meet Pune OSCP 101 Aman Aryan
2018-02-24 Meet Delhi NCR WiFi Security - Beyond Password Cracking mohit
2018-02-24 Meet Delhi NCR News Bytes null/OWASP Delhi Team
2018-02-24 Meet Pune Setting up Hardware pen testing lab for cheap! Arun magesh
2018-02-24 Meet Pune Linux privilege escalation 101 Rashid feroz
2018-02-24 Humla Mumbai Crowd sourced boot-to-root challenge Sudhendu K Lenka
2018-02-23 Meet Dubai Network Analysis using Pcap file Praveen Pandyan
2018-02-23 Meet Dubai Incident Analysis using Splunk Santosh Neelam
2018-02-23 Meet Dubai Code Instrumentation using Frida Abhijeet
2018-02-23 Meet Dubai Password Cracking ++ Antu Prabha
2018-02-23 Meet Dubai Adversary Emulation using CALDERA Pralhad Chaskar
2018-02-18 Meet Ahmedabad How to start your career in Hacking and Security Jaimin Gohel
2018-02-18 Meet Ahmedabad Hacking Mobile apps Bhashit Pandya
2018-02-18 Meet Ahmedabad Walnut Attack Namrata Brahmkshatriya
2018-02-18 Meet Ahmedabad News Bytes Vishal