Date |
Topic |
Speaker |
Resources |
2024-08-24
|
Meet
Coimbatore, Tamil Nadu [Status - Seed]
Purple Team Tabletop Exercise
|
Vignesh C
|
|
2024-08-24
|
Meet
Hyderabad
SAST 1o1
|
Ravindra Penumarthi
|
|
2024-08-24
|
Meet
Kolkata
AWS Pentesting 101
|
Soummya Mukhopadhyay
|
|
2024-08-24
|
Meet
Coimbatore, Tamil Nadu [Status - Seed]
Digital Forensics & Incident Response Operations
|
Subash J
|
|
2024-08-24
|
Meet
Hyderabad
Anatomy of an attack vector & Firmware Security
|
Chanukya Potnuru
|
|
2024-08-24
|
Meet
Coimbatore, Tamil Nadu [Status - Seed]
Challenges in Enterprise DevSecOps & Increasing Security Testing Efficiency.
|
jeet
|
|
2024-08-24
|
Meet
Hyderabad
Newsbytes
|
Umer Uddin
|
|
2024-08-24
|
Meet
Hyderabad
Introduction to Null Hyderabad
|
SHAIK ARIF ALI
|
|
2024-08-24
|
Humla
Vijayawada
Part 1: Understanding the basics of Network Security
|
B Sai Kiran
|
|
2024-08-17
|
Workshop
SCIT Null Student
Networking basics, tool presentation and Q&A
|
Shailendra Singh Sachan
|
|
2024-08-17
|
Workshop
SCIT Null Student
TCP/IP Protocol and UDP Protocol
|
Nilotpal Roy
|
|
2024-08-08
|
Workshop
SCIT Null Student
Application of wireshark tool
|
Nishant Jain
|
|
2024-08-08
|
Workshop
SCIT Null Student
Workflow and usage of wireshark tool
|
Jaydeep Katariya
|
|
2024-08-05
|
Workshop
Ganpat University Student
MS. Shivani Ghodke
|
Shivani Ghodke
|
|
2024-08-03
|
Humla
Bangalore
Part 2: Practical Application and Secure Practices
|
Manoj Deshmukh
|
|
2024-08-03
|
Humla
Bangalore
Part 1: Understanding and Exploiting Kubernetes
|
Manoj Deshmukh
|
|
2024-07-27
|
Humla
Chennai
CTF
|
Chandrapal Badshah
|
|
2024-07-27
|
Humla
Chennai
Attacking ECS, lambda
|
Chandrapal Badshah
|
|
2024-07-27
|
Meet
Ahmedabad
ORM Leak
|
Jayvin Gohel
|
|
2024-07-27
|
Meet
Pune
Introduction to GRC
|
Souradip Goswami
|
|
2024-07-27
|
Meet
Ahmedabad
Introduction to Request Smuggling
|
Meet Sodha
|
|
2024-07-27
|
Meet
Pune
Popping Shell with VSCode Extensions
|
Saumyajeet Das
|
|
2024-07-27
|
Meet
Vijayawada
Beginners Guide to Network Security/Pentesting
|
B Sai Kiran
|
|
2024-07-27
|
Meet
Ahmedabad
Exploiting pending intents on android
|
Parthiv Dudhat
|
|
2024-07-27
|
Meet
Ahmedabad
News Bytes
|
Nanda Harprit
|
|
2024-07-27
|
Humla
Chennai
Attacking EC2,IAM,S3
|
Chandrapal Badshah
|
|
2024-07-27
|
Meet
Vijayawada
Recon for Beginners
|
Daniel Thotapalli
|
|
2024-07-20
|
Meet
Bangalore
Building Your Own Threat Intel Sink: A Modern Approach with Large Language Models
|
Pavan Karthick M
|
|
2024-07-20
|
Meet
Hyderabad
Preparation to the next meet
|
Pavan Mohan (pavanw3b)
|
|
2024-07-20
|
Meet
Hyderabad
A deep dive into XXE Exploitation
|
Mohd Aqeel Ahmed
|
|
2024-07-20
|
Meet
Bangalore
Inside Phishing Groups: Trust No One
|
Anshuman
|
|
2024-07-20
|
Meet
Hyderabad
Thick client Security
|
Venkata Raju Putra
|
|
2024-07-20
|
Meet
Bangalore
Blockchain and Smart Contract
|
Meera
|
|
2024-07-20
|
Meet
Hyderabad
Red Teaming LLM applications
|
Ankit Patel
|
|
2024-07-20
|
Meet
Hyderabad
Newsbyte
|
Mohammed Ibrahim Nasir
|
|
2024-07-20
|
Meet
Bangalore
Deepfakes Detection Techniques
|
pretti Rajesh
|
|
2024-07-20
|
Meet
Hyderabad
Introduction to Null Hyderabad
|
Ravindra Penumarthi
|
|
2024-07-13
|
Meet
Mumbai
SIEM Introduction and Architecture
|
Anand Chauhan
|
|
2024-07-13
|
Meet
Mumbai
Defensive Fortification
|
Manan Sheth
|
|
2024-07-13
|
Meet
Mumbai
Cybersecurity Reporting: Enhancing Communication Through Effective Report Writing
|
Abhishek Pandey
|
|
2024-07-06
|
Meet
Coimbatore, Tamil Nadu [Status - Seed]
The Anatomy of a Malware Campaign
|
Manivannan Arumugam
|
|
2024-07-06
|
Meet
Coimbatore, Tamil Nadu [Status - Seed]
Well, it's just an AWS Account ID
|
Chandrapal Badshah
|
|
2024-07-06
|
Meet
Coimbatore, Tamil Nadu [Status - Seed]
Unveiling Hidden Connections - MetaData Association Models in CyberCrime Investigations
|
Ashok Kumar Mohan
|
|
2024-07-06
|
Meet
Kolkata
LLM Security: Can Large Language Models be Hacked?
|
Arjun Ghoshal
|
|
2024-07-06
|
Meet
Kolkata
LLM Security: Can Large Language Models be Hacked?
|
Sneharghya
|
|
2024-07-06
|
Meet
Kolkata
Finding UART and Getting a Root Shell on a Linux Router
|
Debanjan Saha
|
|
2024-07-06
|
Meet
Kolkata
Introduction To SIGINT
|
Soummya Mukhopadhyay
|
|
2024-07-06
|
Meet
Kolkata
Breach & Attack Simulation
|
Mohammed Danish Amber
|
|
2024-06-29
|
Meet
Vijayawada
Security Risks of AI - LLM & AppSec Roadmap
|
Ramu Inturi
|
|
2024-06-29
|
Meet
Vijayawada
AI in Cyberspace
|
B. Aditya Bharathi
|
|
|