null Global Committee elections are coming up! See the election repository for more information.

No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2018-01-13 Meet Mumbai Privilege Escalation using Powershell Avkash Kathiriya
2018-01-13 Meet Mumbai NewsBytes Malla Reddy
2018-01-13 Meet Mumbai Crowd-sourced Vulnerable Machine Exploitation - CTF Series Sudhendu K Lenka
2018-01-13 Humla Bangalore Binary Exploitation using Protostar upendra singh
2017-12-23 Meet Chennai OSINT Nibin
2017-12-23 Meet Chennai Compliance Overview & GRC Arun Venkatesan
2017-12-23 Meet Pune Debugging iOS Binaries with LLDB Sneha Rajguru
2017-12-23 Meet Pune Cracking Nordic-Bluetooth’s Read back protection. Arun magesh
2017-12-23 Meet Pune Attacking the malloc's heap on linux Sudhakar Verma
2017-12-23 Meet Pune News Bytes - '2017 Revisited' Aman Aryan
2017-12-22 Meet Dubai Introduction to Atomic Red Team Framework for defender Pralhad Chaskar
2017-12-22 Meet Dubai Windows Privilege Escalation Techniques Riyaz Walikar
2017-12-22 Meet Dubai Introduction to assembly x86 Avinash Kumar Thapa
2017-12-22 Meet Dubai Introduction to RFID security Abdul Rasheed
2017-12-17 Meet Bhopal Server Side template Injection[remote] narendra kumar
2017-12-17 Meet Bhopal ARM Exploitation[remote] jitendra kumar
2017-12-17 Meet Bhopal Getting started with bug bounty[remote] Shubham Gupta
2017-12-17 Meet Bhopal News Bytes HARSHVARDHAN PATHAK
2017-12-16 Meet Bangalore Rop chaining Abhinav Chourasia
2017-12-16 Meet Bangalore Local Priv Escalation on Linux Tushar Routray
2017-12-16 Meet Bangalore Annual Review Security Learning 2017 Akash Mahajan
2017-12-16 Workshop Mumbai ICS and Car Hacking Mini Village Arun Mane
2017-12-16 Meet Bangalore Server Side Template Injection narendra kumar
2017-12-09 Meet Mumbai Memory Forensics with Rekall Malla Reddy
2017-12-09 Meet Mumbai Privilege Escalation using Powershell Avkash Kathiriya
2017-12-09 Meet Mumbai Penetration Testing Using Metasploit Series - Part I Pratik
2017-12-09 Meet Mumbai Code execution on modern day applications Rahul Sasi
2017-12-09 Meet Mumbai NewsBytes Varun Vij
2017-12-09 Meet Mumbai Crowd-sourced Vulnerable Machine Exploitation - CTF Series Dhruv
2017-11-25 Meet Chennai Load balancing and Web Application Firewall jebaraj
2017-11-25 Meet Chennai DEP and ASLR bypass Dhayalan
2017-11-25 Meet Chennai Newsbytes abhay
2017-11-25 Meet Chennai Features of Wireshark Vasant
2017-11-25 Meet Chennai P2P Akash Raghav M
2017-11-25 Meet Delhi NCR Unveiling the values of Mobile Identities Harshal Arora
2017-11-25 Meet Delhi NCR GDPR for InfoSec Professionals Saumya Vishnoi
2017-11-25 Meet Delhi NCR Insecure Direct Object References: What, Why, and How? by Abhinav Mishra Abhinav Mishra
2017-11-25 Meet Delhi NCR OWASP Top 10 2017 Update Sandeep Singh
2017-11-25 Meet Delhi NCR InfoSec News Bytes null/OWASP Delhi Team
2017-11-19 Meet Bhopal Lets Hunt the target using OSINT Chandrapal Badshah
2017-11-19 Meet Bhopal An Introduction to SysInternal Riyaz Walikar
2017-11-18 Meet Bangalore Mathematical Modelling for NexG & The Algebra of Cryptography hakooraevil
2017-11-18 Humla Pune Attacking - REST API Siddharth Bezalwar
2017-11-18 Meet Bangalore Introduction to Cryptocurrency Ajit
2017-11-18 Workshop Mumbai Analysing Mhz to Ghz with SDR - IOT Workshop Arun Mane
2017-11-18 Meet Bangalore Firmware Analysis for Beginners Ramkumar Ganesan
2017-11-17 Meet Dubai An analysis of the Yalu jailbreak Prateek Gianchandani
2017-11-17 Meet Dubai Introduction to Deception Techniques harish
2017-11-17 Meet Dubai Social Engineering Payloads Bhdresh
2017-11-17 Meet Dubai SCADA 101 Ashok