No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2016-10-01 Public Puliya Bangalore Getting started with the Cloud (Or Rather Public Infrastructure As A Service Cloud) Akash Mahajan
2016-09-24 Meet Chennai Intro to SIEM Raghavendran Gopal
2016-09-24 Meet Chennai Security Leaks in SMB vengatesh
2016-09-24 Meet Chennai Malicious Adversaries Vs ML Naresh
2016-09-24 Meet Chennai DLL Hijacking Bhaskar
2016-09-24 Meet Kolkata Hacking with Raspberry Pi Koustav Chanda
2016-09-24 Meet Delhi NCR Pwning Windows Mobile Applications Ankit Giri
2016-09-24 Meet Mumbai Middleware Dissection Kaustubh Padwad
2016-09-24 Meet Kolkata Android Exploitation Animesh Roy
2016-09-24 Meet Delhi NCR Machine Learning in Information Security - The Relationship Mohammed Zuber
2016-09-24 Meet Mumbai NewsBytes pratik Mahale
2016-09-24 Meet Delhi NCR Escape Plan - Evading Web Application Firewalls (WAF) for XSS Attacks Divya
2016-09-24 Meet Mumbai Abusing TARGET Sanoop Thomas
2016-09-24 Meet Delhi NCR Infosec News Bytes Arpit
2016-09-24 Meet Kolkata 'What' and 'How' of a CTF Govind Singh
2016-09-24 Meet Mumbai Linux Kernel Internals & Memory Management Ganesh Naik
2016-09-23 Meet Dubai Panel Discussion & Live Q&A - Bug Bounties Rupam Bhattacharya
2016-09-23 Meet Dubai Panel Discussion & Live Q&A - Bug Bounties TAS
2016-09-23 Meet Dubai Exploiting Software Update Vulnerabilities V B
2016-09-23 Meet Dubai Exploiting a Domain using Rogue Kerberos Server TAS
2016-09-23 Meet Dubai Ransomware Preface Arjun PN
2016-09-17 Humla Mumbai Drozer for Android Application Security Vivek Mahajan
2016-09-17 Meet Pune Secure Coding in C# Siddharth Bezalwar
2016-09-17 Meet Pune Android Application Exploitation Sumedh Bhalerao
2016-09-17 Humla Mumbai Drozer for Android Application Security Vivek Mahajan
2016-09-17 Meet Pune Security News Bytes swapnil shukla
2016-09-17 Meet Pune Pwning Computers Using USB HID Devices Rashid feroz
2016-09-17 Workshop Bangalore Python School of Security - Class 2 Bharath
2016-09-17 Workshop Bangalore Python School of Security - Class 2 Abhinav Chourasia
2016-09-11 Meet Bhopal What it takes to defend an application Anant Shrivastava
2016-09-11 Meet Bhopal Admissibility of electronic evidence in India YOgesh Pandit
2016-09-11 Meet Bhopal News Bytes Jaskaran Singh Narula
2016-09-10 Meet Bangalore CTF(Capture The Flag) Approach Chandrakant
2016-09-10 Meet Bangalore Using Hydra Sankalp Bastakoti
2016-09-10 Meet Bangalore IOT Exploitation - II Abhinav Chourasia
2016-09-10 Meet Bangalore Bypassing Corporate Security Aamer Shah
2016-09-10 Meet Bangalore iOS App Runtine Analysis Swaroop Yermalkar
2016-08-28 Workshop Delhi NCR Bug Bounty Hunting Abhinav Mishra
2016-08-27 Humla Mumbai Approaching and cracking a CTF - Part 2 Vivek Mahajan
2016-08-27 Meet Delhi NCR Scratching your Brain into Darkweb Arpit
2016-08-27 Meet Kolkata Intimacy with MSF - Metasploit Framework Animesh Roy
2016-08-27 Meet Kolkata Unleashing OWASP through Buffer Overflow / Reverse Engineering Prasenjit Kanti Paul
2016-08-27 Meet Delhi NCR Windows Privilege Escalation Techniques Dhruv
2016-08-27 Meet Delhi NCR OWASP Project Talk Vaibhav Gupta
2016-08-27 Meet Kolkata Scanning in Deep - Exploring the Nmap Chandresh Gupta
2016-08-27 Meet Delhi NCR Infosec News Bytes Ankit
2016-08-27 Humla Mumbai Approaching and cracking a CTF - Part 1 Mayank
2016-08-26 Meet Dubai Content Security Policy Rupam Bhattacharya
2016-08-26 Meet Dubai Infernal Wirless Suite Demo Khalilov
2016-08-26 Meet Dubai Bypassing AV & Application Whitelisting Bhdresh