No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2016-08-26 Meet Dubai Pixie Dust Attack Sumit Shrivastava
2016-08-20 Meet Chennai SCADA Pentesting Bhaskar
2016-08-20 Meet Chennai Spam Email Filtering Srihari
2016-08-20 Meet Chennai Onion Routing on Cloud Akash Thakur
2016-08-20 Meet Chennai Automated Pentesting Arjun Basnet
2016-08-14 Meet Bhopal Using BurpSuite Intruder for Web Application Security Testing Akash Mahajan
2016-08-14 Meet Bhopal Browser Automation Using Selenium and Python Rahul
2016-08-14 Meet Bhopal Introduction to Burp Suite prashant
2016-08-13 Meet Bangalore IOT Exploitation Bharath
2016-08-13 Meet Bangalore Security of Healthcare systems Anirudh duggal
2016-08-13 Meet Bangalore Buffer Overflow detection with Immunity Pratik Shah
2016-08-13 Meet Mumbai NTFS Forensics D.M.Reddy
2016-08-13 Meet Mumbai Formula Injection Chirag Savla
2016-08-13 Meet Mumbai NewsByte Aishwarya Iyer
2016-08-13 Meet Bangalore Encryption in Security. Kartik Lalan
2016-08-13 Meet Bangalore Panel Talk on Information Security Jagan Mohan
2016-08-13 Meet Pune ICS Pentesting Part 1 : Introduction and Attack's on PLC Arun Mane
2016-08-13 Meet Mumbai Android Reverse Engineering Samrat Das
2016-08-13 Meet Pune Everything You Need To Know About JTAG ! Mohammed Pota
2016-08-13 Meet Bangalore An Introdcution to Trusted Platform Module Nayna
2016-08-13 Meet Pune Device Tree Binding Anand Moon
2016-08-13 Meet Mumbai Stack Overflow Bhaskar K. Divecha
2016-08-13 Meet Pune Security News Bytes Aniket Rastogi
2016-08-13 Meet Bangalore Exploiting a vulnerability to gain a shell aditya
2016-08-06 Humla Chennai ANDROID APP PENETRATION TESTING Aadarsh
2016-08-06 Workshop Bangalore Python School of Security - Class 1 Bharath
2016-08-06 Workshop Bangalore Python School of Security - Class 1 Abhinav Chourasia
2016-07-30 Meet Chennai Newsbytes Rishabh Gupta
2016-07-30 Meet Chennai Burp Suite - Various Modules Akash Thakur
2016-07-30 Meet Chennai Amazon AWS Penetration testing - Methodology vengatesh
2016-07-30 Meet Chennai Exploiting Vulnerability in a Victim machine Ashok
2016-07-30 Meet Delhi NCR RF Poking Prashant Shukla
2016-07-30 Meet Delhi NCR Introduction to OAuth2 and its Security Considerations Vaibhav Gupta
2016-07-30 Meet Delhi NCR OWASP Project Talk Sandeep Singh
2016-07-30 Meet Delhi NCR Infosec News Bytes Arpit
2016-07-23 Humla Mumbai OWASP TOP 10 Attacks and Vulnerabilities Part 2 sagar parmar
2016-07-23 Humla Mumbai OWASP TOP 10 Attacks and Vulnerabilities Part 1 sagar parmar
2016-07-22 Meet Dubai Pixel Dust Attack Sumit Shrivastava
2016-07-22 Meet Dubai Threat Hunting in Windows 2 Gibin John
2016-07-22 Meet Dubai Threat Hunting in Windows 1 Anif
2016-07-22 Meet Dubai WAF Bypass Avinash Kumar Thapa
2016-07-22 Meet Dubai IoT Attack Surfaces Prateek Gianchandani
2016-07-22 Meet Dubai Basics of PCI Juned Mirza
2016-07-16 Meet Bangalore Introduction to Web Application Firewalls. Chandrapal Badshah
2016-07-16 Meet Bangalore Twitter Bug Hunt Gabbar
2016-07-16 Meet Bangalore Linux Privilege Escalation techniques Jagan Mohan
2016-07-16 Meet Bangalore Platform Security using intel SGX Pradyumna Padhan
2016-07-16 Meet Bangalore Security Intelligence Raghavendran Gopal
2016-07-16 Meet Bangalore Node JS Security Madhu Akula
2016-07-16 Meet Bangalore Automated Information Gathering Using Recon-ng narendra kumar