No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2016-07-16 Meet Bangalore Android Security Internals Kartik Lalan
2016-07-16 Meet Bangalore Beginners Talk on Physical Securty Manasdeep
2016-07-10 Meet Bhopal Setting of Enterprise Environment for Pentesting Through Virtualization Vineet Chhabra
2016-07-10 Meet Bhopal IOS Pentesting Prateek Gianchandani
2016-07-10 Meet Bhopal Burp Suite prashant
2016-07-09 Meet Mumbai Ransomware Aditya Jamkhande
2016-07-09 Meet Mumbai NewsByte RAHUL TULASKAR
2016-07-09 Meet Pune Anti-Virus Bypass using Powershell Pushkar Pashupat
2016-07-09 Meet Mumbai Intro to x86 and Reverse Engineering Amaan Cheval
2016-07-09 Meet Pune Incident Handling & Responses cephas
2016-07-09 Meet Mumbai Business Continuity Planning & Cloud Milind P Wairkar
2016-07-09 Meet Pune Security News Bytes Abbas
2016-06-25 Meet Chennai Microsoft Threat Modelling Tool 2016 - Overview Kannan
2016-06-25 Meet Chennai Enumerating Subdomains Aadarsh
2016-06-25 Meet Chennai DDOS - The Menace Aravind Anbazhagan
2016-06-24 Meet Dubai Defending an Enterprise Active Directory Environment V B
2016-06-24 Meet Dubai Telecom Basics Must for Security Akib Sayyed
2016-06-24 Meet Dubai Basics of NSE (Nmap Scripting Engine) Abhijeet
2016-06-24 Meet Dubai SSH Tunneling Shaikh Raashid
2016-06-18 Meet Delhi NCR Meet the DIVA - Part 1 Ankit
2016-06-18 Meet Delhi NCR Quick & Dirty Forensic Techniques Kamal
2016-06-18 Meet Delhi NCR Mapping your digital footprint Aakash Goel
2016-06-18 Meet Delhi NCR Infosec News Bytes Mohammed Zuber
2016-06-11 Meet Bangalore Metasploit basics and db usage Arun.S
2016-06-11 Meet Bangalore Windows Privilege Escalation Techniques Riyaz Walikar
2016-06-11 Meet Bangalore An introduction to Single Sign On [with Demo] Lakshmikiran
2016-06-11 Meet Bangalore How I pwned you online Nutan Kumar Panda
2016-06-11 Meet Bangalore Case studies of recent network attacks Devanshu Agarwal
2016-06-11 Meet Mumbai Fuzzing | Part I Nitesh Malviya
2016-06-11 Meet Mumbai Malware Command and Control: Evasion Tactics and Techniques Dhawal Sudhir shah
2016-06-11 Meet Bangalore SQL Injection to shell Krithika Mutuguppe
2016-06-11 Meet Pune Windows Kernel Exploitation 7 Ashfaq Ansari
2016-06-11 Meet Mumbai Malware Command and Control: Evasion Tactics and Techniques Avkash K
2016-06-11 Meet Bangalore Targeted Attacks Ashwin Vamshi
2016-06-11 Meet Bangalore Targeted Attacks Rahul Choudhary
2016-06-11 Meet Pune Building a Tor router with Raspberry Pi aditya
2016-06-11 Meet Mumbai Methodology of Bug Bounty Dhiraj Mishra
2016-06-11 Meet Pune Security News Bytes Anant Mudgal
2016-06-11 Meet Bangalore Android Security - Part 3 jitendra kumar
2016-06-05 Meet Bhopal Secure Socket Layer (SSL) Communication & Certificates Aditya Deshmukh
2016-06-05 Meet Bhopal iptables - Linux Firewall Hemraj Singh
2016-05-22 Meet Bhopal ANDROID SECURITY AND HACKING Piyush Upadhyay
2016-05-22 Meet Bhopal Operating system Concepts Nitish Jadia
2016-05-22 Meet Bhopal Cyber Defamation Case Study YOgesh Pandit
2016-05-22 Meet Bhopal Burp Suite Utkarsh Bhargava
2016-05-21 Meet Delhi NCR A Primer on Bitcoins & Digital Currencies Ankur Vats
2016-05-21 Meet Delhi NCR OSINT - Testcases for Pentesters Shubham Mittal
2016-05-21 Meet Delhi NCR InfoSec News Bytes Arpit
2016-05-21 Meet Delhi NCR Introduction & Chapter Updates Sandeep Singh
2016-05-14 Puliya Bangalore Working with Virtual box for hands on sessions Riyaz Walikar