null Global Committee elections are coming up! See the election repository for more information.

No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2016-10-15 Meet Pune HTTP/2 : A Security Perspective Sunil Kumar
2016-10-15 Meet Pune Car Hacking (Risks to digitized vehicles) Hiren Bhensdadia
2016-10-15 Meet Pune Security News Bytes Siddharth Bezalwar
2016-10-15 Humla Mumbai Open Source Intelligence Shubham Mittal
2016-10-08 Meet Mumbai PHP Security Siddharth Mahajan
2016-10-08 Meet Mumbai Lesser Known Web Attacks Kaushal Parikh
2016-10-08 Meet Mumbai News Bytes Mugdha
2016-10-08 Meet Mumbai VPN Technologies - How secure are SSL and IPsec VPN encryptions Uday Bhatia
2016-10-08 Meet Mumbai Veils Framework Sukesh Shetty
2016-10-08 Public Puliya Bangalore Getting Started with Windows Security Kaushal Banninthaya
2016-10-08 Meet Mumbai Security Certifications Manasdeep
2016-10-08 Meet Mumbai Trends in Payment Industry – Host Computing Environment & Secure Element Raakhi Radhakrishnan
2016-10-08 Public Puliya Bangalore Getting Started with Android Security Kartik Lalan
2016-10-01 Public Puliya Bangalore Getting started with the Cloud (Or Rather Public Infrastructure As A Service Cloud) Akash Mahajan
2016-09-24 Meet Chennai Intro to SIEM Raghavendran Gopal
2016-09-24 Meet Chennai Security Leaks in SMB vengatesh
2016-09-24 Meet Chennai Malicious Adversaries Vs ML Naresh
2016-09-24 Meet Chennai DLL Hijacking Bhaskar
2016-09-24 Meet Kolkata Hacking with Raspberry Pi Koustav Chanda
2016-09-24 Meet Delhi NCR Pwning Windows Mobile Applications Ankit Giri
2016-09-24 Meet Mumbai Middleware Dissection Kaustubh Padwad
2016-09-24 Meet Kolkata Android Exploitation Animesh Roy
2016-09-24 Meet Delhi NCR Machine Learning in Information Security - The Relationship Mohammed Zuber
2016-09-24 Meet Mumbai NewsBytes pratik Mahale
2016-09-24 Meet Delhi NCR Escape Plan - Evading Web Application Firewalls (WAF) for XSS Attacks Divya
2016-09-24 Meet Mumbai Abusing TARGET Sanoop Thomas
2016-09-24 Meet Delhi NCR Infosec News Bytes Arpit
2016-09-24 Meet Kolkata 'What' and 'How' of a CTF Govind Singh
2016-09-24 Meet Mumbai Linux Kernel Internals & Memory Management Ganesh Naik
2016-09-23 Meet Dubai Panel Discussion & Live Q&A - Bug Bounties Rupam Bhattacharya
2016-09-23 Meet Dubai Panel Discussion & Live Q&A - Bug Bounties TAS
2016-09-23 Meet Dubai Exploiting Software Update Vulnerabilities V B
2016-09-23 Meet Dubai Exploiting a Domain using Rogue Kerberos Server TAS
2016-09-23 Meet Dubai Ransomware Preface Arjun PN
2016-09-17 Humla Mumbai Drozer for Android Application Security Vivek Mahajan
2016-09-17 Meet Pune Secure Coding in C# Siddharth Bezalwar
2016-09-17 Meet Pune Android Application Exploitation Sumedh Bhalerao
2016-09-17 Humla Mumbai Drozer for Android Application Security Vivek Mahajan
2016-09-17 Meet Pune Security News Bytes swapnil shukla
2016-09-17 Meet Pune Pwning Computers Using USB HID Devices Rashid feroz
2016-09-17 Workshop Bangalore Python School of Security - Class 2 Bharath
2016-09-17 Workshop Bangalore Python School of Security - Class 2 Abhinav Chourasia
2016-09-11 Meet Bhopal What it takes to defend an application Anant Shrivastava
2016-09-11 Meet Bhopal Admissibility of electronic evidence in India YOgesh Pandit
2016-09-11 Meet Bhopal News Bytes Jaskaran Singh Narula
2016-09-10 Meet Bangalore CTF(Capture The Flag) Approach Chandrakant
2016-09-10 Meet Bangalore Using Hydra Sankalp Bastakoti
2016-09-10 Meet Bangalore IOT Exploitation - II Abhinav Chourasia
2016-09-10 Meet Bangalore Bypassing Corporate Security Aamer Shah
2016-09-10 Meet Bangalore iOS App Runtine Analysis Swaroop Yermalkar