No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2015-10-17 Humla Mumbai Incident Response with YARA - Part 2 Continued D.M.Reddy
2015-10-17 Meet Bangalore HL 72.X (In)Security in Medical devices Anirudh duggal
2015-10-17 Meet Bangalore Introduction to DevOps Sec sandesh
2015-10-17 Meet Bangalore iOS internals Abhinav Chourasia
2015-10-17 Humla Delhi NCR SQL Injection - Let's get query-fied Ankur Vats
2015-10-17 Meet Bangalore Bluetooth Security - Ubertooth Jigar Lad
2015-10-17 Meet Bangalore Basics of BurpSuite Proxy Nishanth Kumar Pathi
2015-10-17 Humla Mumbai Incident Response with YARA - Part 2 D.M.Reddy
2015-10-17 Humla Chennai Attacking and exploiting a website using SQL Injection, XSS, and more Gowtham
2015-10-10 Meet Mumbai Linux Audit Kaustubh Padwad
2015-10-10 Meet Pune Pentesting SOAP webservices Jovin Lobo
2015-10-10 Meet Mumbai NewsBytes Kumar Gunjan
2015-10-10 Meet Mumbai APT & Strategies to counter APT(Advance Persistent Threats) Hemang
2015-10-10 Meet Pune Demystifying scada malware analysis- Havex- part 1 Arun Mane
2015-10-10 Meet Pune Security News Bytes chetan kawley
2015-10-10 Meet Mumbai APT & Strategies to counter APT(Advance Persistent Threats) Avkash K
2015-09-27 Meet Bangalore #daftnationalencryptionpolicy Akash Mahajan
2015-09-27 Meet Bangalore RFID hacking Jayesh
2015-09-27 Meet Bangalore Django - Bypassing CSRF Protection Deepam Kanjani
2015-09-27 Meet Bangalore Demystifying Web Application Firewall Sarwar Jahan M
2015-09-27 Meet Bangalore Owasp Mobile Top 10 - M10 : Lack of binary Protection Shivang Desai
2015-09-26 Meet Chennai DDoS Attacks Srihari
2015-09-26 Meet Chennai Newsbytes Devaraj Munuswamy
2015-09-26 Meet Chennai Windows 10 Security Aneesh
2015-09-26 Meet Chennai Hearbleed vulnerability exploit sriram
2015-09-26 Meet Chennai IOT security issues vengatesh
2015-09-12 Meet Mumbai Secure Code Review Badrish Dubey
2015-09-12 Meet Pune Demystifying scada malware analysis- Havex Arun Mane
2015-09-12 Meet Mumbai Windows Audit Kaustubh Padwad
2015-09-12 Meet Pune Ethical Hacking - Identifying the Vulnerabilities Sarwar Jahan M
2015-09-12 Meet Pune Security News Bytes Sumedh Bhalerao
2015-09-12 Meet Mumbai Cacti & Netflow Archit Mehta
2015-09-06 Humla Mumbai Malware Analysis & Reverse Engineering Rohan Bhavsar
2015-09-05 Meet Delhi NCR Cyber Warfare Capabilities, A Reality Check by Rajeev Chauhan aarcee
2015-09-05 Meet Delhi NCR Undersurf: Dark Reading Aakash Goel
2015-09-05 Meet Delhi NCR Setting Up a Cost Effective Application Security Program from Scratch - Part 2 Ram Awasthi
2015-09-05 Meet Delhi NCR Setting Up a Cost Effective Application Security Program from Scratch - Part 1 tusnin das
2015-09-05 Meet Delhi NCR News Bytes Shantanu Goel
2015-08-29 Meet Chennai Manual Source Code Analysis Nalla Muthu S
2015-08-29 Meet Chennai Windows Tokens vengatesh
2015-08-29 Meet Chennai iOS - Run time Analysis using Cycript naveen
2015-08-29 Meet Chennai iOS - Run time Analysis using GDB santosh
2015-08-29 Meet Chennai Mobile Security - M7 adarsh
2015-08-29 Meet Bangalore Kerberos Golden Ticket Asish
2015-08-29 Meet Bangalore Android rooting Internals Anto joseph
2015-08-29 Meet Bangalore Cross Origin Resource Sharing Ishan Girdhar
2015-08-29 Meet Bangalore Exploiting Version Control Systems Anant Shrivastava
2015-08-29 Meet Bangalore Owasp Mobile Top 10 - M9: Improper Session Handling Apoorva
2015-08-22 Humla Mumbai Incident Response with YARA | A pattern matching swiss knife | Part 1 D.M.Reddy
2015-08-08 Bachaav Chennai Exploits and Mitigation Prasath K