No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2022-08-27 Meet Bangalore Threat Actors are targeting BFSI Sector using Improvised Modus Operandi Anshuman
2022-07-30 Meet Delhi NCR Authentication and SSO yogesh taneja
2022-07-30 Meet Pune Securing Containers, Images and Kubernetes Ramesh Kumar
2022-07-30 Meet Mumbai Folina Vulnerability Lionel Faleiro
2022-07-30 Meet Pune A Beginners Guide for using FRIDA Ali Jujara
2022-07-30 Meet Delhi NCR Cryptography 101 Naman
2022-07-30 Meet Pune Security Bytes Sudhakar Verma
2022-07-30 Meet Delhi NCR IoT Security anshul bajpai
2022-07-30 Meet Mumbai Create conveyer (Payload Dropper) Chirag Savla
2022-07-24 Meet Ahmedabad Infosec Quiz Kuldeep Pandya
2022-07-24 Meet Ahmedabad Bypassing XSS Filters Virendra
2022-06-26 Meet Ahmedabad Quiz Time Henavi Modi
2022-06-26 Meet Ahmedabad A Unified Methodology to Threat Modeling Henavi Modi
2022-06-26 Meet Ahmedabad Next generation cyber security achivement. shubham shah
2022-06-25 Meet Delhi NCR Introduction to Cyber Security manish Rohilla
2022-06-19 Meet Villupuram Corrupting Linux Userland Memory for fun & Profit Ajay Suresh kumar
2022-06-18 Meet Pune Dynamic Analysis on Flutter based iOS Applications using Ghidra Ali Jujara
2022-06-18 Meet Pune CanaryTokens : Zero-Cost Detection & Deception Dev Dua
2022-06-18 Meet Pune Security Bytes Prateek Thakare
2022-06-12 Meet Villupuram Active Directory Fundamentals Dhanesh Sivasamy
2022-05-28 Meet Delhi NCR The Art of Pentesting JWT Tarun Sehgal
2022-05-28 Meet Delhi NCR Hacking web using Images Chirag Sukhala
2022-05-28 Meet Delhi NCR Introduction to Firewalls sahil sharma
2022-05-22 Meet Ahmedabad Hacking The Most Secured: Blockchain Technology Rohit Burke
2022-05-22 Meet Ahmedabad Cyber-Physical Security Risk and Cybersecurity Framework Het Mehta
2022-05-21 Meet Pune Fuzzing Open Source Software Sudhakar Verma
2022-05-21 Meet Pune Uncharted Secrets of Broken Access Control Aishwarya Kendle & Prateek Thakare
2022-05-21 Humla Delhi NCR Reverse Engineering - A developer approach for protection against possible exploitation Farhad Sajid Barbhuiya
2022-04-30 Meet Delhi NCR Stack based buffer overflow - 101 Swati Laxmi
2022-04-30 Meet Delhi NCR AWS IAM Attack and Defence manish Rohilla
2022-04-30 Meet Delhi NCR The Story of port 445 Sanchay Singh
2022-04-17 Meet Ahmedabad Hacking The Most Secured Blockchain Technology Rohit Burke
2022-04-17 Meet Ahmedabad Data leak through OOB techniques _RaviRamesh
2022-04-10 Meet Twitter null Talks with Founder of CloudSEK - Rahul Sasi Sooraj Sathyanarayanan
2022-03-27 Meet Ahmedabad Vajra - Your Weapon to Cloud Raunak parmar
2022-03-20 Meet Ahmedabad Vajra - Your Weapon to Cloud Raunak parmar
2022-03-13 Meet ClubHouse null Talks with Co-Founder of Arrka - Sameer Anja Sooraj Sathyanarayanan
2022-03-12 Meet Chennai Exploit writing basics vengatesh
2022-03-12 Meet Chennai Server Side Template Injection mohan balaji
2022-03-06 Meet ClubHouse Must Know LinkedIn Tips Sooraj Sathyanarayanan
2022-03-05 Meet ClubHouse Higher Education - Cybersecurity Sooraj Sathyanarayanan
2022-02-27 Meet Ahmedabad Smart Contract Hacking For Beginners Kuldeep Pandya
2022-02-13 Humla Mumbai C2 101 Chirag Savla
2022-01-23 Meet Ahmedabad Fuzzing and Symbolic Execution for Exploit Development Malav Vyas
2022-01-23 Meet Ahmedabad Understanding Containers through their Runtimes Siddharth Balyan
2022-01-22 Meet Mumbai Guide to dark web investigation - Case Study Vignesh C
2022-01-22 Meet Mumbai All about Reflection Sanket Solanki
2022-01-22 Meet Mumbai Intro to Cloud Security (AWS) - Part 1 Raunak parmar
2022-01-15 Meet Indore Building an Enterprise DevSecOps Program Romansh Yadav
2022-01-15 Meet Indore Introduction to Null Arpit Mittal