No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2023-08-26 Meet Bhubaneswar Darkweb Basics Jayant Agarwal
2023-08-19 Meet Bangalore AWS IAM Privilege Escalation Ankit Sharma
2023-08-19 Meet Bangalore Deeplink Exploitation Sunita
2023-08-19 Meet Bangalore Product Security Namrata Mahajan
2023-08-19 Meet Bangalore Smart contract fuzzing Gururaj Dalawai
2023-08-12 Humla Bangalore Exploit Development Manish
2023-08-06 Meet Kolkata Demystifying Cyber Threat Intelligence Debraj Dey
2023-08-06 Meet Kolkata C&C Frameworks : An Overview Ayan Saha
2023-08-06 Meet Kolkata Evolution of Hacking, Hackers and Cyber Attacks Ronit Chakraborty
2023-07-30 Meet Ahmedabad Quiz Session Kuldeep Pandya
2023-07-30 Meet Ahmedabad OSINT Unveiled Bhashit Pandya
2023-07-30 Meet Ahmedabad Fetching GeoLocation Details Het Mehta
2023-07-30 Meet Ahmedabad Art of Fetching Historical Records Purvil
2023-07-29 Meet Bhubaneswar Reverse Engineering Part 2 - win32 api abhijit mohanta
2023-07-29 Meet Bhubaneswar Scan through Scams Lagnajeet Mishra
2023-07-29 Meet Bhubaneswar Chatgpt for Security Professional and/or for Everyone Nutan Kumar Panda
2023-07-29 Bachaav Bangalore Deep Dive into Container Security & Hardening Rohit Kumar
2023-07-15 Humla Chennai Malware Analysis - CTF - Custom malwares Chandresh Gupta
2023-07-15 Meet Bangalore Ikaros - An attack surface management framework Prateek Thakare
2023-07-15 Meet Bangalore NGFW - Firewall & DNS Security Anandraj Amaran
2023-07-15 Meet Bangalore From User to Domain Controller: A Journey through the Critical ADCS Vulnerability in Active Directory Abhinandan Khurana
2023-07-15 Meet Bangalore Exploring Security Through Digital Risk Protection Lens Pavan Karthick M
2023-07-15 Meet Bangalore Task Hijacking Anshika
2023-07-15 Humla Chennai Malware Analysis - Introduction & Techniques Ravi Rajput
2023-07-01 Meet Kolkata Incident Response Fundamentals Sudipta Pramanik
2023-07-01 Meet Kolkata Web Application Hunting Approach Souvik
2023-07-01 Meet Kolkata Hack Wireless Networks with IOT Aninda Saha
2023-07-01 Meet Kolkata Exploit Writing 101 – Beyond Just Reporting Bugs Soummya Mukhopadhyay
2023-06-25 Meet Ahmedabad Hands-on Challenge Kuldeep Pandya
2023-06-25 Meet Ahmedabad DNS Zone Takeovers Jay
2023-06-25 Meet Ahmedabad DNS Rebinding Dishant Kapadiya
2023-06-25 Meet Ahmedabad Authoring Nuclei Templates Parth
2023-06-25 Meet Ahmedabad News Bytes Janesh Senjaliya
2023-06-24 Meet Chennai Active Directory Attacks Prakash
2023-06-24 Meet Chennai Network Architecture Review Sivakumar S
2023-06-24 Meet Chennai Network Forensics Kaarthik
2023-06-24 Meet Bangalore GCP with IAP Security Anjali Shukla
2023-06-24 Meet Bangalore Policy based Kubernetes Security Using KYVERNO Ravi
2023-06-24 Meet Bhubaneswar ICS Security (Industrial Control System) Anshuman Mishra
2023-06-24 Meet Pune Raspberry Pi from Security Perspective Varun Tech
2023-06-24 Meet Bangalore AWS serverless pentesting Divyanshu shukla
2023-06-24 Meet Bhubaneswar Introduction to Red Teaming Tushar Routray
2023-06-24 Meet Pune Securing Workloads on AWS Cloud: Leveraging Amazon GuardDuty and Inspector Sankalp Sandeep Paranjpe
2023-06-24 Meet Bangalore FlipperZero is really cool hacking gadget? Mr-IoT
2023-06-24 Meet Bhubaneswar LLM Application and AI Security Shaunak
2023-06-24 Meet Bangalore Securing IoT on the Home Network Vedant Khandelwal
2023-06-17 Puliya Bangalore Intro To Malware Analysis Adib Nagarajan
2023-06-10 Meet Mumbai SOC Maturity Assessment aarjavee shah
2023-06-10 Humla Bhubaneswar Hands on IOT Security Nutan Kumar Panda
2023-06-10 Meet Mumbai The Illusion of Trust Chirag Savla