No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2024-02-14 Workshop Ganpat University Student Android System and Security krish bheda
2024-02-13 Workshop Ganpat University Student Cloud Computing and Security Sagar patel
2024-02-12 Workshop Ganpat University Student DNS Spoofing & Session Hijacking Dhrumi Chaudhari
2024-02-10 Meet Mumbai Abusing AADConnect for Privilege Escalation - Part 1 Chirag Savla
2024-02-10 Meet Ahmedabad Laying the security pipeline right way on gitlab Chirag Jariwala
2024-02-10 Meet Mumbai Custom Cloud Red Team Tool Raunak parmar
2024-02-10 Meet Ahmedabad Fast IP lookup for open Ports and Vulnerabilities Praveen Mali
2024-02-10 Meet Ahmedabad News Byte Jay Patel
2024-01-27 Meet Kolkata Beginners guide to Hardware Hacking Asutosh Kumar
2024-01-27 Meet Kolkata Demystifying DNS Attacks Rakesh Seal
2024-01-27 Meet Pune Red Teaming - A Bird's Eye Overview Syed Modassir Ali
2024-01-27 Meet Kolkata Immutable Desktop using Container Orchestration Mohammed Danish Amber
2024-01-27 Meet Kolkata Recon Resurgence: Level up your Recon skills for Maximum impact in Bug-Bounty Agnibha Dutta
2024-01-27 Meet Pune Smart Contract Auditing Pratik Shetty
2024-01-27 Meet Kolkata Art of Threat Modelling Samkalpa Mukherjee
2024-01-24 Meet Vijayawada Docker Orchestration with Kubernetes Sai Sanjay
2024-01-24 Meet Vijayawada Introduction to Docker and Docker Networking Sri Venkat Harsha Rayasam
2024-01-20 Meet Bangalore Security Aspects of Gen AI Prashant Kumar Jha
2024-01-20 Meet Hyderabad Preparation to the next meet Ravindra Penumarthi
2024-01-20 Meet Bangalore Fortifying Security Pipeline Rakesh Paruchuri
2024-01-20 Meet Hyderabad Threat hunting and common cloud compromises hunting on Azure P B Surya Subhash
2024-01-20 Meet Chennai Quick Primer on NIST Framework - Best Practices for Managing CyberSecurity Risks Kaushik Ganesh
2024-01-20 Meet Bangalore Exploiting the Firebase Login Mechanism and APIKEY's Devendra
2024-01-20 Meet Chennai Attacking Kubernetes Cluster Metadata using SSRF vulnerability PradeepKumar P
2024-01-20 Meet Hyderabad Cyber-crime laws & IPR Sarwar Jahan M
2024-01-20 Meet Chennai Unveiling Vulnerabilities - Hacking Adult entertainment and Dating sites Nithissh S
2024-01-20 Meet Hyderabad Wonders of HTTP Headers MOHAMMAD SAQLAIN
2024-01-20 Meet Bangalore Dark Web Crawler Abhishek Kumar
2024-01-20 Meet Hyderabad Introducing Null Hyderabad SHAIK ARIF ALI
2024-01-20 Meet Chennai Attack Surface Management in Ransomware Defence # Mdsathees
2024-01-20 Meet Hyderabad Security News Bytes and Latest CVE's MOHD ABDUL JAMEEL
2024-01-20 Meet Bangalore Guardian Trio: Cryptography, Threat Modeling, IAM Aditi Rai
2024-01-07 Humla Ahmedabad Android application instrumentation with FRIDA - Part 2 Nishith K
2024-01-07 Humla Ahmedabad Android application instrumentation with FRIDA Part 1 Jaimin Gohel
2024-01-06 Meet Bhubaneswar A history on how the first malware/virus was born Sampad Rout
2024-01-06 Meet Delhi NCR Blockchain Security Basics Sanchay Singh
2024-01-06 Meet Bhubaneswar How to get into Cyber Security Tushar Routray
2024-01-06 Meet Delhi NCR Learnings from the 2023 cyber incidents Jalaj
2024-01-06 Meet Bhubaneswar Demystifying Scams Lagnajeet Mishra
2024-01-06 Meet Delhi NCR Bad USBs are Scary!!(make one with a Raspberry Pi Pico for ₹221) Nilesh Kumar
2023-12-24 Meet Ahmedabad Web Application Pentesting Case Studies Bhashit Pandya
2023-12-24 Meet Ahmedabad Android Native Binary Reverse Engineering Ravi Rajput
2023-12-24 Meet Ahmedabad Application Security Chirag Jariwala
2023-12-24 Meet Ahmedabad Secure Coding Practice Rushabh Shah
2023-12-24 Meet Ahmedabad News Bytes Sabarish Iyer
2023-12-23 Humla Ahmedabad Web Hacking उपदेश _RaviRamesh
2023-12-16 Meet Bangalore RE for windows PE files Ananthakrishnan