Date Topic Speaker Resources
2018-10-28 Meet Ahmedabad Introduction to Responder Parth
2018-10-28 Meet Ahmedabad Basics of Metasploit Framework Sanjay Makwana
2018-10-28 Meet Ahmedabad Basics of BlockChain Sanjay Gondaliya
2018-10-27 Meet Chennai Newsbytes ashok kumawat
2018-10-27 Meet Chennai Reversing RAT Bhaskar
2018-10-27 Meet Chennai Deception Technology Sai Ganesh T
2018-10-27 Meet Chennai Return to libc Anirudh
2018-10-27 Meet Chennai Securing S3 bucket, IAM, VPC <script>alert("Chirag Jariwala");</script>
2018-10-27 Workshop Pune Basics of SQL Injection and techniques of exploitation Urvesh Thakkar
2018-10-27 Workshop Pune Common Crypto Failures Ajit
2018-10-26 Meet Dubai Techniques for Bypassing NAC - Case Study Teck_K2
2018-10-26 Meet Dubai Intro to Format string attacks Khalilov
2018-10-26 Meet Dubai Application Threat Modelling seid
2018-10-26 Meet Dubai Windows Kernel Driver Fuzzing Michael
2018-10-21 Meet Bhopal Documenting Security with Secure WordPress Installation Faiz
2018-10-21 Meet Bhopal Pentesting BlackMarket VM Sahil Khan
2018-10-21 Meet Bhopal walkthrough of Basic Pentesting: 1 Sheeraz Ali
2018-10-21 Meet Bhopal Newsbytes Shreyasi
2018-10-20 Meet Chandigarh Getting Started with NMAP: Swiss Army Knife for Network Security Testing Pankaj Mouriya
2018-10-13 Meet Mumbai Exploring types of аņtеииаs (Make your own Wi-Fi аņtеииаs) Hitesh
2018-10-13 Meet Delhi Phishing Techniques Naveen
2018-10-13 Meet Bangalore Static Malware Analysis Vikram
2018-10-13 Meet Delhi Instrumenting iOS apps on Non Jailbroken Device manish Rohilla
2018-10-13 Meet Bangalore Insecure Deserialization Bittu Kumar
2018-10-13 Meet Mumbai PowerShell modules, bypass and securing Rajan Christian
2018-10-13 Meet Delhi BugBounty Methodology - The Rules and the How To Avinash Jain
2018-10-13 Meet Bangalore Bodhi Vulnerable Application Demo AMol NAik
2018-10-13 Meet Delhi Introduction to Windows Kernel Exploitation Himanshu Khokhar Jaat
2018-10-13 Meet Mumbai IoT Security Arun Mane
2018-10-13 Meet Delhi News Bytes Sandeep Singh
2018-10-13 Meet Bangalore An introduction to DefectDojo (OWASP Project) Riyaz Walikar
2018-10-13 Meet Mumbai Buffer Overflow, Exploitation on Windows (Stack Overflow) Priyank Parekh
2018-10-13 Meet Bangalore 802.11 Security Shyamsundar Das
2018-10-13 Meet Bangalore Introduction to Kerberos Protocol Sadhana
2018-10-06 Humla Bangalore REST API Pentesting Mihir Shah
2018-10-06 Workshop Mumbai Memory Forensics Ravidutt purwal
2018-10-06 Humla Bangalore Exploiting OAuth 2.0 Protocol Mihir Shah
2018-09-29 Humla Mumbai Pentesting with Metasploit Pratik
2018-09-28 Meet Dubai SAP Auditing Sukesh Shetty
2018-09-28 Meet Dubai Macro Injections Aamer Shah
2018-09-28 Meet Dubai Reflective DLL Injection Sudhanshu S Sharma
2018-09-28 Meet Dubai WiFi Pentesting with Infernal Khalilov
2018-09-25 Public Bachaav Delhi Securing AWS Environments Ankit Giri