Date Topic Speaker Resources
2018-04-28 Meet Pune Intro to Android Game Hacking Aman Aryan
2018-04-28 Meet Pune Notorious Vulnerabilities of Mobile Banking Apps Sneha Rajguru
2018-04-28 Meet Pune Using SAT solvers in puzzles sudhackar
2018-04-27 Meet Dubai iOS internals Prateek Gianchandani
2018-04-27 Meet Dubai Using Raspberry Pi in Pentesting Mohesh mohan
2018-04-27 Meet Dubai The "E" in MalwarE - Evolution, Exploit, Evasion Rami
2018-04-27 Meet Dubai Cyber Threats Intelligence and Analytics Surendra
2018-04-22 Meet Bhopal Introduction to Nmap Yugansh Holani
2018-04-22 Meet Bhopal The Lazy Script Sudhanshu kashyap
2018-04-22 Meet Bhopal Getting Started with Burp Suite Shreya Pohekar
2018-04-21 Meet Chennai Pentesting VOIP - Part2 vengatesh
2018-04-21 Meet Chennai Data Science,Machine Learning and AI Teja Kummarikuntla
2018-04-21 Meet Chennai Cryptojacking Sai Ganesh T
2018-04-21 Meet Chennai Host based IDS Gopi Krishnan S
2018-04-21 Public Puliya Bangalore Kubenetes Security Nemo
2018-04-21 Public Puliya Bangalore Kubernetes 101 hashfyre
2018-04-21 Meet Bangalore Selenium+Zap+Jenkins Narendra
2018-04-21 Meet Bangalore Report Automation Zakeer
2018-04-21 Meet Bangalore Rest API Pentesting Sagar
2018-04-21 Meet Bangalore Block Chain Sadhana
2018-04-21 Meet Bangalore Hardware Hacking Likith
2018-04-15 Meet Ahmedabad Hands-on Challenge Bhashit
2018-04-15 Meet Ahmedabad Pawning JS Jaimin Gohel
2018-04-15 Meet Ahmedabad Detect Before Attack Santhosh Baswa
2018-04-15 Meet Ahmedabad Firewall Testing - An art of Intrusion Ravi Rajput
2018-04-15 Meet Ahmedabad Social Engineering - II Namrata Brahmkshatriya
2018-04-15 Meet Ahmedabad News Bytes Manju Pushkarsingh
2018-04-15 Meet Ahmedabad Introduction to Null Community Bhashit
2018-04-14 Meet Mumbai The domain will fall - Evolved strategies to break Internal networks and avoid detection Sudarshan
2018-04-14 Meet Mumbai Vulnerability analysis on cyber-physical systems: MELSOFT protocol mihirraj dixit
2018-04-14 Meet Mumbai NewsBytes Gaurav Kumar
2018-04-14 Meet Mumbai Code Review kavita Ghaitadke
2018-04-07 Humla Bangalore Post Exploitation with PowerShell Empire (Getting started) Riyaz Walikar
2018-03-30 Meet Dubai Phishing Methodology Mayank
2018-03-30 Meet Dubai Hacking Radio Frequencies Part 2 Rajesh TV
2018-03-30 Meet Dubai Hacking Radio Frequencies Part 2 Abdul Rasheed
2018-03-30 Meet Dubai DevSecOps 101 Shaikh Raashid
2018-03-30 Meet Dubai Computer Forensics Methodology Mousa Alfalayleh
2018-03-25 Meet Chennai The key to Enumeration Nibin
2018-03-25 Meet Chennai XOR Encryption Anmol Maurya
2018-03-25 Meet Chennai Host based IDS Gopi Krishnan S
2018-03-25 Meet Bhopal Vagrant for Devops Deepanshu Gajbhiye
2018-03-25 Meet Chennai Pentesting Series - II - VoIP Pentesting vengatesh
2018-03-25 Meet Bhopal Beef Exploitation Framework SAURABH
2018-03-25 Meet Ahmedabad Can You See My Meterpreter!? Ravi Rajput
2018-03-25 Meet Bhopal News Bytes Yugansh Holani
2018-03-25 Meet Ahmedabad OWASP Top 10 - A1 Injection Explained Jaimin Gohel
2018-03-25 Meet Ahmedabad Red Teaming - A real-world attack simulation Bhashit
2018-03-25 Meet Ahmedabad Introduction to Wireshark Vishal
2018-03-24 Meet Kolkata Basics of Windows Privilege Escalation Souhardya Sardar