Date Topic Speaker Resources
2017-12-22 Meet Dubai Introduction to Atomic Red Team Framework for defender Pralhad Chaskar
2017-12-22 Meet Dubai Windows Privilege Escalation Techniques Riyaz Walikar
2017-12-22 Meet Dubai Introduction to assembly x86 Avinash Kumar Thapa
2017-12-22 Meet Dubai Introduction to RFID security Abdul Rasheed
2017-12-17 Meet Bhopal Server Side template Injection[remote] narendra kumar
2017-12-17 Meet Bhopal ARM Exploitation[remote] jitendra kumar
2017-12-17 Meet Bhopal Getting started with bug bounty[remote] Shubham Gupta
2017-12-17 Meet Bhopal News Bytes HARSHVARDHAN PATHAK
2017-12-16 Meet Bangalore Rop chaining Abhinav Chourasia
2017-12-16 Meet Bangalore Local Priv Escalation on Linux Tushar Routray
2017-12-16 Meet Bangalore Annual Review Security Learning 2017 Akash Mahajan
2017-12-16 Workshop Mumbai ICS and Car Hacking Mini Village Arun Mane
2017-12-16 Meet Bangalore Server Side Template Injection narendra kumar
2017-12-09 Meet Mumbai Memory Forensics with Rekall Malla Reddy
2017-12-09 Meet Mumbai Privilege Escalation using Powershell Avkash Kathiriya
2017-12-09 Meet Mumbai Penetration Testing Using Metasploit Series - Part I Pratik
2017-12-09 Meet Mumbai Code execution on modern day applications Rahul Sasi
2017-12-09 Meet Mumbai NewsBytes Varun Vij
2017-12-09 Meet Mumbai Crowd-sourced Vulnerable Machine Exploitation - CTF Series Dhruv
2017-11-25 Meet Chennai Load balancing and Web Application Firewall jebaraj
2017-11-25 Meet Chennai DEP and ASLR bypass Dhayalan
2017-11-25 Meet Chennai Newsbytes abhay
2017-11-25 Meet Chennai Features of Wireshark Vasant
2017-11-25 Meet Chennai P2P Akash Raghav
2017-11-25 Meet Delhi Unveiling the values of Mobile Identities Harshal Arora
2017-11-25 Meet Delhi GDPR for InfoSec Professionals Saumya Vishnoi
2017-11-25 Meet Delhi Insecure Direct Object References: What, Why, and How? by Abhinav Mishra Abhinav Mishra
2017-11-25 Meet Delhi OWASP Top 10 2017 Update Sandeep Singh
2017-11-25 Meet Delhi InfoSec News Bytes null/OWASP Delhi Team
2017-11-19 Meet Bhopal Lets Hunt the target using OSINT Chandrapal
2017-11-19 Meet Bhopal An Introduction to SysInternal Riyaz Walikar
2017-11-18 Meet Bangalore Mathematical Modelling for NexG & The Algebra of Cryptography Ali Shabbir
2017-11-18 Humla Pune Attacking - REST API Siddharth Bezalwar
2017-11-18 Meet Bangalore Introduction to Cryptocurrency Ajit
2017-11-18 Workshop Mumbai Analysing Mhz to Ghz with SDR - IOT Workshop Arun Mane
2017-11-18 Meet Bangalore Firmware Analysis for Beginners Ramkumar Ganesan
2017-11-17 Meet Dubai An analysis of the Yalu jailbreak Prateek Gianchandani
2017-11-17 Meet Dubai Introduction to Deception Techniques harish
2017-11-17 Meet Dubai Social Engineering Payloads Bhdresh
2017-11-17 Meet Dubai SCADA 101 Ashok
2017-11-11 Public Puliya Mumbai IT Act 2000 with amendments 2008 Vikas Naik
2017-11-11 Meet Mumbai Circumventing Networks Vijay Lalwani
2017-11-11 Meet Pune Buffer Overflow in Windows shyam
2017-11-11 Meet Mumbai Radio Hacking Part II - GNURadio Nitesh Malviya
2017-11-11 Meet Pune Powershell Hrushikesh Kakade
2017-11-11 Meet Pune OSINT Apurv Singh Gautam
2017-11-11 Meet Mumbai Web Application Firewall Romansh Yadav
2017-11-11 Meet Pune News Bytes Akshay Pawar
2017-11-11 Meet Mumbai NewsByte Malla Reddy
2017-10-29 Meet Bhopal Progress update on IOT Study group Shreya Pohekar