Date Topic Speaker Resources
2018-12-23 Meet Ahmedabad Hands-on Challenge Jaimin Gohel
2018-12-23 Meet Ahmedabad Unlocking The Secrets - Lock Picking Basics Namrata Brahmkshatriya
2018-12-23 Meet Ahmedabad A Dive Into ELF Files Bhashit
2018-12-23 Meet Ahmedabad Ransomware Reversing Tale Ravi Rajput
2018-12-15 Meet Chennai Serialization and Deserialization Vijay Kumar
2018-12-15 Meet Chennai Boot2Root - Post exploitation vectors Bala Murugan
2018-12-15 Meet Chennai Android Pentesting - Oat2Dex Sushil Bhojwani
2018-12-15 Meet Chennai Pentesting DNS vengatesh
2018-12-15 Meet Delhi Offensive OSINT Tushar Mendiratta
2018-12-15 Meet Delhi Setting up and using VPS Infrastructure for BugBounty and Pentesting narendra kumar
2018-12-15 Meet Bangalore Industrial Threat Landscape Biswajit De
2018-12-15 Meet Bangalore Designing security solution for Microservices in Multi-cloud Neelkamal Singh Gaharwar
2018-12-15 Meet Delhi Getting Started with Threat Hunting Sandeep Singh
2018-12-15 Meet Bangalore IP Sec Bharath
2018-12-15 Meet Delhi Notable APT activities of 2018 and their analysis Ankit
2018-12-15 Meet Delhi News Bytes Pratul
2018-12-15 Meet Bangalore OWASP Serverless Top 10 Badshah
2018-12-15 Meet Bangalore Using Burp Macros to Automate Session Handling Riddhi Shree
2018-12-15 Meet Bangalore Introductions Veerababu(Mr-IoT)
2018-12-15 Meet Bangalore Wireshark varun sharma
2018-12-11 Puliya Bhopal Bandit wargame Faiz M Khan
2018-12-08 Meet Mumbai Port knocking Akshay
2018-12-08 Meet Mumbai Port Knocking Swapnil
2018-12-08 Meet Mumbai NewsBytes Govind Ray
2018-12-08 Meet Mumbai GRC: Governance, Risk managment, and Compliance Sujith Ambady
2018-12-08 Meet Mumbai CHFI: A roadmap Nishant Grover
2018-11-25 Bachaav Bhopal Secure Wordpress Deployment Faiz M Khan
2018-11-24 Meet Mumbai Security: A CISO’s Perspective Sheshadri
2018-11-24 Meet Pune Bypassing Edge security policies Nikhil Mittal
2018-11-24 Meet Kolkata Exploit - Drink - Sleep - Repeat Prasenjit Kanti Paul
2018-11-24 Meet Mumbai Abusing MSSQL Part I Chirag Savla
2018-11-24 Meet Kolkata Evolution of Vulnerability Management Practice Arijit Das
2018-11-24 Meet Mumbai NewsByte ashwani kumar
2018-11-24 Meet Pune Introduction to Reverse Engineering with radare2 Sudhakar Verma
2018-11-24 Meet Mumbai Dissecting Linux's ELF Fromat Munawwar Hussain Shelia
2018-11-24 Meet Pune Common Crypto Failures : 2 Ajit
2018-11-24 Humla Bangalore Firmware Reverse Engineering and Exploitation Vaibhav Bedi
2018-11-24 Humla Bangalore Stepping into IoT Security Veerababu(Mr-IoT)
2018-11-18 Meet Ahmedabad Finding W4ld0: How to get noticed by a hiring manager in cyber security Darshan
2018-11-18 Meet Ahmedabad Introduction to reversing using IDA Bhargav Gajera
2018-11-18 Meet Ahmedabad Social engineering case studies Namrata Brahmkshatriya
2018-11-18 Meet Ahmedabad Master The Post exploitation with Metasploit Framework Ravi Rajput
2018-11-17 Meet Chennai Static Analysis of NodeJS Rajsek
2018-11-17 Meet Chennai Pentesting Email vengatesh
2018-11-17 Meet Chennai String Malware Bhaskar