Date Topic Speaker Resources
2018-07-08 Meet Bhopal CSRF-101 Akanksha
2018-07-08 Meet Bhopal Router pawning with Bus Pirate Shreya Pohekar
2018-07-08 Meet Bhopal Intro to Broken Authentication Abha Rajawat
2018-06-29 Meet Dubai State of the Art Fuzzing Michael
2018-06-29 Meet Dubai Android Internals Raghvendra Singh
2018-06-29 Meet Dubai Ethereum Smart Contracts Pen test Sandeep Kamble
2018-06-29 Meet Dubai Auditing ACLs on Active Directory Pralhad Chaskar
2018-06-24 Meet Ahmedabad Hands-on Challenge Bhashit
2018-06-24 Meet Ahmedabad Linux Privilege Escalation Techniques Bhashit
2018-06-24 Meet Ahmedabad Diving in Digital 4n6 Pranjal Vyas
2018-06-24 Meet Ahmedabad Automated Wifi Pentesting Lokesh Gupta
2018-06-24 Meet Ahmedabad Information Security - Giant Opportunities Prakash Bangaruchetti
2018-06-23 Meet Chennai Printing and Payment card standard for audit Kannan
2018-06-23 Meet Chennai Memory safety demo using GDB Gopi Krishnan S
2018-06-23 Meet Chennai OAuth 2.0 vinothpkumar
2018-06-23 Meet Delhi Securing Wordpress Installations Ankit Giri
2018-06-23 Meet Bangalore Maintaining Anonymity Online Rajan Fasra
2018-06-23 Meet Pune How to get started with Metasploit: The easiest approach to get started with Metasploit Sawan Bhan
2018-06-23 Meet Bangalore Breaking into infosec as career sanjeeva kumar
2018-06-23 Meet Pune Linux Privilege Escalation Touhid M.Shaikh
2018-06-23 Meet Delhi Burp Suite -101 for Web Application Security Testing Pankaj Mouriya
2018-06-23 Meet Delhi News Bytes null/OWASP Delhi Team
2018-06-23 Meet Bangalore Identity Management in modern web apps Riddhi Shree
2018-06-23 Meet Pune Hacking the Wireless World Harshit Agrawal
2018-06-23 Meet Bangalore Getting started with Frida on Android Apps Badshah
2018-06-23 Workshop Mumbai Raspberry Pi 3 in Infosec Sanket
2018-06-23 Meet Bangalore OWASP Top 10 2017 shreyas.n
2018-06-10 Meet Bhopal XSS 101 Sahil Khan
2018-06-10 Meet Bhopal Web Browser automation for Testing of Web applications using Selenium 2 with Java Shivani Thakur
2018-06-09 Meet Mumbai How to use slack as c2 server Chirag Savla
2018-06-09 Meet Mumbai Way to Secure Architecture Viral Shah
2018-06-09 Meet Mumbai Report Writing Chetan Madkam
2018-06-09 Meet Mumbai Metasploit Series - Part III Pratik
2018-06-09 Meet Mumbai NewsBytes Idris Ratlamwala
2018-06-09 Humla Bangalore Post Exploitation with Powersploit (Getting started) Riyaz Walikar
2018-05-27 Humla Bhopal Pentesting with Metasploit Faiz M Khan
2018-05-26 Puliya Bangalore Lesser Known Burp Extensions Neelu Tripathy
2018-05-26 Meet Bangalore Security Access in Automobile Debojyoti
2018-05-26 Meet Bangalore AWS Overview + Security Raghavendran Gopal
2018-05-26 Meet Bangalore Owasp Projects Vandana Verma
2018-05-26 Meet Bangalore Wireless Pentesting Mihir Shah
2018-05-26 Meet Bangalore Burp Suite for Beginners Vathsala
2018-05-25 Meet Dubai Pwning AWS Infrastructure Services Suraj Khetani
2018-05-25 Meet Dubai Active Directory Assessments Zahid Arafat Khan
2018-05-25 Meet Dubai Using Raspberry Pi for Pentesting Mohesh mohan
2018-05-25 Meet Dubai iOS Internals Prateek Gianchandani
2018-05-19 Meet Chennai Software Defined Perimeter protecting webservices samjeba
2018-05-19 Meet Chennai Pentesting Android Apps Using Frida Aadarsh
2018-05-19 Meet Chennai SSH Pentesting vengatesh
2018-05-19 Meet Delhi iOS Reverse Engineering Jai Verma