No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2024-02-22 Meet Vijayawada Unveiling the secrets: A deep dive into web application security shark0d3sn1p3r
2024-02-22 Meet Vijayawada Investigating cyber threats in real time : Introduction to SOC, SIEM & Practical Tools Setup Srinu
2024-02-22 Meet Vijayawada Securing Cyberspace : A Bug Bounty Journey with Renganathan Renganathan P
2024-02-17 Meet Dubai Feedback and Closing Ajay
2024-02-17 Meet Dubai Building DevSecOps strategy Milan Singh Thakur
2024-02-17 Meet Dubai Azure Intrusion Tactics: Unlocking Doors with File Uploads, SSTI, and Command Injection Pratik
2024-02-17 Meet Dubai Networking Break Abdul Rasheed
2024-02-17 Meet Dubai Web3 Security Tamaghna Basu
2024-02-17 Meet Dubai Hacking Electron Apps Dhiraj Mishra
2024-02-17 Meet Dubai Introductions TAS
2024-02-17 Meet Bangalore Mindset of a Purple Team Edwin Christy
2024-02-17 Meet Bangalore CIS hardening for Ubuntu Ashok Rachapudi
2024-02-17 Meet Bangalore Secure Coding Aditya Gupta
2024-02-17 Meet Bangalore Preparation for OSCP and other RedTeaming Certifications SATHIYANARAYANA S
2024-02-17 Meet Bangalore Anatomy of Cyber Attack Raghav Gupta
2024-02-15 Workshop Ganpat University Student IOT Security Khushi
2024-02-14 Workshop Ganpat University Student Android System and Security krish bheda
2024-02-13 Workshop Ganpat University Student Cloud Computing and Security Sagar patel
2024-02-12 Workshop Ganpat University Student DNS Spoofing & Session Hijacking Dhrumi Chaudhari
2024-02-10 Meet Mumbai Abusing AADConnect for Privilege Escalation - Part 1 Chirag Savla
2024-02-10 Meet Ahmedabad Laying the security pipeline right way on gitlab Chirag Jariwala
2024-02-10 Meet Mumbai Custom Cloud Red Team Tool Raunak parmar
2024-02-10 Meet Ahmedabad Fast IP lookup for open Ports and Vulnerabilities Praveen Mali
2024-02-10 Meet Ahmedabad News Byte Jay Patel
2024-01-27 Meet Kolkata Beginners guide to Hardware Hacking Asutosh Kumar
2024-01-27 Meet Kolkata Demystifying DNS Attacks Rakesh Seal
2024-01-27 Meet Pune Red Teaming - A Bird's Eye Overview Syed Modassir Ali
2024-01-27 Meet Kolkata Immutable Desktop using Container Orchestration Mohammed Danish Amber
2024-01-27 Meet Kolkata Recon Resurgence: Level up your Recon skills for Maximum impact in Bug-Bounty Agnibha Dutta
2024-01-27 Meet Pune Smart Contract Auditing Pratik Shetty
2024-01-27 Meet Kolkata Art of Threat Modelling Samkalpa Mukherjee
2024-01-24 Meet Vijayawada Docker Orchestration with Kubernetes Sai Sanjay
2024-01-24 Meet Vijayawada Introduction to Docker and Docker Networking Sri Venkat Harsha Rayasam
2024-01-20 Meet Bangalore Security Aspects of Gen AI Prashant Kumar Jha
2024-01-20 Meet Hyderabad Preparation to the next meet Ravindra Penumarthi
2024-01-20 Meet Bangalore Fortifying Security Pipeline Rakesh Paruchuri
2024-01-20 Meet Hyderabad Threat hunting and common cloud compromises hunting on Azure P B Surya Subhash
2024-01-20 Meet Chennai Quick Primer on NIST Framework - Best Practices for Managing CyberSecurity Risks Kaushik Ganesh
2024-01-20 Meet Bangalore Exploiting the Firebase Login Mechanism and APIKEY's Devendra
2024-01-20 Meet Chennai Attacking Kubernetes Cluster Metadata using SSRF vulnerability PradeepKumar P
2024-01-20 Meet Hyderabad Cyber-crime laws & IPR Sarwar Jahan M
2024-01-20 Meet Chennai Unveiling Vulnerabilities - Hacking Adult entertainment and Dating sites Nithissh S
2024-01-20 Meet Hyderabad Wonders of HTTP Headers MOHAMMAD SAQLAIN
2024-01-20 Meet Bangalore Dark Web Crawler Abhishek Kumar
2024-01-20 Meet Hyderabad Introducing Null Hyderabad SHAIK ARIF ALI
2024-01-20 Meet Chennai Attack Surface Management in Ransomware Defence # Mdsathees
2024-01-20 Meet Hyderabad Security News Bytes and Latest CVE's MOHD ABDUL JAMEEL
2024-01-20 Meet Bangalore Guardian Trio: Cryptography, Threat Modeling, IAM Aditi Rai
2024-01-07 Humla Ahmedabad Android application instrumentation with FRIDA - Part 2 Nishith K