No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2018-05-12 Meet Mumbai Web Services Gaurav Kumar
2018-05-12 Meet Mumbai Abusing Outlook Chirag Savla
2018-05-12 Meet Mumbai Machine Learning & Infosec Kaushal Parikh
2018-05-12 Meet Mumbai NewsByte Kush
2018-04-28 Meet Pune Port Scanning-1-O-1 Vinit Jannu
2018-04-28 Meet Pune Intro to Android Game Hacking Aman Aryan
2018-04-28 Meet Pune Notorious Vulnerabilities of Mobile Banking Apps Sneha Rajguru
2018-04-28 Meet Pune Using SAT solvers in puzzles Sudhakar Verma
2018-04-28 Public Puliya Mumbai Solving Vulnerable Machines from VulnHub/ HackTheBox Vijay Kumar
2018-04-27 Meet Dubai iOS internals Prateek Gianchandani
2018-04-27 Meet Dubai Using Raspberry Pi in Pentesting Mohesh mohan
2018-04-27 Meet Dubai The "E" in MalwarE - Evolution, Exploit, Evasion Rami
2018-04-27 Meet Dubai Cyber Threats Intelligence and Analytics Surendra
2018-04-22 Meet Bhopal Introduction to Nmap Yugansh Holani
2018-04-22 Meet Bhopal The Lazy Script Sudhanshu kashyap
2018-04-22 Meet Bhopal Getting Started with Burp Suite Shreya Pohekar
2018-04-21 Meet Chennai Pentesting VOIP - Part2 vengatesh
2018-04-21 Meet Chennai Data Science,Machine Learning and AI Teja Kummarikuntla
2018-04-21 Meet Chennai Cryptojacking Sai Ganesh T
2018-04-21 Meet Chennai Host based IDS Gopi Krishnan S
2018-04-21 Public Puliya Bangalore Kubenetes Security Nemo
2018-04-21 Public Puliya Bangalore Kubernetes 101 hashfyre
2018-04-21 Meet Bangalore Selenium+Zap+Jenkins Narendra
2018-04-21 Meet Bangalore Report Automation Zakeer
2018-04-21 Meet Bangalore Rest API Pentesting Sagar
2018-04-21 Meet Bangalore Block Chain Sadhana
2018-04-21 Meet Bangalore Hardware Hacking Likith
2018-04-15 Meet Ahmedabad Hands-on Challenge Bhashit Pandya
2018-04-15 Meet Ahmedabad Pawning JS Jaimin Gohel
2018-04-15 Meet Ahmedabad Detect Before Attack Santhosh Baswa
2018-04-15 Meet Ahmedabad Firewall Testing - An art of Intrusion Ravi Rajput
2018-04-15 Meet Ahmedabad Social Engineering - II Namrata Brahmkshatriya
2018-04-15 Meet Ahmedabad News Bytes Manju Chufal
2018-04-15 Meet Ahmedabad Introduction to Null Community Bhashit Pandya
2018-04-14 Meet Mumbai The domain will fall - Evolved strategies to break Internal networks and avoid detection Sudarshan
2018-04-14 Meet Mumbai Vulnerability analysis on cyber-physical systems: MELSOFT protocol mihirraj dixit
2018-04-14 Meet Mumbai NewsBytes Gaurav Kumar
2018-04-14 Meet Mumbai Code Review kavita Ghaitadke
2018-04-07 Humla Bangalore Post Exploitation with PowerShell Empire (Getting started) Riyaz Walikar
2018-03-30 Meet Dubai Phishing Methodology Mayank
2018-03-30 Meet Dubai Hacking Radio Frequencies Part 2 Rajesh TV
2018-03-30 Meet Dubai Hacking Radio Frequencies Part 2 Abdul Rasheed
2018-03-30 Meet Dubai DevSecOps 101 Shaikh Raashid
2018-03-30 Meet Dubai Computer Forensics Methodology Mousa Alfalayleh
2018-03-25 Meet Chennai The key to Enumeration Nibin
2018-03-25 Meet Chennai XOR Encryption Anmol Maurya
2018-03-25 Meet Chennai Host based IDS Gopi Krishnan S
2018-03-25 Meet Bhopal Vagrant for Devops Deepanshu Gajbhiye