No filter set
Query

Date Topic Speaker Resources
2014-10-11 Meet Dharamshala Security News Bytes tashi dhondup
2014-09-28 Humla Delhi Malware Techniques Demystified Adhokshaj Mishra
2014-09-27 Meet Chennai Server Hardening teja babu
2014-09-27 Meet Chennai Pentesting iOS Applications santosh
2014-09-27 Meet Chennai **Bonus Session..! Sukesh
2014-09-27 Meet Chennai Source Code Audit - ESAPI PradeepKumar P
2014-09-27 Meet Chennai News Bytes Hariessh Kumar B
2014-09-27 Humla Bangalore Top 10 Web Application Security Hazards – For beginners ONLY - Part 2 Abhinav Sejpal
2014-09-20 Meet Delhi Ready for Humla (Attack)? Adhokshaj Mishra
2014-09-20 Meet Delhi OWASP CSRF Protector Minhaz A V
2014-09-20 Meet Delhi Detecting Reconnaissance through Packet Analysis Shashank Nigam
2014-09-20 Meet Delhi News Bytes and What's New null/OWASP Delhi Team
2014-09-20 Meet Bangalore ZAP Proxy Rupam Bhattacharya
2014-09-20 Meet Dharamshala Darknets & Decentralisation debanjum
2014-09-20 Meet Bangalore HTTP Response Splitting Sharath
2014-09-20 Meet Dharamshala IOS Backdoors tenzin chokden
2014-09-20 Meet Bangalore Social Engineering and its importance during Security Audits Manasdeep
2014-09-20 Meet Dharamshala htaccess and robots uncovered prabhuS
2014-09-20 Meet Bangalore News Bytes Apoorva
2014-09-20 Meet Dharamshala Security News Bytes Ugyen Kyab
2014-09-20 Meet Bangalore OWASP Mobile Security Risk : M3 Insecure Transport Layer Anant Shrivastava
2014-09-13 Meet Mumbai Wireless Security Nilesh Sapariya
2014-09-13 Meet Mumbai Security onion part 2 Kaustubh Padwad
2014-08-31 Meet Delhi Introduction to OWASP Bricks Abhi M Balakrishnan
2014-08-31 Meet Delhi All Your Slot-Tables are Belong to us Shubham Mittal
2014-08-31 Meet Delhi News Bytes and What's New Anuj Gupta
2014-08-30 Meet Bangalore null Bangalore #5yrcelebration Akash Mahajan
2014-08-30 Meet Bangalore Burp Advanced Harshal jamdade
2014-08-30 Meet Bangalore Are you a Host for Malware? Abhijeth
2014-08-30 Meet Bangalore XML Injection AMol NAik
2014-08-30 Meet Bangalore News Bytes Vijayendra K. S.
2014-08-30 Humla Pune iOS Application Penetration Testing Swaroop Yermalkar
2014-08-30 Meet Bangalore OWASP Mobile Top 10 Risk : M2 : Insecure Data Storage Anant Shrivastava
2014-08-23 Meet Chennai Metasploiting a Windows 8 Machine. Arjun Basnet
2014-08-23 Meet Chennai Say Hello To Kernel Gopi Krishnan S
2014-08-23 Meet Chennai Is your machine hosting any malware ? Venkateswara Reddy Yeruva
2014-08-23 Meet Chennai News Bytes Bharath
2014-08-23 Humla Bangalore Top 10 Web Application Security Hazards Abhinav Sejpal
2014-08-16 Meet Dharamshala Security Track sva
2014-08-16 Meet Dharamshala Operational Security jigmetsetan
2014-08-16 Meet Dharamshala Secure Database Coding for uploading files Tashi Paljor
2014-08-16 Meet Dharamshala Security News Bytes Sunil Kumar
2014-08-09 Meet Pune Memory Corruption Ashfaq Ansari
2014-08-09 Meet Pune Android security Prasanna Kanagasabai
2014-08-09 Meet Pune Security News Bytes Imdadullah Mohammed
2014-07-26 Meet Chennai Everything About HeartBleed Sukesh
2014-07-26 Meet Chennai What's behind SQLI Arjun Gupta M
2014-07-26 Meet Chennai Say Hello To Kernel Gopi Krishnan S