No filter set
Query

Date Topic Speaker Resources
2019-05-17 Meet Dubai Exploit Development with Metasploit Dhiraj Mishra
2019-05-17 Meet Dubai I.N.T.E.L Rami
2019-05-11 Meet Mumbai Writing your own OS from Scratch Nishit
2019-05-11 Meet Mumbai Data Exfiltration & Its Detection Techniques Chirag Savla
2019-05-11 Meet Mumbai Introduction to Null/OWASP Dhruv
2019-05-11 Humla Bangalore Attacking Docker Containers Satheesh Kumar Varatharajan
2019-05-11 Humla Bangalore Reconnaissance & OSINT - CTF edition Bharath
2019-05-04 Meet Pune Demystifying malloc : 1. Heap overflow Gaurav
2019-05-04 Meet Pune Subdomain Takeover Heena Rawal
2019-05-04 Meet Pune GDALR: owning black-box ML models Nikhil
2019-05-04 Puliya Bangalore How to get started in InfoSec Badshah
2019-05-04 Humla Bangalore Humla Session on Red Teaming Active Directory Harsh Thakur
2019-04-28 Meet Ahmedabad Test your skills - CTF Aagam Shah
2019-04-28 Meet Ahmedabad Era of Race Condition Jaimin Gohel
2019-04-28 Meet Ahmedabad Cyber Threat Intelligence Namrata Brahmkshatriya
2019-04-28 Meet Ahmedabad Fuzzing Web Sockets Rohit Jadav
2019-04-27 Meet Bangalore ADHD( Active Directory for Hacker’s Delight) Harsh Thakur
2019-04-27 Meet Bangalore CSP Bypass Pawan Jaiswal
2019-04-27 Meet Bangalore Injection attacks in apps with NoSQL backends Riyaz Walikar
2019-04-27 Humla Ahmedabad Hands-on Windows Exploit Development Ravi Rajput
2019-04-27 Meet Chennai How Muthu Kumar found 5 CVEs in 50mins Chandru J
2019-04-27 Meet Bangalore OWASP Slot Vandana Verma
2019-04-27 Meet Chennai Github Security vinothpkumar
2019-04-27 Humla Mumbai RedTeam Tatics Pratik
2019-04-27 Meet Bangalore Fraud in digital advertising industry Aditya Varma
2019-04-27 Meet Bangalore OSINT mindset to protect your organization Badshah
2019-04-21 Meet Bhopal Basics of Reverse Engineering Saurabh Chaudhary
2019-04-21 Meet Bhopal Experience of internship in a security company Sahil Khan
2019-04-21 Meet Bhopal Exploiting Nullbyte VM Devansh Dubey
2019-04-21 Meet Bhopal Role of Cloud Computing in the growth of DevSecOps Culture Faiz
2019-04-20 Humla Bangalore Overflowing and Gaining a shell Mihir Shah
2019-04-13 Meet Chandigarh The Pentester Blueprint: A Guide to Becoming a Pentester Phillip Wylie
2019-04-13 Workshop Chandigarh Getting started with Blockchain Shubham Gupta
2019-04-13 Puliya Bangalore Hands on with AWS Riyaz Walikar
2019-04-06 Puliya Bangalore Log Analysis Using Command Line Abhinav Chourasia
2019-03-31 Meet Bhopal Getting started with Wireshark lakshyadubey
2019-03-31 Meet Bhopal Reverse Engineering using IDA Shreya Pohekar
2019-03-31 Meet Bhopal Social Engineering Divyansh Rathore
2019-03-31 Meet Bhopal A6 - Security Misconfiguration Megha sahu
2019-03-30 Meet Delhi OWASP Top 10 Vulnerabilities aastha sahni
2019-03-30 Meet Delhi OWASP Top 10 Vulnerabilities Samaan Fatima
2019-03-30 Meet Delhi Conquering Git : The only Version Control System Pankaj Mouriya
2019-03-30 Meet Delhi Introduction to Cloud Security Minali Arora
2019-03-30 Meet Delhi Bringing Left Shift Security Change in India E-Community #BugBounty Avinash Jain
2019-03-30 Meet Mumbai RFID & NFC Hacking Paras Arora
2019-03-30 Meet Delhi News Bytes Siddharth
2019-03-30 Humla Bangalore windows privilege escalation Kartik Lalan
2019-03-29 Meet Dubai Endpoint Malware analysis and response Santosh Neelam
2019-03-29 Meet Dubai Fuzzing and Triaging using AFL Khalilov
2019-03-29 Meet Dubai Road to tfp0 in iOS 12 by Prateek Gianchandani