No filter set
Query

Date Topic Speaker Resources
2018-09-08 Meet Mumbai Server Side Template Injection to code execution Sanoop Thomas
2018-09-08 Meet Mumbai Abusing Microsoft Local Administrator Password Solution Ankit Joshi
2018-09-08 Humla Bangalore Linux Post Exploitation - Privilege Escalation Techniques Romansh Yadav
2018-08-31 Meet Dubai Bloodhound 2.0 (Tool Demo) Pralhad Chaskar
2018-08-31 Meet Dubai ADRecon: Active Directory Recon (Tool Demo) tas@null.co.in
2018-08-31 Meet Dubai DejaVu: An Opensource Deception Framework harish
2018-08-31 Meet Dubai DejaVu: An Opensource Deception Framework Bhdresh
2018-08-31 Meet Dubai Detecting Large Scale Eavesdropping Ashok
2018-08-25 Meet Chennai The rise of Cryptomalwares Sai Ganesh T
2018-08-25 Meet Chennai Remote Port Forwarding vengatesh
2018-08-25 Meet Delhi CORS Vulnerabilities Naman Sahore
2018-08-25 Meet Bhopal Blockchain smart contracts security Prateek Gianchandani
2018-08-25 Meet Delhi Digital Forensics with Open Source Tools Prashant Shukla
2018-08-25 Meet Delhi News Bytes Ankit
2018-08-25 Meet Bhopal IOS Security Internals Prateek Gianchandani
2018-08-19 Meet Ahmedabad Data Integrity Checks Savan Gadhiya
2018-08-19 Meet Ahmedabad Anatomy of HID attack Ravi Rajput
2018-08-19 Meet Ahmedabad Introduction To Security Automation Using Python Santhosh Baswa
2018-08-19 Meet Bhopal Security Compliance with OpenScap Jaskaran Singh Narula
2018-08-19 Meet Ahmedabad Android Static Analysis Jaimin Gohel
2018-08-19 Meet Ahmedabad News Bytes Bhuvan Gandhi
2018-08-18 Public Puliya Ahmedabad Getting Familiar With Android pen-test Tools Kartik Lalan
2018-08-18 Meet Bangalore Canbus - Car Hacking Kalathil Karthik
2018-08-18 Meet Bangalore Securing Active Directory Vikas Tiwari
2018-08-18 Meet Bangalore Machine Learning for AppSec siva srl
2018-08-18 Meet Bangalore XML External Entity (XXE) Injection Attacks Riyaz Walikar
2018-08-18 Meet Bangalore Using IoT to automate security Mohammed Danish Amber
2018-08-18 Meet Bangalore Basics of Cyrptocurrencies Shivam
2018-08-11 Meet Mumbai OSINT methodology using Bash to dig active Sub-domains sahil
2018-08-11 Meet Mumbai Abusing Outlook Part II - Continue Chirag Savla
2018-08-11 Meet Mumbai ICS/SCADA Security Aditya Srivastava
2018-08-11 Meet Mumbai My Infosec Journey Kaushal Parikh
2018-08-11 Meet Mumbai NewsBytes Narendra Choyal
2018-07-22 Meet Ahmedabad The Great Hack of Sony Nirav Patel
2018-07-22 Meet Ahmedabad Buffer Overflow - Tips and Tricks armaan pathan
2018-07-22 Meet Ahmedabad New Bytes Kuldeep
2018-07-21 Meet Chennai Android Mobile - Static Code Analysis PradeepKumar P
2018-07-21 Meet Chennai Extracting filesystem from router firmware <script>alert("Chirag Jariwala");</script>
2018-07-21 Meet Pune Introduction to File Inclusion (LFI) Touhid M.Shaikh
2018-07-21 Meet Pune Intuitive mathemagic of machine learning and it's security Nikhil
2018-07-21 Meet Chandigarh Burp Suite -101 for Application Security Testing Pankaj Mouriya
2018-07-21 Meet Pune NP Hard problems as trapdoor functions Sudhakar Verma
2018-07-21 Meet Pune Introductions Sneha Rajguru
2018-07-15 Puliya Bhopal Malware 101 SAURABH
2018-07-14 Meet Bangalore Responder - Windows Exploitation Tool Aamer Shah
2018-07-14 Meet Bangalore JWT 101 Mohammed Akbar Shariff
2018-07-14 Meet Bangalore OWASP - DevSlop Project Arun.S
2018-07-14 Meet Mumbai Abusing Outlook - Part II Chirag Savla
2018-07-14 Meet Mumbai Introduction to Payment Card Industry - Data Security Standards Lokesh
2018-07-14 Meet Bangalore IoT Pentesting -Zigbee Veerababu(Mr-IoT)