No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2016-12-17 Workshop Mumbai IoT Workshop with low level understanding Nitesh Malviya
2016-12-17 Meet Bangalore An introduction to Sysinternals Riyaz Walikar
2016-12-17 Meet Chennai Overview on Firewall Arunraj Radhakrishnan
2016-12-17 Meet Delhi NCR RAT - Kill or Get Killed! (Speaker - Karan Bansal) Sandeep Singh
2016-12-17 Meet Delhi NCR Infosec news bytes - 2016 year in a review Arpit
2016-12-17 Meet Bangalore Malware Reverse Engineering Mohammed Danish Amber
2016-12-17 Meet Chennai SSRF Sivaranjani
2016-12-17 Meet Bangalore Tor Internals and Hidden Services - Part II Gabbar
2016-12-17 Meet Bangalore Tool Demo - Pwntools Chandrapal Badshah
2016-12-17 Workshop Mumbai IoT Workshop with low level understanding Ganesh Naik
2016-12-17 Meet Bangalore iOS pentesting for beginners Arun.S
2016-12-16 Meet Dubai Emerging IoT attacks Mohammed Hyder
2016-12-16 Meet Dubai Introduction to Malware analysis Surendra
2016-12-16 Meet Dubai An introduction to Sysinternals Riyaz Walikar
2016-12-16 Meet Dubai Bad USB's Abdul Rasheed
2016-12-10 Humla Mumbai CTF - Theme IoT Kaustubh Padwad
2016-12-10 Meet Mumbai Memory Corruption - IoT Scenarios Kaustubh Padwad
2016-12-10 Meet Mumbai Side Channel Attacks Arun Mane
2016-12-10 Meet Mumbai NewsByte Nishant Mehta
2016-12-10 Meet Pune Cross Site Scripting : alert(0); swapnil shukla
2016-12-10 Meet Mumbai OWASP - IoT Top Ten Nitesh Malviya
2016-12-10 Meet Pune Android exploit using Signed Certificates Hiren Bhensdadia
2016-12-10 Meet Pune The 3 Es of Ransomware. Sunil Kumar
2016-12-10 Meet Mumbai Understanding of SPI and I2C Protocols Mohammed Pota
2016-12-10 Meet Pune Security News Bytes Nikhil Aswani
2016-12-10 Public Bachaav Bangalore Automated Infrastructure Security Monitoring & Defense Madhu Akula
2016-12-03 Humla Bangalore Android Mobile Security Kartik Lalan
2016-11-27 Meet Bhopal Introduction to IoT Saurabh Chaudhary
2016-11-27 Meet Bhopal Bit coin frauds with special reference to demonetization YOgesh Pandit
2016-11-27 Meet Bhopal News Bytes Shubhanshu Shrivastava
2016-11-27 Meet Chennai Security Newsbytes Rishabh Upadhyay
2016-11-27 Meet Chennai Exploit of the month - part 2 Chintu Philips Koshy
2016-11-27 Meet Chennai Exploit of the month - Part 1 Santhosh
2016-11-27 Meet Chennai Airgap Malware Naresh
2016-11-27 Meet Chennai Using Wireshark for PCAP analysis Balasubramaniam Natarajan
2016-11-26 Meet Delhi NCR Quantum Computing :Uses and Potential in Field of information security aarcee
2016-11-26 Meet Delhi NCR Darknets - Introduction & Understanding Deanonymization of Tor Users Hitesh Bhatia
2016-11-26 Meet Delhi NCR Network Discovery - Inside Out Aakash Goel
2016-11-26 Meet Delhi NCR Infosec News Bytes Arpit
2016-11-26 Humla Mumbai IoT Exploitation Arun Mane
2016-11-19 Meet Bangalore Software defined radio Mr-IoT
2016-11-19 Meet Bangalore Tor Internals and Hidden Services Gabbar
2016-11-19 Meet Pune Understanding of SPI and I2C protocols. Mohammed Pota
2016-11-19 Meet Bangalore Case studies of Authentication and Authorization bypass Sarwar Jahan M
2016-11-19 Meet Pune Buffer overflow attack in depth. Balasaheb Salunke
2016-11-19 Meet Bangalore Demo on Netcat Rahul R
2016-11-19 Bachaav Delhi NCR Attack Monitoring with ELK Shubham Mittal
2016-11-19 Meet Bangalore Introduction to VPN Security shreedhar
2016-11-19 Meet Pune Hacking Car like a BOSS Arun Mane
2016-11-19 Meet Pune Security News Bytes Balasaheb Salunke