No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2016-09-24 Meet Delhi NCR Infosec News Bytes Arpit
2016-09-24 Meet Kolkata 'What' and 'How' of a CTF Govind Singh
2016-09-24 Meet Mumbai Linux Kernel Internals & Memory Management Ganesh Naik
2016-09-23 Meet Dubai Panel Discussion & Live Q&A - Bug Bounties Rupam Bhattacharya
2016-09-23 Meet Dubai Panel Discussion & Live Q&A - Bug Bounties TAS
2016-09-23 Meet Dubai Exploiting Software Update Vulnerabilities V B
2016-09-23 Meet Dubai Exploiting a Domain using Rogue Kerberos Server TAS
2016-09-23 Meet Dubai Ransomware Preface Arjun PN
2016-09-17 Humla Mumbai Drozer for Android Application Security Vivek Mahajan
2016-09-17 Meet Pune Secure Coding in C# Siddharth Bezalwar
2016-09-17 Meet Pune Android Application Exploitation Sumedh Bhalerao
2016-09-17 Humla Mumbai Drozer for Android Application Security Vivek Mahajan
2016-09-17 Meet Pune Security News Bytes swapnil shukla
2016-09-17 Meet Pune Pwning Computers Using USB HID Devices Rashid feroz
2016-09-17 Workshop Bangalore Python School of Security - Class 2 Bharath
2016-09-17 Workshop Bangalore Python School of Security - Class 2 Abhinav Chourasia
2016-09-11 Meet Bhopal What it takes to defend an application Anant Shrivastava
2016-09-11 Meet Bhopal Admissibility of electronic evidence in India YOgesh Pandit
2016-09-11 Meet Bhopal News Bytes Jaskaran Singh Narula
2016-09-10 Meet Bangalore CTF(Capture The Flag) Approach Chandrakant
2016-09-10 Meet Bangalore Using Hydra Sankalp Bastakoti
2016-09-10 Meet Bangalore IOT Exploitation - II Abhinav Chourasia
2016-09-10 Meet Bangalore Bypassing Corporate Security Aamer Shah
2016-09-10 Meet Bangalore iOS App Runtine Analysis Swaroop Yermalkar
2016-08-28 Workshop Delhi NCR Bug Bounty Hunting Abhinav Mishra
2016-08-27 Humla Mumbai Approaching and cracking a CTF - Part 2 Vivek Mahajan
2016-08-27 Meet Delhi NCR Scratching your Brain into Darkweb Arpit
2016-08-27 Meet Kolkata Intimacy with MSF - Metasploit Framework Animesh Roy
2016-08-27 Meet Kolkata Unleashing OWASP through Buffer Overflow / Reverse Engineering Prasenjit Kanti Paul
2016-08-27 Meet Delhi NCR Windows Privilege Escalation Techniques Dhruv
2016-08-27 Meet Delhi NCR OWASP Project Talk Vaibhav Gupta
2016-08-27 Meet Kolkata Scanning in Deep - Exploring the Nmap Chandresh Gupta
2016-08-27 Meet Delhi NCR Infosec News Bytes Ankit
2016-08-27 Humla Mumbai Approaching and cracking a CTF - Part 1 Mayank
2016-08-26 Meet Dubai Content Security Policy Rupam Bhattacharya
2016-08-26 Meet Dubai Infernal Wirless Suite Demo Khalilov
2016-08-26 Meet Dubai Bypassing AV & Application Whitelisting Bhdresh
2016-08-26 Meet Dubai Pixie Dust Attack Sumit Shrivastava
2016-08-20 Meet Chennai SCADA Pentesting Bhaskar
2016-08-20 Meet Chennai Spam Email Filtering Srihari
2016-08-20 Meet Chennai Onion Routing on Cloud Akash Thakur
2016-08-20 Meet Chennai Automated Pentesting Arjun Basnet
2016-08-14 Meet Bhopal Using BurpSuite Intruder for Web Application Security Testing Akash Mahajan
2016-08-14 Meet Bhopal Browser Automation Using Selenium and Python Rahul
2016-08-14 Meet Bhopal Introduction to Burp Suite prashant
2016-08-13 Meet Bangalore IOT Exploitation Bharath
2016-08-13 Meet Bangalore Security of Healthcare systems Anirudh duggal
2016-08-13 Meet Bangalore Buffer Overflow detection with Immunity Pratik Shah
2016-08-13 Meet Mumbai NTFS Forensics D.M.Reddy
2016-08-13 Meet Mumbai Formula Injection Chirag Savla