No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2016-07-30 Meet Delhi NCR Infosec News Bytes Arpit
2016-07-23 Humla Mumbai OWASP TOP 10 Attacks and Vulnerabilities Part 2 sagar parmar
2016-07-23 Humla Mumbai OWASP TOP 10 Attacks and Vulnerabilities Part 1 sagar parmar
2016-07-22 Meet Dubai Pixel Dust Attack Sumit Shrivastava
2016-07-22 Meet Dubai Threat Hunting in Windows 2 Gibin John
2016-07-22 Meet Dubai Threat Hunting in Windows 1 Anif
2016-07-22 Meet Dubai WAF Bypass Avinash Kumar Thapa
2016-07-22 Meet Dubai IoT Attack Surfaces Prateek Gianchandani
2016-07-22 Meet Dubai Basics of PCI Juned Mirza
2016-07-16 Meet Bangalore Introduction to Web Application Firewalls. Chandrapal Badshah
2016-07-16 Meet Bangalore Twitter Bug Hunt Gabbar
2016-07-16 Meet Bangalore Linux Privilege Escalation techniques Jagan Mohan
2016-07-16 Meet Bangalore Platform Security using intel SGX Pradyumna Padhan
2016-07-16 Meet Bangalore Security Intelligence Raghavendran Gopal
2016-07-16 Meet Bangalore Node JS Security Madhu Akula
2016-07-16 Meet Bangalore Automated Information Gathering Using Recon-ng narendra kumar
2016-07-16 Meet Bangalore Android Security Internals Kartik Lalan
2016-07-16 Meet Bangalore Beginners Talk on Physical Securty Manasdeep
2016-07-10 Meet Bhopal Setting of Enterprise Environment for Pentesting Through Virtualization Vineet Chhabra
2016-07-10 Meet Bhopal IOS Pentesting Prateek Gianchandani
2016-07-10 Meet Bhopal Burp Suite prashant
2016-07-09 Meet Mumbai Ransomware Aditya Jamkhande
2016-07-09 Meet Mumbai NewsByte RAHUL TULASKAR
2016-07-09 Meet Pune Anti-Virus Bypass using Powershell Pushkar Pashupat
2016-07-09 Meet Mumbai Intro to x86 and Reverse Engineering Amaan Cheval
2016-07-09 Meet Pune Incident Handling & Responses cephas
2016-07-09 Meet Mumbai Business Continuity Planning & Cloud Milind P Wairkar
2016-07-09 Meet Pune Security News Bytes Abbas
2016-06-25 Meet Chennai Microsoft Threat Modelling Tool 2016 - Overview Kannan
2016-06-25 Meet Chennai Enumerating Subdomains Aadarsh
2016-06-25 Meet Chennai DDOS - The Menace Aravind Anbazhagan
2016-06-24 Meet Dubai Defending an Enterprise Active Directory Environment V B
2016-06-24 Meet Dubai Telecom Basics Must for Security Akib Sayyed
2016-06-24 Meet Dubai Basics of NSE (Nmap Scripting Engine) Abhijeet
2016-06-24 Meet Dubai SSH Tunneling Shaikh Raashid
2016-06-18 Meet Delhi NCR Meet the DIVA - Part 1 Ankit
2016-06-18 Meet Delhi NCR Quick & Dirty Forensic Techniques Kamal
2016-06-18 Meet Delhi NCR Mapping your digital footprint Aakash Goel
2016-06-18 Meet Delhi NCR Infosec News Bytes Mohammed Zuber
2016-06-11 Meet Bangalore Metasploit basics and db usage Arun.S
2016-06-11 Meet Bangalore Windows Privilege Escalation Techniques Riyaz Walikar
2016-06-11 Meet Bangalore An introduction to Single Sign On [with Demo] Lakshmikiran
2016-06-11 Meet Bangalore How I pwned you online Nutan Kumar Panda
2016-06-11 Meet Bangalore Case studies of recent network attacks Devanshu Agarwal
2016-06-11 Meet Mumbai Fuzzing | Part I Nitesh Malviya
2016-06-11 Meet Mumbai Malware Command and Control: Evasion Tactics and Techniques Dhawal Sudhir shah
2016-06-11 Meet Bangalore SQL Injection to shell Krithika Mutuguppe
2016-06-11 Meet Pune Windows Kernel Exploitation 7 Ashfaq Ansari
2016-06-11 Meet Mumbai Malware Command and Control: Evasion Tactics and Techniques Avkash K
2016-06-11 Meet Bangalore Targeted Attacks Ashwin Vamshi