No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2023-09-30 Meet Bhubaneswar Harnessing AI and ML in Cybersecurity Ashwin Ragav
2023-09-30 Humla Ahmedabad API Testing Basics Dishant Kapadiya
2023-09-17 Meet Ahmedabad Silent Leaks, Loud Risks: Mastering Operational Security Divyansh Jain
2023-09-17 Meet Ahmedabad API Reversing: Penetration Testing Without Documentation Dishant Kapadiya
2023-09-17 Meet Ahmedabad Secure by Design: A Dive into Application Security Engineering Akshar
2023-09-17 Meet Ahmedabad Fortifying Foundations: A Primer on SCADA Security Jayvin Gohel
2023-09-17 Meet Ahmedabad News Bytes harshit
2023-09-16 Meet Kolkata Cyber Forensics in the New Age of Cyber Security Soham Das
2023-09-16 Meet Bangalore Reverse Engineering: Ghidra or IDA? Manish
2023-09-16 Meet Bangalore Securing CI/CD Pipeline using Github Actions Bharath Kumar N
2023-09-16 Meet Kolkata GSM call flow & security features (2G,3G,4G) KRISHNENDU GHOSH
2023-09-16 Meet Bangalore Hawk Eye - Datasource, PII & Secret Scanner (Open Source Tool Demo) Rohit Kumar
2023-09-16 Meet Kolkata Reverse Engineering and It’s Basic Prasenjit Kanti Paul
2023-09-16 Meet Kolkata Get Started with Cyber Security and Its landscape Anurag Roy
2023-09-16 Meet Bangalore Bug Hunting For Everyone Pawan Chhabria
2023-09-16 Meet Bangalore Supply Chain Security Neeraj Kumar Vijay
2023-09-02 Meet Pune Hacking Electron Applications Prajyot Chemburkar
2023-09-02 Meet Pune Security Champions Program, Developer Education and Advocacy Ishaq Mohammed
2023-08-27 Meet Ahmedabad BLEached Security Mukund bhuva
2023-08-27 Meet Ahmedabad Let's Talk about Container Security nivet pv
2023-08-27 Meet Ahmedabad Data Protection Bill: A Joke That's Not Funny Anymore Het Mehta
2023-08-26 Meet Delhi NCR Demystifying LLMs and Associated Security Risks Sandeep Singh
2023-08-26 Meet Bhubaneswar Sql Injection Suvendu Das
2023-08-26 Meet Delhi NCR Unraveling the SCA Complexity: Navigating in a World of Bugs, Updates, and Diverse Tools Ankit
2023-08-26 Meet Bhubaneswar Memory forensics for malware analysts abhijit mohanta
2023-08-26 Meet Delhi NCR OWASP Top 10 Series | A07:2021-Identification and Authentication Failures Jalaj
2023-08-26 Meet Delhi NCR OWASP Top 10 Series | A07:2021-Identification and Authentication Failures Sanchay Singh
2023-08-26 Meet Bhubaneswar Darkweb Basics Jayant Agarwal
2023-08-19 Meet Bangalore AWS IAM Privilege Escalation Ankit Sharma
2023-08-19 Meet Bangalore Deeplink Exploitation Sunita
2023-08-19 Meet Bangalore Product Security Namrata Mahajan
2023-08-19 Meet Bangalore Smart contract fuzzing Gururaj Dalawai
2023-08-12 Humla Bangalore Exploit Development Manish
2023-08-06 Meet Kolkata Demystifying Cyber Threat Intelligence Debraj Dey
2023-08-06 Meet Kolkata C&C Frameworks : An Overview Ayan Saha
2023-08-06 Meet Kolkata Evolution of Hacking, Hackers and Cyber Attacks Ronit Chakraborty
2023-07-30 Meet Ahmedabad Quiz Session Kuldeep Pandya
2023-07-30 Meet Ahmedabad OSINT Unveiled Bhashit Pandya
2023-07-30 Meet Ahmedabad Fetching GeoLocation Details Het Mehta
2023-07-30 Meet Ahmedabad Art of Fetching Historical Records Purvil
2023-07-29 Meet Bhubaneswar Reverse Engineering Part 2 - win32 api abhijit mohanta
2023-07-29 Meet Bhubaneswar Scan through Scams Lagnajeet Mishra
2023-07-29 Meet Bhubaneswar Chatgpt for Security Professional and/or for Everyone Nutan Kumar Panda
2023-07-29 Bachaav Bangalore Deep Dive into Container Security & Hardening Rohit Kumar
2023-07-15 Humla Chennai Malware Analysis - CTF - Custom malwares Chandresh Gupta
2023-07-15 Meet Bangalore Ikaros - An attack surface management framework Prateek Thakare
2023-07-15 Meet Bangalore NGFW - Firewall & DNS Security Anandraj Amaran
2023-07-15 Meet Bangalore From User to Domain Controller: A Journey through the Critical ADCS Vulnerability in Active Directory Abhinandan Khurana
2023-07-15 Meet Bangalore Exploring Security Through Digital Risk Protection Lens Pavan Karthick M
2023-07-15 Meet Bangalore Task Hijacking Anshika