No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2022-09-17 Meet Bangalore Introductions Nikhil P Kulkarni
2022-09-17 Meet Bangalore Cyber Security Awareness Biswajit Sahu
2022-08-28 Meet Ahmedabad Approach To Solve Android CTFs Jaimin Gohel
2022-08-27 Meet Bangalore Feedback & Topics Selection for Next Monthly Meet Nikhil P Kulkarni
2022-08-27 Meet Bangalore An Overview and Changing Paradigm of Cyber Warfare and Operations Abhinav Pandey
2022-08-27 Meet Delhi NCR Cyber crime and Digital forensics Natasha Sharma
2022-08-27 Meet Delhi NCR Cyber crime and Digital forensics Gautam Nangia
2022-08-27 Meet Bangalore Using DNS as a Layer of Defence Swapneel Patnekar
2022-08-27 Meet Delhi NCR Forensics 101 Piyush Kaushik
2022-08-27 Meet Bangalore Backdooring the firmware of an IoT Device Mohammed Saqeeb
2022-08-27 Meet Delhi NCR OWASP Top 10 Series Session 1 - Broken Access Control Jalaj
2022-08-27 Meet Bangalore Networking Session Nikhil P Kulkarni
2022-08-27 Meet Delhi NCR News Bytes Bhavya
2022-08-27 Workshop Pune IoT Hacking 101 Appar Thusoo
2022-08-27 Meet Bangalore Building & Bypassing Content Security Policy Mohammed Akbar Shariff
2022-08-27 Meet Bangalore Introductions Nikhil P Kulkarni
2022-08-27 Meet Bangalore Threat Actors are targeting BFSI Sector using Improvised Modus Operandi Anshuman
2022-07-30 Meet Delhi NCR Authentication and SSO yogesh taneja
2022-07-30 Meet Pune Securing Containers, Images and Kubernetes Ramesh Kumar
2022-07-30 Meet Mumbai Folina Vulnerability Lionel Faleiro
2022-07-30 Meet Pune A Beginners Guide for using FRIDA Ali Jujara
2022-07-30 Meet Delhi NCR Cryptography 101 Naman
2022-07-30 Meet Pune Security Bytes Sudhakar Verma
2022-07-30 Meet Delhi NCR IoT Security anshul bajpai
2022-07-30 Meet Mumbai Create conveyer (Payload Dropper) Chirag Savla
2022-07-24 Meet Ahmedabad Infosec Quiz Kuldeep Pandya
2022-07-24 Meet Ahmedabad Bypassing XSS Filters Virendra
2022-06-26 Meet Ahmedabad Quiz Time Henavi Modi
2022-06-26 Meet Ahmedabad A Unified Methodology to Threat Modeling Henavi Modi
2022-06-26 Meet Ahmedabad Next generation cyber security achivement. shubham shah
2022-06-25 Meet Delhi NCR Introduction to Cyber Security manish Rohilla
2022-06-19 Meet Villupuram Corrupting Linux Userland Memory for fun & Profit Ajay Suresh kumar
2022-06-18 Meet Pune Dynamic Analysis on Flutter based iOS Applications using Ghidra Ali Jujara
2022-06-18 Meet Pune CanaryTokens : Zero-Cost Detection & Deception Dev Dua
2022-06-18 Meet Pune Security Bytes Prateek Thakare
2022-06-12 Meet Villupuram Active Directory Fundamentals Dhanesh Sivasamy
2022-05-28 Meet Delhi NCR The Art of Pentesting JWT Tarun Sehgal
2022-05-28 Meet Delhi NCR Hacking web using Images Chirag Sukhala
2022-05-28 Meet Delhi NCR Introduction to Firewalls sahil sharma
2022-05-22 Meet Ahmedabad Hacking The Most Secured: Blockchain Technology Rohit Burke
2022-05-22 Meet Ahmedabad Cyber-Physical Security Risk and Cybersecurity Framework Het Mehta
2022-05-21 Meet Pune Fuzzing Open Source Software Sudhakar Verma
2022-05-21 Meet Pune Uncharted Secrets of Broken Access Control Aishwarya Kendle & Prateek Thakare
2022-05-21 Humla Delhi NCR Reverse Engineering - A developer approach for protection against possible exploitation Farhad Sajid Barbhuiya
2022-04-30 Meet Delhi NCR Stack based buffer overflow - 101 Swati Laxmi
2022-04-30 Meet Delhi NCR AWS IAM Attack and Defence manish Rohilla
2022-04-30 Meet Delhi NCR The Story of port 445 Sanchay Singh
2022-04-17 Meet Ahmedabad Hacking The Most Secured Blockchain Technology Rohit Burke
2022-04-17 Meet Ahmedabad Data leak through OOB techniques _RaviRamesh
2022-04-10 Meet Twitter null Talks with Founder of CloudSEK - Rahul Sasi Sooraj Sathyanarayanan