I remember my first meeting with Nagareshwar in 2011. We were sitting in a small cafe with a cup of coffee. we discussed many things but one of the topic was how to build a group of like minded p...
Here is the quick update and presentations from our recently concluded ‘SecurityXploded Cyber Security Quarterly Meetup’. In this meet, Adarsh Agarwal delivered presentation on “Under...
In this presentation, Monnappa explained the concept of code injection and hollow process injection. He demonstrated the working of hollow process injection using reverse engineering and showed h...
In this presentation, Anirudh Duggal covered the techniques used to fingerprint vulnerable hospitals and healthcare infrastructure using web based tools. He also explained the potential attack po...
In this presentation, Abhinav chourasia covered the concept of Buffer Overflow and he also demonstrated how one can exploit a vulnerable application and take control of a system and execute arbit...
In this presentation, Satyam Saxena talked about features that can be used to detect DGA domains and he also covered how Whois information and passive dns data can be used to build model to detec...
In this presentation, Adarsh Agarwal covered the the infection mechanism of Ransomwares, different variants of Ransomwares, differences between the variants, anatomy of ransomwares, timeline of t...
This is an announcement for the upcoming SecurityXploded cyber security community meetup on 28th May 2016 in Bangalore, India. This meet is completely free and doesn’t require any registration ...
Here is the quick update and presentations from our recently concluded Sixth ‘SecurityXploded Cyber Security Quarterly Meetup’. In this meet, Jiggyasu Sharma delivered presentation on �...
In this presentation, Monnappa covered Linux malware analysis and showed automation of Linux malware analysis using Limon sandbox, he also demonstrated analysis of Linux malwares Tsunami, Mayhem ...