Saumil Udayan Shah [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Inside Stegosploit Deepsec-2016 - vienna,austria
2016: The Infosec Crossroads hacklu-2016 - parchotel,luxembourg
ARM Shellcode Basics hacklu-2016 - parchotel,luxembourg
ARM Shellcode Basics 44con-2016 - london,uk
2016: The Infosec Crossroads 44con-2016 - london,uk
STEGOSPLOIT - EXPLOIT DELIVERY WITH STEGANOGRAPHY AND POLYGLOTS BlackHatEU-2015 - amsterdam,netherlands
Stegosploit - Delivering Drive-By Exploits With Only Images HackLu-2015 - parcHotel,Luxembourg
Stegosploit: Hacking with Pictures HITBamsterdam-2015 - Amsterdam,Netherlands
Stegosploit - Hacking with Pictures Syscan-2015 - Merchant Court,Singapore
Hacking with Images - Evil Pictures Hacklu-2014 - Luxembourg,Germany
12 YEARS AND A BAKER'S DOZEN Nullcon-2014 - Goa,India
Bad Things in Good Packages - Creative Exploit Delivery Deepsec-2012 - Vienna, Austria
The Exploit Laboratory Advanced Edition Deepsec-2012 - Vienna, Austria Security
Innovative Approaches to Exploit Delivery HITBSecConf Malaysia-2012 - KL, Malaysia Exploitation Web Security Attack
Web Wars 3 HITBMalaysia-2011 - Kuala Lam Pur,Malaysia
Lessons Learned From 2010 Nullcon-2011 - Goa, India Security
Exploit Delivery HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Web Browser
The Traveling Hacksmith 2009-2010 HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Others Deep Knowledge
Surviving The Internet In 2010 ITWeb Security Summit-2010 - Johannesburg, South Africa Security Analysis
web security - going nowhere? HITBDubai-2010 - Dubai,UAE
Ownage 2.0 DeepSec-2009 - Vienna,Austria
Ownage 2.0 HackLu-2009 - Luxembourg,Luxembourg
Browser Exploits - A New Model For Browser Security HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Browser
Browser Exploits - A new model for Browser Security HackLu-2008 - Luxembourg,Luxembourg
Top 10 Web 2.0 Attacks HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Web
Writing Metasploit Plugins - from Vulnerability to Exploit BlackhatUSA-2006 - Las Vegas,USA
Adware/Spyware BlackHatAsia-2005 - Tokyo,Japan
Writing Metasploit Plugins - From Vulnerability To Exploit Blackhat USA-2005 - Las Vegas, USA Security Development
Defeating Automated Web Assessment Tools Blackhat Europe-2005 - Amsterdam, The Netherlands Security Web
Defeating Automated Web Assessment Tools Blackhat Europe-2005 - Amsterdam, The Netherlands Security Web
Defeating Automated Web Assessment Tools Blackhat USA-2004 - Las Vegas, USA Security Web
Defeating Automated Web Assessment Tools Blackhat USA-2004 - Las Vegas, USA Security Web
Http Fingerprinting And Advanced Assessment Techniques Blackhat Europe-2004 - Amsterdam, The Netherlands Security Web
Http Fingerprinting And Advanced Assessment Techniques Blackhat Europe-2004 - Amsterdam, The Netherlands Security Web
HTTP Fingerprinting and Advanced Assessment Techniques BlackHatWindows-2004 - Las Vegas,USA
HTTP: Advanced Assessment Techniques BlackHatWindows-2003 - Las Vegas,USA
Top Ten Web Attacks BlackHatAsia-2002 - Marina Bay,Singapore
One-Way Sql Hacking: Futility Of Firewalls In Web Hacking Blackhat Europe-2001 - Amsterdam, The Netherlands Security Web SQL
Web Hacking BlackHatAsia-2001 - Marina Bay,Singapore
Web Hacking BlackHatWindows-2001 - Las Vegas,USA