This is aimed to give beginners an overview of the different areas of cybersecurity and CTF’s. It also consists of basic information about the different areas of cybersecurity like Reverse Engineering, Binary Exploitation, Cryptography, Web Exploitation, and Digital Forensics.Visit
A meant to help people get started with kernel exploitation. It's modular, lab-based environment helps people to easily set up and learn multiple attack vectors present in the Linux kernel.Visit
An educational to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanations and implementation of all the existing vulnerabilities and attacks on various Encryption Systems, Digital Signatures, Message Authentication Codes and Authenticated Encryption Systems. Each attack is also supplemented with example challenges from "Capture The Flag" contests and their respective write-ups.Visit
An educational, CTF-styled for students, security researchers interested in the field of Memory Forensics. The labs are designed in way which helps beginners to learn forensic artifacts which can recovered from a system’s memory.Visit
This emulates the C File Structure and can generate automatic payloads for an arbitrary read and write provided that there is a bug that allows us to overwrite a File Structure. It currently supports amd64 and i386 architectures.Visit
This helps the user to generate Gopher payload for exploiting SSRF (Server Side Request Forgery) and gaining RCE (Remote Code Execution), also it will help the user to gain the Reverse shell on the victim server.Visit
Siddharth was invited to speak on “kernel fuzzing using syzkaller” at moosecon - internal conference by vmware on 18th september at vmware office in bangalore
Ashutosh is an invited speaker in bsides delhi 2019 (october 11th). he will be talking on “analysis of end to end encryption in chat applications“
Kartheek lade conducted a workshop on car hacking at bsides delhi 2019
Geethna and Sowmya were invited to hack.lu 2019 conference (22-24 oct) in luxembourg and took a workshop on introduction to reverse engineering, exploitation and crypto
Abhiram Kumar conducted a workshop on memory forensics - a ctf approach at mec dev conf, kochi.
Shruti and Neelam are invited to take a workshop on getting started with reverse engineering, binary exploitation and cryptography at bsides delhi 2019
Sowmya Potluri and Sayooj Samuel were selected to attend a 4-day workshop on secure multiparty computation: theory and practice 2020, at the indian institute of science (iisc), bangalore. the speakers at this event were top cryptographers, including ran canetti (boston university, usa), yuval ishai (technion, israel), benny pinkas and camit hazay (bar ilan university, israel) among others.