security

Android Application Hacking with Damn Vulnerable Bank

Hands-on experience with [Damn Vulnerable Bank](https://rewanthtammana.com/damn-vulnerable-bank/)

A Practical Approach To Breaking & Pwning Kubernetes Clusters

Four Day Training on Breaking & Pwning Kubernetes Clusters

Compromising Organizational Systems Through Chaining Attacks

Detailed analysis of how we chained multiple vulnerabilities that led to complete company compromise of one of our multi-million dollar client

Understanding And Exploiting Android Applications

Delivered 4 day training on Android Application Security

Browser Extensions To Hunt For Low Hanging Fruits

Demonstrates the browser extension to automate vulnerability hunting

Creating Browser Extensions To Hunt Low Hanging Fruits

This presentation helps you to create your own browser extension for any browser to automate identification of security vulnerabilities

Hacking Just By Browsing

This presentation helps you to create your own browser extension for any browser to automate identification of security vulnerabilities

Creating Browser Extensions To Hunt For Low Hanging Fruits

This presentation helps you to create your own browser extension for any browser to automate identification of security vulnerabilities

Damn Vulnerable Bank

Vulnerable Banking Application for Android

Dictionary Attack Cyberoam

Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam)