Sanoop Thomas public
[search 0]
More
Download the App!
show episodes
 
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
  continue reading
 
Loading …
show series
 
Duncan Ogilvie has started reverse engineering somewhere around 2009. He is the creator of x64dbg, an open-source x64/x32 debugger for windows, and 100+ other projects. Duncan loves to do binary analysis and Windows internals. In this episode, he shares the interesting journey with developing and maintaining x64dbg project. For more SecTools podcas…
  continue reading
 
A cybersecurity professional with expertise in mobile, web, and network penetration testing. Dimitrios holds a degree in Computer Science, majoring in Cryptography and Security, and has worked with top companies like Microsoft and Google. He is frequent speaker at prominent security conferences such as BlackHat, Nullcon, Insomni'hack, and Troopers.…
  continue reading
 
Angelina Tsuboi is an aerospace cybersecurity instructor focusing on satellite systems. With over a decade of programming and development experience in addition to being a scientific researcher for NASA, she has been involved in various CubeSat initiatives where she participated in tasks related to command and data handling subsystems and firmware …
  continue reading
 
Gelei is a cybersecurity researcher with wide interests in system security and penetration testing. He is currently pursuing a Ph.D. in computer science from Nanyang Technological University, Singapore, where he explores security challenges in complex human-interactive systems. Gelei is also a blockchain auditor at Quantstamp, Inc., where he contri…
  continue reading
 
Abhisek Datta is an accomplished security professional with over a decade of experience in information security solution engineering, services, vulnerability research, reverse engineering and security tools development. He is an active participant of NULL Security Community, India’s largest open security community as a core team member responsible …
  continue reading
 
Tim Misiak has been working on debuggers and diagnostics for most of my professional career as a software engineer. For more than a decade, Tim has been working on the Microsoft Debugger Platform team, working on tools such as WinDbg and KD. He started the WinDbgNext project in 2016 that modernized WinDbg UI. Tim also wrote a chunk of the X86/X64 e…
  continue reading
 
Thomas Roccia is the Sr. Security Researcher at Microsoft, working on threat intelligence, malware analysis, incident response, and more. He also has the interest in many other topics including mentoring and teaching, open-source, hacking, 3D printing and even blockchain ecosystem. For more SecTools podcast episodes, visit https://infoseccampus.com…
  continue reading
 
Erlend has worked as a developer and security consultant for over 14 years, trying to build and break many different types of systems. He spends some of his free time on security research and open source tools, and is the main author behind retire.js - a free and open source scanner for JavaScript. He is also the chapter leader of the Norwegian OWA…
  continue reading
 
Jeff Foley has over 20 years of industry experience focused on applied research & development and assessment of security in critical information technology and infrastructure. He is the Project Leader for Amass, an OWASP (Open Web Application Security Project) Foundation flagship project that performs in-depth attack surface mapping and asset disco…
  continue reading
 
Anand Tiwari is an information security professional with a strong technical background working as a Technical Product Manager (PM), focusing on the more technical aspects of a cloud security product. He tries to fill it in by doing in-depth technical research and competitive analysis, given business issues, strategy, and a deep understanding of wh…
  continue reading
 
Nicolas is a French security researcher, a proud dad of two children. He started Wapiti in 2006 when he was learning Python programming language. Nicolas is currently working in the infosec field as a programmer at CybelAngel (since 2015). Wapiti is a web-application vulnerability scanner that allows you to audit the security of your websites or we…
  continue reading
 
unblob is an accurate, fast, and easy-to-use extraction suite. It parses unknown binary blobs for more than 30 different archive, compression, and file-system formats, extracts their content recursively, and carves out unknown chunks that have not been accounted for. unblob is free to use, licensed under MIT license, it has a command line interface…
  continue reading
 
Christian Folini is a Swiss security engineer and web application firewall expert working at netnea.com. Christian studied History and Computer Science and graduated with a PhD in Medieval History. He is the author of the ModSecurity Handbook (2ed), He also co-lead the OWASP ModSecurity Core Rule Set (CRS) project that runs on millions of servers g…
  continue reading
 
Graduated in 1999 from Epita (France) as IT security engineer, Philippe endorsed many roles before creating its latest company CrowdSec. From Pentester to community builder (Magento) or even eCommerce expert (author of 4 books), or CTO, he is tech curious and loves to dive into new trends like IoT, crypto currencies or AI. But whatever the context …
  continue reading
 
Alexandre Dulaunoy: Alexandre Dulaunoy leads the Luxembourgian Computer Security Incident Response Team (CSIRT) CIRCL in the research and operational fields. He enjoys working on projects that blend “free information,” innovation, and direct social improvement. When not gardening binary streams, he likes facing the reality of ecosystems while garde…
  continue reading
 
Ai Ho (mostly known as j3ssie) is a self-taught security engineer with a computer science background who loves automation. He got Interested in responsible disclosure/bug bounty nearly three years ago and have been building some of my own tools to do it. He wrote Osmedeus, Jaeles and Metabigor to help his bug bounty efforts and made these projects …
  continue reading
 
Ruslan Habalov has a computer science background with a focus on code analysis and is interested in scalable solutions to challenging security problems. His security research covered an exploitable remote code execution bug in PHP used against a popular platform in a bug-bounty context as well as side-channel attacks against browsers. As a machine …
  continue reading
 
Jack Baker is a professional security researcher and amateur video game hacker. Jack has spoken at a handful of conferences including DEF CON on subjects relating to reverse engineering and vulnerability research. Jack started his infosec career as a software developer in the fintech space before realizing that breaking things is less stressful tha…
  continue reading
 
Lukas Rist authored several open source honeypot projects. After spending a couple of years studying mathmatics and physics, Lukas ventured out to work with Bing and Microsoft Research on making the web a safer place, got payed by DARPA to hunt hackers and taught students in Taiwan open source security. His passion for security and open source got …
  continue reading
 
Joxean Koret has been working for the past 15 years in many different computing areas. He started as a database software developer and DBA for a number of different RDBMS. Eventually he turned towards reverse engineering and applied this DB insights to discover dozens of vulnerabilities in major database products, especially Oracle. He also worked …
  continue reading
 
Chris Em (also known as Cookie Engineer) has almost 2 decades of experience in IT and security industry. He specializes in multiple domains including web intelligence, network security and forensics. During spare time, Chris is working on the Web of Knowledge with his project called the [Tholian Network](https://tholian.network), which aims to auto…
  continue reading
 
Marc Ochsenmeier is the author of Pestudio on winitor.com. Pestudio is a unique tool that allows you to perform an initial assessment of a malware without even infecting a lab system or studying its code. Marc has initially worked as software developer with a focus on Windows hardening security. He also has a vast expertise in penetration testing a…
  continue reading
 
In 2001, NJ founded the Infosec community tools portal ToolsWatch.org. And since 2011, he is co-managing & helping to improve the Black Hat Arsenal the World’s largest security event dedicated to open source tools demonstrations. NJ is also the founder of vFeed, Inc a niche startup that provides top-notch correlated vulnerability & threat intellige…
  continue reading
 
Guillaume Valadon is the Security Agent Team Lead at Datadog, and holds a PhD in IPv6 networking. He likes looking at data and crafting packets. In his spare time, he co-maintains Scapy and learns reversing embedded devices. Also, he still remembers what AT+MS=V34 means! Guillaume regularly gives technical presentations, classes and live demonstrat…
  continue reading
 
Vipin Pavithran is a cyber-security professor at Amrita Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham. He is the founder and chief mentor of internationally recognized student clubs - amFOSS, Team bi0s, and Team Shakti . He is also known for organizing the premiere InCTF and InCTF Junior - cyber-security contests, which …
  continue reading
 
Paulino Calderon (@calderpwn) is a published author and international speaker with over 12 years of experience in network and application security. When he isn’t traveling to security conferences or consulting for Fortune 500 companies with Websec, a company he co-founded in 2011, he spends peaceful days enjoying the beach in Cozumel, Mexico. He lo…
  continue reading
 
Anastasios Stasinopoulos is a Senior Penetration Tester at Obrela Labs - Obrela Security Industries and has a professional experience over 6 years in the field of Information Security working exclusively as a Penetration Tester. Anastasios earned the Bachelor of Science (B.Sc.) degree in "Surveying & Geoinformatics Engineering" from Technological I…
  continue reading
 
Steve Springett is the Senior Security Architect at ServiceNow, Chicago. Steve educates teams on the strategy and specifics of developing secure software. He practices security at every stage of the development lifecycle by leading sessions on threat modeling, secure architecture and design, static/dynamic/component analysis, offensive research, an…
  continue reading
 
Nishant Sharma leads R&D at Pentester Academy and Attack Defense. He has 8+ years of experience in the information security field including 6+ years in WiFi security research and development. He has conducted classroom trainings in Blackhat USA, HITB Amsterdam/Singapore, RootCon, OWASP NZ Day. He has presented research and conducted workshops at Bl…
  continue reading
 
Emily Wenger is a PhD student at the University of Chicago studying machine learning security and privacy. She’s particularly interested in understanding and preventing the unintended uses/abuses of facial recognition technology. Emily and team has built Fawkes, a system that helps individuals inoculate their images against unauthorized facial reco…
  continue reading
 
Isaac Evans is the leader of r2c (https://r2c.dev/), a small startup working on giving security tools directly to developers. Previously, he conducted research into binary exploitation bypasses for techniques like control-flow integrity and novel hardware defenses on new architectures like RISC-V as a researcher at the US Defense Department under a…
  continue reading
 
Kai Jern (xwings), is Lab Director of The ShepherdLab, of JD Security. His research topic mainly on embedded device, hardware security, blockchain security, reverse engineering and various security topics. He presented his findings in different international security conferences like Defcon, HITB, Codegate, QCon, KCon, Brucon, H2HC and etc. He cond…
  continue reading
 
H.D Moore founded the Metasploit Project in early 2003 and later the project was aquired by Rapid7. He spent the last 20 years conducting security assessments, building security products, and pushing the status quo through research, with leadership roles at Digital Defense, BreakingPoint Systems, Rapid7, and Atredis Partners. HD founded Critical Re…
  continue reading
 
Brian leads the digital forensics team at Basis Technology, which builds software for incident response, digital forensics, and custom mission needs. He is the author of the book File System Forensic Analysis and developer of several open source digital forensics analysis tools, including The Sleuth Kit and Autopsy. Brian has a Ph.D. in computer sc…
  continue reading
 
Miroslav Stampar is an IT Security Advisor - Expert at Croatian Government's CERT, part of the Information Systems Security Bureau (ZSIS). Born in 1982., writing and breaking computer code for as long as I can remember. A PhD candidate with Master's Degree in Computer Science at Faculty of Electrical Engineering and Computing (FER), University of Z…
  continue reading
 
Joakim Kennedy is a Threat Intelligence Manager for Anomali. His job involves analyzing malware, tracking threat actors and numerous other responsibilities around threat intelligence. He often leads efforts around the Anomali Threat Research Team’s reports and blogs. His tool the “Go Reverse Engineering Toolkit” (https://go-re.tk/) was presented at…
  continue reading
 
Giovanni is a senior cyber security expert and manager based in Paris, old Italian Backtrack Linux ambassador/staff and ex DEFT Linux developer, now is the Tsurugi Linux core developer. DFIR instructor in his free time, he has spoken in several security conferences and he is passionate of many other topics like cyber-threat intelligence investigati…
  continue reading
 
SecTools Podcast Series Episode 13 with Ajin Abraham Ajin Abraham is a Security Engineer with 8+ years of experience in Application Security including 4 years of Security Research. He is passionate on developing new and unique security tools. Some of his contributions to Hacker's arsenal include OWASP Xenotix XSS Exploit Framework, Mobile Security …
  continue reading
 
Mohammed A. “secfigo” Imran is the Founder and CTO of Eracorp Technologies/Practical DevSecOps and a seasoned security professional with 8 years of experience in helping organisations with their Information Security Programs. He has a diverse background in R&D, consulting and product-based industries with a passion to solve complex security program…
  continue reading
 
Aseem Jakhar is the Director, research at Payatu Software Labs payatu.com a boutique security testing company. He is a renowned security researcher with extensive experience in system programming, security research and consulting. He is well known in the hacking and security community as the founder of null - The open security community, registered…
  continue reading
 
Yiannis is a Director at one of the big 4 consulting firm with over 10 years of technical experience providing physical security assessments, penetration tests and red team operations. Yiannis is the developer of the WarBerryPi which has been presented at Blackhat USA 2016, Blackhat Europe 2016 and Blackhat USA 2018 among other conferences. Yiannis…
  continue reading
 
Tanya Janca is a senior cloud security advocate for Microsoft, specializing in application and cloud security; evangelizing software security and advocating for developers and operations folks alike through public speaking, her open source project OWASP DevSlop, and various forms of teaching via workshops, blogs and community events. As an ethical …
  continue reading
 
Mike Hodges is a Senior Security Engineer at Red Ventures leading Red Team Operations and Incident Response. He comes from a background of application development and penetration testing consulting. Currently, his focus is on developing evasive offensive capabilities and fighting off the ever-present imposter syndrome brought on by working in InfoS…
  continue reading
 
Anant Shrivastava has worked on computer and open source software since 2000. He grouped Linux user groups in Bhopal and was also active in other major Linux user groups across India. Anant now working as Regional Director Asia Pacific for NotSoSecure Global Service. He has been Speaker/Trainer at various conferences including BlackHat, RuxCon, Nul…
  continue reading
 
Fotis Chantzis has been a member of the main Nmap development team since 2009, when he wrote Ncrack under the mentorship of Fyodor, the original author of Nmap, during Google Summer of Code 2009 and 2010. He also represented Nmap at the Google Mentor Summit in October 2016. His work includes exploiting the TCP Persist Timer to magnify the effect of…
  continue reading
 
OJ Reeves TheColonial is an Australian security professional who specializes in attack simulation. When not breaking networks and software, he is actively contributing to the Metasploit framework on Meterpreter for years. He is also a member of the Corelan team. Today OJ runs a specialist security consultancy called Beyond Binary based in Australia…
  continue reading
 
Ryan Dewhurst has been testing web applications professionally for security issues since 2009. He has a BSc (hons) Ethical Hacking for Computer Security that he completed with a First. Ryan is very active in the information security community, contributing to various OWASP projects and releasing his own popular tools such as Damn Vulnerable Web App…
  continue reading
 
Simon is the project leader for the OWASP Zed Attack Proxy (ZAP), one of the world’s most popular free security tools, which he first released in 2010. Previously a Java web application developer he now works in the Mozilla Firefox Operations Security team helping to protect the core services that Mozilla relies on to build, ship and run Firefox. L…
  continue reading
 
Loading …

Quick Reference Guide