News

Explore what’s going on with Payatu.

Abhinav Thakur and Himanshu Gupta delivered a talk at Security Boat Meetup on “Secure Code Review and Reverse Engineering bare-metal firmware”

Aseem Jakhar delivered a talk at IOTSHOW.IN on “What Shall make Indian Engineers to be able to write their own Pay Cheques?”

Syed Modassir Ali conducted a workshop on “Infrastructure Penetration Testing for Beginners”

Shashank Dubey will be delivering a talk on “Cloud Fortification: Protecting AWS with IAM, CloudTrail, and Lambda”

Kedar Sovani delivered a Webinar on “Security and Privacy in the Smart home with Matter”

Yashodhan Mandke and Appar Thusoo delivered a talk on “Introduction to IoT Hardware Hacking.”

Yashodhan Mandke will be delivering a webinar on “IoT Hardware Hacking Att(ACK)ing I2C.”

Amit Musale will be delivering a webinar on “All you need to know about OT Security.”

Bartek Gedrojc, Ph.D., VP Sales Products at Riscure will be delivering a webinar on “Fundamentals of Fault Injections.”

Amit Musale will be giving a talk on “Building ICS/SCADA (OT) Security Labs.”

Kumar Ashvin will be giving a talk on “Are your containers really secure?.”

Kartheek Lade will be conducting a workshop on “Car Hacking.”

Hari Prasad and Arun Nair will be conducting a workshop on “Lateral Movement Techniques.”

Appar Thusso will be delivering a webinar on “Medical Device Security: The Good, the Bad and the Ugly.”

Aseem Jakhar will be giving a talk on “EXPLIoT Framework.”

Kumar Ashvin will be giving a talk on “Security Containers from Day One.”

Yashodhan Mandke will be speaking at cOcOn on the topic “IoT Security Standards and Guidelines.”

Karthik Lade will be speaking at cOcOn on the topic “CANalyse: A Vehicle Network Analysis and Attack Tool.”

Kumar Ashwin will be giving a talk on “Getting Started with DFIR”

Kumar Ashwin will be giving a talk on “Honey Dripping from the Cloud.”

Gaurav Bhosale will be giving a talk on “An Introduction to Wifi Penetration Testing”

Nandhakumar will be giving a talk on “DevSecOps 101: Integrating Security into Devops.”

Arjun Singh will be giving a talk on “Privileges Escalation and Sensitive Data Exposure”

Hrushikesh Kakade will be giving a talk on “Red Team Assessment: Setting up Phishing Campaign (Live Demo)”

Hrushikesh Kakade will be giving a talk on “Introduction to Red Team Assessments: Enumeration.”

Yashodhan Mandke will be giving a talk on “Securing your IoT Products with Security Compliance Standards.”

Aseem Jakhar will be speaking at the Dynamic CISO Session on the topic IoT: New Frontier, New Threats.

Nikhil Joshi will be giving a talk on “An Introduction to AI Security Assessment”

Aseem Jakhar will be speaking at ISMG virtual cybersecurity summit on the topic connected device security.

Hrushikesh Kakade will be giving a talk on “An Introduction to Red Team Assessments”.

Appar Thusoo will be giving a talk on “Under The Air: Introduction to Software Defined Radio”.

Munawwar Hussain Shelia will be giving a talk on “The Art & Craft of writing ARM shellcode”.

Asmita Jha will be giving a talk on “Secure IoT product development with an understanding of the attacker’s perspective” at Nullcon Masterclass for Developers.

Munawwar Hussain Shelia will be speaking at HITB Cyber Week on the topic Writing Bare-Metal ARM Shellcode.

Asmita Jha will be taking a Workshop at CISO Platform on “Hacking IoT with EXPLIoT Framework”.

Nikhil Mittal will be speaking at powerofcommunity security conference on the topic “My Hacking Adventures With Safari Reader Mode”.

Asmita Jha will be taking a workshop at Hackaday Remoticon on “Introduction to Firmware Reversing”.

Asmita Jha will be taking a session on “IoT Security Assessment”.

In this Webinar, our Bandit Rewanth will give Security professionals a comprehensive understading of the Reconnaissance to SQL Injection, SQL injection to Remote Code Execution(RCE) etc.

Munawwar will give security professionals a comprehensive understanding of the ARM Architecture, reversing ARM binaries, exploiting vulnerabilities and the nuances of ARM shellcoding.

Arun Magesh will be delivering a webinar on Introduction to IoT Reversing Firmware and discussing how to get started with IoT pentesting with hands-on.

Ashfaq Ansari is conducting a workshop to get you started with kernel vulnerability analysis and exploitation on the Android platform.

Aseem Jakhar will be delivering the talk – “Busting the IoT Security Assessment Blues with Super Powers” at IoXt Alliance Spring Virtual Conference.

Nikhil Joshi will be delivering a webinar on “How secure are ML application”.

Nikhil Joshi will be delivering training titled “ML for security and security for ML” at troppers2020

Ashfaq Ansari, will be delivering a training on “Windows Kernel Exploitation Foundation & Advanced” at CanSecWest, Canada 2020.

Aseem Jakhar and Munawwar Hussain Shelia will be delivering a training on “Practical IoT Hacking” at nullcon, Goa, India 2020.

Nikhil Joshi will be delivering the training titled “ML for security and security for ML” at Nullcon Goa 2020.

Ashfaq Ansari, will be delivering a training on “Windows Kernel Exploitation Foundation & Advanced” at nullcon, Goa, India 2020.

Nikhil Joshi delivered a talk titled “Machine Learning for Offensive Security” at PyData Pune.

Munawwar Hussain and Asmita Jha will be delivering IoT Hacking workshop CPX360 Asia on 17 Jan 2020 in Bangkok.

Nikhil Mittal will be speaking at CCC events on the topic breaking Microsoft edge extensions security policies

Ashfaq Ansari a.k.a “HackSysTeam”, will be delivering Windows Kernel Exploitation Training.

Sudhakar Verma and Krishnakant Patil will be delivering 2 days training on Reverse Engineering at NULLCON Delhi 2019.

We will be demonstrating our tool EXPLIoT: IoT Security Testing and Exploitation Framework at Defcon 27 Demo Labs track

We will be demonstrating our tool EXPLIoT: IoT Security Testing and Exploitation Framework at BlackHat Arsenal track.

Nikhil Joshi will be delivering a training titled “ML for security and security for ML” at Nullcon Bangalore 2019.

Delivered a talk on How to fail in Hardware Hacking at PHDays

We will be delivering a talk on “Hacking using browsing” – building a browser extension to hunt for bugs at CRESTCon London 2019.

We will be delivering a talk on “Hacking using browsing” – building a browser extension to hunt for bugs at Bsides Cairo 2019.

Rewanth will be delivering a talk on building a browser extension to bunt for low hanging fruits at HITB 2018.

We will be delivering 3 days training on Windows Kernel Exploitation Advanced

Delivered a Workshop on hacking a Smart Watch at DEFCON 25.

We will be delivering 2 days training on Mobile App Attack.

We will be delivering 3 days training on Practical IoT Hacking.

We will be delivering 2 days training on Practical IoT Hacking Basic Edition

We will be delivering 3 day training on “Practical IoT Hacking Training” at ZerOCon 2018

We will be delivering 3 day training on “Windows Kernel Exploitation Advanced” at ZerOCon 2018

We will be delivering 2 day training on “Practical IoT Hacking: Basic Edition” at Blackhat Asia 2018

We will be delivering 2 days training on Windows Kernel Exploitation Advanced

We will be delivering 2 days training on Windows Kernel Exploitation Foundations

Presenting at Blackhat Arsenal about “EXPLIoT – Internet of Things Security Testing and Exploitation Framework”

We will be delivering 2 day training on “Mobile App Attack” at AppSec USA 2017

We will be delivering workshop on “Mobile App Attack 2.0” at DefCon 25, Caesars Palace

We will be delivering workshop on “eXtreme Mobile Application Exploitation” Tuscany Suites and Casino

We will be delivering three day “Practical IoT Hacking” training at Hack in Paris.

We will be delivering the talk “IoT Hacking Simplified” at Hack in the Box CommSec, Amsterdam

We will be delivering two two “Practical IoT Hacking” training at Hack in the Box Amsterdam.

We will be delivering 2 days training on Windows Kernel Exploitation at Power of Community

We will be delivering 3 days training on Windows Kernel Exploitation at BruCon.

Ashfaq Ansari will be speaking on Hacksys Extreme Vulnerable Driver for Windows at Blackhat Asia.

Aseem Jakhar will be speaking at the panel on Exploiting the internet of things at Blackhat Asia.

We will be delivering 2 days training on IoT Hacking at Blackhat Asia.

Aseem Jakhar will be speaking on Security of Internet of Things at India Smart Grid Week

Sneha Rajguru will be conducting Winja CTF challenge at Nullcon.

Aseem Jakhar will be speaking on Risk assessment of Internet of Things at IoTShow.

We will be delivering a workshop on ARM for Pentesters at Defcon.

We will be delivering 2 days training on IoT Hacking at Blackhat USA.

Sneha Rajguru will be speaking on Android Security at Fudcon.

We will be delivering 3 days training on A(RM)ndroid/IoS Exploitation at Hack in Paris.

Senha Rajguru will be conducting a workshop on Cyber crimes against women and safety measures, at RedHat.

Sneha Rajguru will be speaking on Android Security at Gnunify.

We will be delivering 3 days training on ARM Android Exploitation at Brucon.

We will be delivering a workshop on ARM Exploitation at PHDays

DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

CTI Report
DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in your inbox

Ebook Download
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Mobile Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Web App Sample Report

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by