LLMSec Demo: Interactive Security Training Platform for LLM Vulnerabilities
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
This post has the slides related to my talk in the Conf42 DevOps 2025 Conference
This is series of articles about Android Application Security !!!!
This is my Second public speaking opportunity and first in BSidesPhilly Security Conference. This post has the slides.
I gave my first talk and training in BSides Delaware. This post has the slides, files related to that
This is series of articles about Android Application Security !!!!
This is series of articles about Android Application Security !!!!
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
This post has the slides related to my talk in the Conf42 DevOps 2025 Conference
This is my Second public speaking opportunity and first in BSidesPhilly Security Conference. This post has the slides.
I gave my first talk and training in BSides Delaware. This post has the slides, files related to that
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
These are few questions/notes, I took during my interviews preparation in 2021 !!!!
This is series of articles about Android Application Security !!!!
This is series of articles about Android Application Security !!!!
This is series of articles about Android Application Security !!!!
This is my notes that I took during my Android Application Penetration Testing over the years. !!!!
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
This is my Second public speaking opportunity and first in BSidesPhilly Security Conference. This post has the slides.
I gave my first talk and training in BSides Delaware. This post has the slides, files related to that
These are few questions/notes, I took during my interviews preparation in 2021 !!!!
This is my notes that I took during my iOS Application Penetration Testing over the years. !!!!
This is my notes that I took during my Android Application Penetration Testing over the years. !!!!
This is series of articles about Android Application Security !!!!
This is series of articles about Android Application Security !!!!
This is series of articles about Android Application Security !!!!
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
I gave my first talk and training in BSides Delaware. This post has the slides, files related to that
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
This is my notes that I took during my iOS Application Penetration Testing over the years. !!!!
This is my notes that I took during my Android Application Penetration Testing over the years. !!!!
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
I gave my first talk and training in BSides Delaware. This post has the slides, files related to that
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
This is my notes that I took during my iOS Application Penetration Testing over the years. !!!!
These are few questions/notes, I took during my interviews preparation in 2021 !!!!
I gave my first talk and training in BSides Delaware. This post has the slides, files related to that
This is my Second public speaking opportunity and first in BSidesPhilly Security Conference. This post has the slides.
This post has the slides related to my talk in the Conf42 DevOps 2025 Conference
This post has the slides related to my talk in the Conf42 DevOps 2025 Conference
This post has the slides related to my talk in the Conf42 DevOps 2025 Conference
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
Presented at the NJ Water Environment Association Annual Conference, this talk addresses the critical challenges of securing water and wastewater infrastruc...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Presented at the 15th IEEE Integrated STEM Education Conference at Princeton University, this talk inspires the next generation of developers to prioritize ...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Presented for IEEE SSIT (Society on Social Implications of Technology), this webinar explores the critical intersection of cybersecurity, AI, and human righ...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
Three-hour hands-on training at BSidesCharm 2025 covering practical web application penetration testing techniques, from OWASP Top 10 exploitation to defens...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented at SECON NJ 2025, New Jersey’s premier cybersecurity conference, this talk addresses the quantum computing threat to application security an...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at HOPE_16, the historic 16th Hackers On Planet Earth conference, this talk explores the quantum computing threat to modern cryptography and pract...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
Presented at BSides Delaware 2025, Delaware’s premier grassroots cybersecurity conference, this hands-on talk explores practical LLM security vulnerab...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
Presented at the first-ever joint ISC2 & IIA New Jersey training day, this talk was specifically adapted for auditors and compliance professionals to un...
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...
An open-source educational platform demonstrating vulnerable vs. defended LLM integration patterns with live examples of prompt injection, RAG poisoning, an...