Skip to main content
  • Conferences
  • Speakers
  • Skillcamp
Notifications
  • Strategies for Online and Offline Success
    ×
  • That Will Get You Speaking Engagements in 2024
    ×
  • For a Meeting or Talk
    ×
  • SpeakerHub's commitment to innovation and user-centric design.
    ×
  • How to Make Your Public Speech Professional and Memorable
    ×
  • SIGN UP
  • SIGN IN
  1. Home
  2. Find a speaker
  3. Velayutham Selvaraj
Velayutham Selvaraj's cover banner
Velayutham Selvaraj's picture

Velayutham Selvaraj

Director
TwinTech Solutions
Country or state 
India
Available to 
Global
City 
Chennai
Fee 
Languages 
English
Volunteer
Yes

Personal Details

Bio

I completed my MS in Digital Forensics and Cyber Crime Analysis in United Kingdom. I’m into VAPT (Vulnerability Assessment and Penetration Testing). Now we are accredited with EC council started training Information Security Experts. I have delivered tons of sessions on information security to young graduates and info sec professionals. I worked on many government related projects on information security, helping them to re-design and implement their Cyber Security operations. I hold certifications certified ethical hacker, certified security analyst, certified hacking forensics investigator and the list goes on. I find my self growing everyday learning new concepts , I’m an independent researcher who often finds zero days in IOT devices and commercial softwares. I also work closely with law enforcement on extortion, harrasment & money laundering.

Current position (3)

Director

TwinTech Solutions

Regional Head

Hackers Day

Technical Author

GBHackers On Cyber Security

Presentations

Presentations (2)
Exploiting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from the user. Hackers leverage this method to execute malicious scripts to compromise.

Perform Vulnerability Scanning in Your Network using Maltego

There are a lot of things maltego can do not just information gathering it can also brute force a website login page, SQL injection and scanning the targets.

  • All (2)
  • Videos
  • Photos (1)
  • Slides (1)
This speaker hasn't uploaded any videos yet.
TPH
TPH
Getting A Shell Through MS Office
This speaker hasn't uploaded any one sheet yet.
This speaker hasn't uploaded any press information yet.

Expertise (10)

Technology
Education
Computer and Network Security Application Security Browser security Java Security conventional cybersecurity zeroday Social Engineering Browser Forensics
Recommendations
Why choose me? 

Director at TwinTech Solutions Int Speaker on Cyber Profiling and VAPT

Similar to Velayutham
  • Igor Volovich's picture
    Igor
    Volovich
    Managing Director, Founder
    Cyber Strategy Partners
  • Yul Bahat's picture
    Yul
    Bahat
    Co-Founder and CISO
    Securitude Cyber Solutions
  • Joshua Long's picture
    Joshua
    Long
    Founder
    the JoshMeister on Security
  • Adithyan Ak's picture
    Adithyan
    Ak
    Security Researcher
    TPH Infosec
  • Smit Shah's picture
    Smit
    Shah
    Co-Founder & CEO
    eSecurify
  • Speakers
  • Agencies
  • Events
  • How it works
  • Blog
  • Upgrade
  • Podcast
  • About us
  • Organizers
  • Terms of use
  • Privacy policy
  • FAQ
  • API
  • Contact
  • Corporate Speakers Bureau & CRM
  • Motivational speakers
  • Leadership speakers
  • Business speakers
  • Inspirational speakers
  • Keynote speakers
  • Corporate speakers
  • Celebrity speakers
  • Top 50 Business Speakers
  • Top 50 Leadership Speakers
  • Top 50 Motivational Speakers
  • Top 50 Technology Speakers

Get speaking tips & so much more!

Twice a month we send you speaking tips, training ideas and lots of useful updates.

© 2026 SpeakerHub
All rights reserved.

  • Facebook
  • Twitter
  • LinkedIn
  • SoundCloud