Skip to main content
  • Conferences
  • Speakers
  • Skillcamp
Notifications
  • Strategies for Online and Offline Success
    ×
  • That Will Get You Speaking Engagements in 2024
    ×
  • For a Meeting or Talk
    ×
  • SpeakerHub's commitment to innovation and user-centric design.
    ×
  • How to Make Your Public Speech Professional and Memorable
    ×
  • SIGN UP
  • SIGN IN
  1. Home
  2. Find a speaker
  3. Velayutham Selvaraj
Velayutham Selvaraj's cover banner
Velayutham Selvaraj's picture

Velayutham Selvaraj

Director
TwinTech Solutions
Country or state 
India
Available to 
Global
City 
Chennai
Fee 
Languages 
English
Volunteer
Yes

Personal Details

Bio

I completed my MS in Digital Forensics and Cyber Crime Analysis in United Kingdom. I’m into VAPT (Vulnerability Assessment and Penetration Testing). Now we are accredited with EC council started training Information Security Experts. I have delivered tons of sessions on information security to young graduates and info sec professionals. I worked on many government related projects on information security, helping them to re-design and implement their Cyber Security operations. I hold certifications certified ethical hacker, certified security analyst, certified hacking forensics investigator and the list goes on. I find my self growing everyday learning new concepts , I’m an independent researcher who often finds zero days in IOT devices and commercial softwares. I also work closely with law enforcement on extortion, harrasment & money laundering.

Current position (3)

Director

TwinTech Solutions

Regional Head

Hackers Day

Technical Author

GBHackers On Cyber Security

Presentations

Presentations (2)
Exploiting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from the user. Hackers leverage this method to execute malicious scripts to compromise.

Perform Vulnerability Scanning in Your Network using Maltego

There are a lot of things maltego can do not just information gathering it can also brute force a website login page, SQL injection and scanning the targets.

  • All (2)
  • Videos
  • Photos (1)
  • Slides (1)
This speaker hasn't uploaded any videos yet.
TPH
TPH
Getting A Shell Through MS Office
This speaker hasn't uploaded any one sheet yet.
This speaker hasn't uploaded any press information yet.

Expertise (10)

Technology
Education
Computer and Network Security Application Security Browser security Java Security conventional cybersecurity zeroday Social Engineering Browser Forensics
Recommendations
Why choose me? 

Director at TwinTech Solutions Int Speaker on Cyber Profiling and VAPT

Similar to Velayutham
  • Sharon McRill's picture
    Sharon
    McRill
    President
    The Betty Brigade
  • Jian Gong's picture
    Jian
    Gong
    Head of Cybersecurity and Tech Infrastructure
    Better Therapeutics, Inc.
  • Brian Vermeer's picture
    Brian
    Vermeer
    Staff Developer Advocate
    Snyk
  • Nitin Pandey's picture
    Nitin
    Pandey
    Chairman
    National Information Security Council
  • Mir Haris Niyaz's picture
    Mir Haris
    Niyaz
    Regional Account Manager MEA
    Checkmarx
  • Speakers
  • Agencies
  • Events
  • How it works
  • Blog
  • Upgrade
  • Podcast
  • About us
  • Organizers
  • Terms of use
  • Privacy policy
  • FAQ
  • API
  • Contact
  • Corporate Speakers Bureau & CRM
  • Motivational speakers
  • Leadership speakers
  • Business speakers
  • Inspirational speakers
  • Keynote speakers
  • Corporate speakers
  • Celebrity speakers
  • Top 50 Business Speakers
  • Top 50 Leadership Speakers
  • Top 50 Motivational Speakers
  • Top 50 Technology Speakers

Get speaking tips & so much more!

Twice a month we send you speaking tips, training ideas and lots of useful updates.

© 2026 SpeakerHub
All rights reserved.

  • Facebook
  • Twitter
  • LinkedIn
  • SoundCloud