INITIALIZING SYSTEMS
>> SYSTEM_READY

THREAT HUNTING
VILLAGE

Join the elite community of cyber defenders. Advanced simulation, proactive defense, and human-driven analysis.

EXPLORE EVENTS

// THE MISSION

The Threat Hunting Village isn't just a conference; it's a live fire exercise. We exist to bridge the critical gap between automated security tools and human intuition.

In a landscape where adversaries are constantly evolving, relying on signatures is a failing strategy. We teach the art of the hunt: assuming the breach, analyzing the anomalies, and neutralizing the threat.

  • Human-Led Adversary Emulation
  • Proactive Threat Intelligence
  • Advanced Incident Response
root@thv:~# ./init_defense.sh
> [INFO] scanning network topography...
> [WARN] anomaly detected on port 443
> [ACT] dispatching hunter protocols...
> [SUCCESS] adversary isolated.
root@thv:~# _

// THE_TEAM

Chetan Kawley

Chetan Kawley

Team Lead

Experienced in advanced threat hunting, incident response, and security architecture, delivering tailored frameworks, intelligence-driven risk management, and forensic readiness across critical industries including aviation, energy, mining, and industrial automation.

LinkedIn
Devendra Kumar Sinha

Devendra Kumar Sinha

Core Team Member

Experienced Penetration Tester with a strong background in the information security industry, specializing in web application vulnerability assessment and penetration testing across diverse enterprise environments.

LinkedIn
Lakshay Dubey

Lakshay Dubey

Core Team Member

Focused on security research and development, threat intelligence, malware analysis, and YARA rule engineering to identify and track emerging threats. Actively involved in building detection logic, researching adversary techniques, and enhancing defensive capabilities.

LinkedIn
Aryan Bhujbal

Aryan Bhujbal

Team Member

Cybersecurity enthusiast, learning red teaming activities, penetration testing, SOC operations, and threat hunting. Actively involved in detecting adversary activity, and improving defensive capabilities through continuous security validation.

LinkedIn
Nikhil Jadhav

Nikhil Jadhav

Team Member

Experienced Breach and Attack Simulator with hands-on experience in Red Team operations, SOC workflows, and proactive threat hunting. Actively involved in simulating real-world attacks, validating detections, and strengthening organizational security posture.

LinkedIn
Tanish Saxena

Tanish Saxena

Team Member

Cybersecurity enthusiast and security researcher on platforms, ranking among the top 1% on TryHackMe and actively participating in CTFs. Enjoy creating cybersecurity content and building vulnerable CTF machines focused on cryptography, privilege escalation, and CVE-based challenges.

LinkedIn

// KNOWLEDGE_BASE (FAQ)

No. We welcome defenders of all skill levels and of any experience.

A laptop and the mindset to learn something new.

Check the conference website for recording availability.

Yes. We have a zero-tolerance policy for harassment.