• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 15
  • 14
  • 13
  • 11
  • 10
  • 9
  • 8
Edition logo

Nullcon 11

2020-03-06 - 2020-03-07
  • Video will not be published
    Welcome Note
    - Antriksh Shah
  • Thumbnail for the video - click to play

    ►

    The Metadata Trap: Whistleblowers In The Age Of Surveillance And Big Data
    - Micah Lee
  • Thumbnail for the video - click to play

    ►

    Bug Bounty: Why Is This Happening?
    - Adam Ruddermann
  • Thumbnail for the video - click to play

    ►

    Securing the Human Factor
    - Panel Discussion
  • Thumbnail for the video - click to play

    ►

    PwdLess: Exploitation Tales From RouterLand
    - Christofaro Mune
  • Thumbnail for the video - click to play

    ►

    Automotive Security Bugs Explained For Bug Hunters
    - Jay Turla
  • Thumbnail for the video - click to play

    ►

    Predicting Danger: Building the Ideal Threat Intelligence Model
    - Panel Discussion
  • Thumbnail for the video - click to play

    ►

    Rage Against The IDOR’s: Using Machine Learning Models To Detect And Stop Authorization Bypass Vulnerabilities
    - Juan Berner
  • Video will not be published
    HackerHelp
    - Various
  • Thumbnail for the video - click to play

    ►

    Lessons from the Cyber Trenches
    - Panel Discussion
  • Thumbnail for the video - click to play

    ►

    Don't Ruck Us Too Hard: Owning All Of Ruckus AP devices
    - Gal Zror
  • Thumbnail for the video - click to play

    ►

    Complication in Security Practices
    - Panel Discussion
  • Thumbnail for the video - click to play

    ►

    Mlw @41: A New Sophisticated Loader By APT Group TA505
    - Alexey Vishnyakov
  • Video will not be published
    Hacker Q&A
    - Nathaniel Wakelam andLaurie Mercer
  • Thumbnail for the video - click to play

    ►

    Taking The Guess Out Of Glitching
    - Adam Laurie
  • Thumbnail for the video - click to play

    ►

    Cybersecurity In India - Information Asymmetry, Cross Border Threats and National Sovereignty
    - Saumil Shah
  • Thumbnail for the video - click to play

    ►

    Crouching Hacker, Killer Robot? Removing Fear From Cyber-physical Security
    - Stefano Zanero
  • Thumbnail for the video - click to play

    ►

    The One Weird Trick SecureROM Hates, Vol. 2
    - Nikias Bassen
  • Thumbnail for the video - click to play

    ►

    Panel: Supply Chain Security In Critical Infrastructure Systems
    - Panel Discussion
  • Thumbnail for the video - click to play

    ►

    InfoSec Deep Learning In Action
    - Satnam Singh
  • Thumbnail for the video - click to play

    ►

    Putting It All Together: Building An iOS Jailbreak From Scratch
    - Umang Raghuvanshi
  • Thumbnail for the video - click to play

    ►

    Economics Of Data Breach And Attack
    - Panel Discussion
  • Thumbnail for the video - click to play

    ►

    Hacking Automatically: Applying Program Analysis To IoT
    - Ryan Speers
  • Thumbnail for the video - click to play

    ►

    XNU Heap Exploitation: From Kernel Bug To Kernel Control
    - Tihmstar
  • Thumbnail for the video - click to play

    ►

    Hack The Law : Protection For Ethical Cyber Security Research In India
    - Panel Discussion
  • Thumbnail for the video - click to play

    ►

    COMpromise: Remote Code Execution In Windows Development Environments
    - Stan Hegt
  • Thumbnail for the video - click to play

    ►

    Dissecting Rotten Apples: MacOS Malware Analysis
    - Felix Seele
  • Thumbnail for the video - click to play

    ►

    Building Advanced Security applications On Qiling.io
    - KaiJern Lau & Quynh Nguyen Anh
  • Thumbnail for the video - click to play

    ►

    Cloud As An Attack Vector
    - Rushikesh Vishwakarma & Ashwin Vamshi
  • Thumbnail for the video - click to play

    ►

    Closing Note And Prize Distribution
    - Various