• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 15
  • 14
  • 13
  • 11
  • 10
  • 9
  • 8
Edition logo

Nullcon 13

2022-09-09 - 2022-09-10
  • Thumbnail for the video - click to play

    ►

    Opening Note
    - Antriksh Shah
  • Thumbnail for the video - click to play

    ►

    Do We Get Stuff Done? We Don’t Get Stuff Done? Or Do We? Or Will We, Maybe? Soon?
    - Mario Heiderich
  • Thumbnail for the video - click to play

    ►

    A Kernel Hacker Meets Fuchsia OS
    - Alexander Popov
  • Thumbnail for the video - click to play

    ►

    Hack The Bridge
    - Anto Joseph
  • Thumbnail for the video - click to play

    ►

    A UEFI Firmware Bootkt In The Wild
    - Ivan Kwiatkowski
  • Thumbnail for the video - click to play

    ►

    Secure Service Edge (SSE): Challenges And Upsides Of Adoption
    - Panel
  • Thumbnail for the video - click to play

    ►

    ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron
    - Mohan Sri Rama Krishna Pedhapati and Maxwell Garrett
  • Thumbnail for the video - click to play

    ►

    Hack the Source: Securing OSS – One Bug At A Time
    - Sandeep Singh
  • Thumbnail for the video - click to play

    ►

    Impact Of Disruptive Technologies On A CISOs Career And Progression
    - Panel
  • Thumbnail for the video - click to play

    ►

    Service Workers VS Corporate Firewalls
    - Aleksandr Kolchanov
  • Thumbnail for the video - click to play

    ►

    Consumer Tech Bug Bounty Panel: Hear From The Program Managers
    - Panel
  • Thumbnail for the video - click to play

    ►

    Cloud Services For Financial Inclusion: Possibilities And Challenges
    - Panel
  • Thumbnail for the video - click to play

    ►

    Scale Hacking To Secure Your Cloud And Beyond
    - Anand Prakash
  • Thumbnail for the video - click to play

    ►

    Handling A Bug Bounty Program From A Blue Team Perspective
    - Ashwath K and Ankit Anurag
  • Thumbnail for the video - click to play

    ►

    PAM Maturity: From Zero Trust To Least Privilege
    - Panel
  • Thumbnail for the video - click to play

    ►

    Mind The Gap: The Linux Ecosystem Kernel Patch Gap
    - Jakob Lell & Regina Bíró
  • Thumbnail for the video - click to play

    ►

    Raining CVEs On WordPress Plugins With Semgrep
    - Shreya Pohekar and Syed Sheeraz Ali
  • Thumbnail for the video - click to play

    ►

    Unlocking Security Collaboration With Cyber Threat Intelligence
    - Panel
  • Thumbnail for the video - click to play

    ►

    Do PDF Tools Conform To The Specification?
    - Prashant Anantharaman
  • Thumbnail for the video - click to play

    ►

    Software-Defined Snort With Barnyard And Pulled Pork For NIDPS
    - Arun Samuel Baskaran
  • Thumbnail for the video - click to play

    ►

    Elevating The TrustZone To Achieve A Powerful Android Kernel Exploit
    - Tamir Zahavi-Brunner
  • Thumbnail for the video - click to play

    ►

    A New Secret Stash For Fileless Malware
    - Denis Legezo
  • Thumbnail for the video - click to play

    ►

    c0ntextomy - Let's Debug Together
    - Nikias Bassen
  • Thumbnail for the video - click to play

    ►

    Web 3.0: Smart Contracts Could Be Leaky
    - Riddhi Shree
  • Thumbnail for the video - click to play

    ►

    Securing India The CERT-In Way
    - Panel
  • Thumbnail for the video - click to play

    ►

    Hacking 5G Is No Rocket Science
    - Altaf Shaik and Matteo Strada
  • Thumbnail for the video - click to play

    ►

    0-Day Up Your Sleeve: Attacking macOS Environments
    - Wojciech Reguła
  • Thumbnail for the video - click to play

    ►

    Automate Your Whatsapp Chats
    - Aditi Bhatnagar
  • Thumbnail for the video - click to play

    ►

    Does Your SOC Suck
    - Panel
  • Thumbnail for the video - click to play

    ►

    Hacking Android Foreground Services Escalation Of Privileges
    - Rony Das
  • Thumbnail for the video - click to play

    ►

    The Different Faces Of MacOS Malware: Detecting Anomalies In A Poisoned Apple
    - Amit Malik & Pratik Jeware
  • Thumbnail for the video - click to play

    ►

    Securing The Software
    - Panel
  • Thumbnail for the video - click to play

    ►

    IoT Supply Chain Blues And The Way Forward
    - Panel
  • Thumbnail for the video - click to play

    ►

    Honey, I Just Put The Hospital On A Ventilator! DICOM And Its Pitfalls
    - Shyam Sundar Ramaswami and Rakesh Mahanthi
  • Thumbnail for the video - click to play

    ►

    Jailbreaking iOS In The Post-Apocalyptic Era
    - CoolStar & Tihmstar
  • Thumbnail for the video - click to play

    ►

    Ticketing 101: Making Sure Your Documentation Is As Good As Your Findings
    - Paula Pustulka
  • Thumbnail for the video - click to play

    ►

    Hacking Fintech Crime: Realities And Possibilities In India
    - Anand Venkatanaryanan and Chander Mohan
  • Video will not be published
    Into The Dark: Switching Of Renewable Power From Everywhere
    - Stephan Gerling
  • Thumbnail for the video - click to play

    ►

    Pushing Security Left By Mutating Byte Code
    - Gaurav Gogia
  • Thumbnail for the video - click to play

    ►

    Unearthing Malicious And Other "Risky" Open-Source Packages Using Packj
    - Ashish Bijlani & Devdutt Patnaik
  • Thumbnail for the video - click to play

    ►

    Closing And Prize Ceremony
    - nullcon