< NULLCON 2025 - GOA />
Conference Speakers
KEYNOTE SPEAKER
Fueling the Future: Building Robust Engines for a Secure Digital World
All Speakers
Technical Speakers
CXO Speakers
iOS and macOS Track
BountyCraft Track
Winja Track
Developer Track
Workshop and Villages
Surfing the Wild Wild West of Open Source Software Supply Chain Risks
Learn more
Adam Laurie
Securing the chains: Building defensive layers for software supply chains
Learn more
Instrumenting the Unknown: Leveraging Frida for Binary Analysis on Linux
Learn more
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell
Learn more
Pick, Tinker, Learn: Demystifying Locks for Physical Security
Learn more
How to Teach Threading to a Dolphin
Learn more
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
Learn more
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
Learn more
Windows Keylogger Detection: Targeting Past and Present Keylogging Techniques
Learn more
Avkash Kathiriya
MacOS Lockdown Mode: A Forensic Deep Dive
Learn more
Converging IT and OT Security: Unified strategies for protection, detection and response.
Google Give Me Vulnz
Learn more
Enterprise Readiness for Supply Chain Attacks
Fuzzing Rust Smart Contracts: Writing A Bug Printer Engine From Scratch
Learn more
How Ecovacs robots got hacked and what we can learn
Learn more
Devesh & Thiruraghavan
Learn more
Converging IT and OT security: Unified strategies for protection, detection, and response
Satellite Communications: Analyzing and Protecting Space-Based Assets
Learn more
Guilt by Association: Pwning Millions of Smart Weighing Machines with API and Hardware Hacking
Learn more
AI in SecOps: Enhancing Incident Response with Intelligence
Bridging the Gap: Enhancing OT Security with an Affordable Testbed
Learn more
From Code to Defense: Why Developers Are the New Security Leaders
From Code to Defense: Why Developers Are the New Security Leaders
Radio Hacking Workshop
Learn more
eKYC Crisis: Securing the Lockers
Learn more
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
Krishan Dev
Krishna Pandey
Kuldeep Singh
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
Learn more
State of iOS Jailbreaking in 2025
Learn more
Your Identity is Mine: Techniques and Insights from OS Identity Providers Research
Learn more
Mathan Kasilingam
Predator Malware: Trust Broken at the Core
Learn more
Project Dusseldorf: finding out-of-band vulnerabilities at cloud scale
Learn more
AI in SecOps: Enhancing Incident Response with Intelligence
AI in SecOps: Enhancing Incident Response with Intelligence
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
Rishi Rajpal
Converging IT and OT security: Unified strategies for protection, detection, and response
Converging IT and OT security: Unified strategies for protection, detection, and response
Sachin Jain
MLOps Under Attack: Threat Modeling Modern AI Systems
Learn more
Enterprise Readiness for Supply Chain Attacks
What the PHUZZ?! Finding 0-days in PHP Apps with Coverage-guided Fuzzing
Learn more
The hidden ART of rolling shellcode decryption
Learn more
From Code to Defense: Why Developers Are the New Security Leaders
Drawing parallels between iOS and macOS Pentesting with DVMA
Learn more
From Code to Defense: Why Developers Are the New Security Leaders
Will It Run? Fooling EDRs with command lines using empirical data
Learn more
Trapped by the CLI
Learn more
Broken isolation - draining your credentials from popular macOS password managers
Learn more
Reversing Large Deep learning AI Models
Learn more
Converging IT and OT security: Unified strategies for protection, detection, and response