< NULLCON 2025 - GOA />

Conference Speakers

All Speakers
Technical Speakers
iOS and macOS Track
BountyCraft Track
Winja Track
Developer Track
Workshop and Villages
Gayatri Sunil Relekar
Student VIT, Pune
Prateek Singh
Lead OT Cybersecurity - APAC Eaton
Bridging the Gap: Enhancing OT Security with an Affordable Testbed
Learn more
Wojciech Regula
Principal Security Consultant Securing
Broken isolation - draining your credentials from popular macOS password managers
Learn more
Arshid Shyam Kumar
Technical Expert Siemens
Chinmay Krishna R
Junior-year Integrated Master’s Student IIIT-Bangalore
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks
Learn more
Vaibhav Lakhani
Cyber Security Consultant Kroll Global Solutions LLP
Drawing parallels between iOS and macOS Pentesting with DVMA
Learn more
Kevin Valerio
Security Engineer Security Research Labs
Daniel Schmidt
Security Consultant Security Research Labs
Fuzzing Rust Smart Contracts: Writing A Bug Printer Engine From Scratch
Learn more
Cameron Vincent
Security Engineer Microsoft
Google Give Me Vulnz
Learn more
Eugene Lim
Lead Cybersecurity Engineer - Open Government Products
Guilt by Association: Pwning Millions of Smart Weighing Machines with API and Hardware Hacking
Learn more
Kumar Ashwin
Technical Manager, Research & Consulting Redhunt Labs
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms
Learn more
Dennis Giese
Security Researcher Independant
How Ecovacs robots got hacked and what we can learn
Learn more
Andras Tevesz
Senior Vulnerability Researcher CUJO AI
How to Teach Threading to a Dolphin
Learn more
Kandi Abhishek Reddy
Security Researcher Team bi0s
Alla Vamsi Krishna
Project Assistant Indian Institute of Science, Bengaluru
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell
Learn more
Bhargav Rathod
Security Analyst Salesforce
MacOS Lockdown Mode: A Forensic Deep Dive
Learn more
Matthias Frielingsdorf
Co-Founder & VP of Research iVerify
Predator Malware: Trust Broken at the Core
Learn more
Michael Hendrickx
Principal Security Research Manager Microsoft
Project Dusseldorf: finding out-of-band vulnerabilities at cloud scale
Learn more
Yashodhan Vivek Mandke
Research Scholar MIT-WPU
Reversing Large Deep learning AI Models
Learn more
Drishti Jain
International Tech Speaker
Satellite Communications: Analyzing and Protecting Space-Based Assets
Learn more
Yadhu Krishna M
Security Engineer CRED
Akhil Mahendra
Engineering Leader - Security Engineering CRED
Hritik
Security Engineer CRED
Securing the chains: Building defensive layers for software supply chains
Learn more
Lars Fröder
Security Researcher Cellebrite Labs
State of iOS Jailbreaking in 2025
Learn more
Abhisek Datta
Co-Founder SafeDep
Surfing the Wild Wild West of Open Source Software Supply Chain Risks
Learn more
Anto Joseph
Principal Security Engineer Eigen Labs
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties
Learn more
Tijme Gommers
Offensive Cyber Security ABN AMRO Bank
The hidden ART of rolling shellcode decryption
Learn more
William Robinet
Trapped by the CLI
Learn more
Namrata Godhanbhai Brahmkshatriya
Lead - Cybersecurity Supremology
Amey Gat
Principal Threat Researcher Fortinet
Unlocking The Secret - Lock Picking
Learn more
Sebastian Neef
PHD candidate Technical University of Berlin
What the PHUZZ?! Finding 0-days in PHP Apps with Coverage-guided Fuzzing
Learn more
Wietze Beukema
Independent Research
Will It Run? Fooling EDRs with command lines using empirical data
Learn more
Asuka Nakajima
Senior Security Research Engineer Elastic
Windows Keylogger Detection: Targeting Past and Present Keylogging Techniques
Learn more
Maor Abutbul
Vulnerability Researcher CyberArk Labs
Your Identity is Mine: Techniques and Insights from OS Identity Providers Research
Learn more