No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2017-05-13 Meet Mumbai Active Directory Attacks & Detections Part-II Ankit Joshi
2017-05-13 Meet Mumbai Wireless reverse engineering Arun Mane
2017-05-13 Meet Mumbai Lesser known Threat Intelligence techniques Avkash Kathiriya
2017-05-13 Meet Mumbai Why should I speak in Null Meet? Manasdeep
2017-05-13 Meet Mumbai NewsByte Zubair Mulla
2017-05-06 Meet Pune Hacking into the Airwaves with SDR Rashid feroz
2017-05-06 Meet Pune Foundations of Cryptography Sunil Kumar
2017-05-06 Meet Pune VA of CSRF Sneha Nehatkar
2017-05-06 Public Puliya Delhi NCR Linux Basics Puliya Ankit
2017-05-06 Meet Pune SSH Authentication - Public key cryptography Harish Tiwari
2017-05-06 Humla Bangalore Penetration Testing Web Application and Web Services with Burpsuite Praveen Kumar K
2017-05-06 Humla Bangalore Penetration Testing Web Application and Web Services with Burpsuite Arun.S
2017-04-29 Meet Kolkata Souhardya Sardar Souhardya Sardar
2017-04-29 Meet Delhi NCR Malicious Hypervisor: Virtualization in shellcodes Adhokshaj Mishra
2017-04-29 Meet Kolkata Shivam Gupta (Shankey) Shankey Gupta
2017-04-29 Meet Delhi NCR Open House Discussion : OWASP Top 10 2017 RC1 - What is right/wrong null/OWASP Delhi Team
2017-04-29 Meet Delhi NCR Detecting Cyber Crime Patterns in India post Demonetization by Dinesh Yadav (S.P. City Noida) Deep Shankar Yadav
2017-04-29 Meet Kolkata Real Life story of an arrest under Cyber Law Animesh Roy
2017-04-29 Meet Delhi NCR News Bytes Mohammed Zuber
2017-04-29 Humla Mumbai Bug Hunting Battlefield sagar parmar
2017-04-29 Humla Bangalore Getting started with Wireless Pentesting Ashritha
2017-04-28 Meet Dubai ShadowBroker FuzzBunch - Demo TAS
2017-04-28 Meet Dubai Overview of Domain Fronting With Real World Examples Rafay Baloch
2017-04-28 Meet Dubai Kerberoasting Windows Domain Controllers Kaleem Shaik
2017-04-28 Meet Dubai Advance Incident Response Surendra
2017-04-23 Meet Bhopal Server hardening using IPtables - Part -2 Sahil Khan
2017-04-23 Meet Bhopal Server hardening using IPtables - Part -1 Jaskaran Singh Narula
2017-04-23 Meet Bhopal Introduction to footprinting chetan thakre
2017-04-23 Meet Bhopal IoT Security & Advancement Shreya Pohekar
2017-04-23 Meet Bhopal News Bytes Mukesh Pathak
2017-04-22 Meet Chennai Same Origin Policy(SOP) Bypasses for Android Browsers PradeepKumar P
2017-04-22 Meet Chennai Compliances Ram
2017-04-22 Public Puliya Bangalore Linux Security Subash
2017-04-22 Public Puliya Bangalore Linux Security Madhu Akula
2017-04-22 Meet Chennai Aadhar Authentication Tibin Lukose
2017-04-22 Meet Bangalore Working with Exploit Kits Gajendra Kumar
2017-04-22 Meet Pune Mobile Apps - Run time Analysis Sneha Rajguru
2017-04-22 Meet Bangalore IoT security 101 jitendra kumar
2017-04-22 Meet Pune Elliptical Curve Cryptography - Understanding Maths, usage, attacks on ECC and BolckChain primitives Ajit
2017-04-22 Meet Bangalore Exploiting Buffer Overflow vulnerability. Riddhi Shree
2017-04-22 Meet Pune What is Machine Learning and why is everyone talking about it? Sumedh Bhalerao
2017-04-22 Meet Bangalore Number Theory & Cryptography Debojyoti
2017-04-22 Workshop Mumbai Intelligence Gathering Vijay Kumar
2017-04-22 Meet Bangalore Hacking Bluetooth Arun magesh
2017-04-22 Meet Bangalore Impacket Tools Riyaz Walikar
2017-04-15 Humla Bangalore Solving Web CTF challenges Riyaz Walikar
2017-04-08 Meet Mumbai Docker Security Siddharth Mannan
2017-04-08 Meet Mumbai Why should I speak in Null Meet? Manasdeep
2017-04-08 Meet Mumbai NewsByte Avkash Kathiriya
2017-04-08 Meet Mumbai Commix - Command Injection Attack Tool Rajasekar