null Global Committee elections are coming up! See the election repository for more information.

No filter set
Show sessions with reference (Presentation or Video)
Query

Date Topic Speaker Resources
2026-03-22 Meet Bangalore Smart Contract Vulnerabilities: Hacking, Detecting, and Preventing with Data Jayavamsi Villuri
2025-06-29 Meet Bhopal Reverse Engineering Android Apps: Cracking SSL Pinning Defenses Aasim Akhtar
2025-06-29 Meet Bhopal Introduction to null Samarth Pohekar
2025-06-21 Meet Bangalore How to select Enterprise Browser Mohamed Ismail E
2025-06-21 Meet Bangalore HTML Smuggling Ravi Shankar
2025-06-21 Meet Bangalore Defense Evasion SHAMEEM P K
2025-06-21 Meet Bangalore Intent Vulnerabilities in Mobile Android Application Pooja Pawar
2025-05-31 Meet Ahmedabad News Bytes Bhavik
2025-05-24 Meet Bangalore How MCP is augumenting Security Operations Pavan Karthick M
2025-05-24 Meet Bangalore SecOps Evolved: Automating Threat Intel and Cloud Security with AI Uday Kasturi
2025-05-24 Meet Chennai CTF - Web, Network, Source Code PradeepKumar P
2025-05-24 Meet Bangalore Cybersecurity in times of crisis Prashant Madhyasta
2025-05-24 Meet Chennai Backbone and the first line of defence - SOC PradeepKumar P
2025-05-24 Meet Bangalore Privacy Landscape Worldwide & Personal Data Protection shekhargowda
2025-05-24 Meet Chennai De-Anonymizing Crypto : Open Source techniques for Blockchain Tracking Srivatsan SK
2025-05-24 Meet Bangalore Anatomy of Attack Vectors and Firmware Security Below the OS Chanukya Potnuru
2025-05-23 Meet Bangalore Unlocking the Secrets of Android DeepLink Exploitation Akash Katare
2025-04-26 Meet Kolkata Stages of cyber Attacks Pankaj Barman
2025-04-26 Meet Kolkata Secure Cloud Practices for Engineers G37SYS73M
2025-04-26 Meet Bangalore MCP & A2A - Threat Modelling Ananthakrishnan
2025-04-26 Meet Ahmedabad The Art of Digital Investigation: From Breach to Breakdown Mr. Soham Raval
2025-04-26 Meet Bangalore Leveraging AI to automate various aspects of threat modeling Ved Prabhu
2025-04-26 Meet Ahmedabad Hunting Initial access Malware Hiren Sadhwani
2025-04-26 Meet Bangalore Threat detection via Sysmon Ashish Dogra
2025-04-26 Meet Ahmedabad Privacy regulations in AI dominated world Sameer
2025-04-26 Meet Ahmedabad News Bytes Jayvin Gohel
2025-04-26 Meet Bangalore DevSecOps: A Practitioner’s Perspective ramkumari iyer
2025-04-20 Meet Bhopal A primer on Wireshark Sunil Choudhary
2025-04-20 Meet Bhopal Android App Security Abubakr Niazi
2025-04-19 Humla Bangalore Advanced Testing Techniques & Vulnerabilities Akash Katare
2025-04-19 Humla Bangalore iOS Application & Pentesting Background Akash Katare
2025-03-29 Meet Kolkata Reverse Engineering 101 - Session 2 Parul Sharma
2025-03-29 Meet Hyderabad Preparation to the next meet Pavan Mohan (pavanw3b)
2025-03-29 Meet Kolkata Reverse Engineering 101 - Session 1 Samkalpa Mukherjee
2025-03-29 Meet Hyderabad GenAI CTF abhishikt v v
2025-03-29 Meet Kolkata Blockchain security in an Open, Decentralized World Kasturi behera
2025-03-29 Meet Hyderabad Building Your Own SCA Tool: Lessons from Tej Hare Krishna Rai
2025-03-29 Meet Hyderabad Secure Design Using Threat Modelling Samiksha Singhal
2025-03-29 Meet Hyderabad Newsbyte Tansique Dasari
2025-03-29 Meet Hyderabad Introduction to Null Hyderabad Ravindra Penumarthi
2025-03-23 Meet Bhopal Setting up your dev environment and preparation for next meetup Ankit Patel
2025-03-23 Meet Bhopal Mitre Attack Matrix for Cybersecurity Professional Sameep Shukla
2025-03-22 Meet Chennai Firmware Security - Framework for Emulation and VA Mahalakshmi Sugumaran
2025-03-22 Meet Bangalore Panel Discussion Place Holder