Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ARM exploitation, reverse engineering, and vulnerability analysis through the lens of hacking an internet-enabled rabbit toy, uncovering authentication bypasses and remote code execution bugs.
Explore bug bounty dynamics, structure, and benefits for both hunters and companies. Learn strategies for successful programs and navigating challenges in this evolving cybersecurity landscape.
Learn to transform your phone into a low-cost IMSI catcher detector. Explore mobile security vulnerabilities, silent SMS detection, and IMSI catcher identification techniques in this comprehensive tutorial.
Dive deep into Meterpreter's inner workings, exploring its lifecycle, Reflective DLL Injection, and migration techniques. Gain technical insights into this powerful Metasploit payload for Windows systems.
Explore creative problem-solving and repurposing through the lens of building a bionic hand from a coffee maker. Learn innovative approaches to finding potential in everyday objects.
Novel USB attacks for remote control of air-gapped machines with minimal forensic footprint. Explores stealthy bi-directional channels, remote connectivity, and offloading complexity to hardware. Releases open-source toolset using freely available hardwa…
Explore JTAG exploitation techniques for rooting devices, covering physical layer access, data protocols, and advanced memory analysis for security professionals.
Explore malware analysis techniques, from detection to eradication, using free tools. Learn to identify indicators of compromise and effectively remove threats from enterprise networks.
Explore Meterpreter's evolution, new features, and advanced techniques for red team engagements. Learn about stageless payloads, transport modification, and persistence to enhance network penetration capabilities.
Explore Windows drivers: IRPs, IRQLs, device objects, function handlers, I/O controls, and memory access. Gain practical insights for driver development and debugging.
Explore modern Man-In-The-Middle attack techniques with MITMf, a Python framework combining new and old methods for efficient, extendable, and reliable network security testing.
Explore Black Hat's infrastructure, network challenges, and security measures. Learn about wired and wireless setups, threat modeling, and lessons for building robust conference networks.
Explore Android device security using a diverse cluster, addressing fragmentation challenges and enabling efficient vulnerability research and testing across multiple devices.
Explore GSM network vulnerabilities and attack tools that compromise phone calls, messaging, and web browsing. Learn about GSM architecture, weaknesses, and practical demonstrations of exploits.
Explore vulnerabilities in antivirus software, focusing on discovery and exploitation techniques. Learn about attack surfaces, fuzzing, and specific vulnerabilities in popular AV engines.
Get personalized course recommendations, track subjects and courses with reminders, and more.