Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore techniques for detecting and capturing in-the-wild Windows Local Privilege Escalation vulnerabilities, including methodology development and continuous improvement strategies.
Explore automated security vulnerability detection and fixing in open-source software, including techniques like OpenRewrite and control flow analysis for efficient, large-scale remediation.
Explore vulnerabilities in Hyper-V's GPU-Paravirtualization feature, examining 4 fixed DirectX component issues and their implications for virtualization security.
Uncover vulnerabilities in Siemens ET 200SP SoftPLC, exploring its architecture, boot process, and potential attack vectors. Learn about PC-based PLCs and their security implications in industrial control systems.
Methodology for detecting wireless signal tracking using low-cost hardware and Python. Covers SIGINT techniques, MAC address randomization, and provides code for DIY implementation.
Explore a protocol for collectivizing security bounties, enabling companies to showcase software security and ethical hackers to retrieve bounties without ambiguity, eliminating subjectivity in triage processes.
Techniques for detecting unauthorized use of algorithms in commercial products, including search methods, reverse-engineering, and a real-world case study. Provides strategies for addressing IP theft and prevention.
Explore Intel Wi-Fi chip vulnerabilities through reverse-engineering, uncovering firmware exploits and code execution risks in complex features like Wake-on-WLAN and TDLS.
Unveils a novel exploitation technique surpassing Dirty Pipe, enabling arbitrary file overwriting and privilege escalation through double-free vulnerabilities, applicable across affected kernel versions.
Explore vulnerabilities in Source Code Management systems, including reconnaissance, user role manipulation, and repository takeover. Learn attack scenarios and defensive strategies for GitHub, GitLab, and Bitbucket.
Explore vulnerabilities in Cisco ASA firewalls, including ASDM package verification issues and FirePOWER module exploits. Learn to create malicious packages and gain root access.
Explore syscall-flow-integrity protection (SFIP) to enhance application security by limiting control flow across user-to-kernel transfers, addressing vulnerabilities in complex software systems.
Explore Firefox's innovative approach to mitigating zero-day attacks using in-memory sandboxes for third-party C libraries, enhancing security against memory safety vulnerabilities.
Explore vulnerabilities in Linux kernel file descriptor operations, focusing on high-risk scenarios in exporting and importing, and learn to identify and address these security concerns.
Explore advanced techniques for embedding and loading static payloads in Linux malware, focusing on ELF binary construction and section manipulation to enhance payload survival and evasion.
Get personalized course recommendations, track subjects and courses with reminders, and more.