Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a userspace logic bug chain for kernel privilege escalation on macOS, bypassing security measures and loading unsigned kernel extensions. Learn about module hijacking and mitigation techniques.
Explore quantum computing's impact on cryptography, including reversing cryptographic primitives using quantum circuits and real hardware implementations of P-Box, S-Box, CRC-8, and XOR functions.
Explore compiler vulnerabilities and malicious modifications in GCC, from accidental bugs to intentional exploits. Learn about compiler stages, potential attack vectors, and strategies for detecting malicious alterations.
Exploración de ataques Unicode mejorados con aprendizaje profundo, creando un diccionario de caracteres confundibles para desarrollar herramientas ofensivas sofisticadas y nuevos procedimientos de prueba de aplicaciones.
Explore HDMI vulnerabilities through protocol analysis, fuzzing techniques, and real-world exploitation, showcasing potential security risks in AV devices and demonstrating practical attack vectors.
Automated discovery of logical privilege escalation vulnerabilities in Windows 10 services, using simulated user interactions and interface calls. Includes methodology, ALPC analysis, and system implementation.
Exploring vulnerabilities in centrally-controlled smart homes, demonstrating remote attacks on IoT devices like door locks, gates, and gas valves, and discussing analytical methods for smart home hacking.
Exploiting vulnerabilities in Cisco ASA firewalls: New techniques to bypass protection mechanisms, heap exploitation strategies, and disclosure of a 0-day vulnerability affecting major ASA versions.
Explore vulnerabilities in GSM devices like alarms and smartwatches. Learn number spoofing, brute-force attacks, and mobile operator exploits. Gain hands-on experience and develop security requirements for GSM systems.
Explore advanced Windows kernel fuzzing techniques, including a new method and custom tool for discovering vulnerabilities in kernel objects and their relationships.
Practical approach to reverse engineering obfuscated BIOS/UEFI malware and virtualized packers, using tools and techniques for code simplification and threat analysis.
Explore vulnerabilities in satellite-based rescue systems, focusing on the International Cospas-Sarsat Programme. Learn about eavesdropping, spoofing, and active attack techniques on satellite communications.
Explore techniques for dumping, parsing, and analyzing i.MX flash memory chips, focusing on NXP i.MX architecture in embedded systems. Learn about custom flash memory management and tools for recovering filesystems.
Efficient binary diffing tool for IDA Pro, using fuzzy hashes to quickly compare and import function data from multiple IDBs, enhancing malware analysis productivity.
Explores vulnerabilities in SS7 networks, revealing how attackers can bypass security measures to intercept messages and steal money. Discusses the implications for 2G/3G users and highlights a critical flaw in current protection tools.
Get personalized course recommendations, track subjects and courses with reminders, and more.