Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Innovative approach for IoT black-box fuzzing using "fuzzing triggers" from companion apps to generate optimal inputs, overcoming limitations of existing tools and discovering zero-day vulnerabilities.
Novel attack vector using compromised MySQL servers to target clients, demonstrating remote code execution vulnerabilities in MySQL tools and libraries, including a zero-day exploit bypassing security patches.
Explore game cheating techniques, anti-cheat mechanisms, and bypassing methods in competitive gaming. Gain insights into the evolving landscape of game security and hacking strategies.
Comprehensive guide to building a high-speed anti-censorship router, covering GFW history, bypass methods, protocols, deployment strategies, and practical implementation for unrestricted internet access.
Explore advanced DMA reentrancy techniques for QEMU escape, including DMA Reflection/Refraction and DMA Oriented Programming. Learn about vulnerabilities, exploit processes, and future challenges in virtualization security.
Exploring Windows Desktop Window Manager vulnerabilities, focusing on DirectComposition UserSpace. Covers architecture, attack surfaces, and specific CVEs, offering insights into bug hunting techniques and security implications.
Exploring vulnerabilities in home routers and small business devices, detailing methodologies for finding and exploiting security flaws, and demonstrating real-world attack scenarios in SOHO networks.
Explores next-gen virtualization-based code obfuscation techniques, focusing on target-specific instruction sets and intertwined VM components to enhance resilience against deobfuscation attacks.
Explore lateral movement techniques in OT networks, focusing on vulnerabilities in L1 devices. Learn about BPCS/SIS architectures, exploit chains, and hardening strategies to enhance industrial control system security.
Explore advanced techniques for using Windows syscalls in shellcode, overcoming portability issues, and enhancing malicious functionality. Learn about ShellWasp tool and novel WoW64 syscall invocation methods for stealthy code execution.
Unveiling a critical 8-year-old vulnerability in XRP Ledger that could compromise $40 billion in assets. Explores the RCE exploit, potential profit methods, and network control implications for blockchain security.
Comprehensive overview of iOS malware detection techniques, covering known samples, automated and manual detection methods, and potential improvements for enhanced security.
Explore car hacking techniques, focusing on radio frequencies and BLE. Learn about Rolling Codes analysis and practical steps to conduct research on vehicle security vulnerabilities.
Innovative static taint analyzer for third-party SDKs, addressing challenges in user data protection and privacy policy compliance. Achieves high accuracy in identifying undisclosed information collection behaviors.
Exposé des failles de la protection contre les ransomwares de Windows, démonstration de méthodes de contournement et d'attaques à distance, avec vidéos à l'appui.
Get personalized course recommendations, track subjects and courses with reminders, and more.