Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Novel attack vector using compromised MySQL servers to target clients, demonstrating remote code execution vulnerabilities in MySQL tools and libraries, including a zero-day exploit bypassing security patches.
Explore game cheating techniques, anti-cheat mechanisms, and bypassing methods in competitive gaming. Gain insights into the evolving landscape of game security and hacking strategies.
Comprehensive guide to building a high-speed anti-censorship router, covering GFW history, bypass methods, protocols, deployment strategies, and practical implementation for unrestricted internet access.
Explore advanced DMA reentrancy techniques for QEMU escape, including DMA Reflection/Refraction and DMA Oriented Programming. Learn about vulnerabilities, exploit processes, and future challenges in virtualization security.
Exploring Windows Desktop Window Manager vulnerabilities, focusing on DirectComposition UserSpace. Covers architecture, attack surfaces, and specific CVEs, offering insights into bug hunting techniques and security implications.
Exploring vulnerabilities in home routers and small business devices, detailing methodologies for finding and exploiting security flaws, and demonstrating real-world attack scenarios in SOHO networks.
Explores next-gen virtualization-based code obfuscation techniques, focusing on target-specific instruction sets and intertwined VM components to enhance resilience against deobfuscation attacks.
Explore lateral movement techniques in OT networks, focusing on vulnerabilities in L1 devices. Learn about BPCS/SIS architectures, exploit chains, and hardening strategies to enhance industrial control system security.
Explore advanced techniques for using Windows syscalls in shellcode, overcoming portability issues, and enhancing malicious functionality. Learn about ShellWasp tool and novel WoW64 syscall invocation methods for stealthy code execution.
Unveiling a critical 8-year-old vulnerability in XRP Ledger that could compromise $40 billion in assets. Explores the RCE exploit, potential profit methods, and network control implications for blockchain security.
Comprehensive overview of iOS malware detection techniques, covering known samples, automated and manual detection methods, and potential improvements for enhanced security.
Explore car hacking techniques, focusing on radio frequencies and BLE. Learn about Rolling Codes analysis and practical steps to conduct research on vehicle security vulnerabilities.
Exploiting Linux kernel vulnerabilities: techniques for bypassing security controls, leveraging nftables bugs, and achieving code execution. Includes mitigation strategies and a novel per-softirq stack randomization implementation.
Improve Golang binary analysis in Ghidra with Java-based scripts. Recover strings, functions, and types for efficient malware research and vulnerability detection.
Exploring JARM: An active TLS fingerprinting algorithm for clustering servers, identifying default settings, and detecting malicious servers. Includes C++ implementation, technical analysis, and improvements to enhance fingerprint confidence.
Get personalized course recommendations, track subjects and courses with reminders, and more.