Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Innovative Android malware analysis engine using criminal law principles. Develops a scoring system with five stages to assess malicious activities, overcoming obfuscation techniques through a specialized Dalvik bytecode loader.
Exploring vulnerabilities in biometric access control systems, including server command forgery, unauthorized user addition, and face database exposure. Demonstrates exploits to leak employee data and bypass security measures.
Explore modern code deobfuscation techniques, from basic analysis to advanced semantic-based methods. Learn limitations of syntactic approaches and discover state-of-the-art program synthesis techniques.
Learn to build a fuzzer using Qiling Framework, exploring cross-platform binary analysis and leveraging 1day bugs to potentially uncover 0day vulnerabilities. Hands-on lab covers installation, fundamentals, and advanced techniques.
Runtime memory analysis tool for mobile apps, automating common checks during penetration testing. Simplifies reverse engineering of obfuscated code for iOS and Android, tracking app behavior changes in real-time.
MemoryRanger: A hypervisor-based solution to protect Windows kernel memory from attacks on NTFS structures, handle tables, and token privileges, using VT-x and EPT technologies.
Explore vehicle architecture, CANbus protocol, CAN frames, and car hacking tools in this hands-on virtual lab. Learn from experts in automotive security and gain practical skills in vehicle system penetration testing.
Exploración de códigos secretos en dispositivos Android, revelando vulnerabilidades de seguridad y métodos de bypass en teléfonos de principales fabricantes. Incluye demostraciones prácticas y herramientas de fuzzing.
Exploración de técnicas modernas de explotación para productos de virtualización de VMware, incluyendo ejemplos prácticos de escape de Workstation y ESXi, y discusión de primitivas de explotación avanzadas.
Exploring how hardware component boundaries impact platform security, focusing on outsourced components, supply chain risks, and threat modeling gaps in modern hardware architectures.
Hands-on firmware hacking workshop using Ghidra for reverse engineering ARM Cortex-M architecture, followed by live demonstration of hardware glitching attacks on microcontrollers.
Exploring security vulnerabilities in privileged Linux containers, demonstrating exploitation methods on Play-with-Docker platform, and showcasing techniques to access host systems and networks.
Explore Qiling Framework for advanced security analysis, including cross-platform emulation, fuzzing, malware sandboxing, and IoT vulnerability research. Learn to build customized tools efficiently.
Exploiting Adobe Reader vulnerabilities through malformed strings, revealing four critical security flaws including information disclosure and code execution risks.
Explore four unconventional, home-built software-defined radios using simple methods and common parts. Learn innovative approaches to wireless experimentation and protocol hacking from a leading security researcher.
Get personalized course recommendations, track subjects and courses with reminders, and more.