Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Online Education
Data Analysis
Introduction to Real-Time Audio Programming in ChucK
Introduction to Complexity
The Science of the Solar System
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring vulnerabilities in fingerprint scanners and access control systems, demonstrating physical-to-virtual attacks, and discussing network persistency techniques in IoT devices.
Explore DNS file exfiltration techniques, including a unique protocol for bypassing NG Firewalls. Learn about HIPS tricks and innovative approaches to data transfer across networks.
Explore modern automotive cybersecurity threats, including V2X technologies, smart batteries, and wireless keys. Learn about vulnerabilities in upcoming car features and their implications for future vehicle security.
Innovative deep learning model for tracking fake news authors by analyzing content and stylistic features, enabling identification of attackers spreading malicious rumors for financial gain.
Explore cybersecurity strategies, bug bounty programs, and hacker motivation with Katie Moussouris. Learn about industry myths, perverse incentives, and practical solutions for smarter security practices.
Exploring Jenkins vulnerabilities, including dynamic routing misuse and Groovy sandbox escape. Learn to build custom gadgets and exploit Jenkins through unconventional methods.
Exploración detallada de la vulnerabilidad "Waterdrop" en el controlador Binder de Android, que permite escalar privilegios y obtener acceso root en dispositivos populares, incluyendo los Pixel más recientes.
Exploración de técnicas avanzadas para eludir Device Guard en Windows 10, incluyendo métodos que requieren privilegios de administrador y otros que utilizan aplicaciones nativas del sistema operativo.
In-depth analysis of Content Security Policy for XSS prevention, exploring its effectiveness, debunking myths, and sharing real-world data on successful XSS mitigation in sensitive applications.
Exploración de nuevas interfaces de ataque en iOS y OSX, revelando vulnerabilidades del kernel y controladores mediante ingenierÃa inversa, análisis estático/dinámico y fuzzing mejorado.
Comprehensive guide to reversing with Radare2, covering installation, basic commands, visual modes, configuration, and practical applications. Suitable for beginners and professionals in computer security.
Exploración de técnicas avanzadas para duplicar modelos de aprendizaje automático de caja negra, destacando vulnerabilidades en servicios en la nube y proponiendo un nuevo método de ataque más eficiente.
Explore iOS/macOS networking vulnerabilities, focusing on mbuf processing in XNU kernel. Learn about network packet structures, vulnerability discovery techniques, and PoC exploit development.
Explore TOCTOU attacks on Intel's BootGuard, learn about vulnerabilities in secure boot processes, and discover open-source tools for testing system security.
Introducción a Hourglass Fuzz, un método rápido de búsqueda de errores para Android que supera las limitaciones de los sistemas de fuzzing tÃpicos, con ejemplos de vulnerabilidades descubiertas en controladores gráficos y Bluetooth.
Get personalized course recommendations, track subjects and courses with reminders, and more.