Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore 30 years of hacking evolution and its impact on cybersecurity. Learn key insights and prepare for future challenges in the rapidly evolving landscape of digital security and cyberwarfare.
Unveiling critical vulnerabilities in leading SSL VPNs, including pre-auth RCEs and backdoors. Demonstrating exploitation techniques, post-exploitation strategies, and discussing mitigation measures for enterprise security.
Explore advanced mutation fuzzing techniques for wireless protocols, covering basics, new fuzzer development, and smart payload mutation. Includes demos on mobile, IoT, and automotive vulnerabilities.
Explores vulnerabilities in 5G/4G protocols affecting network operators and consumer devices. Demonstrates new hijacking, bidding down, and battery draining attacks using low-cost tools. Discusses worldwide testing results and potential fixes.
Explore techniques to evade static code analysis tools, including covert data flow, deep call stacks, and taint laundering. Learn how malicious code can be camouflaged to avoid detection.
Uncovers vulnerabilities in major phone brands' network settings, allowing attackers to manipulate user data. Demonstrates attack flows and discusses vendor mitigations for these security risks.
Explore PErfidious, a Python tool for PE file manipulation and shellcode injection. Learn about its capabilities in bypassing endpoint detection systems and its potential as a modern PE file analysis library.
Explore CNN-based methods for detecting manipulated facial images, including Deepfakes and face merging. Learn effective techniques using low-level and high-level features for automatic detection of facial manipulation.
Explore techniques for deceiving object detectors by comparing the attack process to neural network training. Learn how applying training techniques can improve adversarial attacks on state-of-the-art systems.
Demonstrating a systematic approach to reverse engineer and exploit car systems through CAN bus communication protocol analysis, packet spoofing, and payload crafting within a month-long prototype build.
Explore underrated security bugs with code snippets, exploitation examples, and impact assessments. Learn to identify and understand these overlooked vulnerabilities for better cybersecurity practices.
Comprehensive analysis of the Tick cyber espionage group's decade-long activities, focusing on their tactics, malware, and impact on East Asian targets, particularly in Korea and Japan.
Closing ceremony and prize-giving event for the Hack In The Box Security Conference, featuring awards for the Capture The Flag competition winners.
Explore advanced kernel fuzzing techniques for macOS, including syscall and IOKit fuzzing. Learn about PanicXNU v3's features and its effectiveness in uncovering critical vulnerabilities in Apple's kernel.
Exploring vulnerabilities in industrial RF remote controllers, revealing security flaws and potential attacks. Includes demos, findings, and recommendations for improving safety in IIoT applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.