Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Machine Learning
Python
Microsoft Excel
Intelligenza Artificiale
Python for Data Science
Introduction to Philosophy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore adversarial approaches to smart contracts with insights on potential vulnerabilities and attack vectors, enhancing your understanding of blockchain security.
Insightful discussion on bug bounty programs, DEFCON CTF experiences, and smart contract security, offering valuable perspectives for cybersecurity enthusiasts and professionals.
Explore Amazon Cognito security misconfigurations, including unauthorized access, authentication bypass, and privilege escalation. Learn detection techniques and developer recommendations.
Explore ClipboardEvent listeners as potential XSS vectors in web applications. Learn techniques for identifying and exploiting vulnerabilities to enhance your offensive security skills.
Explore RFC vulnerabilities and their impact on web security with Inti De Ceukelaire. Learn to identify and exploit logic flaws in protocols for more effective bug hunting and penetration testing.
Mastering command-line tools for efficient data manipulation in offensive security. Learn sorting, regex, grep, find, and JSON processing to enhance your hacking capabilities.
Discover how Frans Rosen achieved remote code execution on Apple through hot jar swapping. Learn about the research, exploit, and analysis behind this impressive security finding.
Explore techniques for reversing Web Assembly (wasm) in this offensive security talk. Learn key strategies and tools for analyzing and understanding wasm code.
Explore smart contract vulnerabilities, including re-entrancy attacks, delegatecall risks, and price oracle issues. Learn from real-world examples and gain insights into securing blockchain applications.
Discover effective blackbox monitoring techniques for timely bug detection in web applications. Learn task-based hybrid approaches, freshness indicators, and risk markers for improved security.
Dive into a critical smart contract vulnerability analysis, exploring a $600,000+ bug in Port Finance and learning how it was identified through a bug bounty program before potential exploitation.
Explore smart contract auditing through a real-world example, gaining insights into security practices and vulnerability detection in blockchain technology.
Insightful interview with @seclilc on her cybersecurity journey, covering hacking, reconnaissance, tools, work-life balance, and overcoming challenges in the field.
Discover how to find XSS vulnerabilities on high-profile websites and create effective proof-of-concept exploits to demonstrate potential data leakage risks.
Explore techniques for exploiting vulnerabilities in Continuous Integration systems, focusing on security risks and potential attack vectors in the software development pipeline.
Get personalized course recommendations, track subjects and courses with reminders, and more.