Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to reverse-engineer Apple Watch protocols, perform Bluetooth hacking, and execute data exfiltration by mimicking trusted devices in Apple's ecosystem.
Uncover how macOS malware bypasses Apple's CDHash revocation system, enabling execution of explicitly blocked apps through Gatekeeper flaws and runtime enforcement weaknesses.
Discover how to exploit four chained vulnerabilities in macOS for user-to-root privilege escalation, covering DNS interception, ASLR bypass, and PAC mitigation techniques.
Discover the evolution of Mac Monitor, an open-source macOS security tool leveraging Apple's Endpoint Security APIs for system activity analysis and threat detection prototyping.
Uncover macOS location privacy vulnerabilities and learn how attackers can bypass consent mechanisms to track users through system weaknesses and third-party apps.
Discover how two researchers developed a macOS exploit over coffee, covering sandbox escapes, XPC calls, ACL inheritance, and race conditions to achieve privilege escalation.
Explore macOS security telemetry through ULS, ESF, and TCC.db to detect threats like Atomic Stealer using behavioral analysis and specialized tools for hardening environments.
Unlock the forensic potential of Apple's Powerlogs database with 600+ tables revealing user activity, travel patterns, apps, and system states across all Apple devices.
Discover how iOS sandbox security works by revamping decompilation tools to reveal sandbox rules, structure, and real-world security implications for enhanced research capabilities.
Explore a behavioral framework for classifying macOS grayware beyond static labels, examining deception, persistence, and monetization traits through Adload family analysis.
Discover how to exploit macOS CoreAudio vulnerabilities through structured Mach message fuzzing, API call chaining, and sandbox escape techniques for privilege escalation.
Discover how to reverse engineer Apple's security updates using automated tools and AI agents to transform opaque CVE fixes into concrete binary-level analysis and actionable intelligence.
Discover how researchers exploited Spotlight plugins to bypass macOS TCC protections, exposing sensitive user data and Apple Intelligence vulnerabilities in this critical security analysis.
Explore Apple's Lockdown Mode implementation through reverse engineering analysis, uncovering protected apps, daemons, and attack vectors it mitigates against zero-click exploits.
Explore Swift binary analysis techniques by understanding type metadata, runtime systems, and reflection capabilities for enhanced iOS app security research.
Get personalized course recommendations, track subjects and courses with reminders, and more.