Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Data Analysis
Digital Marketing
Introduction to Graphic Illustration
Unlocking Information Security I: From Cryptography to Buffer Overflows
Quantum Mechanics for Everyone
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Dive into the world of IoT RF protocol security as Oliver Lavery explores symbolic execution tools for vulnerability research, showcasing critical discoveries in SiLabs Z-Wave protocol implementation.
Dive into the latest Windows kernel exploit mitigations with a focus on Hypervisor-enforced Paging Translation (HVPT), exploring how this technology aims to protect page tables and potentially end non-data-driven kernel exploits.
Explore the rev.ng decompiler's capabilities in this hands-on guide from raw binary to decompiled C code, including using LLVM IR, CodeQL, and clang-static-analyzer to find bugs in decompiled code.
Discover an automated method to force Android malware to unpack itself, eliminating the need for custom decryptors while remaining packer-agnostic. Learn about BadUnboxing, a new open-source tool for generating benign versions of Android malware.
Dive into x86-64 machine code obfuscation through an analysis of Themida's code mutation feature. Learn about the implementation, findings, and a symbolic execution-based attack for complete deobfuscation and binary regeneration.
Explore how IBM i implements control flow integrity through hardware-assisted memory tagging, with insights into its object-oriented OS, memory safety mechanisms, and a demonstration of memory corruption exploitation.
Dive into the world of GPT reverse engineering with Elias Bachaalany as he shares insights from analyzing over 1000 GPTs, revealing security vulnerabilities, anti-reverse engineering techniques, and surprising discoveries.
Delve into VMProtect 3.8's architecture, reverse engineering techniques, and attack vectors for protected binaries. Learn to identify configuration errors and develop custom analysis tools for combating this obfuscation technology.
Dive into the process of analyzing and exploiting BootROM vulnerabilities in Renesas DA1469x chips, learning how to bypass SecureBoot and recover encrypted firmware through reverse engineering techniques.
Uncover a Windows vulnerability class that allows bypassing Driver Signing Enforcement (DSE) in Windows 11, enabling arbitrary code execution with kernel privileges without third-party code.
Dive into the technical details of DoNex ransomware and learn how vulnerabilities were exploited to decrypt affected files without negotiating with cybercriminals.
Explore the current and future applications of Large Language Models in reverse engineering, addressing challenges like inaccuracies and privacy while showcasing ReverserAI's potential to enhance code analysis and malware detection.
Dive into the complex world of Windows Registry with Mateusz Jurczyk as he reveals vulnerabilities discovered during his audit of the kernel subsystem, featuring case studies and exploit demonstrations.
Dive into the world of UEFI binary golfing, exploring how to create tiny self-replicating applications, understand the x64 ABI, and implement obfuscation techniques to avoid detection.
Dive into vulnerability research in Windows CryptoAPI with Erik Egsgard as he shares his journey finding remote code execution vulnerabilities in this critical security component.
Get personalized course recommendations, track subjects and courses with reminders, and more.