Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover a pre-auth remote vulnerability in Linux kernel's NVMe implementation. Learn open-source vulnerability research, static code analysis, and NVMe technology. Includes live demos and practical tips.
Explore a case study on exploiting CVE-2023-20032 in ClamAV, demonstrating remote code execution and ASLR bypass techniques applicable to similar antivirus software vulnerabilities.
Explore Android data encryption, focusing on key generation, storage, and vulnerabilities. Learn about File-Based Encryption, TEE, Secure Element, and attack strategies using software vulnerabilities on Samsung A22 and Pixel 3a.
Discover how to build a robot for extracting RAM contents from embedded devices using cryogenic techniques. Learn about design challenges, practical solutions, and cost-effective construction methods.
Efficient heuristics for detecting cryptographic algorithms, state machines, and obfuscated code in binaries. Enhance reverse engineering workflows with architecture-agnostic techniques.
Reverse engineering Samsung oven firmware to fix temperature inaccuracies and improve performance, demonstrating power analysis, fault injection, and binary patching techniques for e-waste reduction.
Comprehensive security analysis of low-earth satellites, exploring vulnerabilities and demonstrating live exploitation to gain full control. Covers satellite architecture, reverse engineering, and potential impacts on critical services.
Reverse engineering and exploiting cryptographic backdoors in Phicomm routers, demonstrating vulnerabilities and developing tools for unauthenticated root access.
Découvrez les nouvelles techniques de dissimulation du malware PlugX utilisant les API Windows via COM, son exploitation de Windows Explorer et sa capacité de propagation par clé USB.
Explore Windows networking internals, reverse engineering techniques, and recent vulnerabilities like CVE-2023-23415 in this insightful talk on uncovering security flaws in the Windows networking stack.
Exploring MS-DOS malware techniques to create art, blending assembly programming with vintage bootkit analysis. Insights on legacy vulnerabilities and modern applications in firmware and IoT security.
Explore Windows Restart Manager: its architecture, legitimate uses, and potential for malicious exploitation. Learn defense techniques against threats and see live demonstrations of its functionalities.
Explore modifying Qualcomm WiFi chip firmware for security research. Learn about chip architecture, firmware structure, and patching techniques using the Nexmon framework to enhance functionality and find vulnerabilities.
Explore Intel Processor Trace on Windows for fuzzing. Learn about driver development, debugging with IDA Plugin, and leveraging hardware-supported branch tracing for efficient, targeted evolutionary fuzzing.
Reverse engineering satellite IP content delivery: from reception to packet analysis, error correction, and high bitrate handling. Culminates in creating a Linux-based client mimicking commercial versions.
Get personalized course recommendations, track subjects and courses with reminders, and more.