Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Reverse engineering Windows Defender's JavaScript engine: analysis, functionality, tooling, and potential vulnerabilities in MpEngine.dll's core antivirus system.
Explore DIY ARM debugging for Wi-Fi chips using Nexmon framework. Learn to set breakpoints, handle debugging events, and perform single-step debugging on Cortex-R4 microcontrollers in FullMAC Wi-Fi firmwares.
Exploración profunda de la seguridad de HP iLO4, incluyendo análisis del firmware, vulnerabilidades y una nueva técnica de explotación para comprometer el sistema operativo del servidor host a través de DMA.
In-depth analysis of Turla espionage group's tactics, techniques, and custom toolset for targeting governments and diplomats, presented by ESET malware researchers Matthieu Faou and Jean-Ian Boutin.
Explore reverse engineering techniques used to emulate a buffer overflow in StarCraft, addressing challenges in preserving popular mods while enhancing game security.
Detailed analysis of a critical vulnerability in Cisco ASA AnyConnect, covering fuzzing architecture, bug analysis, and exploitation techniques for IKEv1 packets.
Unveiling Toshiba laptop vulnerabilities: BIOS password recovery exploitation and EC firmware signing key extraction, enabling stealth rootkit implantation. Implications for newer models discussed.
Explore vulnerabilities in industrial routers, focusing on Digi WR21 and Sarian OS. Uncover internal workings, network protocols, and security features of critical infrastructure devices.
Comprehensive analysis of QNX's security features, including exploit mitigations and random number generators, revealing vulnerabilities and design issues in critical embedded systems.
Explore WSL vulnerabilities and Windows kernel exploitation techniques. Learn about reverse engineering, syscall manipulation, and bypassing modern anti-exploitation defenses to achieve privilege escalation.
Explore the intermediate language used in Hex-Rays Decompiler, its simplicity and power in representing programs, and plans for publication and programmatic access.
Automated techniques for reversing complex C++ code, focusing on rebuilding inheritance, identifying templates, and tracing program flow to simplify the reverse engineering process.
Toolset for detecting vulnerabilities in iOS apps: download and decrypt, decompile, statically analyze, and present results. Focuses on high-level semantics reconstruction and common mobile app security flaws.
Explore bypassing Code Read Protection in NXP LPC microcontrollers through bootloader exploitation and glitch attacks. Learn hardware/software design for a simple glitcher to disable CRP and access FLASH contents.
Exploring vulnerabilities in Hardware Security Modules (HSMs) through firmware analysis and reverse engineering of the TMS320C64x DSP architecture, with focus on the Utimaco SecurityServer.
Get personalized course recommendations, track subjects and courses with reminders, and more.