Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Presentation on r2m2, a radare2 plugin leveraging miasm2 for reversing rare CPU architectures. Demonstrates integration of powerful reverse engineering tools and simplifies implementation of new architectures.
Techniques for in-depth reverse engineering of Flash, mapping ActionScript to undocumented counterparts, and analyzing vulnerabilities in Adobe Flash Player for improved exploit research.
Herramienta para detectar patrones en código binario mediante coincidencia de grafos. Permite definir firmas personalizadas para identificar variantes de malware y extraer información valiosa.
Exploring security risks of integrating open-source components in closed applications, focusing on Adobe Reader's XSLT engine. Techniques for auditing and finding vulnerabilities are demonstrated.
Explore vulnerabilities in popular cryptocurrency hardware wallets with experts Thomas Roth and Dmitry Nedospasov, uncovering potential security risks and attack vectors.
Explore advanced Windows tracing techniques using WPP and TraceLogging for enhanced dynamic and static analysis in cybersecurity investigations.
Explore advanced X-ray reverse engineering techniques with expert George Tarnovsky, uncovering hidden hardware secrets and enhancing your security analysis skills.
Exploring remote protocols in Baseband, reverse engineering methodologies, and bug discovery in mobile communication systems.
Exploring security flaws in VR games leading to remote code execution, highlighting privacy concerns and the need for developers to prevent abuse in online AR/VR communities.
Explore attacker dynamics and signatures in cyber conflicts, leveraging insights for proactive defense and enhanced situational awareness in the cybersecurity landscape.
Explore critical vulnerabilities in pre-installed software on Dell and Lenovo PCs, examining the security risks posed by bloatware and the balance between convenience and user safety.
Explore Trusted Execution Environment vulnerabilities in Qualcomm's TEE, reverse engineering techniques, and fuzzing methods for TrustZone apps in mobile device security research.
Electromagnetic fault injection attack on Trezor Bitcoin wallet reveals recovery seed without physical tampering. Explores vulnerability, demonstrates attack method, and discusses countermeasures for hardware wallets.
Explore the ongoing battle between cheat developers and anti-cheat technologies in gaming. Learn about bypassing techniques and tools for testing anti-cheat software effectiveness.
Detailed exploration of Windows kernel security, focusing on KASLR defeats, heap vulnerabilities, and recent changes in RS4. Insights into potential exploits and current Windows KASLR state.
Get personalized course recommendations, track subjects and courses with reminders, and more.