Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore RFC vulnerabilities and their impact on web security with Inti De Ceukelaire. Learn to identify and exploit logic flaws in protocols for more effective bug hunting and penetration testing.
Mastering command-line tools for efficient data manipulation in offensive security. Learn sorting, regex, grep, find, and JSON processing to enhance your hacking capabilities.
Learn effective directory brute forcing techniques, including wordlist selection and hands-on examples, to enhance your offensive security and bug bounty hunting skills.
Explore techniques for attacking wide-scope targets in bug bounty programs. Learn strategies to identify vulnerabilities and maximize your impact when dealing with extensive attack surfaces.
Explore website hijacking through subdomain and DNS takeovers. Learn about vulnerabilities, detection methods, and how to create proof of concepts for securing web assets.
Detailed walkthrough of API hacking in a Capture The Flag challenge, demonstrating practical offensive security techniques and vulnerability exploitation.
Discover techniques for comprehensive domain mapping of companies, enhancing your attack surface management skills for improved cybersecurity and bug bounty hunting.
Learn to create and deploy smart contracts, tokens, and NFTs on blockchain platforms. Explore vulnerabilities and gain practical insights into Web3 development and security.
Explore smart contracts: definition, NFT applications, programming tools, and a practical demo. Learn key languages and resources for developing your own blockchain-based agreements.
Learn about Certificate Transparency in attack surface management, exploring its importance and implementation in cybersecurity strategies.
Insights from a year of triaging bug bounty reports, covering key lessons learned, common pitfalls, and effective strategies for successful vulnerability reporting and management.
Discover techniques for finding leaked API keys on GitHub, both manually and using tools like TruffleHog. Learn how to leverage these findings for potential critical bounties in bug hunting.
Learn to identify and exploit the Grafana CVE-2021-43798 vulnerability, including detection methods, working proof-of-concept, and practical exploitation techniques for unauthenticated directory traversal.
Comprehensive explanation of Cross-site Scripting (XSS) in web security, covering its types, risks, and prevention methods. Practical insights for ethical hackers and cybersecurity enthusiasts.
Learn fuzzing techniques using Burp Suite in TryHackMe's Advent of Cyber challenge. Enhance your web application security testing skills and discover potential vulnerabilities through automated input manipulation.
Get personalized course recommendations, track subjects and courses with reminders, and more.