Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore UEFI exploit development using cross-architecture UEFI quines as a framework, enhancing your understanding of low-level system vulnerabilities.
Explore advanced techniques for bypassing WebP image format security measures, uncovering vulnerabilities and potential exploits in web applications.
Explore V8 engine's heap sandbox implementation, its security implications, and potential vulnerabilities in Chrome's JavaScript engine.
Explore techniques for attacking Windows device drivers and potential sandbox escape methods in this advanced security analysis presentation.
Explore microcontroller security in Meta's smart glasses, focusing on defense strategies through offensive techniques and real-world applications.
Explore Webkit IPC vulnerabilities and techniques for escaping the Safari sandbox, gaining insights into browser security and exploitation.
Explore Apple's USB-C controller vulnerabilities and hacking techniques with expert Thomas Roth in this cutting-edge cybersecurity presentation.
Entdecken Sie Techniken zur Ausnutzung von Android Binder-Schwachstellen für Root-Zugriff durch Fuzzing-Methoden und Sicherheitsanalyse.
Explore Samsung Galaxy A* boot chain vulnerabilities and attack techniques for enhanced mobile security understanding.
Explore Microsoft Exchange PowerShell Remoting vulnerabilities and exploitation techniques for enhanced cybersecurity awareness and defense strategies.
Explore techniques for blindly exploiting load-balanced services in "The Mines of Kakadûm" presentation, uncovering vulnerabilities in distributed systems.
Dissect Secure Boot's third-party attack surface, exploring vulnerabilities and potential exploits in boot processes.
Explore advanced Android security, focusing on Memory Tagging Extension (MTE) and OEM-specific implementations. Gain insights into exploiting vulnerabilities in custom logic.
Explore stack smashing techniques to bypass security measures in electronic door locks, uncovering vulnerabilities and potential exploits in physical access control systems.
Explore critical vulnerabilities in connected devices through SMS exploitation, uncovering potential threats to millions of users worldwide.
Get personalized course recommendations, track subjects and courses with reminders, and more.