Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Xiaomi IoT ecosystem security, firmware extraction, and cloud communication. Learn to modify devices, implement new functions, and gain independence from proprietary cloud services.
Explore Intel Processor Trace on Windows for fuzzing. Learn about driver development, debugging with IDA Plugin, and leveraging hardware-supported branch tracing for efficient, targeted evolutionary fuzzing.
Reverse engineering satellite IP content delivery: from reception to packet analysis, error correction, and high bitrate handling. Culminates in creating a Linux-based client mimicking commercial versions.
Reverse engineering Windows Defender's JavaScript engine: analysis, functionality, tooling, and potential vulnerabilities in MpEngine.dll's core antivirus system.
Explore DIY ARM debugging for Wi-Fi chips using Nexmon framework. Learn to set breakpoints, handle debugging events, and perform single-step debugging on Cortex-R4 microcontrollers in FullMAC Wi-Fi firmwares.
Exploración profunda de la seguridad de HP iLO4, incluyendo análisis del firmware, vulnerabilidades y una nueva técnica de explotación para comprometer el sistema operativo del servidor host a través de DMA.
In-depth analysis of Turla espionage group's tactics, techniques, and custom toolset for targeting governments and diplomats, presented by ESET malware researchers Matthieu Faou and Jean-Ian Boutin.
Explore reverse engineering techniques used to emulate a buffer overflow in StarCraft, addressing challenges in preserving popular mods while enhancing game security.
Detailed analysis of a critical vulnerability in Cisco ASA AnyConnect, covering fuzzing architecture, bug analysis, and exploitation techniques for IKEv1 packets.
Unveiling Toshiba laptop vulnerabilities: BIOS password recovery exploitation and EC firmware signing key extraction, enabling stealth rootkit implantation. Implications for newer models discussed.
Explore vulnerabilities in industrial routers, focusing on Digi WR21 and Sarian OS. Uncover internal workings, network protocols, and security features of critical infrastructure devices.
Comprehensive analysis of QNX's security features, including exploit mitigations and random number generators, revealing vulnerabilities and design issues in critical embedded systems.
Explore WSL vulnerabilities and Windows kernel exploitation techniques. Learn about reverse engineering, syscall manipulation, and bypassing modern anti-exploitation defenses to achieve privilege escalation.
Explore the intermediate language used in Hex-Rays Decompiler, its simplicity and power in representing programs, and plans for publication and programmatic access.
Automated techniques for reversing complex C++ code, focusing on rebuilding inheritance, identifying templates, and tracing program flow to simplify the reverse engineering process.
Get personalized course recommendations, track subjects and courses with reminders, and more.