Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Introducción a la Ciencia de Datos con Python
Functional Foods and Nutraceuticals
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from REcon Conference. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore Intel Processor Trace on Windows for fuzzing. Learn about driver development, debugging with IDA Plugin, and leveraging hardware-supported branch tracing for efficient, targeted evolutionary fuzzing.
Reverse engineering satellite IP content delivery: from reception to packet analysis, error correction, and high bitrate handling. Culminates in creating a Linux-based client mimicking commercial versions.
Reverse engineering Windows Defender's JavaScript engine: analysis, functionality, tooling, and potential vulnerabilities in MpEngine.dll's core antivirus system.
Explore DIY ARM debugging for Wi-Fi chips using Nexmon framework. Learn to set breakpoints, handle debugging events, and perform single-step debugging on Cortex-R4 microcontrollers in FullMAC Wi-Fi firmwares.
Exploración profunda de la seguridad de HP iLO4, incluyendo análisis del firmware, vulnerabilidades y una nueva técnica de explotación para comprometer el sistema operativo del servidor host a través de DMA.
In-depth analysis of Turla espionage group's tactics, techniques, and custom toolset for targeting governments and diplomats, presented by ESET malware researchers Matthieu Faou and Jean-Ian Boutin.
Detailed analysis of a critical vulnerability in Cisco ASA AnyConnect, covering fuzzing architecture, bug analysis, and exploitation techniques for IKEv1 packets.
Unveiling Toshiba laptop vulnerabilities: BIOS password recovery exploitation and EC firmware signing key extraction, enabling stealth rootkit implantation. Implications for newer models discussed.
Explore vulnerabilities in industrial routers, focusing on Digi WR21 and Sarian OS. Uncover internal workings, network protocols, and security features of critical infrastructure devices.
Comprehensive analysis of QNX's security features, including exploit mitigations and random number generators, revealing vulnerabilities and design issues in critical embedded systems.
Explore WSL vulnerabilities and Windows kernel exploitation techniques. Learn about reverse engineering, syscall manipulation, and bypassing modern anti-exploitation defenses to achieve privilege escalation.
Explore the intermediate language used in Hex-Rays Decompiler, its simplicity and power in representing programs, and plans for publication and programmatic access.
Automated techniques for reversing complex C++ code, focusing on rebuilding inheritance, identifying templates, and tracing program flow to simplify the reverse engineering process.
Toolset for detecting vulnerabilities in iOS apps: download and decrypt, decompile, statically analyze, and present results. Focuses on high-level semantics reconstruction and common mobile app security flaws.
Explore bypassing Code Read Protection in NXP LPC microcontrollers through bootloader exploitation and glitch attacks. Learn hardware/software design for a simple glitcher to disable CRP and access FLASH contents.
Get personalized course recommendations, track subjects and courses with reminders, and more.