Courses from 1000+ universities
Coursera’s flagship credentials may carry big brand names, but who’s actually creating the content?
600 Free Google Certifications
Entrepreneurship
Artificial Intelligence
Web Development
Learn to Program: The Fundamentals
Anatomy: Know Your Abdomen
Introducción a la Ciencia de Datos con Python
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Windows Restart Manager: its architecture, legitimate uses, and potential for malicious exploitation. Learn defense techniques against threats and see live demonstrations of its functionalities.
Explore modifying Qualcomm WiFi chip firmware for security research. Learn about chip architecture, firmware structure, and patching techniques using the Nexmon framework to enhance functionality and find vulnerabilities.
Reverse engineering Samsung oven firmware to fix temperature inaccuracies and improve performance, demonstrating power analysis, fault injection, and binary patching techniques for e-waste reduction.
Comprehensive security analysis of low-earth satellites, exploring vulnerabilities and demonstrating live exploitation to gain full control. Covers satellite architecture, reverse engineering, and potential impacts on critical services.
Reverse engineering and exploiting cryptographic backdoors in Phicomm routers, demonstrating vulnerabilities and developing tools for unauthenticated root access.
Découvrez les nouvelles techniques de dissimulation du malware PlugX utilisant les API Windows via COM, son exploitation de Windows Explorer et sa capacité de propagation par clé USB.
Explore Windows networking internals, reverse engineering techniques, and recent vulnerabilities like CVE-2023-23415 in this insightful talk on uncovering security flaws in the Windows networking stack.
Exploring MS-DOS malware techniques to create art, blending assembly programming with vintage bootkit analysis. Insights on legacy vulnerabilities and modern applications in firmware and IoT security.
Explore Xiaomi IoT ecosystem security, firmware extraction, and cloud communication. Learn to modify devices, implement new functions, and gain independence from proprietary cloud services.
Explore Intel Processor Trace on Windows for fuzzing. Learn about driver development, debugging with IDA Plugin, and leveraging hardware-supported branch tracing for efficient, targeted evolutionary fuzzing.
Reverse engineering satellite IP content delivery: from reception to packet analysis, error correction, and high bitrate handling. Culminates in creating a Linux-based client mimicking commercial versions.
Reverse engineering Windows Defender's JavaScript engine: analysis, functionality, tooling, and potential vulnerabilities in MpEngine.dll's core antivirus system.
Explore DIY ARM debugging for Wi-Fi chips using Nexmon framework. Learn to set breakpoints, handle debugging events, and perform single-step debugging on Cortex-R4 microcontrollers in FullMAC Wi-Fi firmwares.
Exploración profunda de la seguridad de HP iLO4, incluyendo análisis del firmware, vulnerabilidades y una nueva técnica de explotación para comprometer el sistema operativo del servidor host a través de DMA.
In-depth analysis of Turla espionage group's tactics, techniques, and custom toolset for targeting governments and diplomats, presented by ESET malware researchers Matthieu Faou and Jean-Ian Boutin.
Get personalized course recommendations, track subjects and courses with reminders, and more.