Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Reverse Engineering
#Binary Analysis
#Ghidra
#IDA Pro
#Decompilation
#Frida
Showing:
795
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Tokenized AI by Christian Heidorn
Blend Images with Reverse Engineering in Midjourney
1
rewiews
Learn advanced image blending techniques in Midjourney v5 using reverse engineering and multiprompt methods for more creative and controllable results.
Add to list
6
Lesons
17 minutes
On-Demand
Free-Video
Bug Hunting
1
rewiews
Comprehensive guide to bug hunting techniques, covering tools like Burp Suite, subdomain discovery, web application testing, and Android penetration testing for aspiring cybersecurity professionals.
Add to list
33
Lesons
7 hours
On-Demand
Free-Video
Santa Fe Institute
Connecting Molecular Details to Macroscopic Behaviors with Thermodynamics and Information Theory
0
rewiews
Explore how molecular details connect to macroscopic behaviors using thermodynamics and information theory, focusing on E. coli chemotaxis and the energetic costs of biological information processing.
Add to list
19
Lesons
1 hour 2 minutes
On-Demand
Free-Video
NPTEL
Rapid Manufacturing
0
rewiews
Explore advanced manufacturing techniques, from design to production, including 3D printing, reverse engineering, and product development. Gain practical insights through lab demonstrations and case studies.
Add to list
45
Lesons
1 day 8 hours
On-Demand
Free-Video
New York University (NYU)
Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
0
rewiews
Explore advanced binary analysis techniques through interactive challenges, focusing on DECREE, AFL, and LAF. Gain insights into porting strategies and crash analysis methodologies.
Add to list
15
Lesons
27 minutes
On-Demand
Free-Video
New York University (NYU)
angr: Binary Analysis Framework - Demonstration and Analysis
0
rewiews
Explore angr, a powerful binary analysis framework, through demos and source code analysis. Learn its capabilities for reverse engineering and vulnerability detection.
Add to list
6
Lesons
31 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Axiomatic Causal Interventions for Reverse Engineering Relevance Computation in Neural Retrieval Models - Lecture 3
0
rewiews
Explore axiomatic causal interventions for reverse engineering relevance computation in neural retrieval models, enhancing understanding of information retrieval systems.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
Moritz Klein
Reverse Engineering the Bucket Brigade Delay Circuit - DIY Audio Effects
0
rewiews
Dive into the world of bucket brigade delay circuits, exploring their architecture, building a basic version, and designing a DIY audio delay using a BBD chip. Learn analog sampling, signal transfer, and reconstruction techniques.
Add to list
12
Lesons
45 minutes
On-Demand
Free-Video
Reverse Engineering Tutorials
0
rewiews
Explore Android app reverse engineering techniques, from decompilation to vulnerability detection, using tools like GHIDRA for software analysis and security testing.
Add to list
6
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Android Penetration Testing
0
rewiews
Explore advanced Android security techniques including reverse engineering, SSL unpinning, and vulnerability detection in this hands-on penetration testing session.
Add to list
3
Lesons
30 minutes
On-Demand
Free-Video
Autodesk
Additive Manufacturing
0
rewiews
Explore 3D printing capabilities in Fusion 360, covering FFF settings, support structures, lattices, process simulation, and integration with various printers and platforms.
Add to list
23
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Hussein Nasser
Reverse Engineering Series
0
rewiews
Explore popular apps' backend APIs, UX design, and performance through reverse engineering, enhancing your software engineering skills by learning from industry leaders.
Add to list
7
Lesons
1 hour 30 minutes
On-Demand
Free-Video
The National Centre for Research Methods
Research Management and Impact
0
rewiews
Explore ethical principles, theories, and Chinese censorship analysis in this comprehensive research management seminar.
Add to list
3
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Malware Analysis
0
rewiews
Learn to analyze various malware types, from ransomware to nation-state threats. Gain practical skills in behavioral analysis, reverse engineering, and threat attribution techniques.
Add to list
21
Lesons
8 hours
On-Demand
Free-Video
Current Malware Analysis
0
rewiews
Comprehensive malware analysis techniques covering tools, unpacking methods, and real-world examples for cybersecurity professionals and enthusiasts.
Add to list
17
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Malware Analysis Knowledge
0
rewiews
Explore malware analysis techniques, including DEP, text extraction, packers, IDA Pro scripting, Android APK reverse engineering, and MIPS debugging with GDB-multiarch.
Add to list
7
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Reverse Engineering and Malware Analysis
0
rewiews
Learn essential reverse engineering and malware analysis skills using Ghidra, including crackme challenges, WannaCry analysis, and malware detection with Sysinternals Process Explorer.
Add to list
7
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Malware Analysis
0
rewiews
Learn techniques for analyzing malicious software, including document analysis, .NET and Java reverse engineering, debugging with IDA Pro, and understanding remote access tools and botnets.
Add to list
12
Lesons
1 hour 30 minutes
On-Demand
Free-Video
stacksmashing
Hacking the Game & Watch
0
rewiews
Explore the process of hacking Nintendo's Game & Watch, from hardware analysis to running custom software and emulators. Learn about reverse engineering techniques and community efforts in this engaging talk.
Add to list
9
Lesons
35 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Control Flow Graph Reconstruction from EVM Bytecode
0
rewiews
Dive into advanced techniques for reconstructing control flow graphs from Ethereum Virtual Machine bytecode, exploring core concepts and practical applications.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Malware Analysis and Reverse Engineering Course
0
rewiews
Learn techniques for analyzing and reverse engineering malware to understand its behavior and protect systems from threats.
Add to list
30
Lesons
1 hour 30 minutes
On-Demand
Free-Video
media.ccc.de
Writing an Emulator - Approaches, Challenges, and Preservation
0
rewiews
Einblick in die Entwicklung von Emulatoren: Ansätze, Herausforderungen und Bedeutung für die Bewahrung historischer Computersysteme. Praktische Beispiele und Diskussion von Genauigkeit, Geschwindigkeit und Peripherie-Emulation.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Cooper
Pyrrha - Navigating System Binaries Easily
0
rewiews
Discover Pyrrha, a tool for effortlessly exploring system binaries, enhancing your understanding of executable files and improving reverse engineering capabilities.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Ekoparty Security Conference
A Journey Finding Pre and Post-Auth D-Link Router Zero-Days
0
rewiews
Explora el proceso de descubrimiento y explotación de vulnerabilidades 0-day en routers D-Link, desde obtener acceso al firmware hasta identificar y explotar fallos de seguridad para lograr ejecución remota de código.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Silent Steps in Windows Using Syscalls - Evading AV/EDR Defenses
0
rewiews
Explora cómo utilizar syscalls en Windows para evadir defensas AV/EDR, analizando su funcionamiento e interacción mediante ingeniería inversa para lograr evasiones efectivas.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
media.ccc.de
Toniebox Reverse Engineering: Open-Source Alternatives for Children's Audio Player
0
rewiews
Einblick in Reverse Engineering der Toniebox: Technische Details, Datenschutzprobleme und Open-Source-Alternativen wie TeddyBench und TeddyCloud für mehr Kontrolle und Funktionalität.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
media.ccc.de
Breaking DRM in Polish Trains - Reverse Engineering Train Control Systems
0
rewiews
Reverse-Engineering von Zügen zur Analyse einer verdächtigen Fehlfunktion. Einblicke in Zugsicherungssysteme, technische Hintergründe und unerwartete Lösungen für blockierte Triebwagen.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
media.ccc.de
Breaking "DRM" in Polish Trains - Reverse Engineering Train Control Systems
0
rewiews
Découvrez comment une équipe a déjoué un système de sécurité suspect dans des trains polonais en panne, mêlant ingénierie inverse et analyse technique du système de contrôle ferroviaire.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Introducción al Reversing - Ingeniería Inversa para Seguridad Informática
0
rewiews
Introducción a la Ingeniería Inversa: fundamentos, aplicaciones en seguridad informática y herramientas esenciales. Ideal para principiantes interesados en exploits, análisis de malware y más.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
media.ccc.de
CI-Bus: Deep Insights into the Caravan LIN Bus Protocol - EH21
0
rewiews
Detaillierter Einblick in das LIN-Bus-Protokoll der Caravanbranche durch Reverse-Engineering. Enthüllt Implementierungsdetails, Herausforderungen und kuriose Aspekte der Gerätesteuerung in Wohnmobilen.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
media.ccc.de
Coffee Machine Hacks: Overcoming Vendor Lock-in and Planned Obsolescence
0
rewiews
Kaffeemaschinen-Hacks gegen Vendor-Lock-in und erzwungene Obsoleszenz: Wie Tchibo-Geräte trotz WLAN-Abschaltung weiter funktionieren und der Kampf gegen fragwürdige Geschäftspraktiken.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
media.ccc.de
Digital eWaste - Anatomy and Revival of a GPS Device
0
rewiews
Anatomie und Wiederbelebung eines GPS-Empfängers: Technische Erkundung zur Reaktivierung obsoleter Geräte durch Reverse-Engineering und Neuentwicklung von Backend-Systemen.
Add to list
11
Lesons
36 minutes
On-Demand
Free-Video
HashiCorp
Engenharia Reversa com Terraform - Transformando Ambientes Cloud Existentes em IaC
0
rewiews
Aprenda a transformar ambientes cloud existentes em código Terraform, acelerando a implementação de Infraestrutura como Código (IaC) e melhorando a entrega, agilidade e versionamento.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
media.ccc.de
SocketCAN: The CAN Subsystem in the Linux Network Stack
0
rewiews
Entdecke SocketCAN im Linux-Kernel: CAN-Bus-Grundlagen, Hardware-Unterstützung und Protokolle für Automotive und Industrieanwendungen. Lerne Tools zur Analyse und Manipulation von CAN-Datenverkehr kennen.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
media.ccc.de
Heizkeller Sehen und Sterben - Chaos and Linux in German Boiler Rooms
0
rewiews
Entdecke das Chaos in deutschen Heizkellern und erfahre, wie Linux-Gateways zur Vereinheitlichung und Optimierung von Heizungssystemen eingesetzt werden. Lerne über Reverse-Engineering und Open-Source-Lösungen.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
DevSecCon
Dynamic Analysis of Complex Mobile Applications
0
rewiews
Aprenda a realizar análisis de seguridad en aplicaciones móviles complejas, superando protecciones criptográficas y encontrando vulnerabilidades mediante herramientas como Frida, Burp Suite y Brida.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Robert Feranec
How to Design Your Own Chip and How to Build It for Free - With Matt Venn
0
rewiews
Explore chip design and free manufacturing with Matt Venn. Learn about OpenLane, eFabless, hardware description languages, and the process of creating custom chips from concept to production.
Add to list
20
Lesons
1 hour 7 minutes
On-Demand
Free-Video
IEEE
Backward-Bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes
0
rewiews
Explores backward-bounded DSE for solving infeasibility questions in software deobfuscation, demonstrating its effectiveness for opaque predicates and call stack tampering in malware analysis and reverse engineering.
Add to list
13
Lesons
22 minutes
On-Demand
Free-Video
IEEE
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
0
rewiews
Uncovers critical vulnerabilities in solid state drive hardware encryption, revealing potential data recovery risks and the need for additional security measures.
Add to list
8
Lesons
20 minutes
On-Demand
Free-Video
IEEE
RetroWrite- Statically Instrumenting COTS Binaries for Fuzzing and Sanitization
0
rewiews
Explore static instrumentation of COTS binaries for enhanced fuzzing and sanitization using RetroWrite, a framework for rewriting position-independent code.
Add to list
11
Lesons
16 minutes
On-Demand
Free-Video
IEEE
Binary Analysis with Architecture and Code Section Detection Using Supervised Machine Learning
0
rewiews
Explore supervised machine learning techniques for binary analysis, focusing on architecture and code section detection to enhance reverse engineering and security analysis.
Add to list
9
Lesons
18 minutes
On-Demand
Free-Video
IEEE
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
0
rewiews
Comprehensive methodology for cloud providers to assess DRAM vulnerability to Rowhammer attacks, including near-optimal instruction sequences and row adjacency mapping techniques for modern Intel platforms.
Add to list
16
Lesons
17 minutes
On-Demand
Free-Video
IEEE
NetCAT - Practical Cache Attacks from the Network
0
rewiews
Reverse engineering DDIO to demonstrate NetCAT, a network-based cache attack enabling remote keystroke timing attacks and covert channels, highlighting security risks in modern Intel processors.
Add to list
21
Lesons
17 minutes
On-Demand
Free-Video
IEEE
A Generic Approach to Automatic Deobfuscation of Executable Code
0
rewiews
Explore a generic approach to automatically deobfuscate executable code, applicable to various obfuscation techniques. Learn about semantics-preserving transformations and their effectiveness in extracting internal logic from obfuscated malware.
Add to list
16
Lesons
20 minutes
On-Demand
Free-Video
HackerSploit
Malware Analysis With Ghidra - Stuxnet Analysis
0
rewiews
Explore Ghidra's features for malware analysis through a hands-on examination of Stuxnet, demonstrating reverse engineering techniques and tool capabilities.
Add to list
8
Lesons
31 minutes
On-Demand
Free-Video
Autodesk
STL File Editing is Finally Easy with Fusion 360's New Parametric Mesh Workspace
0
rewiews
Discover Fusion 360's new parametric mesh workspace for easy STL file editing, mesh repair, and conversion to solid bodies. Learn advanced techniques for seamless integration of engineered features with existing mesh bodies.
Add to list
29
Lesons
59 minutes
On-Demand
Free-Video
Autodesk
Meshing Around - How Fusion 360's Parametric Mesh Workspace Sets the Bar for Mesh Editing
0
rewiews
Explore Fusion 360's parametric mesh workspace for advanced mesh editing, repair, and conversion. Learn to modify STL files, hollow meshes, and seamlessly integrate engineered features with existing mesh bodies.
Add to list
21
Lesons
1 hour 7 minutes
On-Demand
Free-Video
Autodesk
Deep Dive into the New Parametric Mesh Editing and Reverse Engineering Tools
0
rewiews
Explore Fusion 360's new parametric mesh workspace, featuring enhanced editing, reverse engineering, and solid conversion capabilities. Learn advanced tools for mesh repair, feature addition, and complex model manipulation.
Add to list
18
Lesons
1 hour 27 minutes
On-Demand
Free-Video
HackerOne
Hacker101 - Android Quickstart
0
rewiews
Learn essential Android app hacking concepts, tools, and techniques in this quick guide. Explore APK structure, emulators, decompilation, and security testing methods for successful mobile app penetration testing.
Add to list
19
Lesons
15 minutes
On-Demand
Free-Video
Bugcrowd
Fun with Frida on Mobile - Leveraging Dynamic Analysis Tools
0
rewiews
Explore Frida for mobile app analysis: trace functions, examine memory, bypass security. Practical examples for iOS and Android, including SSL pinning bypass and custom tool creation.
Add to list
42
Lesons
59 minutes
On-Demand
Free-Video
Bugcrowd
iPhone Baseband Research and Reversing - Security Insights and Techniques
0
rewiews
Explore iPhone baseband internals, research techniques, and tools for firmware analysis, reversing, and exploitation. Gain insights into Qualcomm baseband architecture and vulnerabilities.
Add to list
22
Lesons
48 minutes
On-Demand
Free-Video
Bugcrowd
Hardware Hacking for the Masses - Version 2
0
rewiews
Explore hardware hacking basics, areas, and entry points with hands-on demos. Learn essential concepts and discover resources for further practice in this engaging introduction to breaking and understanding hardware.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
Bugcrowd
Finding and Exploiting Hidden Functionality in Windows DLLs - LevelUpX Series 14
0
rewiews
Explore hidden Windows DLL functionality, common bug patterns, and exploitation techniques for bug bounty hunters. Learn tools and methods to uncover vulnerabilities in web servers and network services.
Add to list
8
Lesons
45 minutes
On-Demand
Free-Video
Bugcrowd
SPI Flash Extraction for Bug Bounty Hunters - LevelUpX Series 13
0
rewiews
Hands-on guide to extracting SPI flash contents from hardware devices, focusing on techniques and tools for bug bounty hunters to uncover valuable data and impactful vulnerabilities.
Add to list
10
Lesons
40 minutes
On-Demand
Free-Video
secwestnet
ARM-X Emulator: Open Source CPU Architecture Emulation
0
rewiews
Explore the open-source ARM-X CPU architecture emulator, learning its features and applications for security research and embedded systems development.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
Robert Feranec
Hacking Hardware - Samy Kamkar
0
rewiews
Explore hardware hacking techniques, from credit card manipulation to wireless keyboard emulation, with insights on cryptography, fault injection, and firmware reverse engineering tools.
Add to list
14
Lesons
1 hour 1 minute
On-Demand
Free-Video
SyScan360
Back to the Core - Exploring Fundamental Security Concepts
0
rewiews
Explore advanced techniques for analyzing and exploiting core system vulnerabilities in this in-depth security presentation from SyScan'15 Singapore.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
SyScan360
Breaking Antivirus Software - Security Vulnerabilities and Exploits
0
rewiews
Explore techniques for exploiting vulnerabilities in antivirus software, uncovering potential security flaws and weaknesses in these critical defense systems.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Recon Conference
Recon Brussels 2018 - Starcraft: Emulating a Buffer Overflow for Fun and Profit
0
rewiews
Explore reverse engineering techniques used to emulate a buffer overflow in StarCraft, addressing challenges in preserving popular mods while enhancing game security.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Reverse Engineering for Ethical Hackers
0
rewiews
Explore ethical hacking through reverse engineering techniques, from basic tools to advanced Python methods. Learn practical skills for cybersecurity and ethical hacking in this comprehensive tech talk.
Add to list
17
Lesons
45 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables
0
rewiews
Innovative system for recovering C++ abstractions from executables, enhancing reverse engineering capabilities through logic programming and static analysis techniques.
Add to list
12
Lesons
27 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Debin: Predicting Debug Information in Stripped Binaries
0
rewiews
Innovative machine learning approach for predicting debug information in stripped binaries, enhancing analysis capabilities for security professionals and reverse engineers.
Add to list
15
Lesons
27 minutes
On-Demand
Free-Video
Colin O'Flynn
Ghidra Setup and Intro
0
rewiews
Learn to set up and use Ghidra, a powerful reverse engineering tool. Explore file import, code browsing, decompilation, and memory mapping through hands-on examples.
Add to list
8
Lesons
30 minutes
On-Demand
Free-Video
TheIACR
Secure Messaging
0
rewiews
Explore secure messaging principles, challenges, and innovations with expert insights on encryption, surveillance prevention, and system vulnerabilities.
Add to list
14
Lesons
1 hour 25 minutes
On-Demand
Free-Video
Hackaday
Reverse Engineering with Ghidra
0
rewiews
Explore software reverse engineering fundamentals, x86_64 architecture, and Ghidra basics in this comprehensive introduction to analyzing and understanding compiled code.
Add to list
5
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Hackaday
Replicating a Secure Telephone Key
0
rewiews
Reverse engineering and replicating a secure telephone key: from mechanical design to electrical reproduction, overcoming manufacturing challenges for the Motorola Sectel 9600.
Add to list
22
Lesons
19 minutes
On-Demand
Free-Video
Hackaday
Reading Silicon - How to Reverse Engineer Integrated Circuits
0
rewiews
Explore integrated circuit reverse engineering with Ken Shirriff. Learn techniques to decipher chip layouts, from classic processors to analog components, using die photos and analysis methods.
Add to list
25
Lesons
32 minutes
On-Demand
Free-Video
Hackaday
Reverse Engineering with Ghidra - Class 4
0
rewiews
Explore advanced Ghidra features: external libraries, patch diffing, checksums, memory management, PCODE, SLEIGH, extensions, and scripting for enhanced reverse engineering capabilities.
Add to list
8
Lesons
53 minutes
On-Demand
Free-Video
Hackaday
Reverse Engineering with Ghidra - Class 3
0
rewiews
Explore advanced reverse engineering techniques using Ghidra, covering structs, pointers, enums, system calls, and file operations. Gain practical tips for efficient analysis and code manipulation.
Add to list
8
Lesons
1 hour 1 minute
On-Demand
Free-Video
Hackaday
Reverse Engineering with Ghidra
0
rewiews
Dive deep into assembly language concepts for reverse engineering, covering control flow, loops, variables, functions, and memory management using the Ghidra software suite.
Add to list
10
Lesons
1 hour
On-Demand
Free-Video
Bill Buchanan OBE
Code Forensics - Analyzing High-Level Languages and Compilers
0
rewiews
Explore code forensics techniques for analyzing high-level languages, compilers, and architectures. Learn debugging and tracing methods to uncover hidden software behaviors and vulnerabilities.
Add to list
11
Lesons
1 hour 18 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Malware Creation and Detection - Lecture 2 April 2015
0
rewiews
Explore malware types, analysis methods, and detection techniques in this comprehensive lecture on cybersecurity threats and defenses.
Add to list
10
Lesons
42 minutes
On-Demand
Free-Video
Hackaday
Remoticon 2021 - Rob Weinstein Builds an HP-35 from the Patent Up
0
rewiews
Explore the reverse engineering of the revolutionary HP-35 calculator, from patent analysis to FPGA implementation. Gain insights into its groundbreaking design and inner workings.
Add to list
14
Lesons
35 minutes
On-Demand
Free-Video
Hackaday
Remoticon 2021 - Joey Castillo Teaches Old LCDs New Tricks
0
rewiews
Discover how to hack and customize LCD displays for battery-powered projects, from understanding their functionality to manufacturing your own custom designs.
Add to list
7
Lesons
31 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Code Forensics - Techniques and Tools for Digital Investigation
0
rewiews
Explore code forensics techniques, from high-level languages to virtualization, obfuscation, and network analysis. Learn practical skills for investigating and analyzing software systems.
Add to list
19
Lesons
1 hour 18 minutes
On-Demand
Free-Video
Hackaday
Live Breaking into Encrypted 3D Printer Firmware
0
rewiews
Hands-on workshop on breaking encrypted 3D printer firmware, covering techniques like frequency analysis, known-plaintext attacks, and ARM architecture exploitation using tools such as Matplotlib and SciPy.
Add to list
18
Lesons
52 minutes
On-Demand
Free-Video
Hackaday
AVR- Architecture, Assembly & Reverse Engineering
0
rewiews
Explore AVR architecture, assembly, and reverse engineering, focusing on data space, I/O operations, MAX7219 functionality, and implementing a Simon Says game in pure assembly.
Add to list
6
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Hackaday
AVR - Architecture, Assembly & Reverse Engineering Class 3
0
rewiews
Explore AVR architecture, assembly language, and reverse engineering techniques. Learn essential instructions, bitwise operations, and function calling conventions for microcontroller programming.
Add to list
17
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Hackaday
AVR- Architecture, Assembly & Reverse Engineering
0
rewiews
Explore AVR microcontroller architecture, assembly programming, and reverse engineering techniques. Learn about memory spaces, GPIO registers, interrupts, and timers in this hands-on class.
Add to list
10
Lesons
57 minutes
On-Demand
Free-Video
Malware Analysis 101: N00b to Ninja in 60 Minutes - Lecture 4
0
rewiews
Learn essential malware analysis techniques, from basic concepts to advanced methods, in this comprehensive tutorial designed to rapidly enhance your cybersecurity skills.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Evading Code Emulation - Writing Ridiculously Obvious Malware That Bypasses AV
0
rewiews
Learn techniques for creating malware that evades antivirus detection through code emulation bypass, presented by Kyle Adams at BSidesLV 2014.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Malware Analysis 101: From Novice to Expert in 60 Minutes
0
rewiews
Learn essential malware analysis techniques, from basic to advanced, to enhance your cybersecurity skills and protect against digital threats.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Reverse Engineering Demystified - OISF 2013
0
rewiews
Explore reverse engineering techniques, from source code analysis to binary disassembly. Learn about vulnerability discovery, static and dynamic approaches, and overcoming obstacles in software analysis.
Add to list
22
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Malware Analysis Triage for Beginners
0
rewiews
Learn essential techniques for initial malware analysis, including static and dynamic analysis methods, to quickly assess potential threats and determine next steps.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
What If Max Zoran Succeeded Living Without Silicon Valley - Notacon 9
0
rewiews
Explore living without Silicon Valley tech, examining open-source hardware, reverse engineering, and alternative approaches to technology development. Challenges intellectual property norms and discusses creating fresh hardware solutions.
Add to list
43
Lesons
44 minutes
On-Demand
Free-Video
Dragos: ICS Cybersecurity
Analyzing and Understanding CRASHOVERRIDE - ICS Cybersecurity Webcast
0
rewiews
Comprehensive analysis of CRASHOVERRIDE malware framework, exploring its impact on grid operations, technical details, and mitigation strategies for ICS cybersecurity professionals.
Add to list
22
Lesons
57 minutes
On-Demand
Free-Video
BruCON Security Conference
Reverse Engineering an EV Charger - Zaptec Pro Analysis
0
rewiews
Dive into the reverse engineering process of a popular EV charger, exploring firmware analysis, custom bootloader creation, and potential security improvements in this insightful presentation.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
OWASP Foundation
Understanding the API Attack Vector - How Attackers Exploit Application Communications
0
rewiews
Explore attacker techniques for targeting API-driven applications, including code manipulation, mobile vulnerabilities, and advanced attacks. Learn strategies to secure apps in cloud-native environments.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
OWASP Foundation
Video Game Security - Hacking Techniques and Protection Mechanisms
0
rewiews
Explore video game hacking techniques, from business risks to memory manipulation, covering client-side and network-based attacks, with insights applicable to various software industries.
Add to list
21
Lesons
44 minutes
On-Demand
Free-Video
OWASP Foundation
Shameful Secrets of Proprietary Network Protocols
0
rewiews
Reverse engineering proprietary protocols: case studies revealing security flaws in financial software, home automation, and embedded systems. Techniques for uncovering hidden vulnerabilities in undocumented binary protocols.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Mobile Top Ten 2014 - The New Lack of Binary Protection Category
0
rewiews
Explore the new OWASP Mobile Top Ten category: lack of binary protections. Learn about risks to mobile apps, their impact on the app economy, and strategies to mitigate these threats on iOS and Android platforms.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Reverse Engineering and Code Modification Prevention Project
0
rewiews
Explore reverse engineering risks and prevention techniques for application security experts. Learn about code integrity, data validation, and architectural principles to protect software in untrusted environments.
Add to list
31
Lesons
1 hour 8 minutes
On-Demand
Free-Video
OWASP Foundation
Building Secure Containers for Mobile Devices
0
rewiews
Explore secure container solutions for BYOD environments, covering application wrapping, design challenges, iOS runtime analysis, and implementation best practices for mobile data protection.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
Verifying Software for Security Bugs - Dynamic Analysis and Fuzzing Testing
0
rewiews
Learn dynamic analysis and fuzzing techniques to verify software security, including mitigations and vulnerability checks. Explore BinSecSweeper, an open-source tool for binary analysis on Windows and Linux.
Add to list
30
Lesons
50 minutes
On-Demand
Free-Video
OWASP Foundation
Tagging Your Code with a Useful Assurance Label
0
rewiews
Learn to focus software vulnerability assessments on critical weaknesses across the development lifecycle, and create an "assurance tag" for binaries to enhance security efforts.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Use After Free Exploitation - Detecting and Exploiting Heap Vulnerabilities
0
rewiews
Explore Use After Free vulnerabilities, their detection, and exploitation in web browsers. Learn about memory leaks and ASLR bypass techniques from an industry expert.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
Hacking .NET Applications - The Black Arts of ASM Attacks
0
rewiews
Explore new tools and techniques for attacking .NET applications in live memory, enabling easy point-and-click attacks on critical software components with basic skills and free tools.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Linux Foundation
Hacking for Developers
0
rewiews
Learn ethical hacking techniques, tools, and methodologies to enhance your development skills and improve software security. Gain insights into vulnerability assessment and exploitation.
Add to list
12
Lesons
35 minutes
On-Demand
Free-Video
Cooper
SMT Solvers in IT Security - Deobfuscating Binary Code with Logic
0
rewiews
Explore SMT solvers for deobfuscating binary code in IT security. Learn practical applications, theoretical limitations, and solutions for enhancing malware analysis and vulnerability identification.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Cooper
Infosec and Failure
0
rewiews
Explore common failures in infosec, their causes, and lessons learned with reverse engineer Ange Albertini. Gain insights to improve your cybersecurity practices and avoid pitfalls.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
load more...