OpenSecurityTraining2
banner
opensectraining.bsky.social
OpenSecurityTraining2
@opensectraining.bsky.social
501(c)(3) Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021!
By the end, you’ll not only understand how emulators work—you’ll be able to build, modify, and analyze them for research, debugging, and vulnerability discovery.
November 14, 2025 at 12:10 PM
The course combines hands-on labs, in-browser exercises, and conceptual lectures to bridge theory and practice, preparing students to tackle topics such as system emulation, hardware-assisted execution, and fuzzing of embedded targets.
November 14, 2025 at 12:10 PM
You will start by understanding what emulation truly means—how software can imitate hardware—and progressively build your own 8-bit CPU emulator in Python (SimpleProc-8), extend it with interrupts, I/O, and MMIO, and finally instrument real-world emulators like QEMU.
November 14, 2025 at 12:10 PM
This course explores the fascinating world of emulation, guiding learners from the fundamentals of CPU design to the internals of QEMU and advanced instrumentation techniques.
November 14, 2025 at 12:10 PM
This captures current and future plans for classes involving security in the deep-dark of firmware! But Binarly is starting to give visibility into what's going on there with their binary analysis platform.
November 3, 2025 at 11:45 AM
You could use the OST1 Rootkits class (opensecuritytraining.info/Rootkits.html) as a starting template, since that's the whole point of making the materials under CC licenses. Xeno Kovah isn't planning on updating it as he's off in Bluetooth world now.
Rootkits
opensecuritytraining.info
October 27, 2025 at 11:24 AM
As always, the recommendation is for students to take the class as it's meant to be seen at ost2.fyi/Fuzz1001 where you get lab instructions, etc.
Fuzzing 1001 Short URL Redirect
ost2.fyi
October 10, 2025 at 11:53 AM
PDFs are vector-based for full quality when zooming, and have click-to-go-to-class links
September 22, 2025 at 11:19 AM
Designed for developers, security engineers, and researchers, the course covers both foundational TPM 2.0 concepts and practical hands-on development techniques for interacting with TPM hardware and simulators. This class has a median completion time of 13 hours.
September 15, 2025 at 10:14 AM