Timetable
| Title | Type | Location | Serial | Start | End | All Day | |
|---|---|---|---|---|---|---|---|
| Side Channels | Lecture | E2 2, Günter-Hotz-Hörsaal | 17.07.25 | 17.07.25 | No | ||
| Exploits | Lecture | E2 2, Günter-Hotz-Hörsaal | 22.05.25 | 22.05.25 | No | ||
| Debugging | Lecture | E2 2, Günter-Hotz-Hörsaal | 05.06.25 | 05.06.25 | No | ||
| Introduction | Lecture | E2 2, Günter-Hotz-Hörsaal | 10.04.25 | 10.04.25 | No | ||
| Finding Bugs | Lecture | E2 2, Günter-Hotz-Hörsaal | 12.06.25 | 12.06.25 | No | ||
| Memory Corruption - Overflows | Lecture | E2 2, Günter-Hotz-Hörsaal | 08.05.25 | 08.05.25 | No | ||
| Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 14.05.25 | 14.05.25 | No | |
| Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 21.05.25 | 21.05.25 | No | |
| Pwntools Tutorial #2 | Tutorial | HS003 (E 1 3) | 3 | 07.05.25 | 07.05.25 | No | |
| Pwntools Tutorial #2 | Tutorial | HS003 (E 1 3) | 3 | 04.06.25 | 04.06.25 | No |
