Professional Exploit Development Training

Deep technical binary exploitation course with a focused approach towards the Windows Internals, the Stack Internals, and the Heap Internals

This training is a deep technical binary exploitation course with a focused approach towards the Windows Internals, the Stack Internals, and the Heap Internals.

The instructor’s thought process as an experienced exploit developer changes your worldview about how you approach software/bugs/exploitation, what questions you ask, and developing a methodology.

The instructor can clearly illustrate visual diagrams of how memory corruption exploitations occur on a conceptual level as well as what happens given a specific case study of a CVE.

The instructor questions and challenges your thinking, stepping through the debugger, and building your understand of the instruction and interaction with the system.

The instructor provides a systematic, thorough, and realistic list of CVEs/exercises, across OS versions, that covers what was taught in the class and more, even pushing you into starting your own research.

You get the opportunity to meet and network with other individual invested in doing deep technical work, which may be rare.

There are few to no other courses that offers this level of technical depth that is being covered, at least not publicly.

Testimonials that give you a good sense of what the course is like beyond the page of the course content description :
Voidsec
Wiebe Willems
Matteo Malvica
Gershom Rogers
Rikkert Ten Klooster
Mario Kornab
Nick
Kapil Khot

Attended the combo; Bootcamp and Advanced Training.

John
Corelan Advanced
PwC Sydney
02 2024