Explore tweets tagged as #exploitdev
Happy New Year 2025!. #infosec #CyberSec #ExploitDev #Hacker #Bug #bugbountyhunter #vulnerabilityResearcher #ReverseEngineering #Binex
0
1
4
Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them. I hope it will be useful to someone out there!.#Offsec #Cybersecurity #ExploitDev #Debugging.
2
13
42
🇦🇺 Corelan hits Melbourne for the FIRST time!. 💥 Stack Exploit Dev: Feb 3–6, 2026.🧨 Heap Masterclass: Feb 9–12, 2026. 🎯 w/ @TantoSecurity . 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025. 👉 #Corelan #ExploitDev
1
4
10
Basic introduction to patch diffing in Ghidra by @qkaiser.(Cisco RV110W). Part 1: Part 2: #reverseengineering #patch #cybersecurity
3
73
276
Officially #OSED certified! I've conquered the Windows User Mode Exploit Development exam and earned the Offensive Security Exploit Developer (OSED) certification. Huge thanks to @offsectraining! #ExploitDev #ReverseEngineering #TryHarder
0
0
5
🇧🇪 Belgian Roots. Global Impact. 🌍. Corelan delivers world-class exploit dev training for Windows:.🔹 Stack Smashing.🔹 Heap Masterclass. Built in Europe. Respected worldwide. Sign up 👉 #CyberSecurity #ExploitDev #MadeInBelgium
0
3
6
Mastering buffer overflows in Vulnserver is essential for exploit development. WinDBG aids in debugging vulnerabilities by controlling EIP and generating shellcode. A must-learn for secure environments! 🔍⚙️ #ExploitDev #BufferOverflow. link:
0
0
2
🚨 Blog 6 is out!. Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: #Infosec #WindowsKernel #CyberSecurity #ExploitDev
0
1
2
I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD .#CyberSecurity #exploitdev
4
2
52
🇦🇺 Corelan hits Melbourne for the FIRST time!. 💥 Stack Exploit Dev: Feb 3–6, 2026.🧨 Heap Masterclass: Feb 9–12, 2026. 🎯 w/ @TantoSecurity . 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025. 👉 #Corelan #ExploitDev
0
2
2
💥 Push, Pop, Boom. Corelan Stack isn’t just another course — it’ll make things click. Expert-level stack exploitation. Zero fluff, real deal. “The course filled in gaps I didn’t even know I had.” — Fabio, Brazil. 👉 #corelan #stack #exploitdev
0
0
0
🧠 Heap exploits today = brains > brute force. Leaks, UAFs, type confusion—APT-level tactics. Is your defense still stuck in 2015?. 👇 What’s your go-to heap hardening move?.#CyberSecurity #ExploitDev. 👉️
0
0
0
🇧🇪 Belgian Roots. Global Impact. 🌍. Corelan delivers world-class exploit dev training for Windows:.🔹 Stack Smashing.🔹 Heap Masterclass. Built in Europe. Respected worldwide. Sign up 👉 #CyberSecurity #ExploitDev #MadeInBelgium
0
0
0
ONE more chance this year to take our popular Bootcamp. High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class). Seats are selling fast! What are you waiting for? #corelan#windows11 #exploitdev
0
2
14
💥 Push, Pop, Boom. Corelan Stack isn’t just another course — it’ll make things click. Expert-level stack exploitation. Zero fluff, real deal. “The course filled in gaps I didn’t even know I had.” — Fabio, Brazil. 👉 #corelan #stack #exploitdev
1
1
3
I was driving back home and never thought this last #offsec #ExploitDev #SoftwareExploitation share for 2022 will go this viral. THANKS to all those who Retweeted/Liked/Commented/etc. Wishing you all a great 2023 .
Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n.#Offsec #SoftwareExploitation #RE.
4
3
29
If you're exploiting a driver offering R/W access to physical memory on Win11 24H2, you can leverage this simple trick to circumvent kernel address leak restrictions and retrieve the kernel base address :p. #exploitdev #driverexploitation.
3
54
157