Explore tweets tagged as #exploitdev
@binaryz0ne
Ali Hadi | B!n@ry
8 months
Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them. I hope it will be useful to someone out there!.#Offsec #Cybersecurity #ExploitDev #Debugging.
Tweet media one
2
13
42
@corelanc0d3r
ς๏гєɭคภς0๔3г ([email protected])
14 days
🇦🇺 Corelan hits Melbourne for the FIRST time!. 💥 Stack Exploit Dev: Feb 3–6, 2026.🧨 Heap Masterclass: Feb 9–12, 2026. 🎯 w/ @TantoSecurity . 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025. 👉 #Corelan #ExploitDev
1
4
10
@0xor0ne
0xor0ne
2 years
Basic introduction to patch diffing in Ghidra by @qkaiser.(Cisco RV110W). Part 1: Part 2: #reverseengineering #patch #cybersecurity
Tweet media one
Tweet media two
Tweet media three
3
73
276
@xbz0n
Ivan Spiridonov
2 months
Officially #OSED certified! I've conquered the Windows User Mode Exploit Development exam and earned the Offensive Security Exploit Developer (OSED) certification. Huge thanks to @offsectraining! #ExploitDev #ReverseEngineering #TryHarder
Tweet media one
0
0
5
@corelanc0d3r
ς๏гєɭคภς0๔3г ([email protected])
1 month
🇧🇪 Belgian Roots. Global Impact. 🌍. Corelan delivers world-class exploit dev training for Windows:.🔹 Stack Smashing.🔹 Heap Masterclass. Built in Europe. Respected worldwide. Sign up 👉 #CyberSecurity #ExploitDev #MadeInBelgium
0
3
6
@TweetThreatNews
Cybersecurity News Everyday
3 months
Mastering buffer overflows in Vulnserver is essential for exploit development. WinDBG aids in debugging vulnerabilities by controlling EIP and generating shellcode. A must-learn for secure environments! 🔍⚙️ #ExploitDev #BufferOverflow. link:
Tweet media one
0
0
2
@WKL_cyber
White Knight Labs
10 days
🚨 Blog 6 is out!. Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: #Infosec #WindowsKernel #CyberSecurity #ExploitDev
Tweet media one
0
1
2
@emiratic0der
emiraticoder
1 year
I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD .#CyberSecurity #exploitdev
Tweet media one
4
2
52
@corelanconsult
Corelan Consulting & Training
14 days
🇦🇺 Corelan hits Melbourne for the FIRST time!. 💥 Stack Exploit Dev: Feb 3–6, 2026.🧨 Heap Masterclass: Feb 9–12, 2026. 🎯 w/ @TantoSecurity . 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025. 👉 #Corelan #ExploitDev
0
2
2
@corelanconsult
Corelan Consulting & Training
2 months
💥 Push, Pop, Boom. Corelan Stack isn’t just another course — it’ll make things click. Expert-level stack exploitation. Zero fluff, real deal. “The course filled in gaps I didn’t even know I had.” — Fabio, Brazil. 👉 #corelan #stack #exploitdev
0
0
0
@xCipher007
Cipher007
9 months
Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed
Tweet media one
Tweet media two
0
0
3
@natenead
Nate Nead
2 months
🧠 Heap exploits today = brains > brute force. Leaks, UAFs, type confusion—APT-level tactics. Is your defense still stuck in 2015?. 👇 What’s your go-to heap hardening move?.#CyberSecurity #ExploitDev. 👉️
Tweet media one
0
0
0
@corelanconsult
Corelan Consulting & Training
1 month
🇧🇪 Belgian Roots. Global Impact. 🌍. Corelan delivers world-class exploit dev training for Windows:.🔹 Stack Smashing.🔹 Heap Masterclass. Built in Europe. Respected worldwide. Sign up 👉 #CyberSecurity #ExploitDev #MadeInBelgium
0
0
0
@corelanc0d3r
ς๏гєɭคภς0๔3г ([email protected])
2 years
ONE more chance this year to take our popular Bootcamp. High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class). Seats are selling fast! What are you waiting for?   #corelan#windows11 #exploitdev
Tweet media one
0
2
14
@corelanc0d3r
ς๏гєɭคภς0๔3г ([email protected])
2 months
💥 Push, Pop, Boom. Corelan Stack isn’t just another course — it’ll make things click. Expert-level stack exploitation. Zero fluff, real deal. “The course filled in gaps I didn’t even know I had.” — Fabio, Brazil. 👉 #corelan #stack #exploitdev
1
1
3
@reverseame
reverseame
8 months
Pwning LLaMA.cpp RPC Server #LLAMACpp #RPCServer #ExploitDev #CTF
0
7
26
@binaryz0ne
Ali Hadi | B!n@ry
3 years
I was driving back home and never thought this last #offsec #ExploitDev #SoftwareExploitation share for 2022 will go this viral. THANKS to all those who Retweeted/Liked/Commented/etc. Wishing you all a great 2023 .
Tweet media one
@binaryz0ne
Ali Hadi | B!n@ry
3 years
Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n.#Offsec #SoftwareExploitation #RE.
Tweet media one
4
3
29
@xacone_
Yazidou
30 days
If you're exploiting a driver offering R/W access to physical memory on Win11 24H2, you can leverage this simple trick to circumvent kernel address leak restrictions and retrieve the kernel base address :p. #exploitdev #driverexploitation.
3
54
157