#exploitdev ผลการค้นหา
CVE-2025-52915 assigned - my first vulnerability!🥳 A classic BYOVD case: kernel driver with unrestricted process termination. Vendor coordination turned out more challenging than the exploit itself. Technical write-up: blacksnufkin.github.io/posts/BYOVD-CV… #ExploitDev #CVE #BYOVD #RedTeam
I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD #CyberSecurity #exploitdev

Happy New Year 2025! #infosec #CyberSec #ExploitDev #Hacker #Bug #bugbountyhunter #vulnerabilityResearcher #ReverseEngineering #Binex

If you're exploiting a driver offering R/W access to physical memory on Win11 24H2, you can leverage this simple trick to circumvent kernel address leak restrictions and retrieve the kernel base address :p xacone.github.io/kaslr_leak_24h… #exploitdev #driverexploitation
This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com



All the Assembly and #RE labs have now been shared. I just need to find the reference to the Crackme(s) I used and then it should be 100% complete. #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com

Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them... I hope it will be useful to someone out there! #Offsec #Cybersecurity #ExploitDev #Debugging youtube.com/watch?v=5GGyFb…

Officially #OSED certified! I've conquered the Windows User Mode Exploit Development exam and earned the Offensive Security Exploit Developer (OSED) certification. Huge thanks to @offsectraining! #ExploitDev #ReverseEngineering #TryHarder

Important note to those new to this account. The course below is completely FREE. I know someone (maybe more) has ripped the videos & probably now the labs & is selling them on @udemy. Please do not pay for this course, it is FREE! #ExploitDev #Offsec exploitation.ashemery.com
Hand-crafted ROP chain 🛠️! Had limited gadgets, so I used an IAT entry for HeapAlloc and calculated the VirtualAllocStub RVA offset. Got creative without ASLR and possibly should've used a read primitive. Details in the gist! #ROP #ExploitDev #osed gist.githubusercontent.com/snowcra5h/a7c1…

Mastering buffer overflows in Vulnserver is essential for exploit development. WinDBG aids in debugging vulnerabilities by controlling EIP and generating shellcode. A must-learn for secure environments! 🔍⚙️ #ExploitDev #BufferOverflow link: ift.tt/fFk6AGK

ONE more chance this year to take our popular Bootcamp. High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class). Seats are selling fast! What are you waiting for? deep-conference.com/predeep-bootca… #corelan#windows11 #exploitdev

This week was the last public class of 2023, we’re already filling up the agenda for 2024. However, we still have some timeslots for private classes. (either at your company or in Belgium, for small groups). Interested? DM for info! #corelan #exploitdev #windows11 #stack #heap

We dissect a DFG compiler bug we discovered in Safari/WebKit. This post covers root cause, impact, and technical analysis: blog.exodusintel.com/2025/08/04/oop… #WebKit #VulnerabilityResearch #ExploitDev #Safari #CyberSecurity #ExodusIntel
𝑪𝒊𝒂𝒐 𝑰𝒕𝒂𝒍𝒚, 𝑪𝒊𝒂𝒐 𝑹𝒐𝒎𝒂! 𝑹𝒆𝒂𝒅𝒚 𝒇𝒐𝒓 𝑪𝒐𝒓𝒆𝒍𝒂𝒏? Sign up for our Expert-level stack class: bit.ly/corelan-traini… #corelan #stack #exploitdev #windows11
Pwning LLaMA.cpp RPC Server #LLAMACpp #RPCServer #ExploitDev #CTF pwner.gg/2024/10/03/lla…
I was driving back home and never thought this last #offsec #ExploitDev #SoftwareExploitation share for 2022 will go this viral. THANKS to all those who Retweeted/Liked/Commented/etc... Wishing you all a great 2023 ...

Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n #Offsec #SoftwareExploitation #RE exploitation.ashemery.com

New whitepaper: Polymorphic shellcode bypasses on modern architectures—evasion techniques, detection gaps, and practical defenses. Read: github.com/MottaSec/White… #SecurityResearch #ExploitDev #BlueTeam
CVE-2025-52915 assigned - my first vulnerability!🥳 A classic BYOVD case: kernel driver with unrestricted process termination. Vendor coordination turned out more challenging than the exploit itself. Technical write-up: blacksnufkin.github.io/posts/BYOVD-CV… #ExploitDev #CVE #BYOVD #RedTeam
Privilege escalation isn't always about the shell. Kernel memory leaks can offer direct paths to root access. Details: versprite.com/blog/the-shell… #PrivilegeEscalation #LinuxSecurity #ExploitDev
NEW: Digital Demonology Grimoire - A dark exploration into buffer overflow exploitation & shellcode analysis Perfect reading for👹 github.com/h3xorc1sm/digi… #DEFCON #ExploitDev #Shellcode #BufferOverflow #InfoSec #HackTheGibson
"Those who gaze into the assembler, take care that the assembler does not gaze also into them." The silicon souls whisper their secrets... github.com/h3xorc1sm/digi… #DEFCON #ExploitDev #DigitalDemonology
We dissect a DFG compiler bug we discovered in Safari/WebKit. This post covers root cause, impact, and technical analysis: blog.exodusintel.com/2025/08/04/oop… #WebKit #VulnerabilityResearch #ExploitDev #Safari #CyberSecurity #ExodusIntel
🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025 ✅ No nonsense, No BS ✅ Just real-world exploit dev skills 🎟️ eventcreate.com/e/sigs-corelan… 💛 RT appreciated! #corelan #win11 #exploitdev
🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025 ✅ No nonsense, No BS ✅ Just real-world exploit dev skills 🎟️ eventcreate.com/e/sigs-corelan… 💛 RT appreciated! #corelan #win11 #exploitdev
🇦🇺 Corelan hits Melbourne for the FIRST time! 💥 Stack Exploit Dev: Feb 3–6, 2026 🧨 Heap Masterclass: Feb 9–12, 2026 🎯 w/ @TantoSecurity 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025 👉 bit.ly/corelan-traini… #Corelan #ExploitDev
🇦🇺 Corelan hits Melbourne for the FIRST time! 💥 Stack Exploit Dev: Feb 3–6, 2026 🧨 Heap Masterclass: Feb 9–12, 2026 🎯 w/ @TantoSecurity 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025 👉 bit.ly/corelan-traini… #Corelan #ExploitDev
Built my own 64-bit ELF packer — something I always wanted to try. XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment github.com/0x3xploit/entr… #Linux #ELF #Exploitdev #ReverseEngineering #RedTeam #BinaryAnalysis #infosec



8. 🔥 Maddie Stone Google Project Zero star. Finds zero-days in Android and the wild. Her writeups are art. Keeps pressure on vendors to fix fast. A bug-hunting sniper for the common good. #exploitdev #zeroday
If you're exploiting a driver offering R/W access to physical memory on Win11 24H2, you can leverage this simple trick to circumvent kernel address leak restrictions and retrieve the kernel base address :p xacone.github.io/kaslr_leak_24h… #exploitdev #driverexploitation
🇧🇪 Belgian Roots. Global Impact. 🌍 Corelan delivers world-class exploit dev training for Windows: 🔹 Stack Smashing 🔹 Heap Masterclass Built in Europe. Respected worldwide. Sign up 👉 bit.ly/corelan-traini… #CyberSecurity #ExploitDev #MadeInBelgium
🇧🇪 Belgian Roots. Global Impact. 🌍 Corelan delivers world-class exploit dev training for Windows: 🔹 Stack Smashing 🔹 Heap Masterclass Built in Europe. Respected worldwide. Sign up 👉 bit.ly/corelan-traini… #CyberSecurity #ExploitDev #MadeInBelgium
I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD #CyberSecurity #exploitdev

Happy New Year 2025! #infosec #CyberSec #ExploitDev #Hacker #Bug #bugbountyhunter #vulnerabilityResearcher #ReverseEngineering #Binex

It's truly beautiful.🥹Avoiding bad characters, compensating for limited gadgets. It's like crafting a piece of art🎨. Challenges like this make the #OSED so rewarding!💪Got any tricks up your sleeve? Share them with me. Friday is exam day. #ExploitDev #ArtInCode #infosecurity

Mastering buffer overflows in Vulnserver is essential for exploit development. WinDBG aids in debugging vulnerabilities by controlling EIP and generating shellcode. A must-learn for secure environments! 🔍⚙️ #ExploitDev #BufferOverflow link: ift.tt/fFk6AGK

Hand-crafted ROP chain 🛠️! Had limited gadgets, so I used an IAT entry for HeapAlloc and calculated the VirtualAllocStub RVA offset. Got creative without ASLR and possibly should've used a read primitive. Details in the gist! #ROP #ExploitDev #osed gist.githubusercontent.com/snowcra5h/a7c1…

This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com



All the Assembly and #RE labs have now been shared. I just need to find the reference to the Crackme(s) I used and then it should be 100% complete. #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com

Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️ #CyberSecurity #ExploitDev #ReverseEngineering


The whole course, labs, videos, etc can be found below. #Cybersecurity #Offsec #ExploitDev #Debugging #Reversing exploitation.ashemery.com

Education is power! corelan-training.com/index.php/trai… #nevergiveup #exploitdev #windows11 #stack #heap @corelanc0d3r

Officially #OSED certified! I've conquered the Windows User Mode Exploit Development exam and earned the Offensive Security Exploit Developer (OSED) certification. Huge thanks to @offsectraining! #ExploitDev #ReverseEngineering #TryHarder

I really enjoy teaching private classes! Even if you're just a small group (min. 4), willing to travel to Belgium, we can make it happen! I still have some timeslots in November & December. DM if interested @corelanconsult #windows #exploitdev #corelan #nevergiveup

Built my own 64-bit ELF packer — something I always wanted to try. XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment github.com/0x3xploit/entr… #Linux #ELF #Exploitdev #ReverseEngineering #RedTeam #BinaryAnalysis #infosec



Join us at #SANSHackFest when @jhaddix outlines tools and techniques for Modern Adversarial Reconnaissance. Jason will cover email acquisition, technology profiling, external attack surface, cloud recon, and more! Register Here: sans.org/u/1qcN #PenTest #ExploitDev

Think kernel bugs are too deep to reach? Think again. 🔥 At #NullconBerlin2025, dive headfirst into a hands-on Linux kernel exploitation with security researcher Andrey Konovalov — no prior kernel knowledge required. Know More: nullcon.net/berlin-2025/tr… #LinuxKernel #ExploitDev

Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them... I hope it will be useful to someone out there! #Offsec #Cybersecurity #ExploitDev #Debugging youtube.com/watch?v=5GGyFb…

Join us at #SANSHackFest when @jhaddix will outline tools and techniques for Modern Adversarial Reconnaissance. Jason will cover email acquisition, technology profiling, external attack surface, cloud recon, and more. Register Here: sans.org/u/1qcN #PenTest #ExploitDev

🧠 Heap exploits today = brains > brute force. Leaks, UAFs, type confusion—APT-level tactics. Is your defense still stuck in 2015? 👇 What’s your go-to heap hardening move? #CyberSecurity #ExploitDev 👉️ sec.co/blog/modern-he…

This week was the last public class of 2023, we’re already filling up the agenda for 2024. However, we still have some timeslots for private classes. (either at your company or in Belgium, for small groups). Interested? DM for info! #corelan #exploitdev #windows11 #stack #heap

Something went wrong.
Something went wrong.
United States Trends
- 1. #BornOfStarlightHeeseung 28.4K posts
- 2. Happy Birthday Charlie 76.5K posts
- 3. #tuesdayvibe 4,502 posts
- 4. #csm217 N/A
- 5. Alex Jones 17.3K posts
- 6. Sandy Hook 4,395 posts
- 7. Pentagon 81.6K posts
- 8. Good Tuesday 37.1K posts
- 9. #NationalDessertDay N/A
- 10. #PortfolioDay 4,504 posts
- 11. Shilo 2,937 posts
- 12. Monad 205K posts
- 13. Dissidia 7,971 posts
- 14. Victory Tuesday 1,290 posts
- 15. Masuda 1,840 posts
- 16. Happy Heavenly 11.3K posts
- 17. Happy 32nd 12.2K posts
- 18. Janet Mills 2,375 posts
- 19. Time Magazine 22K posts
- 20. Larry Fink 6,760 posts