This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com

binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com

Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed

xCipher007's tweet image. Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed
xCipher007's tweet image. Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed

Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️ #CyberSecurity #ExploitDev #ReverseEngineering

Paul__ige's tweet image. Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️
#CyberSecurity #ExploitDev #ReverseEngineering
Paul__ige's tweet image. Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️
#CyberSecurity #ExploitDev #ReverseEngineering

Hand-crafted ROP chain 🛠️! Had limited gadgets, so I used an IAT entry for HeapAlloc and calculated the VirtualAllocStub RVA offset. Got creative without ASLR and possibly should've used a read primitive. Details in the gist! #ROP #ExploitDev #osed gist.githubusercontent.com/snowcra5h/a7c1…

tetsuoai's tweet image. Hand-crafted ROP chain 🛠️! Had limited gadgets, so I used an IAT entry for HeapAlloc and calculated the VirtualAllocStub RVA offset. Got creative without ASLR and possibly should've used a read primitive. Details in the gist! #ROP #ExploitDev #osed 

gist.githubusercontent.com/snowcra5h/a7c1…

I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD #CyberSecurity #exploitdev

emiratic0der's tweet image. I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD 
#CyberSecurity #exploitdev

If you're exploiting a driver offering R/W access to physical memory on Win11 24H2, you can leverage this simple trick to circumvent kernel address leak restrictions and retrieve the kernel base address :p xacone.github.io/kaslr_leak_24h… #exploitdev #driverexploitation


🚨 Released a full SEH exploit chain for DeepFreeze 8! With custom shellcode and ROP chain. Software was fully reversed, and an SEH vuln discovered studying for the #OSED 💪Blog write-up coming soon.🔍github.com/snowcra5h/Faro… #CyberSecurity #ExploitDev


𝑪𝒊𝒂𝒐 𝑰𝒕𝒂𝒍𝒚, 𝑪𝒊𝒂𝒐 𝑹𝒐𝒎𝒂! 𝑹𝒆𝒂𝒅𝒚 𝒇𝒐𝒓 𝑪𝒐𝒓𝒆𝒍𝒂𝒏? Sign up for our Expert-level stack class: bit.ly/corelan-traini… #corelan #stack #exploitdev #windows11


🇦🇺 Corelan hits Melbourne for the FIRST time! 💥 Stack Exploit Dev: Feb 3–6, 2026 🧨 Heap Masterclass: Feb 9–12, 2026 🎯 w/ @TantoSecurity 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025 👉 bit.ly/corelan-traini… #Corelan #ExploitDev


Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them... I hope it will be useful to someone out there! #Offsec #Cybersecurity #ExploitDev #Debugging youtube.com/watch?v=5GGyFb…

binaryz0ne's tweet image. Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them... I hope it will be useful to someone out there!
#Offsec #Cybersecurity #ExploitDev #Debugging

youtube.com/watch?v=5GGyFb…

🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025 ✅ No nonsense, No BS ✅ Just real-world exploit dev skills 🎟️ eventcreate.com/e/sigs-corelan… 💛 RT appreciated! #corelan #win11 #exploitdev


🇧🇪 Belgian Roots. Global Impact. 🌍 Corelan delivers world-class exploit dev training for Windows: 🔹 Stack Smashing 🔹 Heap Masterclass Built in Europe. Respected worldwide. Sign up 👉 bit.ly/corelan-traini… #CyberSecurity #ExploitDev #MadeInBelgium


⚠️ Afraid of public classes? 🔒 Corelan Academy = private, intense, small-group exploit dev training 2–8 ppl • one-on-one access • flexible timing • competitive pricing • Stack & Heap DM or reply interested #corelan #exploitdev #training #heap #stack #corelanacademy


ONE more chance this year to take our popular Bootcamp. High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class). Seats are selling fast! What are you waiting for?  deep-conference.com/predeep-bootca…  #corelan#windows11 #exploitdev

corelanc0d3r's tweet image. ONE more chance this year to take our popular Bootcamp.  High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class).  Seats are selling fast!  What are you waiting for?  deep-conference.com/predeep-bootca…  #corelan#windows11 #exploitdev

💥 Push, Pop, Boom. Corelan Stack isn’t just another course — it’ll make things click. Expert-level stack exploitation. Zero fluff, real deal. “The course filled in gaps I didn’t even know I had.” — Fabio, Brazil 👉 bit.ly/corelan-traini… #corelan #stack #exploitdev


Tip #2: Level up your security analysis! 🚀 Use #lldb & Python 🐍 to dynamically monitor every file a program opens (open/openat/fopen). Crucial for #MalwareAnalysis & #ExploitDev to uncover file system interactions. See what that binary really touches! 💻📂 #CyberSecurity

cstotw's tweet image. Tip #2: Level up your security analysis! 🚀 Use #lldb & Python 🐍 to dynamically monitor every file a program opens (open/openat/fopen). Crucial for #MalwareAnalysis & #ExploitDev to uncover file system interactions. See what that binary really touches! 💻📂 #CyberSecurity
cstotw's tweet image. Tip #2: Level up your security analysis! 🚀 Use #lldb & Python 🐍 to dynamically monitor every file a program opens (open/openat/fopen). Crucial for #MalwareAnalysis & #ExploitDev to uncover file system interactions. See what that binary really touches! 💻📂 #CyberSecurity
cstotw's tweet image. Tip #2: Level up your security analysis! 🚀 Use #lldb & Python 🐍 to dynamically monitor every file a program opens (open/openat/fopen). Crucial for #MalwareAnalysis & #ExploitDev to uncover file system interactions. See what that binary really touches! 💻📂 #CyberSecurity

⚠️ Afraid of public classes? 🔒 Corelan Academy = private, intense, small-group exploit dev training 2–8 ppl • one-on-one access • flexible timing • competitive pricing • Stack & Heap DM or reply interested #corelan #exploitdev #training #heap #stack #corelanacademy


⚠️ Afraid of public classes? 🔒 Corelan Academy = private, intense, small-group exploit dev training 2–8 ppl • one-on-one access • flexible timing • competitive pricing • Stack & Heap DM or reply interested #corelan #exploitdev #training #heap #stack #corelanacademy


CVE-2025-52915 assigned - my first vulnerability!🥳 A classic BYOVD case: kernel driver with unrestricted process termination. Vendor coordination turned out more challenging than the exploit itself. Technical write-up: blacksnufkin.github.io/posts/BYOVD-CV… #ExploitDev #CVE #BYOVD #RedTeam


"Those who gaze into the assembler, take care that the assembler does not gaze also into them." The silicon souls whisper their secrets... github.com/h3xorc1sm/digi… #DEFCON #ExploitDev #DigitalDemonology


🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025 ✅ No nonsense, No BS ✅ Just real-world exploit dev skills 🎟️ eventcreate.com/e/sigs-corelan… 💛 RT appreciated! #corelan #win11 #exploitdev


Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed

xCipher007's tweet image. Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed
xCipher007's tweet image. Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed

Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️ #CyberSecurity #ExploitDev #ReverseEngineering

Paul__ige's tweet image. Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️
#CyberSecurity #ExploitDev #ReverseEngineering
Paul__ige's tweet image. Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️
#CyberSecurity #ExploitDev #ReverseEngineering

Hand-crafted ROP chain 🛠️! Had limited gadgets, so I used an IAT entry for HeapAlloc and calculated the VirtualAllocStub RVA offset. Got creative without ASLR and possibly should've used a read primitive. Details in the gist! #ROP #ExploitDev #osed gist.githubusercontent.com/snowcra5h/a7c1…

tetsuoai's tweet image. Hand-crafted ROP chain 🛠️! Had limited gadgets, so I used an IAT entry for HeapAlloc and calculated the VirtualAllocStub RVA offset. Got creative without ASLR and possibly should've used a read primitive. Details in the gist! #ROP #ExploitDev #osed 

gist.githubusercontent.com/snowcra5h/a7c1…

I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD #CyberSecurity #exploitdev

emiratic0der's tweet image. I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD 
#CyberSecurity #exploitdev

This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com

binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com

It's truly beautiful.🥹Avoiding bad characters, compensating for limited gadgets. It's like crafting a piece of art🎨. Challenges like this make the #OSED so rewarding!💪Got any tricks up your sleeve? Share them with me. Friday is exam day. #ExploitDev #ArtInCode #infosecurity

tetsuoai's tweet image. It's truly beautiful.🥹Avoiding bad characters, compensating for limited gadgets. It's like crafting a piece of art🎨. Challenges like this make the #OSED so rewarding!💪Got any tricks up your sleeve? Share them with me. Friday is exam day. #ExploitDev #ArtInCode #infosecurity

I really enjoy teaching private classes! Even if you're just a small group (min. 4), willing to travel to Belgium, we can make it happen! I still have some timeslots in November & December. DM if interested @corelanconsult #windows #exploitdev #corelan #nevergiveup

corelanc0d3r's tweet image. I really enjoy teaching private classes! Even if you're just a small group (min. 4), willing to travel to Belgium, we can make it happen!  I still have some timeslots in November & December. DM if interested @corelanconsult #windows #exploitdev #corelan #nevergiveup

Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them... I hope it will be useful to someone out there! #Offsec #Cybersecurity #ExploitDev #Debugging youtube.com/watch?v=5GGyFb…

binaryz0ne's tweet image. Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them... I hope it will be useful to someone out there!
#Offsec #Cybersecurity #ExploitDev #Debugging

youtube.com/watch?v=5GGyFb…

Mastering buffer overflows in Vulnserver is essential for exploit development. WinDBG aids in debugging vulnerabilities by controlling EIP and generating shellcode. A must-learn for secure environments! 🔍⚙️ #ExploitDev #BufferOverflow link: ift.tt/fFk6AGK

TweetThreatNews's tweet image. Mastering buffer overflows in Vulnserver is essential for exploit development. WinDBG aids in debugging vulnerabilities by controlling EIP and generating shellcode. A must-learn for secure environments! 🔍⚙️ #ExploitDev #BufferOverflow

link: ift.tt/fFk6AGK

Built my own 64-bit ELF packer — something I always wanted to try. XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment github.com/0x3xploit/entr… #Linux #ELF #Exploitdev #ReverseEngineering #RedTeam #BinaryAnalysis #infosec

Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec
Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec
Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec

All the Assembly and #RE labs have now been shared. I just need to find the reference to the Crackme(s) I used and then it should be 100% complete. #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com

binaryz0ne's tweet image. All the Assembly and #RE labs have now been shared. I just need to find the reference to the Crackme(s) I used and then it should be 100% complete. #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com

ONE more chance this year to take our popular Bootcamp. High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class). Seats are selling fast! What are you waiting for?  deep-conference.com/predeep-bootca…  #corelan#windows11 #exploitdev

corelanc0d3r's tweet image. ONE more chance this year to take our popular Bootcamp.  High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class).  Seats are selling fast!  What are you waiting for?  deep-conference.com/predeep-bootca…  #corelan#windows11 #exploitdev

🧠 Heap exploits today = brains > brute force. Leaks, UAFs, type confusion—APT-level tactics. Is your defense still stuck in 2015? 👇 What’s your go-to heap hardening move? #CyberSecurity #ExploitDev 👉️ sec.co/blog/modern-he…

natenead's tweet image. 🧠 Heap exploits today = brains > brute force.
Leaks, UAFs, type confusion—APT-level tactics.

Is your defense still stuck in 2015?

👇 What’s your go-to heap hardening move?
#CyberSecurity #ExploitDev

👉️ sec.co/blog/modern-he…

I was driving back home and never thought this last #offsec #ExploitDev #SoftwareExploitation share for 2022 will go this viral. THANKS to all those who Retweeted/Liked/Commented/etc... Wishing you all a great 2023 ...

binaryz0ne's tweet image. I was driving back home and never thought this last #offsec #ExploitDev #SoftwareExploitation share for 2022 will go this viral. THANKS to all those who Retweeted/Liked/Commented/etc... Wishing you all a great 2023 ...

Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n #Offsec #SoftwareExploitation #RE exploitation.ashemery.com

binaryz0ne's tweet image. Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n
#Offsec #SoftwareExploitation #RE

exploitation.ashemery.com


YES! 🔥 The legendary Corelan (@corelanc0d3r) exploit development training is happening in ROME! 🇮🇹 Absolutely stoked about this opportunity right here in Italy. Time to level up those #ExploitDev skills! 💪 #Corelan #CyberSecurity #InfoSec #Reversing #Rome #Hacking #Cyber

BSidesRoma's tweet image. YES! 🔥 The legendary Corelan (@corelanc0d3r) exploit development training is happening in ROME! 🇮🇹 Absolutely stoked about this opportunity right here in Italy. Time to level up those #ExploitDev skills! 💪
#Corelan #CyberSecurity #InfoSec #Reversing #Rome #Hacking #Cyber

Think kernel bugs are too deep to reach? Think again. 🔥 At #NullconBerlin2025, dive headfirst into a hands-on Linux kernel exploitation with security researcher Andrey Konovalov — no prior kernel knowledge required. Know More: nullcon.net/berlin-2025/tr… #LinuxKernel #ExploitDev

nullcon's tweet image. Think kernel bugs are too deep to reach? Think again. 🔥

At #NullconBerlin2025, dive headfirst into a hands-on Linux kernel exploitation with security researcher Andrey Konovalov — no prior kernel knowledge required.

Know More: nullcon.net/berlin-2025/tr…

#LinuxKernel #ExploitDev

Loading...

Something went wrong.


Something went wrong.


United States Trends