Hi everyone,
We are super excited and proud to announce the start of a great initiative.
17 years ago, Peter Van Eeckhoutte (aka corelanc0d3r) began publishing his exploit development tutorials on the Corelan website.
Those tutorials were groundbreaking and paved the way for how entire generations of security researchers learned exploit development. They became a global reference point for both aspiring and experienced exploit developers, and even for trainers building their own courses. His work has been cited in books, referenced in research, and quietly influenced how people approach vulnerability analysis and exploitation at a fundamental level.
Even today — despite changes in operating systems, mitigations, and tooling — the underlying techniques documented in those blog posts remain highly relevant.
And yet, one question kept coming back:
“Can we see this in action? Can you make a video so we can follow along?”
So we decided to do exactly that.
I’ve teamed up with Corelan to turn these legendary write-ups into a video-based series, where we walk through the original material step by step — but this time, live, visual, and on modern systems.
This is not a replacement for the original content, it’s an extension. A way to bridge theory and execution.
We’re kicking things off with Part 1 of the original series:
👉 Exploit Writing Tutorial Part 1
In the first video, we exploit a stack-based buffer overflow on a modern Windows 11 x64 environment.
By the end of the tutorial, you will have learned:
We’ll also be using tools such as WinDBG and mona.py throughout the process — all based on the original Corelan workflow, but using modern systems and tooling.
If you need help setting up and using WinDBG, please take a moment to review this post. Also, feel free to use the CorelanVMInstall.ps1 script to help set up WinDBG, Python, Visual Studio Express and other tools on your Windows 11 machine.
You can watch the video here:
This is just the beginning.
More parts of the Corelan tutorial series will be covered — each building further on the previous one, and gradually moving into more advanced territory.
It’s an honor to collaborate on material that has helped shape so many careers in this field.
If you’ve ever read the Corelan tutorials and wanted to see them unfold in real time — this is for you.
If your interested in diving even deeper into this subject matter, Corelan also offers more in-depth training with topics more advanced than those we’ll be going through within this series. Corelan classes prep you for the unique Corelan Certified Exploit Developer exam.
If you're interested in taking a Corelan Training in the US, hosted by CCST, follow this link to sign up and get a $200 voucher.
Fan of the Corelan wallpapers used in the video? Get them here!
Sponsor me <3: https://github.com/sponsors/wetw0rk
More to come.
— Milton (wetw0rk)
© Corelan Consulting BV. All rights reserved. The contents of this page may not be reproduced, redistributed, or republished, in whole or in part, for commercial or non-commercial purposes without prior written permission from Corelan Consulting bv. See our Terms of Use & Privacy Policy (https://www.corelan.be/index.php/legal) for more details.
Subscribe to get the latest posts sent to your email.
Type your email…
Subscribe
wetw0rk is a security researcher passionate about exploit and malware development and an avid open-source contributor. He’s the creator of the Sickle Payload Development Kit and has worked on projects including Metasploit, Exploit-DB, and Kali Linux, with experience in red teaming, reverse engineering, and adversary emulation.
Tags:
Your email address will not be published. Required fields are marked *
Comment *
Name *
Email *
Website
Notify me of new posts by email.
Post Comment
Δ
This site uses Akismet to reduce spam. Learn how your comment data is processed.