Exploit Writing Tutorial Part 1 - The Video

This article has 461 views

Hi everyone,

We are super excited and proud to announce the start of a great initiative.

17 years ago, Peter Van Eeckhoutte (aka corelanc0d3r) began publishing his exploit development tutorials on the Corelan website.

Those tutorials were groundbreaking and paved the way for how entire generations of security researchers learned exploit development.  They became a global reference point for both aspiring and experienced exploit developers, and even for trainers building their own courses. His work has been cited in books, referenced in research, and quietly influenced how people approach vulnerability analysis and exploitation at a fundamental level.

Even today — despite changes in operating systems, mitigations, and tooling — the underlying techniques documented in those blog posts remain highly relevant.

And yet, one question kept coming back:

“Can we see this in action?  Can you make a video so we can follow along?”

🎥 Bringing Corelan to Life

So we decided to do exactly that.

I’ve teamed up with Corelan to turn these legendary write-ups into a video-based series, where we walk through the original material step by step — but this time, live, visual, and on modern systems.

This is not a replacement for the original content, it’s an extension. A way to bridge theory and execution.

🚀 Part 1 — Stack-Based Buffer Overflows (Windows 11 x64)

We’re kicking things off with Part 1 of the original series:

👉 Exploit Writing Tutorial Part 1

In the first video, we exploit a stack-based buffer overflow on a modern Windows 11 x64 environment.

By the end of the tutorial, you will have learned:

  • What a stack-based buffer overflow really is
  • The role of registers and key assembly instructions
  • How to identify the steps and strategy to go from memory corruption to building an exploit
  • How to find and use reliable trampoline pointers
  • When and how to deploy shellcode
  • How to turn a proof of concept into a working exploit

We’ll also be using tools such as WinDBG and mona.py throughout the process — all based on the original Corelan workflow, but using modern systems and tooling.

If you need help setting up and using WinDBG, please take a moment to review this post.  Also, feel free to use the CorelanVMInstall.ps1 script to help set up WinDBG, Python, Visual Studio Express and other tools on your Windows 11 machine.

The video

You can watch the video here:

🔜 What’s Next

This is just the beginning.

More parts of the Corelan tutorial series will be covered — each building further on the previous one, and gradually moving into more advanced territory.

🙏 Final Thoughts

It’s an honor to collaborate on material that has helped shape so many careers in this field.

If you’ve ever read the Corelan tutorials and wanted to see them unfold in real time — this is for you.

If your interested in diving even deeper into this subject matter, Corelan also offers more in-depth training with topics more advanced than those we’ll be going through within this series.   Corelan classes prep you for the unique Corelan Certified Exploit Developer exam.

If you're interested in taking a Corelan Training in the US, hosted by CCST, follow this link to sign up and get a $200 voucher.

Fan of the Corelan wallpapers used in the video? Get them here!

Sponsor me <3: https://github.com/sponsors/wetw0rk

More to come.

— Milton (wetw0rk)


I hope you found this useful 🙏🏻 🤗

© Corelan Consulting BV. All rights reserved. ​The contents of this page may not be reproduced, redistributed, or republished, in whole or in part, for commercial or non-commercial purposes without prior written permission from Corelan Consulting bv. See our Terms of Use & Privacy Policy (https://www.corelan.be/index.php/legal) for more details.



Discover more from Corelan | Exploit Development & Vulnerability Research

Subscribe to get the latest posts sent to your email.

About the author

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.