Corelan Research

Two decades of exploit development research, techniques, and knowledge β€” shared openly and for free with the community.

Quick links:

πŸ“‘ Exploit Development 
tutorials

πŸŽ₯​ Exploit Development 
videos

πŸ“š Tutorials on Debugging

🧑 Support us

⭐️ Exploit Development training

All articles:

 Juniper : Setting up an IPSec VPN tunnel between a Juniper Netscreen firewall/vpn device and a Cisco VPN device

Today, I will explain the (easy) steps to set up a route-based IPSec VPN tunnel between a Juniper Netscreen firewall/VPN device and a remote Cisco…

​ Read More

 Using Active Directory and IAS based Radius for Netscreen WebAuth authentication

As most of the bigger players in the firewall market, Juniper/Netscreen SreenOS based firewalls allow you to use/enforce/require authentication …

​ Read More

 Free tool - Free POP3 Collector

Keywords : Free generic POP3 collector for Microsoft Exchange 2000 Exchange 2003 Exchange 2007 Lotus Domino Server download email from POP3 and …

​ Read More

 Outlook 2007 unable to download Offline Address Book – error 0X8004010F and 0X80190194

I used to run Exchange 2003 in my test lab. After adding a new 2007 Server (HUB, CAS and Mail) in my AD and moving the mailboxes to the 2007 server,…

​ Read More

 Exchange 2007 Administration : Policies and limits

Exchange 2007 offers a set of features that allow for centralized management of policies and limitations. These policies and limitations should …

​ Read More

Corelan Research is a long-running cybersecurity research project focused on exploit development, vulnerability research and Windows internals.   Since 2009, we have published deep technical tutorials covering topics such as stack-based exploitation, heap exploitation, shellcoding, reverse engineering and debugging. 
These tutorials have helped thousands of security researchers, penetration testers, exploit developers and exploit dev trainers learn how modern memory corruption vulnerabilities work.