Corelan Research

Two decades of exploit development research, techniques, and knowledge β€” shared openly and for free with the community.

Quick links:

πŸ“‘ Exploit Development 
tutorials

πŸŽ₯​ Exploit Development 
videos

πŸ“š Tutorials on Debugging

🧑 Support us

⭐️ Exploit Development training

All articles:

 Exchange 2007 : Indexing and searching mailboxes

The Exchange 2007 search engine has much improved over the index/search engines that were available in Exchange 2000/2003. The new search is…

​ Read More

 Delegating AD Admin tasks to non-Admin accounts

Designing a distributed/international Active Directory is certainly the most important piece of a successful AD implementation. One of the issues…

​ Read More

 How to restore a Windows 2003 DC using ASR and VMWare

The following procedure should work for any type of hardware, but I've used VMWare (so this procedure is also valid if you want to convert a …

​ Read More

 AD 2003 DC Restore Technique using VMWare (without having to grant local DC/Domain Admin rights)

In certain distributed AD scenario's, Domain Admins group membership or local DC admin privileges are restricted to certain people only. This is …

​ Read More

 Moving VMWare server/workstation .vmdk to ESX Server

While finishing the setup of my VMWare ESX infrastructure, I needed to move a couple of virtual machines from a VMWare Server (running on Windows…

​ Read More

Corelan Research is a long-running cybersecurity research project focused on exploit development, vulnerability research and Windows internals.   Since 2009, we have published deep technical tutorials covering topics such as stack-based exploitation, heap exploitation, shellcoding, reverse engineering and debugging. 
These tutorials have helped thousands of security researchers, penetration testers, exploit developers and exploit dev trainers learn how modern memory corruption vulnerabilities work.