{"id":19253,"date":"2026-04-02T18:36:26","date_gmt":"2026-04-02T16:36:26","guid":{"rendered":"https:\/\/www.corelan.be\/index.php\/discord\/"},"modified":"2026-04-02T18:36:34","modified_gmt":"2026-04-02T16:36:34","slug":"discord","status":"publish","type":"page","link":"https:\/\/www.corelan.be\/index.php\/discord\/","title":{"rendered":"Discord"},"content":{"rendered":"\n  \n    <section class=\"u-clearfix u-section-1\" id=\"block-3\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <h1 class=\"u-text u-text-default u-text-1\">Join the Corelan Community on Discord<\/h1>\n        <p class=\"u-text u-text-default u-text-2\"> Corelan hosts a <span style=\"font-weight: 700;\">public Discord Server<\/span> where cybersecurity enthusiasts, researchers, students, and professionals can connect, exchange ideas, and learn from each other.&nbsp;<br>\n          <br>Our goal is simple: create a <span style=\"font-weight: 700;\">safe place<\/span> where people passionate about cybersecurity can <span style=\"font-weight: 700;\">ask questions, share knowledge, discuss research, and collaborate<\/span>.&nbsp; &nbsp;Whether you're just starting out or have years of experience in the field, you're welcome to join the conversation.&nbsp;<br>\n          <br>We actively encourage members to <span style=\"font-weight: 700;\">start discussions, share interesting findings, ask technical questions, or help others solve problems<\/span>. Some of the best learning moments happen through open conversations and collaborative thinking.&nbsp;<br>\n        <\/p>\n        <h4 class=\"u-text u-text-default u-text-3\">What the Corelan Discord is for<\/h4>\n        <ul class=\"u-custom-list u-text u-text-default u-text-4\">\n          <li>\n            <div class=\"u-list-icon u-list-icon-1\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Vulnerability Research\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-list-icon-2\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Exploit Development\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-list-icon-3\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Reverse Engineering\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-list-icon-4\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Debugging and Tooling\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-list-icon-5\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Operating System Internals\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-list-icon-6\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Security Research and Techniques\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-list-icon-7\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Learning Resources and Career Discussion\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-list-icon-8\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Students preparing to take a Corelan Training\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-list-icon-9\">\n              <svg class=\"u-svg-content\" viewBox=\"0 0 512 512\" id=\"svg-6f41\"><path d=\"m433.1 67.1-231.8 231.9c-6.2 6.2-16.4 6.2-22.6 0l-99.8-99.8-78.9 78.8 150.5 150.5c10.5 10.5 24.6 16.3 39.4 16.3 14.8 0 29-5.9 39.4-16.3l282.7-282.5z\" fill=\"currentColor\"><\/path><\/svg>\n            <\/div>Candidates preparing for the CCED Exam\n          <\/li>\n        <\/ul>\n        <p class=\"u-text u-text-default u-text-5\"> The server is intended as a <span style=\"font-weight: 700;\">constructive and welcoming<\/span> space for cybersecurity-related discussions, including topics such as:\n        <\/p>\n        <p class=\"u-text u-text-default u-text-6\"> In short: if it helps people grow in cybersecurity, it probably belongs here.&nbsp;<br>\n        <\/p>\n        <h4 class=\"u-text u-text-default u-text-7\">A few simple rules<\/h4>\n        <p class=\"u-text u-text-default u-text-8\"> To keep the community useful and enjoyable for everyone, we ask members to follow a few straightforward guidelines:&nbsp;<br>\n          <br><span style=\"font-weight: 700;\">Be respectful<br><\/span> Everyone comes from different backgrounds and experience levels. Healthy discussions and different viewpoints are welcome \u2014 disrespect, harassment, or personal attacks are not.&nbsp;<br>\n          <br><span style=\"font-weight: 700;\">Keep it constructive<br><\/span> Ask questions, share insights, help others, and build conversations that move the community forward.&nbsp;<br>\n          <br><span style=\"font-weight: 700;\">Stay on topic<br><\/span> The server exists primarily for cybersecurity discussions. Off-topic conversations are fine in moderation, but topics that are purely political, religious, inflammatory, or unrelated to cybersecurity are not appropriate here.&nbsp;<br>\n          <br><span style=\"font-weight: 700;\">No hate speech, trolling or bullying<\/span>\n          <br> Corelan has zero tolerance for discrimination, harassment, hostile behavior, trolling.&nbsp;<br>\n          <br><span style=\"font-weight: 700;\">Use common sense<br><\/span> If a message would make the community worse rather than better, it probably shouldn\u2019t be posted.&nbsp;<br>\n          <br><span style=\"font-weight: 700;\">Moderation&nbsp;<\/span>\n          <br>The Corelan team reserves the right to moderate conversations when necessary in order to maintain a healthy and productive environment. This may include removing messages, redirecting discussions, or taking action against disruptive behavior.&nbsp;<br>The goal of moderation is not to restrict discussion \u2014 it's to protect the quality of the community and keep the environment constructive for everyone.&nbsp;<br>\n          <br><span style=\"font-weight: 700;\">Join the conversation&nbsp;<\/span>\n          <br>If you're interested in cybersecurity and want to be part of an active and knowledgeable community, we'd love to see you there.&nbsp;<br>\n          <br>\n        <\/p>\n        <a href=\"https:\/\/discord.gg\/JdqQcxAqcn\" class=\"u-border-2 u-border-grey-75 u-btn u-btn-round u-button-style u-gradient u-none u-radius u-text-body-alt-color u-btn-1\" target=\"_blank\" rel=\"nofollow\">Join Corelan Discord here <\/a>\n      <\/div>\n    <\/section>\n    \n    \n    \n    \n  \n","protected":false},"excerpt":{"rendered":"<p>Join the Corelan Community on Discord Corelan hosts a public Discord Server where cybersecurity enthusiasts, researchers, students, and professionals can connect, exchange ideas, and learn from each other.&nbsp; Our goal is simple: create a safe place where people passionate about cybersecurity can ask questions, share knowledge, discuss research, and collaborate.&nbsp; &nbsp;Whether you're just starting out &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/discord\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Discord\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-19253","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Discord - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/discord\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discord - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Join the Corelan Community on Discord Corelan hosts a public Discord Server where cybersecurity enthusiasts, researchers, students, and professionals can connect, exchange ideas, and learn from each other.&nbsp; Our goal is simple: create a safe place where people passionate about cybersecurity can ask questions, share knowledge, discuss research, and collaborate.&nbsp; &nbsp;Whether you&#039;re just starting out &hellip; Continue reading &quot;Discord&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/discord\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T16:36:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/discord\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/discord\\\/\",\"name\":\"Discord - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2026-04-02T16:36:26+00:00\",\"dateModified\":\"2026-04-02T16:36:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/discord\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/discord\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/discord\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Discord\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Discord - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/discord\/","og_locale":"en_US","og_type":"article","og_title":"Discord - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Join the Corelan Community on Discord Corelan hosts a public Discord Server where cybersecurity enthusiasts, researchers, students, and professionals can connect, exchange ideas, and learn from each other.&nbsp; Our goal is simple: create a safe place where people passionate about cybersecurity can ask questions, share knowledge, discuss research, and collaborate.&nbsp; &nbsp;Whether you're just starting out &hellip; Continue reading \"Discord\"","og_url":"https:\/\/www.corelan.be\/index.php\/discord\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_modified_time":"2026-04-02T16:36:34+00:00","twitter_card":"summary_large_image","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/discord\/","url":"https:\/\/www.corelan.be\/index.php\/discord\/","name":"Discord - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2026-04-02T16:36:26+00:00","dateModified":"2026-04-02T16:36:34+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/discord\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/discord\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/discord\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Discord"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=19253"}],"version-history":[{"count":1,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19253\/revisions"}],"predecessor-version":[{"id":19263,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19253\/revisions\/19263"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=19253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}