{"id":19256,"date":"2026-04-02T18:36:29","date_gmt":"2026-04-02T16:36:29","guid":{"rendered":"https:\/\/www.corelan.be\/index.php\/legal\/"},"modified":"2026-04-02T18:36:34","modified_gmt":"2026-04-02T16:36:34","slug":"legal","status":"publish","type":"page","link":"https:\/\/www.corelan.be\/index.php\/legal\/","title":{"rendered":"Legal"},"content":{"rendered":"\n  \n    <section class=\"u-clearfix u-section-1\" id=\"block-3\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <h1 class=\"u-text u-text-default u-text-1\">Terms of Use &amp; Privacy Policy<\/h1>\n        <p class=\"u-text u-text-default u-text-2\"><span style=\"font-weight: 700;\">1. Acceptance of Terms<\/span>\n          <br>By accessing and using the Corelan website at www.corelan.be (the \u201cWebsite\u201d), you agree to these Terms of Use. Corelan Consulting BV (\u201cCorelan\u201d) may amend these terms at any time by publishing an updated version on the Website. Continued use of the Website constitutes acceptance of the amended terms.<br>\n          <br><span style=\"font-weight: 700;\">2. Use of the Website and Intellectual Property<\/span>\n          <br>The Website and its contents are made available free of charge for personal, non-commercial and informational use only.&nbsp;<br>All intellectual property rights, including but not limited to copyrights, database rights, trademarks, designs, text, graphics, logos, images, videos, documents, code, and other materials available on the Website, are the exclusive property of Corelan Consulting BV or the respective rights holders and are protected by applicable intellectual property laws.&nbsp;<br>Unless expressly permitted in writing by Corelan, the content of this Website may not be copied, reproduced, republished, uploaded, posted, transmitted, distributed, publicly displayed, commercially exploited, or otherwise used in any form or by any means.&nbsp; This includes translations made of the content of the Website.<br>\n          <br>In particular, users are not permitted to redistribute, republish, mirror, or share Website content on other websites, platforms, or media, whether in whole or in part, without prior written consent from Corelan.&nbsp;<br>Limited reproduction for strictly personal and non-commercial use is permitted only if: <br>- the content remains complete and unmodified, and <br>- the source (Corelan) is clearly indicated.<br>&nbsp;<br>Nothing in these Terms or in the use of the Website grants any license or right to use any intellectual property beyond what is explicitly permitted.<br>\n          <br>In addition, the content of this Website, including but not limited to research articles, technical write-ups, training descriptions, diagrams, screenshots, and other educational materials, may <span style=\"font-weight: 700;\">not be incorporated, reproduced, or reused in training courses, workshops, presentations, publications, commercial materials, or educational content,<\/span> whether free or paid, without prior written permission from Corelan Consulting BV.&nbsp;<br>This restriction applies in particular to the use of Website content in <span style=\"font-weight: 700;\">security training programs, academic materials, conference presentations, online courses, or commercial training offerings<\/span> that are not operated or authorized by Corelan.<br>\n          <br>The Corelan name, logo, and branding may not be used in any way that suggests endorsement, affiliation, or association without prior written permission.<br>\n          <br>\n          <br><span style=\"font-weight: 700;\">3. Automated Access, Scraping and AI Training<\/span>\n          <br>The use of automated systems to access, collect, copy, extract, or index content from the Website is prohibited without prior written permission from Corelan.&nbsp;<br>This includes, but is not limited to: <br>- web scraping or automated harvesting of content <br>- automated crawling beyond what is reasonably necessary for standard search engine indexing <br>- bulk downloading of pages, documents, or other materials <br>- creating datasets or archives derived from Website content <br>- using Website content to train, fine-tune, or improve artificial intelligence, machine learning models, large language models, or similar technologies <br>\n          <br>The content of this Website may not be used to build datasets, knowledge bases, or training corpora, whether for commercial or non-commercial purposes, without explicit written authorization from Corelan Consulting BV.&nbsp;<br>Corelan reserves the right to take appropriate technical and legal measures to prevent unauthorized automated access or use of Website content.<br>\n          <br><span style=\"font-weight: 700;\">4. Links to Third-Party Websites<\/span>\n          <br>The Website may contain links to third-party websites. Such links do not imply any endorsement or responsibility by Corelan. Corelan has no control over and accepts no liability for the content, availability, or use of third-party websites. Accessing such websites is entirely at your own risk and subject to their own terms and policies.<br>\n          <br><span style=\"font-weight: 700;\">5. Disclaimer<\/span>\n          <br>The Website and its contents are provided \u201cas is\u201d and \u201cas available\u201d. Corelan makes no warranties, express or implied, regarding the accuracy, completeness, availability, or suitability of the Website or its contents.<br>\n          <br>Corelan reserves the right to modify or remove any content or service on the Website at any time without prior notice.<br>\n          <br><span style=\"font-weight: 700;\">6. Liability<\/span>\n          <br>To the maximum extent permitted by law, Corelan and any persons associated with Corelan shall not be liable for any direct or indirect damage, including but not limited to loss of data, profit, goodwill, or business, arising from the use of or inability to use the Website, including damage caused by malware or downloaded materials.<br>\n          <br>Users agree to indemnify and hold Corelan harmless against any claims resulting from their breach of these Terms.<br>\n          <br><span style=\"font-weight: 700;\">7. Privacy and Cookies<\/span>\n          <br>Publicly accessible content on the Website can be used without providing personal data.<br>\n          <br>The Website uses cookies, including third-party cookies, for functional, analytical, and improvement purposes. These cookies are not strictly necessary to access the content of the Website. A cookie banner is provided to allow you to manage your preferences in accordance with applicable data protection laws.<br>\n          <br>Personal data provided via contact forms, registrations, or other interactions is processed in accordance with the General Data Protection Regulation (GDPR) and only for legitimate purposes related to Corelan\u2019s services.<br>\n          <br><span style=\"font-weight: 700;\">8. Security<\/span>\n          <br>Corelan reserves the right to restrict or block access to the Website at any time, without prior notice, when necessary to protect the security, integrity, and availability of the Website. Any attempt to compromise the security of the Website is strictly prohibited and may lead to legal action.<br>\n          <br><span style=\"font-weight: 700;\">9. Governing Law and Jurisdiction<\/span>\n          <br>These Terms of Use are governed by Belgian law. Any dispute relating to the Website or its use falls under the exclusive jurisdiction of the courts of Ghent, Belgium.<br>\n          <br><span style=\"font-weight: 700;\">10. Corporate Information<\/span>\n          <br>Corelan Consulting BV<br>Bestuurder: Peter Van Eeckhoutte<br>VAT \/ Enterprise number: BE0721.789.371<br>Registered address: Tamboerijnstraat 12, 8530 Harelbeke, Belgium<br>\n          <br><span style=\"font-weight: 700;\">11. Contact<\/span>\n          <br>For questions, comments, or privacy-related requests, you may contact Corelan at:<br>dataprivacy@corelan-consulting.com\n        <\/p>\n      <\/div>\n    <\/section>\n    \n    \n    \n    \n  \n","protected":false},"excerpt":{"rendered":"<p>Terms of Use &amp; Privacy Policy 1. Acceptance of Terms By accessing and using the Corelan website at www.corelan.be (the \u201cWebsite\u201d), you agree to these Terms of Use. Corelan Consulting BV (\u201cCorelan\u201d) may amend these terms at any time by publishing an updated version on the Website. Continued use of the Website constitutes acceptance of &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/legal\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Legal\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-19256","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Legal - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/legal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Legal - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Terms of Use &amp; Privacy Policy 1. Acceptance of Terms By accessing and using the Corelan website at www.corelan.be (the \u201cWebsite\u201d), you agree to these Terms of Use. Corelan Consulting BV (\u201cCorelan\u201d) may amend these terms at any time by publishing an updated version on the Website. Continued use of the Website constitutes acceptance of &hellip; Continue reading &quot;Legal&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/legal\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T16:36:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/legal\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/legal\\\/\",\"name\":\"Legal - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2026-04-02T16:36:29+00:00\",\"dateModified\":\"2026-04-02T16:36:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/legal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/legal\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/legal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Legal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Legal - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/legal\/","og_locale":"en_US","og_type":"article","og_title":"Legal - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Terms of Use &amp; Privacy Policy 1. Acceptance of Terms By accessing and using the Corelan website at www.corelan.be (the \u201cWebsite\u201d), you agree to these Terms of Use. Corelan Consulting BV (\u201cCorelan\u201d) may amend these terms at any time by publishing an updated version on the Website. Continued use of the Website constitutes acceptance of &hellip; Continue reading \"Legal\"","og_url":"https:\/\/www.corelan.be\/index.php\/legal\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_modified_time":"2026-04-02T16:36:34+00:00","twitter_card":"summary_large_image","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/legal\/","url":"https:\/\/www.corelan.be\/index.php\/legal\/","name":"Legal - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2026-04-02T16:36:29+00:00","dateModified":"2026-04-02T16:36:34+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/legal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/legal\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/legal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Legal"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=19256"}],"version-history":[{"count":1,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19256\/revisions"}],"predecessor-version":[{"id":19266,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19256\/revisions\/19266"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=19256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}