{"id":19617,"date":"2026-05-01T18:09:43","date_gmt":"2026-05-01T16:09:43","guid":{"rendered":"https:\/\/www.corelan.be\/index.php\/home\/"},"modified":"2026-05-01T18:09:46","modified_gmt":"2026-05-01T16:09:46","slug":"home","status":"publish","type":"page","link":"https:\/\/www.corelan.be\/","title":{"rendered":"Home"},"content":{"rendered":"\n  \n    <section class=\"u-clearfix u-section-1\" id=\"block-3\" data-image-width=\"553\" data-image-height=\"369\">\n      <div class=\"u-clearfix u-sheet u-valign-middle-md u-valign-middle-sm u-valign-middle-xl u-sheet-1\">\n        <div class=\"u-container-style u-expanded-width u-group u-shape-rectangle u-group-1\">\n          <div class=\"u-container-layout u-container-layout-1\">\n            <img decoding=\"async\" class=\"custom-expanded u-align-center u-image u-image-1\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/PeterTShirt-1.png\" data-href=\"https:\/\/www.corelan.be\/index.php\/about\/\" title=\"About\">\n            <h1 class=\"u-align-center u-text u-text-default-lg u-text-default-md u-text-default-xl u-text-1\">Corelan Research<\/h1>\n            <h5 class=\"u-align-center u-text u-text-palette-3-light-2 u-text-2\"> Two decades of exploit development research, techniques, and knowledge \u2014 shared openly and for free with the community.<\/h5>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-2\" id=\"block-5\">\n      <div class=\"u-clearfix u-sheet u-valign-middle-md u-valign-middle-sm u-valign-middle-xl u-valign-middle-xs u-sheet-1\">\n        <h3 class=\"u-text u-text-default-lg u-text-default-md u-text-default-sm u-text-default-xl u-text-1\">Quick links:<\/h3>\n        <div class=\"data-layout-selected u-clearfix u-expanded-width u-gutter-6 u-layout-spacing-all u-layout-wrap u-layout-wrap-1\">\n          <div class=\"u-layout\">\n            <div class=\"u-layout-row\">\n              <div class=\"u-container-align-center-xl u-container-style u-layout-cell u-size-12 u-size-20-md u-layout-cell-1\">\n                <div class=\"u-container-layout u-valign-top-lg u-valign-top-xl u-valign-top-xs u-container-layout-1\">\n                  <div class=\"corelan-box-gold u-container-align-center-md u-container-align-center-sm u-container-align-center-xs u-container-style u-expanded-width-lg u-gradient u-group u-shape-rectangle u-group-1\" data-href=\"\/index.php\/category\/exploit-writing-tutorials\/?sorting=date_asc\" data-target=\"_blank\">\n                    <div class=\"u-container-layout u-valign-middle-lg u-valign-middle-md u-valign-middle-xl u-valign-middle-xs u-container-layout-2\">\n                      <h2 class=\"u-align-center u-text u-text-palette-1-light-1 u-text-2\"><span style=\"font-weight: 700;\">\ud83d\udcd1&nbsp;<\/span>Exploit Development&nbsp;<span style=\"font-weight: 700;\">\n                          <br>tutorials<\/span>\n                      <\/h2>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n              <div class=\"u-container-align-center-xl u-container-style u-layout-cell u-size-12 u-size-20-md u-layout-cell-2\">\n                <div class=\"u-container-layout u-valign-top-lg u-valign-top-xl u-container-layout-3\">\n                  <div class=\"corelan-box-gold u-container-align-center-md u-container-align-center-sm u-container-align-center-xs u-container-style u-expanded-width-lg u-expanded-width-md u-expanded-width-sm u-gradient u-group u-shape-rectangle u-group-2\" data-href=\"\/index.php\/category\/exploit-writing-videos\/?sorting=date_asc\">\n                    <div class=\"u-container-layout u-valign-middle-lg u-valign-middle-md u-valign-middle-xl u-valign-middle-xs u-container-layout-4\">\n                      <h2 class=\"u-align-center u-text u-text-palette-1-light-1 u-text-3\">\ud83c\udfa5\u200b Exploit Development&nbsp;<span style=\"font-weight: 700;\">\n                          <br>videos<\/span>\n                      <\/h2>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n              <div class=\"u-container-style u-layout-cell u-size-12 u-size-20-md u-layout-cell-3\">\n                <div class=\"u-container-layout u-valign-top-xl u-valign-top-xs u-container-layout-5\">\n                  <div class=\"corelan-box-gold u-container-align-center-lg u-container-align-center-md u-container-align-center-sm u-container-align-center-xs u-container-style u-gradient u-group u-shape-rectangle u-group-3\" data-href=\"\/index.php\/category\/debugging\/?sorting=date_desc\" data-target=\"_blank\">\n                    <div class=\"u-container-layout u-valign-middle-lg u-valign-middle-md u-valign-middle-xl u-valign-middle-xs u-container-layout-6\">\n                      <h2 class=\"u-align-center u-text u-text-palette-1-light-1 u-text-4\">\ud83d\udcda Tutorials on <span style=\"font-weight: 700;\">Debugging<\/span>\n                      <\/h2>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n              <div class=\"u-container-align-center-xl u-container-style u-layout-cell u-size-12 u-size-30-md u-layout-cell-4\">\n                <div class=\"u-container-layout u-valign-top-xl u-valign-top-xs u-container-layout-7\">\n                  <div class=\"corelan-box-gold u-container-align-center-lg u-container-align-center-md u-container-align-center-sm u-container-align-center-xs u-container-style u-gradient u-group u-shape-rectangle u-group-4\" data-href=\"https:\/\/www.corelan.be\/index.php\/merchandise\/\" title=\"Merchandise\">\n                    <div class=\"u-container-layout u-valign-middle-lg u-valign-middle-md u-valign-middle-xl u-valign-middle-xs u-container-layout-8\">\n                      <h2 class=\"u-align-center u-text u-text-palette-1-light-1 u-text-5\">\ud83e\udde1 Support us<\/h2>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n              <div class=\"u-container-align-center-lg u-container-align-center-xl u-container-style u-layout-cell u-size-12 u-size-30-md u-layout-cell-5\">\n                <div class=\"u-container-layout u-valign-top-xl u-valign-top-xs u-container-layout-9\">\n                  <div class=\"corelan-box-gold custom-expanded u-container-align-center-md u-container-align-center-sm u-container-align-center-xs u-container-style u-expanded-width-md u-expanded-width-sm u-gradient u-group u-shape-rectangle u-group-5\" data-href=\"https:\/\/www.corelan.be\/index.php\/training\/\" title=\"Training\">\n                    <div class=\"u-container-layout u-valign-middle-md u-valign-middle-xl u-valign-middle-xs u-container-layout-10\">\n                      <h2 class=\"u-align-center u-text u-text-palette-1-light-1 u-text-6\"> \u2b50\ufe0f Exploit Development <span style=\"font-weight: 700;\">training<\/span>\n                      <\/h2>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-3\" id=\"block-1\" data-image-width=\"553\" data-image-height=\"369\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <h3 class=\"u-text u-text-default-lg u-text-default-md u-text-default-xl u-text-1\">All articles:<\/h3>\n        <div class=\"u-blog u-container-style u-expanded-width u-pagination-center u-blog-1 u-hidden-visibility\"  data-site-sorting-prop=\"created\" data-site-sorting-order=\"desc\" data-max-items=\"5\" data-items-per-page=\"3\">\n          <div class=\"u-list-control\"><\/div>\n          <div class=\"u-repeater u-repeater-1\">\n            <div class=\"u-blog-post u-container-style u-repeater-item u-shape-rectangle\">\n              <div class=\"u-container-layout u-similar-container u-container-layout-1\">\n                <div class=\"corelan-box-gold u-container-style u-expanded-width u-group u-radius u-shape-round u-group-1\">\n                  <div class=\"u-container-layout u-valign-top-xl u-container-layout-2\">\n                    <h4 class=\"u-blog-control u-text u-text-2\"><span class=\"u-file-icon u-icon u-icon-1\" data-animation-name=\"\" data-animation-duration=\"0\" data-animation-delay=\"0\" data-animation-direction=\"\"><img decoding=\"async\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/postheadericon-1.png\" alt=\"\"><\/span>&nbsp;<a class=\"u-post-header-link\" href=\"https:\/\/www.corelan.be\/index.php\/2026\/05\/01\/mona-v3-released\/\">Mona v3 Released: \u26a1 Faster   \ud83c\udfaf Leaner   \u2699\ufe0f Broader<\/a>\n                    <\/h4>\n                    <div class=\"u-blog-control u-metadata u-text-palette-3-light-2 u-metadata-1\"><span class=\"u-meta-author u-meta-icon\"><a class=\"url u-textlink\" href=\"https:\/\/www.corelan.be\/index.php\/author\/admin0\/\" title=\"View all posts by corelanc0d3r\"><span class=\"fn n\">corelanc0d3r<\/span><\/a><\/span><span class=\"u-meta-date u-meta-icon\">May 1, 2026<\/span>\n                    <\/div>\n                    <div class=\"u-blog-control u-post-content u-text u-text-3\">Long overdue\u2026 but today it finally happened. \n\nWe\u2019re proud to announce the release of mona v3.\n\nThis new version brings Python 2 and Python 3 &hellip;<\/div>\n                    <a href=\"https:\/\/www.corelan.be\/index.php\/2026\/05\/01\/mona-v3-released\/\" class=\"u-blog-control u-border-none u-btn u-button-style u-none u-text-active-palette-2-light-1 u-text-hover-palette-1-light-2 u-text-palette-1-light-1 u-btn-1\">\u200b\u00a0Read More<\/a>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"u-blog-post u-container-style u-repeater-item u-shape-rectangle\">\n              <div class=\"u-container-layout u-similar-container u-container-layout-3\">\n                <div class=\"corelan-box-gold u-container-style u-expanded-width u-group u-radius u-shape-round u-group-2\">\n                  <div class=\"u-container-layout u-valign-top-xl u-container-layout-4\">\n                    <h4 class=\"u-blog-control u-text u-text-4\"><span class=\"u-file-icon u-icon u-icon-2\" data-animation-name=\"\" data-animation-duration=\"0\" data-animation-delay=\"0\" data-animation-direction=\"\"><img decoding=\"async\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/postheadericon-1.png\" alt=\"\"><\/span>&nbsp;<a class=\"u-post-header-link\" href=\"https:\/\/www.corelan.be\/index.php\/2026\/04\/17\/debugging-windbgx-automation-scripting-part-1\/\">Debugging - WinDBG(X) Automation & Scripting - Part 1<\/a>\n                    <\/h4>\n                    <div class=\"u-blog-control u-metadata u-text-palette-3-light-2 u-metadata-2\"><span class=\"u-meta-author u-meta-icon\"><a class=\"url u-textlink\" href=\"https:\/\/www.corelan.be\/index.php\/author\/admin0\/\" title=\"View all posts by corelanc0d3r\"><span class=\"fn n\">corelanc0d3r<\/span><\/a><\/span><span class=\"u-meta-date u-meta-icon\">April 17, 2026<\/span>\n                    <\/div>\n                    <div class=\"u-blog-control u-post-content u-text u-text-5\">Stop just using WinDBG\u2014start bending it to your will. Discover powerful automation, event-driven breakpoints, MASM & C++ expression evaluator, &hellip;<\/div>\n                    <a href=\"https:\/\/www.corelan.be\/index.php\/2026\/04\/17\/debugging-windbgx-automation-scripting-part-1\/\" class=\"u-blog-control u-border-none u-btn u-button-style u-none u-text-active-palette-2-light-1 u-text-hover-palette-1-light-2 u-text-palette-1-light-1 u-btn-2\">\u200b\u00a0Read More<\/a>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"u-blog-post u-container-style u-repeater-item u-shape-rectangle\" data-blog-source-type=\"Recent\">\n              <div class=\"u-container-layout u-similar-container u-container-layout-5\">\n                <div class=\"corelan-box-gold u-container-style u-expanded-width u-group u-radius u-shape-round u-group-3\">\n                  <div class=\"u-container-layout u-valign-top-xl u-container-layout-6\">\n                    <h4 class=\"u-blog-control u-text u-text-6\"><span class=\"u-file-icon u-icon u-icon-3\" data-animation-name=\"\" data-animation-duration=\"0\" data-animation-delay=\"0\" data-animation-direction=\"\"><img decoding=\"async\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/postheadericon-1.png\" alt=\"\"><\/span>&nbsp;<a class=\"u-post-header-link\" href=\"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/\">Exploit Writing Tutorial Part 1 - The Video<\/a>\n                    <\/h4>\n                    <div class=\"u-blog-control u-metadata u-text-palette-3-light-2 u-metadata-3\"><span class=\"u-meta-author u-meta-icon\"><a class=\"url u-textlink\" href=\"https:\/\/www.corelan.be\/index.php\/author\/wetw0rk\/\" title=\"View all posts by Milton Valencia\"><span class=\"fn n\">Milton Valencia<\/span><\/a><\/span><span class=\"u-meta-date u-meta-icon\">April 2, 2026<\/span>\n                    <\/div>\n                    <div class=\"u-blog-control u-post-content u-text u-text-7\">The Corelan tutorials helped shape how exploit development is learned worldwide and inspired generations of security researchers. \n\nNow you can watch&hellip;<\/div>\n                    <a href=\"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/\" class=\"u-blog-control u-border-none u-btn u-button-style u-none u-text-active-palette-2-light-1 u-text-hover-palette-1-light-2 u-text-palette-1-light-1 u-btn-3\">\u200b\u00a0Read More<\/a>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"u-blog-post u-container-style u-repeater-item u-shape-rectangle\" data-blog-source-type=\"Recent\">\n              <div class=\"u-container-layout u-similar-container u-container-layout-7\">\n                <div class=\"corelan-box-gold u-container-style u-expanded-width u-group u-radius u-shape-round u-group-4\">\n                  <div class=\"u-container-layout u-valign-top-xl u-container-layout-8\">\n                    <h4 class=\"u-blog-control u-text u-text-8\"><span class=\"u-file-icon u-icon u-icon-4\" data-animation-name=\"\" data-animation-duration=\"0\" data-animation-delay=\"0\" data-animation-direction=\"\"><img decoding=\"async\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/postheadericon-1.png\" alt=\"\"><\/span>&nbsp;<a class=\"u-post-header-link\" href=\"https:\/\/www.corelan.be\/index.php\/2026\/03\/23\/debugging-windbg-windbgx-fundamentals\/\">Debugging - WinDBG & WinDBGX Fundamentals<\/a>\n                    <\/h4>\n                    <div class=\"u-blog-control u-metadata u-text-palette-3-light-2 u-metadata-4\"><span class=\"u-meta-author u-meta-icon\"><a class=\"url u-textlink\" href=\"https:\/\/www.corelan.be\/index.php\/author\/admin0\/\" title=\"View all posts by corelanc0d3r\"><span class=\"fn n\">corelanc0d3r<\/span><\/a><\/span><span class=\"u-meta-date u-meta-icon\">March 23, 2026<\/span>\n                    <\/div>\n                    <div class=\"u-blog-control u-post-content u-text u-text-9\"><p>\n\nIntroductionIs AI an evolution or a revolution? Or both? Those are interesting questions.\n\nSpeaking of AI - even ChatGPT and Grok agree: A &hellip;<\/p><\/div>\n                    <a href=\"https:\/\/www.corelan.be\/index.php\/2026\/03\/23\/debugging-windbg-windbgx-fundamentals\/\" class=\"u-blog-control u-border-none u-btn u-button-style u-none u-text-active-palette-2-light-1 u-text-hover-palette-1-light-2 u-text-palette-1-light-1 u-btn-4\">\u200b\u00a0Read More<\/a>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"u-blog-post u-container-style u-repeater-item u-shape-rectangle\" data-blog-source-type=\"Recent\">\n              <div class=\"u-container-layout u-similar-container u-container-layout-9\">\n                <div class=\"corelan-box-gold u-container-style u-expanded-width u-group u-radius u-shape-round u-group-5\">\n                  <div class=\"u-container-layout u-valign-top-xl u-container-layout-10\">\n                    <h4 class=\"u-blog-control u-text u-text-10\"><span class=\"u-file-icon u-icon u-icon-5\" data-animation-name=\"\" data-animation-duration=\"0\" data-animation-delay=\"0\" data-animation-direction=\"\"><img decoding=\"async\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/postheadericon-1.png\" alt=\"\"><\/span>&nbsp;<a class=\"u-post-header-link\" href=\"https:\/\/www.corelan.be\/index.php\/2019\/04\/23\/windows-10-egghunter\/\">Windows 10 egghunter (wow64) and more<\/a>\n                    <\/h4>\n                    <div class=\"u-blog-control u-metadata u-text-palette-3-light-2 u-metadata-5\"><span class=\"u-meta-author u-meta-icon\"><a class=\"url u-textlink\" href=\"https:\/\/www.corelan.be\/index.php\/author\/admin0\/\" title=\"View all posts by corelanc0d3r\"><span class=\"fn n\">corelanc0d3r<\/span><\/a><\/span><span class=\"u-meta-date u-meta-icon\">April 23, 2019<\/span>\n                    <\/div>\n                    <div class=\"u-blog-control u-post-content u-text u-text-11\"><p>Introduction\nOk, I have a confession to make, I have always been somewhat intrigued by egghunters. That doesn't mean that I like to use (or abuse) &hellip;<\/p><\/div>\n                    <a href=\"https:\/\/www.corelan.be\/index.php\/2019\/04\/23\/windows-10-egghunter\/\" class=\"u-blog-control u-border-none u-btn u-button-style u-none u-text-active-palette-2-light-1 u-text-hover-palette-1-light-2 u-text-palette-1-light-1 u-btn-5\">\u200b\u00a0Read More<\/a>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"has-pagination u-list-control\"><ul style=\"\" class=\"responsive-style1 u-pagination u-spacing-5 u-unstyled u-pagination-1\"><li style=\"\" class=\"u-nav-item u-pagination-item active\"><span aria-current=\"page\" style=\"padding: 5px 19px; --radius: 5px;\" class=\"u-border-1 u-border-active-palette-3-light-1 u-border-grey-10 u-border-hover-palette-1-light-2 u-button-style u-nav-link u-radius\">1<\/span><\/li><li style=\"\" class=\"u-nav-item u-pagination-item\"><a style=\"padding: 5px 19px; --radius: 5px;\" class=\"u-border-1 u-border-active-palette-3-light-1 u-border-grey-10 u-border-hover-palette-1-light-2 u-button-style u-nav-link u-radius\" href=\"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19617\/page\/2\/\">2<\/a><\/li><li style=\"\" class=\"u-nav-item u-pagination-item\"><span style=\"padding: 5px 19px; --radius: 5px;\" class=\"u-border-1 u-border-active-palette-3-light-1 u-border-grey-10 u-border-hover-palette-1-light-2 u-button-style u-nav-link u-radius\">&hellip;<\/span><\/li><li style=\"\" class=\"u-nav-item u-pagination-item\"><a style=\"padding: 5px 19px; --radius: 5px;\" class=\"u-border-1 u-border-active-palette-3-light-1 u-border-grey-10 u-border-hover-palette-1-light-2 u-button-style u-nav-link u-radius\" href=\"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19617\/page\/47\/\">47<\/a><\/li><li style=\"\" class=\"u-nav-item u-pagination-item\"><a style=\"padding: 5px 19px; --radius: 5px;\" class=\"u-border-1 u-border-active-palette-3-light-1 u-border-grey-10 u-border-hover-palette-1-light-2 u-button-style u-nav-link u-radius\" href=\"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19617\/page\/2\/\">&#x3009;<\/a><\/li><\/ul>\n          <\/div>\n        <\/div>\n        <p class=\"u-align-center u-text u-text-12\"> Corelan Research is a long-running cybersecurity research project focused on exploit development, vulnerability research and Windows internals.&nbsp; &nbsp;Since 2009, we have published deep technical tutorials covering topics such as stack-based exploitation, heap exploitation, shellcoding, reverse engineering and debugging.&nbsp;<br>These tutorials have helped thousands of security researchers, penetration testers, exploit developers and exploit dev trainers learn how modern memory corruption vulnerabilities work.\n        <\/p>\n      <\/div>\n    <\/section>\n    \n    \n    \n    \n  \n","protected":false},"excerpt":{"rendered":"<p>Corelan Research Two decades of exploit development research, techniques, and knowledge \u2014 shared openly and for free with the community. Quick links: \ud83d\udcd1&nbsp;Exploit Development&nbsp; tutorials \ud83c\udfa5\u200b Exploit Development&nbsp; videos \ud83d\udcda Tutorials on Debugging \ud83e\udde1 Support us \u2b50\ufe0f Exploit Development training All articles: &nbsp;Mona v3 Released: \u26a1 Faster \ud83c\udfaf Leaner \u2699\ufe0f Broader corelanc0d3rMay 1, 2026 Long &hellip; <a href=\"https:\/\/www.corelan.be\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Home\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-19617","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Home - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Corelan Research Two decades of exploit development research, techniques, and knowledge \u2014 shared openly and for free with the community. Quick links: \ud83d\udcd1&nbsp;Exploit Development&nbsp; tutorials \ud83c\udfa5\u200b Exploit Development&nbsp; videos \ud83d\udcda Tutorials on Debugging \ud83e\udde1 Support us \u2b50\ufe0f Exploit Development training All articles: &nbsp;Mona v3 Released: \u26a1 Faster \ud83c\udfaf Leaner \u2699\ufe0f Broader corelanc0d3rMay 1, 2026 Long &hellip; Continue reading &quot;Home&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-01T16:09:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Home - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2026-05-01T16:09:43+00:00\",\"dateModified\":\"2026-05-01T16:09:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/","og_locale":"en_US","og_type":"article","og_title":"Home - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Corelan Research Two decades of exploit development research, techniques, and knowledge \u2014 shared openly and for free with the community. Quick links: \ud83d\udcd1&nbsp;Exploit Development&nbsp; tutorials \ud83c\udfa5\u200b Exploit Development&nbsp; videos \ud83d\udcda Tutorials on Debugging \ud83e\udde1 Support us \u2b50\ufe0f Exploit Development training All articles: &nbsp;Mona v3 Released: \u26a1 Faster \ud83c\udfaf Leaner \u2699\ufe0f Broader corelanc0d3rMay 1, 2026 Long &hellip; Continue reading \"Home\"","og_url":"https:\/\/www.corelan.be\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_modified_time":"2026-05-01T16:09:46+00:00","twitter_card":"summary_large_image","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/","url":"https:\/\/www.corelan.be\/","name":"Home - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2026-05-01T16:09:43+00:00","dateModified":"2026-05-01T16:09:46+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=19617"}],"version-history":[{"count":1,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19617\/revisions"}],"predecessor-version":[{"id":19627,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/pages\/19617\/revisions\/19627"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=19617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}