{"id":19065,"date":"2026-04-02T15:31:00","date_gmt":"2026-04-02T13:31:00","guid":{"rendered":"https:\/\/www.corelan.be\/?p=19065"},"modified":"2026-04-02T15:50:01","modified_gmt":"2026-04-02T13:50:01","slug":"exploit-writing-tutorial-part-1-the-video","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/","title":{"rendered":"Exploit Writing Tutorial Part 1 - The Video"},"content":{"rendered":"<p>Hi everyone,<\/p>\n<p>We are super excited and proud to announce the start of a great initiative.<\/p>\n<p>17 years ago, <a href=\"\/index.php\/about\" target=\"_blank\" rel=\"noopener\">Peter Van Eeckhoutte<\/a> (aka <a href=\"\/index.php\/contact\" target=\"_blank\" rel=\"noopener\">corelanc0d3r<\/a>) began publishing his <a href=\"https:\/\/www.corelan.be\/index.php\/category\/exploit-writing-tutorials\/?sorting=date_asc\" target=\"_blank\" rel=\"noopener\">exploit development tutorials<\/a> on the Corelan website.<\/p>\n<p>Those tutorials were groundbreaking and paved the way for how entire generations of security researchers learned exploit development.\u00a0 They became a global reference point for both aspiring and experienced exploit developers, and even for trainers building their own courses. His work has been cited in books, referenced in research, and quietly influenced how people approach vulnerability analysis and exploitation at a fundamental level.<\/p>\n<p>Even today \u2014 despite changes in operating systems, mitigations, and tooling \u2014 the underlying techniques documented in those blog posts remain highly relevant.<\/p>\n<p>And yet, one question kept coming back:<\/p>\n<blockquote><p>\u201cCan we see this in action?\u00a0 Can you make a video so we can follow along?\u201d<\/p><\/blockquote>\n<h2>\ud83c\udfa5 Bringing Corelan to Life<\/h2>\n<p>So we decided to do exactly that.<\/p>\n<p>I\u2019ve teamed up with Corelan to turn these legendary write-ups into a video-based series, where we walk through the original material step by step \u2014 but this time, live, visual, and on modern systems.<\/p>\n<p>This is not a replacement for the original content, it\u2019s an extension. A way to bridge theory and execution.<\/p>\n<h2>\ud83d\ude80 Part 1 \u2014 Stack-Based Buffer Overflows (Windows 11 x64)<\/h2>\n<p>We\u2019re kicking things off with Part 1 of the original series:<\/p>\n<p><a href=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/19\/exploit-writing-tutorial-part-1-stack-based-overflows\/\" target=\"_blank\" rel=\"noopener\">\ud83d\udc49 Exploit Writing Tutorial Part 1<\/a><\/p>\n<p>In the first video, we exploit a stack-based buffer overflow on a modern Windows 11 x64 environment.<\/p>\n<p>By the end of the tutorial, you will have learned:<\/p>\n<ul>\n<li>What a stack-based buffer overflow really is<\/li>\n<li>The role of registers and key assembly instructions<\/li>\n<li>How to identify the steps and strategy to go from memory corruption to building an exploit<\/li>\n<li>How to find and use reliable trampoline pointers<\/li>\n<li>When and how to deploy shellcode<\/li>\n<li>How to turn a proof of concept into a working exploit<\/li>\n<\/ul>\n<p>We\u2019ll also be using tools such as WinDBG and mona.py throughout the process \u2014 all based on the original Corelan workflow, but using modern systems and tooling.<\/p>\n<p>If you need help setting up and using WinDBG, please take a moment to review <a href=\"https:\/\/www.corelan.be\/index.php\/2026\/03\/23\/debugging-windbg-windbgx-fundamentals\/\" target=\"_blank\" rel=\"noopener\">this post<\/a>.\u00a0 Also, feel free to use the <a href=\"https:\/\/github.com\/corelan\/CorelanTraining\/blob\/master\/CorelanVMInstall.ps1\" target=\"_blank\" rel=\"noopener\">CorelanVMInstall.ps1<\/a> script to help set up WinDBG, Python, Visual Studio Express and other tools on your Windows 11 machine.<\/p>\n<h2>The video<\/h2>\n<p>You can watch the video <a href=\"https:\/\/www.youtube.com\/watch?v=QTviE0XtYLg\" target=\"_blank\" rel=\"noopener\">here<\/a>:<br \/>\n<div class=\"epyt-video-wrapper\"><iframe loading=\"lazy\"  id=\"_ytid_89401\"  width=\"1140\" height=\"641\"  data-origwidth=\"1140\" data-origheight=\"641\"  data-relstop=\"1\" src=\"https:\/\/www.youtube.com\/embed\/QTviE0XtYLg?enablejsapi=1&autoplay=0&cc_load_policy=0&cc_lang_pref=&iv_load_policy=1&loop=0&rel=0&fs=1&playsinline=0&autohide=2&theme=dark&color=red&controls=1&disablekb=0&\" class=\"__youtube_prefs__  no-lazyload\" title=\"YouTube player\"  allow=\"fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe><\/div><\/p>\n<h2>\ud83d\udd1c What\u2019s Next<\/h2>\n<p>This is just the beginning.<\/p>\n<p>More parts of the Corelan tutorial series will be covered \u2014 each building further on the previous one, and gradually moving into more advanced territory.<\/p>\n<h2>\ud83d\ude4f Final Thoughts<\/h2>\n<p>It\u2019s an honor to collaborate on material that has helped shape so many careers in this field.<\/p>\n<p>If you\u2019ve ever read the Corelan tutorials and wanted to see them unfold in real time \u2014 this is for you.<\/p>\n<p>If your interested in diving even deeper into this subject matter, Corelan also offers more <a href=\"https:\/\/www.corelan-training.com\" target=\"_blank\" rel=\"noopener\">in-depth training<\/a> with topics more advanced than those we\u2019ll be going through within this series.\u00a0 \u00a0Corelan classes prep you for the unique <a href=\"https:\/\/www.corelan-certified.com\" target=\"_blank\" rel=\"noopener\">Corelan Certified Exploit Developer<\/a> exam.<\/p>\n<p>If you're interested in taking a Corelan Training in the US, hosted by <a href=\"https:\/\/ccsecuritytraining.com\/\" target=\"_blank\" rel=\"noopener\">CCST<\/a>, follow <a href=\"https:\/\/ccsecuritytraining.com\/wetw0rk\/\" target=\"_blank\" rel=\"noopener\">this link to sign up and get a $200 voucher<\/a>.<\/p>\n<p>Fan of the Corelan wallpapers used in the video? <a href=\"http:\/\/github.com\/corelan\/wallpapers\" target=\"_blank\" rel=\"noopener\">Get them here<\/a>!<\/p>\n<p>Sponsor me &lt;3: <a href=\"https:\/\/github.com\/sponsors\/wetw0rk\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/sponsors\/wetw0rk<\/a><\/p>\n<p>More to come.<\/p>\n<p>\u2014 Milton (wetw0rk)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Corelan tutorials helped shape how exploit development is learned worldwide and inspired generations of security researchers. <\/p>\n<p>Now you can watch them come to life.<\/p>\n","protected":false},"author":13,"featured_media":19096,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[3708,244,3801,245],"tags":[3803,3802,3773,3741,3733,1836,285],"class_list":["post-19065","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-debugging","category-exploit-writing-tutorials","category-exploit-writing-videos","category-exploits","tag-exploit-development-video","tag-exploit","tag-tutorial","tag-exploit-development","tag-exploit-development-tutorial","tag-stack","tag-windbg"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exploit Writing Tutorial Part 1 - The Video - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploit Writing Tutorial Part 1 - The Video - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"The Corelan tutorials helped shape how exploit development is learned worldwide and inspired generations of security researchers.  Now you can watch them come to life.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-02T13:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T13:50:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/04\/win32processwetw0rk-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Milton Valencia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wetw0rk7\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/\"},\"author\":{\"name\":\"Milton Valencia\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/283e5f680302002950867b0608dd77c7\"},\"headline\":\"Exploit Writing Tutorial Part 1 - The Video\",\"datePublished\":\"2026-04-02T13:31:00+00:00\",\"dateModified\":\"2026-04-02T13:50:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/\"},\"wordCount\":572,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/win32processwetw0rk.png\",\"keywords\":[\"exploit development video\",\"exploit\",\"tutorial\",\"exploit development\",\"exploit development tutorial\",\"stack\",\"windbg\"],\"articleSection\":[\"Debugging\",\"Exploit Writing Tutorials\",\"Exploit Writing Videos\",\"Exploits\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/\",\"name\":\"Exploit Writing Tutorial Part 1 - The Video - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/win32processwetw0rk.png\",\"datePublished\":\"2026-04-02T13:31:00+00:00\",\"dateModified\":\"2026-04-02T13:50:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/win32processwetw0rk.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/win32processwetw0rk.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/04\\\/02\\\/exploit-writing-tutorial-part-1-the-video\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploit Writing Tutorial Part 1 - The Video\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/283e5f680302002950867b0608dd77c7\",\"name\":\"Milton Valencia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x\",\"caption\":\"Milton Valencia\"},\"description\":\"wetw0rk is a security researcher passionate about exploit and malware development and an avid open-source contributor. He\u2019s the creator of the Sickle Payload Development Kit and has worked on projects including Metasploit, Exploit-DB, and Kali Linux, with experience in red teaming, reverse engineering, and adversary emulation.\",\"sameAs\":[\"https:\\\/\\\/wetw0rk.github.io\\\/\",\"https:\\\/\\\/www.instagram.com\\\/wetw0rk7\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/milton-wetw0rk\\\/\",\"https:\\\/\\\/x.com\\\/wetw0rk7\",\"https:\\\/\\\/www.youtube.com\\\/@wetw0rk7\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/wetw0rk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploit Writing Tutorial Part 1 - The Video - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/","og_locale":"en_US","og_type":"article","og_title":"Exploit Writing Tutorial Part 1 - The Video - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"The Corelan tutorials helped shape how exploit development is learned worldwide and inspired generations of security researchers.  Now you can watch them come to life.","og_url":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2026-04-02T13:31:00+00:00","article_modified_time":"2026-04-02T13:50:01+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/04\/win32processwetw0rk-1024x683.png","type":"image\/png"}],"author":"Milton Valencia","twitter_card":"summary_large_image","twitter_creator":"@wetw0rk7","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/"},"author":{"name":"Milton Valencia","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/283e5f680302002950867b0608dd77c7"},"headline":"Exploit Writing Tutorial Part 1 - The Video","datePublished":"2026-04-02T13:31:00+00:00","dateModified":"2026-04-02T13:50:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/"},"wordCount":572,"commentCount":0,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/04\/win32processwetw0rk.png","keywords":["exploit development video","exploit","tutorial","exploit development","exploit development tutorial","stack","windbg"],"articleSection":["Debugging","Exploit Writing Tutorials","Exploit Writing Videos","Exploits"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/","url":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/","name":"Exploit Writing Tutorial Part 1 - The Video - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/04\/win32processwetw0rk.png","datePublished":"2026-04-02T13:31:00+00:00","dateModified":"2026-04-02T13:50:01+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/04\/win32processwetw0rk.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/04\/win32processwetw0rk.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Exploit Writing Tutorial Part 1 - The Video"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/283e5f680302002950867b0608dd77c7","name":"Milton Valencia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x","caption":"Milton Valencia"},"description":"wetw0rk is a security researcher passionate about exploit and malware development and an avid open-source contributor. He\u2019s the creator of the Sickle Payload Development Kit and has worked on projects including Metasploit, Exploit-DB, and Kali Linux, with experience in red teaming, reverse engineering, and adversary emulation.","sameAs":["https:\/\/wetw0rk.github.io\/","https:\/\/www.instagram.com\/wetw0rk7","https:\/\/www.linkedin.com\/in\/milton-wetw0rk\/","https:\/\/x.com\/wetw0rk7","https:\/\/www.youtube.com\/@wetw0rk7"],"url":"https:\/\/www.corelan.be\/index.php\/author\/wetw0rk\/"}]}},"views":5273,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/04\/win32processwetw0rk.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/19065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=19065"}],"version-history":[{"count":27,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/19065\/revisions"}],"predecessor-version":[{"id":19206,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/19065\/revisions\/19206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media\/19096"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=19065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=19065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=19065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}