{"id":19684,"date":"2026-05-09T18:45:00","date_gmt":"2026-05-09T16:45:00","guid":{"rendered":"https:\/\/www.corelan.be\/?p=19684"},"modified":"2026-05-08T20:10:14","modified_gmt":"2026-05-08T18:10:14","slug":"exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/","title":{"rendered":"Exploit Writing Tutorial Part 2 -  Jumping to shellcode - The Video"},"content":{"rendered":"\n<p>Hi everyone!<\/p>\n<p>A little while ago, we posted <a href=\"https:\/\/www.corelan.be\/index.php\/2026\/04\/02\/exploit-writing-tutorial-part-1-the-video\/\"  target=\"_blank\" rel=\"noopener\">a first video<\/a> covering Corelan's <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/19\/exploit-writing-tutorial-part-1-stack-based-overflows\/\"  target=\"_blank\" rel=\"noopener\">Exploit Writing Tutorial Part 1<\/a>.  <\/p>\n<p>Today, we're back with a second video in the series on exploit development, covering <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/23\/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2\/\"  target=\"_blank\" rel=\"noopener\">Exploit Writing Tutorial Part 2<\/a>  <\/p>\n<p>In this second video, we'll be re-using the stack-based-overflow exploit from the first tutorial along with the Windows 11 x64 environment it was developed for.<\/p>\n<p>By the end of the tutorial, you will have learned:<\/p>\n<ul>\n<li>What jump code is <\/li>\n<li>When and how to use jump code<\/li>\n<li>How do develop custom jumpcode<\/li>\n<li>Flow of exploitation depending on jump operations<\/li>\n<\/ul>\n<p>We'll also be using tools such as WinDBG and mona.py throughout the process - all based on the original Corelan workflow, but using modern systems and tooling.<\/p>\n<p>If you need help setting up and using WinDBG, please take a moment to review <a href=\"https:\/\/www.corelan.be\/index.php\/2026\/03\/23\/debugging-windbg-windbgx-fundamentals\/\"  target=\"_blank\" rel=\"noopener\">this post<\/a>.  <\/p>\n<p>Also, feel free to use the <mono>CorelanVMInstall.ps1<\/mono> script from the <a href=\"https:\/\/github.com\/corelan\/CorelanTraining\/blob\/master\/CorelanVMInstall.ps1\"  target=\"_blank\" rel=\"noopener\">CorelanTraining Github repo<\/a> script to help set up WinDBG, Python, Visual Studio Express and other tools on your Windows 11 machine.<\/p>\n<h2>The video<\/h2>\n<p>You can watch the video <a href=\"https:\/\/youtu.be\/UUv2JE6JA0A?si=C9Fq_EQUwj6A2OkA\" target=\"_blank\" rel=\"noopener\">here<\/a>:<br \/>\n<div class=\"epyt-video-wrapper\"><iframe loading=\"lazy\"  id=\"_ytid_12897\"  width=\"1140\" height=\"641\"  data-origwidth=\"1140\" data-origheight=\"641\"  data-relstop=\"1\" src=\"https:\/\/www.youtube.com\/embed\/UUv2JE6JA0A?enablejsapi=1&autoplay=0&cc_load_policy=0&cc_lang_pref=&iv_load_policy=1&loop=0&rel=0&fs=1&playsinline=0&autohide=2&theme=dark&color=red&controls=1&disablekb=0&\" class=\"__youtube_prefs__  no-lazyload\" title=\"YouTube player\"  allow=\"fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The original Corelan exploit writing tutorials helped a generation of security researchers understand how memory corruption really works. <\/p>\n<p>Today, we continue that journey with a second video in the series \u2014 revisiting Exploit Writing Tutorial Part 2 using a modern Windows 11 x64 lab environment, WinDBG, and mona.py. <\/p>\n<p>In this video, we dive into jump code, execution flow redirection, and custom jump techniques that remain essential knowledge for understanding stack-based exploitation and exploit reliability.<\/p>\n","protected":false},"author":13,"featured_media":19688,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[3708,244,3801,245,2561,3180],"tags":[3826,3825,3803,3741,3733,2802],"class_list":["post-19684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-debugging","category-exploit-writing-tutorials","category-exploit-writing-videos","category-exploits","category-malware-and-reversing","category-mona","tag-assembly","tag-jumpcode","tag-exploit-development-video","tag-exploit-development","tag-exploit-development-tutorial","tag-mona-py"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"The original Corelan exploit writing tutorials helped a generation of security researchers understand how memory corruption really works.  Today, we continue that journey with a second video in the series \u2014 revisiting Exploit Writing Tutorial Part 2 using a modern Windows 11 x64 lab environment, WinDBG, and mona.py.  In this video, we dive into jump code, execution flow redirection, and custom jump techniques that remain essential knowledge for understanding stack-based exploitation and exploit reliability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-09T16:45:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/wetw0rk-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Milton Valencia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wetw0rk7\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/\"},\"author\":{\"name\":\"Milton Valencia\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/283e5f680302002950867b0608dd77c7\"},\"headline\":\"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video\",\"datePublished\":\"2026-05-09T16:45:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/\"},\"wordCount\":203,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/wetw0rk.png\",\"keywords\":[\"assembly\",\"jumpcode\",\"exploit development video\",\"exploit development\",\"exploit development tutorial\",\"mona.py\"],\"articleSection\":[\"Debugging\",\"Exploit Writing Tutorials\",\"Exploit Writing Videos\",\"Exploits\",\"Malware and Reversing\",\"mona\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/\",\"name\":\"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/wetw0rk.png\",\"datePublished\":\"2026-05-09T16:45:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/wetw0rk.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/wetw0rk.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2026\\\/05\\\/09\\\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/283e5f680302002950867b0608dd77c7\",\"name\":\"Milton Valencia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x\",\"caption\":\"Milton Valencia\"},\"description\":\"wetw0rk is a security researcher passionate about exploit and malware development and an avid open-source contributor. He\u2019s the creator of the Sickle Payload Development Kit and has worked on projects including Metasploit, Exploit-DB, and Kali Linux, with experience in red teaming, reverse engineering, and adversary emulation.\",\"sameAs\":[\"https:\\\/\\\/wetw0rk.github.io\\\/\",\"https:\\\/\\\/www.instagram.com\\\/wetw0rk7\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/milton-wetw0rk\\\/\",\"https:\\\/\\\/x.com\\\/wetw0rk7\",\"https:\\\/\\\/www.youtube.com\\\/@wetw0rk7\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/wetw0rk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/","og_locale":"en_US","og_type":"article","og_title":"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"The original Corelan exploit writing tutorials helped a generation of security researchers understand how memory corruption really works.  Today, we continue that journey with a second video in the series \u2014 revisiting Exploit Writing Tutorial Part 2 using a modern Windows 11 x64 lab environment, WinDBG, and mona.py.  In this video, we dive into jump code, execution flow redirection, and custom jump techniques that remain essential knowledge for understanding stack-based exploitation and exploit reliability.","og_url":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2026-05-09T16:45:00+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/wetw0rk-1024x683.png","type":"image\/png"}],"author":"Milton Valencia","twitter_card":"summary_large_image","twitter_creator":"@wetw0rk7","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/"},"author":{"name":"Milton Valencia","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/283e5f680302002950867b0608dd77c7"},"headline":"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video","datePublished":"2026-05-09T16:45:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/"},"wordCount":203,"commentCount":0,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/wetw0rk.png","keywords":["assembly","jumpcode","exploit development video","exploit development","exploit development tutorial","mona.py"],"articleSection":["Debugging","Exploit Writing Tutorials","Exploit Writing Videos","Exploits","Malware and Reversing","mona"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/","url":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/","name":"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/wetw0rk.png","datePublished":"2026-05-09T16:45:00+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/wetw0rk.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/wetw0rk.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2026\/05\/09\/exploit-writing-tutorial-part-2-jumping-to-shellcode-the-video\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Exploit Writing Tutorial Part 2 - Jumping to shellcode - The Video"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/283e5f680302002950867b0608dd77c7","name":"Milton Valencia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d2b4d4c97a67d7c1998e34694eced59c0898d43082322650c6461aeeeabb57a?s=96&d=mm&r=x","caption":"Milton Valencia"},"description":"wetw0rk is a security researcher passionate about exploit and malware development and an avid open-source contributor. He\u2019s the creator of the Sickle Payload Development Kit and has worked on projects including Metasploit, Exploit-DB, and Kali Linux, with experience in red teaming, reverse engineering, and adversary emulation.","sameAs":["https:\/\/wetw0rk.github.io\/","https:\/\/www.instagram.com\/wetw0rk7","https:\/\/www.linkedin.com\/in\/milton-wetw0rk\/","https:\/\/x.com\/wetw0rk7","https:\/\/www.youtube.com\/@wetw0rk7"],"url":"https:\/\/www.corelan.be\/index.php\/author\/wetw0rk\/"}]}},"views":422,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/05\/wetw0rk.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/19684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=19684"}],"version-history":[{"count":5,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/19684\/revisions"}],"predecessor-version":[{"id":19695,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/19684\/revisions\/19695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media\/19688"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=19684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=19684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=19684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}