{"id":2068,"date":"2009-07-12T19:45:52","date_gmt":"2009-07-12T17:45:52","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/"},"modified":"2009-07-12T19:45:52","modified_gmt":"2009-07-12T17:45:52","slug":"free-tool-find-where-ad-users-are-logged-on-into","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/","title":{"rendered":"Free tool : Find out where your AD Users are logged on into"},"content":{"rendered":"<p>Hi,<\/p>\n<p>I decided to release another free utility I wrote a while ago. This small command-line utility can be used to find out where Active Directory users are logged on into, and\/or to find out who is logged on on specific machines.&#160; This should include local users, users that are logged in via RDP, user accounts that are used to run services and scheduled tasks (only when the task is running at that time).&#160; I have not fully tested all scenario\u2019s yet, but the first results look quite ok.<\/p>\n<p>You can download the utility from <a title=\"https:\/\/www.corelan.be\/index.php\/my-free-tools\/ad-cs\/pve-find-ad-user\/\" href=\"https:\/\/www.corelan.be\/index.php\/my-free-tools\/ad-cs\/pve-find-ad-user\/\">https:\/\/www.corelan.be\/index.php\/my-free-tools\/ad-cs\/pve-find-ad-user\/<\/a>. You need .Net framework 2.0 on the machine that you are running the tool off, and you also need to have admin access on the computers you are running the utility against.<\/p>\n<p>The tool is compiled on a 32bit system, but it should run fine on 64bit systems as well.<\/p>\n<p>Open a command prompt and start the utility without parameters :<\/p>\n<p>&#160;<\/p>\n<pre style=\"border-right: #cecece 1px solid; padding-right: 5px; border-top: #cecece 1px solid; padding-left: 5px; min-height: 40px; padding-bottom: 5px; overflow: auto; border-left: #cecece 1px solid; width: 650px; padding-top: 5px; border-bottom: #cecece 1px solid; background-color: #f0f0f0\"> -----------------------------------------\n  PVE Find AD Users\n  Peter Van Eeckhoutte\n  (c) 2009 - http:<span style=\"color: #008000\">\/\/www.corelan.be<\/span>\n  Version : x.x.x.x\n -----------------------------------------\n\n Syntax : pveFindADUser.exe &lt;parameters&gt;\n\n Valid parameters are :\n -h\n   show help\n -u\n   check <span style=\"color: #0000ff\">for<\/span> updates\n -v\n   show a little bit more info (verbose)\n -current [&quot;<span style=\"color: #8b0000\">username<\/span>&quot;]\n   The -current parameters shows the currently logged on user on each PC\n   in the domain. If you specify a username (between quotes), then only\n   the PC's where that specific user is logged on will be displayed.\n   If you don't specify a username, all PC's with logged on users will be\n   displayed in the report.\n -last [&quot;<span style=\"color: #8b0000\">username<\/span>&quot;]\n   The -last parameters shows the last logged on user on each PC in the domain.\n   If you specify a username (between quotes), then only the PC's where that\n   user has logged on last time will be shown\n   If you don't specify a username, all PC's with the last logged\n   on users will be reported.\n\n   In both cases, the username should contain the domain name !\n   (DOMAIN\\username)\n\n   If you specify DOMAIN\\*username* (with 2 asterisks), then\n   all users containing the 'username' <span style=\"color: #0000ff\">string<\/span> will be displayed\n\n -noping\n   Do <span style=\"color: #0000ff\">not<\/span> ping target computer before trying to enumerate user logons\n -p &lt;nr of pings&gt;\n   If ping is enabled, set number of pings <span style=\"color: #0000ff\">for<\/span> verifying that host is alive\n   If -p is <span style=\"color: #0000ff\">not<\/span> specified, 2 pings will be sent\n -rootpath rootpath\n   Where rootpath is written in distinguishedName notation\n     Example : OU=Computers,dc=domain,dc=com\n -target hostname.domain.com,hostname2.domain.com,hostname3.domain.com\n   Optional parameter that allows you to specify the list of hosts\n   (fqdn) to run the query against\n   Without <span style=\"color: #0000ff\">this<\/span> -target parameter, queries will be executed against\n   all hosts in the current domain\n -stopfound\n   Stop searching when first match has been found.\n   This parameter works only when looking <span style=\"color: #0000ff\">for<\/span> currently logged on users\n\n Output will be written to console <span style=\"color: #0000ff\">and<\/span> to a file called report.csv<\/pre>\n<p>While most options are self-explanatory, I\u2019ll go through them anyway :<\/p>\n<p><strong>-h : <\/strong>show help. Not much to say about that.<\/p>\n<p><strong>-u : <\/strong>check if there is an updated version of the utility. You can use this parameter in conjunction with other parameters<\/p>\n<p><strong>-current [\u201cusername\u201d]<\/strong> : This parameter can do 2 things. If you only specify&#160; -current&#160; then the utility will simply get all currently logged on users on all target machines.&#160; If you specify a username (<em>DOMAIN\\Username<\/em>) then only the computers where this user is logged on, will be displayed.&#160; The utility will try to get the current logged on users from the registry first. If that fails, it will try to get the users via WMI. When the users are collected via WMI, you may see the user account that you are using the run the utility as a logged on user. This user may not be logged on interactively, it just may show up because you are connecting to the host via WMI. Just be aware of this.<\/p>\n<p><strong>-last [\u201cusername\u201d] <\/strong>: This parameter can do 2 things as well.&#160; If you only specify&#160; -last&#160;&#160; then the utility will attempt to get the last logged on user on the target computer. If you specify a username ( <em>DOMAIN\\Username<\/em>) then only the computers that have this user account as last logon, will be displayed.&#160; Note that, depending on your company policy, the last logon username may be hidden and the tool may not be able to get it.<\/p>\n<p><strong>-noping<\/strong> : this option will prevent the tool from performing a ping (well, in fact, by default the tool does 2 pings) before trying to get the user logon information.<\/p>\n<p><strong>-target <\/strong>: this optional parameter allows you to specify the hosts to query.&#160; If you don\u2019t specify this -target parameter, then all hosts in the current domain will be queried.&#160; If you decide to specify -target, followed with a comma-separated list of hostnames, make sure to use the FQDN of the target hosts.<\/p>\n<p>In its most simple form, you could just run&#160; pveadfinduser.exe -current&#160;&#160; to&#160; show all currently logged on users on all machines (computers, servers, domain controllers, ...) in the domain.<\/p>\n<p>The tool will write the output of the queries into a csv file called report.csv. This file will contain the following fields :<\/p>\n<p><em>computername, username, mode and technique. <\/em><\/p>\n<p>Mode can be &quot;current&quot; (for currently logged on users) and &quot;last&quot; (for last logged on users).&#160; Technique can be &quot;registry&quot; or &quot;wmi&quot;, depending on the technique that was used to gather the information.<\/p>\n<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Hi, I decided to release another free utility I wrote a while ago. This small command-line utility can be used to find out where Active Directory users are logged on into, and\/or to find out who is logged on on specific machines.&#160; This should include local users, users that are logged in via RDP, user &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Free tool : Find out where your AD Users are logged on into\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[31,488,373,127],"tags":[484],"class_list":["post-2068","post","type-post","status-publish","format-standard","hentry","category-active-directory","category-corelan-free-tools","category-scripts","category-security","tag-free-tool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Free tool : Find out where your AD Users are logged on into - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Free tool : Find out where your AD Users are logged on into - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Hi, I decided to release another free utility I wrote a while ago. This small command-line utility can be used to find out where Active Directory users are logged on into, and\/or to find out who is logged on on specific machines.&#160; This should include local users, users that are logged in via RDP, user &hellip; Continue reading &quot;Free tool : Find out where your AD Users are logged on into&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2009-07-12T17:45:52+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/12\\\/free-tool-find-where-ad-users-are-logged-on-into\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/12\\\/free-tool-find-where-ad-users-are-logged-on-into\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Free tool : Find out where your AD Users are logged on into\",\"datePublished\":\"2009-07-12T17:45:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/12\\\/free-tool-find-where-ad-users-are-logged-on-into\\\/\"},\"wordCount\":600,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"free tool\"],\"articleSection\":[\"Active Directory\",\"Corelan Free Tools\",\"Scripts\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/12\\\/free-tool-find-where-ad-users-are-logged-on-into\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/12\\\/free-tool-find-where-ad-users-are-logged-on-into\\\/\",\"name\":\"Free tool : Find out where your AD Users are logged on into - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2009-07-12T17:45:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/12\\\/free-tool-find-where-ad-users-are-logged-on-into\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/12\\\/free-tool-find-where-ad-users-are-logged-on-into\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/12\\\/free-tool-find-where-ad-users-are-logged-on-into\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Free tool : Find out where your AD Users are logged on into\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Free tool : Find out where your AD Users are logged on into - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/","og_locale":"en_US","og_type":"article","og_title":"Free tool : Find out where your AD Users are logged on into - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Hi, I decided to release another free utility I wrote a while ago. This small command-line utility can be used to find out where Active Directory users are logged on into, and\/or to find out who is logged on on specific machines.&#160; This should include local users, users that are logged in via RDP, user &hellip; Continue reading \"Free tool : Find out where your AD Users are logged on into\"","og_url":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2009-07-12T17:45:52+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Free tool : Find out where your AD Users are logged on into","datePublished":"2009-07-12T17:45:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/"},"wordCount":600,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["free tool"],"articleSection":["Active Directory","Corelan Free Tools","Scripts","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/","url":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/","name":"Free tool : Find out where your AD Users are logged on into - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2009-07-12T17:45:52+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/12\/free-tool-find-where-ad-users-are-logged-on-into\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Free tool : Find out where your AD Users are logged on into"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":75072,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/2068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=2068"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/2068\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=2068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=2068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=2068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}