{"id":7564,"date":"2011-09-14T21:17:52","date_gmt":"2011-09-14T19:17:52","guid":{"rendered":"https:\/\/www.corelan.be\/?p=7564"},"modified":"2011-09-14T21:17:52","modified_gmt":"2011-09-14T19:17:52","slug":"corelan-t-shirt-contest-derbycon-2011","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/","title":{"rendered":"Corelan T-Shirt Contest - Derbycon 2011"},"content":{"rendered":"<p>September is going to be a busy month.<\/p>\n<p>With <a href=\"http:\/\/2011.brucon.org\/index.php\/Main_Page\" target=\"_blank\" rel=\"noopener\">Brucon<\/a> approaching very fast and Derbycon on its way as well, it looks like I will be spending more time at cons than at work \ud83d\ude42<\/p>\n<p>I'll have the pleasure to teach the Corelan Live Exploit Development Bootcamp trainings at Brucon and Derbycon.\u00a0 If you are a student, make sure to check the prerequisites so we're all set to make the training a success for everyone.<\/p>\n<p>We've crammed a LOT of exploiting techniques into this 2-day training. This means that at Brucon, we'll extend the first day and continue the training until 21:00.\u00a0 In case of Derbycon, we'll most likely go on until midnight on both days.\u00a0\u00a0\u00a0 You've been warned ! \ud83d\ude42<\/p>\n<p>There are a few more seats left for the training at Brucon. If you are interested in taking the course, <a href=\"http:\/\/2011.brucon.org\/index.php\/Training\" target=\"_blank\" rel=\"noopener\">register\/ get your seat now<\/a> before it's too late.<\/p>\n<p>The training at Derbycon is sold out.... but we have some good news.\u00a0\u00a0 We're happy to be able to give away one free ticket for our training at Derbycon, which includes admission to the conference itself. Yep - that's a $825 gift.<\/p>\n<p>Of course, Corelan wouldn't be Corelan if we would give away the ticket without a fight....<\/p>\n<p>&nbsp;<\/p>\n<h3>The contest<\/h3>\n<p>The challenge is very simple.<\/p>\n<p>Create a T-shirt design that references Corelan and\/or mona.py<\/p>\n<p>Email your design to<em> contest<\/em> [at] <em>corelan <\/em>[dot] <em>be<\/em>\u00a0 (max. 5Mb).\u00a0\u00a0 (Please send in designs in png file format, with a transparent background)<\/p>\n<p>The deadline to submit your design is <strong>Thursday September 22nd <\/strong>2011, at noon (Brussels time).<\/p>\n<p>You can only submit one design. You are allowed to refine your existing design &amp; send in an updated version before the deadline. The last design that you submit will be the one that we'll use in the contest.<\/p>\n<p>All designs must be original and royalty free.<\/p>\n<p>We will publish all designs online on September 23rd.<\/p>\n<p>Corelan Team will select the best design and announce the winner on September 25th.<\/p>\n<p>The winner gets a free ticket to our Corelan Live training at Derbycon, and we will add the design to our Corelan shop at <a href=\"http:\/\/www.cafepress.com\/corelanteam\" target=\"_blank\" rel=\"noopener\">Cafepress<\/a>.<\/p>\n<p>Good luck, the game is on !<\/p>\n<p>&nbsp;<\/p>\n<p><em>Follow me on <a href=\"https:\/\/twitter.com\/corelanc0d3r\" target=\"_blank\" rel=\"noopener\">twitter<\/a> and\/or head over to IRC (freenode, channel #corelan) for updates.<\/em><\/p>\n<hr \/>\n<h3>Update<\/h3>\n<p>We will no longer accept new submissions.\u00a0 Below you can find the 2 designs that were submitted before the deadline:<\/p>\n<h4>Design 1<\/h4>\n<p><a class=\"thickbox\" href=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-1.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; margin: 7px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px; border: 0px;\" title=\"t-shirt-1\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-1_thumb.jpg\" alt=\"t-shirt-1\" width=\"242\" height=\"198\" border=\"0\" \/><\/a><\/p>\n<p>Design 2<\/p>\n<p><a class=\"thickbox\" href=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-2.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; margin: 7px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px; border: 0px;\" title=\"t-shirt-2\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-2_thumb.jpg\" alt=\"t-shirt-2\" width=\"110\" height=\"242\" border=\"0\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>We will announce the winner on September 25th.<\/p>\n<hr \/>\n<h3>And the winner is\u2026<\/h3>\n<h4 align=\"center\">DESIGN 2 - submitted by TheLightCosine!<\/h4>\n<p>Congratulations, see you at Derbycon !<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>September is going to be a busy month. <\/p>\n<p>With Brucon approaching very fast and Derbycon on its way as well, it looks like I will be spending more time at cons than at work \ud83d\ude42<\/p>\n<p>I'll have the pleasure to teach the Corelan Live Exploit Development Bootcamp trainings at Brucon and Derbycon.  If you are a student, make sure to check the prerequisites so we're all set to make the training a success for everyone.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[3733,2339,269],"class_list":["post-7564","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-exploit-development-tutorial","tag-rop","tag-peter-van-eeckhoutte"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Corelan T-Shirt Contest - Derbycon 2011 - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Corelan T-Shirt Contest - Derbycon 2011 - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"September is going to be a busy month.  With Brucon approaching very fast and Derbycon on its way as well, it looks like I will be spending more time at cons than at work :) I&#039;ll have the pleasure to teach the Corelan Live Exploit Development Bootcamp trainings at Brucon and Derbycon. If you are a student, make sure to check the prerequisites so we&#039;re all set to make the training a success for everyone.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2011-09-14T19:17:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-1_thumb.jpg\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Corelan T-Shirt Contest - Derbycon 2011\",\"datePublished\":\"2011-09-14T19:17:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/\"},\"wordCount\":426,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2011\\\/09\\\/t-shirt-1_thumb.jpg\",\"keywords\":[\"exploit development tutorial\",\"rop\",\"Peter Van Eeckhoutte\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/\",\"name\":\"Corelan T-Shirt Contest - Derbycon 2011 - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2011\\\/09\\\/t-shirt-1_thumb.jpg\",\"datePublished\":\"2011-09-14T19:17:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2011\\\/09\\\/t-shirt-1_thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2011\\\/09\\\/t-shirt-1_thumb.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/09\\\/14\\\/corelan-t-shirt-contest-derbycon-2011\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Corelan T-Shirt Contest &#8211; Derbycon 2011\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Corelan T-Shirt Contest - Derbycon 2011 - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/","og_locale":"en_US","og_type":"article","og_title":"Corelan T-Shirt Contest - Derbycon 2011 - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"September is going to be a busy month.  With Brucon approaching very fast and Derbycon on its way as well, it looks like I will be spending more time at cons than at work :) I'll have the pleasure to teach the Corelan Live Exploit Development Bootcamp trainings at Brucon and Derbycon. If you are a student, make sure to check the prerequisites so we're all set to make the training a success for everyone.","og_url":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2011-09-14T19:17:52+00:00","og_image":[{"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-1_thumb.jpg","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Corelan T-Shirt Contest - Derbycon 2011","datePublished":"2011-09-14T19:17:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/"},"wordCount":426,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-1_thumb.jpg","keywords":["exploit development tutorial","rop","Peter Van Eeckhoutte"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/","url":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/","name":"Corelan T-Shirt Contest - Derbycon 2011 - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-1_thumb.jpg","datePublished":"2011-09-14T19:17:52+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-1_thumb.jpg","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2011\/09\/t-shirt-1_thumb.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2011\/09\/14\/corelan-t-shirt-contest-derbycon-2011\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Corelan T-Shirt Contest &#8211; Derbycon 2011"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":2246,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/7564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=7564"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/7564\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=7564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=7564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=7564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}