Corelan Exploit Development Bootcamp - 4 Days

October 25-28 at Rixos Premium JBR
Course Price: $2,950

What Will I Learn?

The  Corelan Bootcamp teaches both basic & advanced techniques to write   reliable exploits for the Win32 platform. The trainer will share his   “notes from the field” and various tips & tricks to become more  effective at writing exploits.

This hardcore hands-on course will  provide students with a solid understanding of current Win exploitation  techniques and memory protection bypass techniques.

Meet Your Instructor

Peter  Van Eeckhoutte is the founder of Corelan Team and the author of the  well-known tutorials on Win32 Exploit Development Training, available at The team gathers a group of IT Security  enthusiasts and researchers from around the world, who all share common  interests : doing research, gather & share knowledge, and perform  responsible/coordination disclosure. Above all, the team is well known  for their ethics and their dedication to helping other people in the  community. Together with the team, he has developed and published  numerous tools that will assist pentesters and exploit developers, and  published whitepapers/video’s on a wide range of IT Security related  topics (pentesting tools, (malware) reverse engineering, etc).

You can find some of the tools on the Corelan github page:


Students should be:
  • Able to read simple C code and simple scripts
  • Familiar with writing basic scripts using Python/Ruby/…
  • Ready to dive into a debugger and read asm
  • Ready to think out of the box and have a strong desire to learn
  • Fluent with managing Windows / Linux operating system and with using VMWare workstation/Virtualbox
  • Familiar with using Metasploit
  • No prior knowledge of assembly is required, but it will certainly help if you have some basic knowledge

  • In case you’re wondering: if you took OSCP/OSCE, and understood the exploitation part of the courses, then you are probably ready for the course


Students will receive the exact installation instructions after registration, about a week before class begins, so don’t start installling the VMs yet.

Students are required to sign a confidentiality agreement at the start of the course.  You will not be admitted to the course without signing this document.  You can find a copy of the document

Course Curriculum