App Screenshots

Exploit Writing Certification by the Exploit Pack team.

This two-day Bootcamp introduces both basic and advanced techniques from Juan Sacco of Exploit Pack.

This course is a truly unique opportunity to learn both basic and advanced techniques from an experienced exploit developer. During this course, students will be able to learn all the ins and outs of writing reliable stack-based exploits for the Windows platform. We believe it is important to start the course by explaining the basics of stack buffer overflows and exploit writing, but this is most certainly not “your average” entry-level course. In fact, this is a true bootcamp and one of the finest and most advanced courses you will find on Win32 stack-based exploit development. This hardcore hands-on course will provide students with a solid understanding of current stack-based exploitation techniques and memory protection bypass techniques. We make sure the course material is kept updated with current techniques, includes previously undocumented tricks and techniques, and details about research we performed ourselves. Combined with the way the course is built, this will turn this class into a truly unique experience.
Learn directly from the author of Exploit Pack.

Next available training: May 22-23, 2025 - Live online session
Discounted price for EP users: 850 euros, including exam


Register now
--> Contact us to organize a custom training with your team

The road to get certified:

  • Learn the process of turning a proof-of-concept into a working exploit.
  • Learn how to read and understand existing exploits.
  • Learn how to change an existing exploit that you failed to make it work.
  • Write reliable exploits and integrate them into Exploit Pack.
  • Learn what shellcode is, how Exploit Pack shellcodegenerator works and how to make shellcode work reliably in your exploit.
  • Refresh basic knowledge about win32 exploit development and learn more advanced topics.
  • Understand better how to detect exploits and how to protect against them.
  • Upgrade the basic view on common development mistakes, how to avoid them and how compiler/linker options can help.
  • Refresh basic computer CPU and memory handling architecture.
  • Reverse engineering binaries and practice with crackmes.
  • Learn how a debugger works and compare it with similar tools.
  • Learn over protection mechanisms and how to bypass them.
  • Discover a vulnerability and write a succesfull exploit by your own.
  • Take the final exam and get yourself certified.



App Screenshots

Trusted by technical teams at companies of all sizes around the globe

Author image

What the community says about Exploit Pack:

"Penetration testing has a lot of repeating tasks, especially when doing similar assignments for clients. For this reason, tools like Exploit Pack help with automating repeating activities. This framework contains over 38.000 exploits, probably much more than one might ever need." - linuxsecurity.expert