MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

Windows Exploit Development Megaprimer

Course Summary

Learn how to write reliable exploits.

  • +

    Course Syllabus

    • Basics
      • Buffer Overflow Explained
    • Exploiting Buffer Overflows
      • Vanilla EIP Overwrite
      • Exploiting Vanilla EIP Overwrite
      • Eliminating Bad Character in your Exploit
      • Exploiting Buffer Overflow : Structured Exception Handler (SEH) Overwrite
    • Exploit Development with
      • - The Exploit Writer's Swiss Army Knife
      • - Continuation
      • Converting Exploits to Metasploit Modules with
    • Advanced Exploit Development in Windows
      • Unicode Based Exploit Development Introduction
      • Unicode Based Exploit Development Continuation
      • Unicode Based Exploit Development Final Thoughts
      • Egg Hunter Basics
      • Writing an Exploit using Egg Hunter
      • Data Execution Prevention (DEP) Basics
      • Bypassing Data Execution Prevention (DEP) using ROP Chains

Course Fee:
USD 99

Course Type:


Course Status:



1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top