Corelan Exclusive - Limited Enrollment

Corelan HEAP Exploit Development Masterclass

A fast-paced, mind-bending, hands-on course that dives deep into Windows 7 and Windows 11 heap manipulation, built and taught by the Corelan team for exploit developers ready for the next step.

EUR 3,700 tuition + 21% tax - EUR 4,477 total investment for the Corelan "HEAP" Masterclass.

4-5 days of live, hands-on exploitation Windows 7 & Windows 11 heap internals Lifetime post-training support

Inside the Corelan HEAP Masterclass

Evidence-based training for exploit developers who want the real story.
Built for hackers ready to suffer & bleed (in the best way possible)
Windows internals

Heap anatomy on Win7 & Win11

Understand the NT and Segment heaps, front-end vs back-end allocators, and the mitigations that make Windows 11 so different from Windows 7.

Terminology & building blocks Mitigation deep dives
Exploit development

Advanced heap primitives

Use-After-Free, linear & non-linear overflows, Memorigami predictive folding, dynamic heap tracing, and the techniques Corelan uses to build reliable exploits.

Heap Feng Shui Windows 11 primitives
Tooling & research

WinDBG classic & WinDBGX

Symbols, breakpoints, logging workflows and how to explore heap data structures yourself so you can validate every claim through evidence-based learning.

Dynamic tracing Hands-on labs
x64 uplift

Intro to x64 exploitation

From memory maps to calling conventions, learn how to adapt your stack and heap exploitation techniques and craft ROP chains for modern 64-bit targets.

Registers & calling conventions ROP chain mastery
Research mindset

Evidence-based learning

Learn how to ask the right questions, approach fuzzing and bug hunting in complex apps, and document heap allocator primitives so you can continue your own research.

Critical thinking Bug hunting workflow
Who it's for

Exploit devs ready for more

Red teamers, malware researchers, SOC analysts, DFIR pros, and anyone who already masters ROP and wants to push beyond return-pointer overwrites.

Stack course alumni Serious practitioners