<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Corelan Certified Exploit Developer</provider_name><provider_url>https://www.corelan-certified.com</provider_url><author_name>corelanc0d3r</author_name><author_url>https://www.corelan-certified.com/index.php/author/admin5/</author_url><title>Exam - Corelan Certified Exploit Developer</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="mfgSydXciO"&gt;&lt;a href="https://www.corelan-certified.com/index.php/exam/"&gt;Exam&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.corelan-certified.com/index.php/exam/embed/#?secret=mfgSydXciO" width="600" height="338" title="&#x201C;Exam&#x201D; &#x2014; Corelan Certified Exploit Developer" data-secret="mfgSydXciO" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.corelan-certified.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>5 phases&nbsp;to becomeCorelan Certified&nbsp; Exploit Developer 1. Theory Demonstrate your theoretical understanding of Windows Memory Management, Memory Corruption types, Exploit Development strategies, etc 2. Write Exploits Demonstrate your practical skills by writing and documenting exploits for&nbsp; Stack &amp; Heap Memory Corruptions, and for implementing various exploit dev related techniques 3. Self-Study We&#x2019;ll give you a &hellip; Continue reading ""</description></oembed>
