New subscription options!     Learn more


Go beyond buffer overflows in Windows User Mode Exploit Development.

Now enjoy more flexibility and go at your own pace with a Learn subscription

Earn your OSED


About EXP-301 | Buying Options | Course info | Testimonials | Details | Pricing

Windows User Mode Exploit Development (EXP-301)

Windows User Mode Exploit Development

Windows User Mode Exploit Development (EXP-301) is an intermediate-level course which teaches students the fundamentals of modern exploit development. It starts with basic buffer overflow attacks and builds into learning the skills needed to crack the critical security mitigations protecting enterprises.

Students who loved buffer overflows in Penetration Testing with Kali Linux (PEN-200) will find that EXP-301 takes those skills to the next level. This course is one of the replacements for Cracking the Perimeter (CTP), which we retired on October 15, 2020.

Those who complete the course and pass the 48-hour exam earn the Offensive Security Exploit Developer (OSED) certification. The OSED is one of three certifications making up the new OSCE3 certification, along with the OSWE for web application security and the OSEP for penetration testing.

How to buy EXP-301

Individual Course


  • 90 days of lab access
  • One exam attempt
  • Self-guided

Learn One


  • One course
  • 365 days of lab access
  • Two exam attempts
  • Plus exclusive content

Learn Unlimited


  • All online courses*
  • 365 days of lab access
  • Unlimited exam attempts
  • Plus exclusive content
* You could qualify for a discount with Aspire and Achieve
* AWE (EXP-401) is only taught in live classes.
* Financing for Learn One now available through Climb Credit with as little as 0% APR and up to 36 monthly payments.
Payment as low as $65.76 a month. Only available to US students. Learn More.

Course Info


Students will:

  • Learn the fundamentals of reverse engineering
  • Create custom exploits
  • Develop the skills to bypass security mitigations
  • Write handmade Windows shellcode
  • Adapt older techniques to more modern versions of Windows

About the exam


Who is the course for?

  • Windows User Mode Exploit Development is an intermediate course designed for those who want to learn about exploit development skills
  • Job roles like penetration testers, exploit developers, security researchers, Malware analysts, and software developers working on security products, could benefit from the course

Course prerequisites

  • Familiarity with debuggers (ImmunityDBG, OllyDBG)
  • Familiarity with basic exploitation concepts on 32-bit
  • Familiarity with writing Python 3 code
  • Ability to read and understand C code at a basic level (optional but recommended)
  • Ability to read and understand 32-bit Assembly code at a basic level (optional but recommended)


Ronald Ocubillo | OSCP, OSCE , CRTO

"I've almost lost my own sanity at this until I popped that shell which barely passed the exam. It was so tough that you have to combine everything that has been taught on the course..."

Ronald Ocubillo | OSCP, OSCE , CRTO

Jorge Giménez Duro | Ethical Hacker at Security Research Labs

"Finally OSED! After 36 hours of no sleep I finally succeed. This is, by far, the most challenging (and fun) exam of Offensive Security I have done so far, but It was worth the time; the content is extremely well structured :)"

Jorge Giménez Duro | Ethical Hacker at Security Research Labs

Eugene Lim | Cybersecurity Specialist

"This was the hardest exam I've taken so far. It was truly a beast of a challenge but it demonstrated all the hallmarks of the OffSec "Try Harder" rigour. On to the next!"

Eugene Lim | Cybersecurity Specialist

Download Flyer

Course Details


EXP-301 is an intermediate-level exploit development course that serves to build a solid foundation for students wanting to pursue AWE. Topics covered include:

  • WinDbg tutorial
  • Stack buffer overflows
  • Exploiting SEH overflows
  • Intro to IDA Pro
  • Overcoming space restrictions: Egghunters
  • Shellcode from scratch
  • Reverse-engineering bugs
  • Stack overflows and DEP/ASLR bypass
  • Format string specifier attacks
  • Custom ROP chains and ROP payload decoders

View the full syllabus

  • Using WinDbg
  • Writing your own shellcode
  • Bypassing basic security mitigations, including DEP and ASLR
  • Exploiting format string specifiers
  • The necessary foundations for finding bugs in binary applications to create custom exploits


  • 15+ hours of video
  • 600+ page course guide
  • Active student forums
  • Access to virtual lab environment
  • Closed Captioning is available for this course

Course Pricing

All prices in US dollars. Register for Learn One or contact our training consultants if you're purchasing Learn Unlimited.
Discounts may be available for Learn One subscription.