
Dec 8, 2022
EXP-301: Windows User Mode Exploit Development Guide
Explore the free guide to learn more about the Windows User Mode Exploit Development (EXP-301) course.
About the course
Windows User Mode Exploit Development (EXP-301) is an intermediate-level course which teaches students the fundamentals of modern exploit development.
It starts with basic buffer overflow attacks and builds into learning the skills needed to crack the critical security mitigations protecting enterprises. Those who complete the course and pass the 48-hour exam earn the Offensive Security Exploit Developer (OSED) certification.
Course Topics
- Exploiting SEH overflows
- Overcoming space restrictions: Egghunters
- Shellcode from scratch
- Reverse-engineering bugs
- Stack overflows and DEP/ASLR bypass
- Format string specifier attacks
- Custom ROP chains and ROP payload decoders
Student Reviews
“w00tw00t!! I’ve almost lost my own sanity at this until I popped that shell which barely passed the exam. It was so tough that you have to combine everything that has been taught on the course: stack/SEH overflow, reverse engineering, custom shellcode, egghunter, ASLR/DEP bypass, and custom ROP chain. Overall, that was a hell of a challenge that kept me awake for 48 hours with almost no sleep but it’s all worth it. Thank you OffSec and I’ll be seeing you again for the next couple of weeks for the OSEP exam.”
– Ronald Ocubillo | OSCP, OSCE , CRTO
“ Finally OSED! After 36 hours of no sleep, I finally succeeded. This is, by far, the most challenging (and fun) exam of OffSec I have done so far, but It was worth the time; the content is extremely well structured :)”
– Jorge Giménez Duro | Ethical Hacker at Security Research Labs
“I’m delighted to pass the Offensive Security Exploit Development course, and in so doing, achieved the Offensive Security Certified Expert (OSCE3)! OSCE3 holders must have passed all three of Offensive Security’s 300-level courses: Windows User Mode Exploit Development (EXP-301), Evasion Techniques and Breaching Defenses (PEN-300), and Advanced Web Attacks and Exploitation (WEB-300). This was the hardest exam I’ve taken so far. It was truly a beast of a challenge but it demonstrated all the hallmarks of the OffSec “try harder” rigor. On to the next!”
– Eugene Lim | Cybersecurity Specialist
Start your journey with Learn One
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
Jun 5, 2025
2 min read

Insights
OffSec’s Take on the Global Generative AI Adoption Index
Discover OffSec’s take on the latest Global Generative AI Adoption Index report released by AWS.
May 30, 2025
3 min read

Research & Tutorials
CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
A critical remote code execution (RCE) vulnerability in the D-Tale data visualization tool was identified which allowed attackers to execute arbitrary system exams, abusing an exposed API endpoint.
May 29, 2025
2 min read