Become an expert in elite-level exploit development. This intensive course (updated for 2026) focuses on bypassing the most advanced Microsoft security mitigations. You will dive deep into 64-bit Kernel exploitation, VMware guest-to-host escapes and complex heap manipulations. This program is for world class researchers and culminates in a grueling 72 hour practical exam that tests your ability to craft custom exploits from scratch
One-time payment
$999.00
$2499.00
$4099.00
In 2026, the gap between a penetration tester and an exploit developer has widened. The OSEE Certification Training at Namifly prepares you for the highest tier of the offensive security industry. This is not a "scanning" course; it is a deep-dive into assembly, memory corruption, and the internal architecture of the Windows operating system.
Why OSEE is the "Black Belt" of Security in 2026
In an era where AI-driven defenses and advanced EDRs (Endpoint Detection and Response) catch traditional attacks instantly, the only way to remain undetected is to find flaws in the underlying system itself. The 2026 OSEE curriculum focuses on:
Modern Mitigation Bypass: You won't just learn about DEP and ASLR. You will master techniques to defeat Control Flow Guard (CFG), Arbitrary Code Guard (ACG), and Virtualization-Based Security (VBS).
Kernel-Mode Dominance: While most hackers stay in "User Mode," the OSEE takes you into the Windows Kernel (Ring 0). You will learn to exploit drivers and manipulate kernel structures to gain total system control.
Real-World Software Targets: The course uses case studies from high-profile software like Microsoft Edge and VMware Workstation, teaching you how to find "type confusion" and "use-after-free" vulnerabilities in production-grade code.
The Core Mastery Domains (EXP-401)
Advanced Shellcode: Crafting custom, hand-written assembly shellcode that bypasses security filters and avoids detection.
Heap Spraying & Grooming: Precision manipulation of the Windows Heap to place your malicious code exactly where it needs to be.
Sandboxing & Escapes: Identifying weaknesses in application sandboxes (like Chrome or Edge) to break out into the host operating system.
Kernel Driver Exploitation: Writing exploits for Windows drivers by identifying insecure IOCTL (Input/Output Control) handlers.
Bypassing SMEP/SMAP: Learning how to jump between user-mode and kernel-mode memory while bypassing hardware-level protections.
Expand the sections below to see the detailed curriculum for this course.
Instructor information not available.
Course Rating
Rating distribution would be calculated from individual reviews.
No reviews yet for this course.
Find answers to common questions about this course.
It is widely considered the hardest certification in the industry. Unlike the 24-hour OSCP, the OSEE gives you 72 hours of active exploitation time, followed by 24 hours for the report.
Yes. It is strongly recommended that you have already completed the OSED (EXP-301) or have extensive experience in x86/x64 assembly and WinDbg.
Historically, this course was "Live Only" (at BlackHat). However, in 2026, it is available via OffSec's Learn Unlimited and specialized elite training partners like Namifly.
OSEE graduates usually work as Vulnerability Researchers, Exploit Devs, or Senior Red Teamers for governments and top-tier security firms.