
Jan 16, 2012
Announcing the OSEE Certification
Since the inception of our Advanced Windows Exploitation (AWE) course, our students (who are always searching for more pain) have been asking for an accompanying certification exam. We are very pleased to announce the launch of the Offensive Security Exploit Expert (OSEE) certification.
Since the inception of our Advanced Windows Exploitation (AWE) course, our students (who are always searching for more pain) have been asking for an accompanying certification exam. We are very pleased to announce the launch of the Offensive Security Exploit Expert (OSEE) certification.
The OSEE joins our OSWP, OSCP, and OSCE certifications and fully adheres to the Offensive Security “lack of sleep” standards with its grueling 72-hour time frame in which to develop exploits for specific unknown vulnerabilities in our dedicated certification exam lab.
As our AWE students know all too well, this certification, in keeping with Offensive Security tradition, will not be a walk in the park, but the pain and agony will be well worth it in earning this most difficult of certifications. The OSEE certification exam thoroughly assesses not only the students understanding of the course content, but also their ability to think laterally and adapt to new challenges.
New Certification
All former AWE students are eligible to take the OSEE exam free of charge up until July 30th, 2012. To receive a scheduling link to experience the OSEE challenge, email orders with your OSID.
For those who have not had the pleasure of experiencing AWE, the course covers advanced exploitation techniques such as:
- Egghunters
- DEP and ASLR Bypass
- Custom Shellcode Creation
- Unicode Exploitation
- Windows Kernel Driver Exploitation
- Precision Heap Spraying
For more information, please see the Advanced Windows Exploitation (AWE) Syllabus. If you’d like to take your exploitation skills to the next level and have the opportunity to “enjoy” the unique experience of the OSEE challenge, our next AWE course will be held in St. Kitts this March and seats are still available so Sign-Up today.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-39914 – Unauthenticated Command Injection in FOG Project’s export.php
Discover details about CVE-2024-39914, a critical unauthenticated command injection vulnerability in FOG Project ≤ 1.5.10.34. Learn how attackers can exploit export.php to execute system commands or deploy persistent webshells.
Jun 26, 2025
2 min read

OffSec News
What It Really Means to “Try Harder”
Discover how OffSec’s “Try Harder” mantra evolved into a mindset, and how it helps learners build grit, creativity, and real-world problem-solving skills.
Jun 23, 2025
7 min read

Research & Tutorials
CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage
CVE-2025-3248 is a critical RCE vulnerability in Langflow that allows unauthenticated attackers to execute arbitrary Python code via unsanitized input to exec(). Learn how it works and how to protect your system.
Jun 18, 2025
2 min read