Free Access Now: Ruby Security Field Guide

Ruby is vulnerable. Learn how to avoid introducing its vulnerabilities into your projects, and secure popular open source software built on the language.


Advanced technical training for security researchers, incident response handlers and exploit developers. Our hands-on workshops give your staff the skills to understand how modern attacks are developed and performed.

Our trainings are scheduled once enough people have indicated their interest in taking one. Fill out the form below if you are interested in taking a training offered by Trail of Bits.

Available Trainings Course Length Register
Windows Browser Exploitation (“Assured Exploitation”) 2, 3 or 5 days Waiting List

I’m interested in a training with Trail of Bits!

If you would like to schedule a private training for your company or have any questions about the courses, please contact Receive announcements about our upcoming trainings by subscribing to our announcement list. If you would like to request help from your company to attend a training, we can help you get started.

Assured Exploitation

Many security professionals have experience with stack overflows and heap spraying, but these techniques are rarely sufficient when applied to modern systems. Reliable exploitation on Vista and Windows 7 systems requires advanced techniques such as heap layout manipulation, return oriented programming and ASLR information leaks. This two-day intensive course focuses on teaching the principles behind these advanced techniques and will give the students hands-on experience with real-world exploits.

Assured Exploitation is delivered by the security research team at Trail of Bits.