OSEE
Offensive Security Exploitation Expert
Offensive Security Exploitation Expert
› Quality score
Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.
› Market signals
public, citable inputs to the recognition scoreHardest OffSec exam — fewer than 250 holders.
› Built for these roles
› Exam format
Practical: 71 hours 45 min hands-on exam (Advanced Windows Exploitation) + report. Proctored. Hardest OffSec exam.
Retake voucher $249 separately. No wait period beyond exam scheduling availability.
› Recertification
Valid indefinitely. No renewal required.
› NICE Framework work roles
The NIST NICE work-role IDs this cert maps to. NICCS lookup.
› Core domains covered
The 3 domains this cert is centrally about. Passing the exam demonstrates working knowledge of each.
Methodology (OSSTMM, PTES), web/network/mobile pentesting, social engineering, purple teaming.
Static/dynamic analysis, sandbox analysis, assembly/disassembly, packer analysis, YARA rules, malware family classification.
OWASP Top 10, secure SDLC, SAST/DAST/IAST, API security, code review, DevSecOps.
› Prerequisites
No formal prerequisites. EXP-401 course (live training, approx. 5,499 USD). Expertise in exploit dev and reverse engineering required.
› Progression
requiredrecommendedWhere this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.
No vendor-gated prereqs.
No certs require this one.
No follow-on certs reference this one yet.
› Study materials
Curated starting points. Not exhaustive — vet each against your learning style and the current exam version.
- OffSec Proving Grounds Practice
- Corelan Exploit Writing Tutorials
- FuzzySecurity Windows Exploit Dev
› Version & lifecycle
OffSec's most demanding exam. Often pursued after OSED.
› Salary signal
Senior vulnerability researcher / advanced exploit developer, US, 7+ years. Very rare credential.
Robert Half Salary Guide + community salary surveys · 2024 · US base only · p25–p75 range
› How it compares
OSED is user-mode Windows exploit dev; OSEE is the deepest single-domain advanced exam, kernel + bypass focus.
↔ Compare side-by-sideOSEE is laser-focused Windows exploit dev; GXPN is broader pentest + exploit-writing methodology.
↔ Compare side-by-side› Careers that commonly pursue this cert
Dissect malicious software to understand capabilities, extract indicators, and produce attribution. A specialist role that powers threat intelligence, detection engineering, and advanced IR.
See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.