Exploiting a site that only accepts PNG files
Easy format string vulnerability
Writing and understanding a format string payloads
Abusing environment variables
Exploiting JSON Web Tokens
Exploiting a simple number search binary game