Writing and understanding a buffer overflow payloads
Utilizing a buffer overflow payloads to override pointers
Leveraging a UAF vulnerability to manipulate heap allocation
Exploiting a site that only accepts PNG files
Easy format string vulnerability
Writing and understanding a format string payloads
Abusing environment variables