Learn how you can exploit BOF applications on Linux Operating system including the debugging tools and methods.
Experiment the art of exploiting windows based applications along with discovering handy tools and scripts can help you the exploitation process.
Learn about the techniques and methods of exploiting applications with memory restrictions enabled and the bypassing techniques including ROP stuff.
CTF writeups for Hackthebox and Vulnhub.
Learn how you can create your own fuzzing scripts using python and some advanced topics in forensics and exploit development.
Learn how you can create powerful shellcodes automatically and manually along with bypassing anti-viruses.