Learn about Reverse engineering and Binary Exploitation:
https://medium.com/swlh/intro-to-reverse-engineering-45b38370384
https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9
https://blog.usejournal.com/binary-exploitation-buffer-overflows-a9dc63e8b546
https://blog.usejournal.com/binary-exploitation-buffer-overread-c8561e7c47f1
https://medium.com/swlh/binary-exploitation-format-string-vulnerabilities-70edd501c5be
https://medium.com/swlh/binary-exploitation-data-execution-prevention-cc47edf2033b
https://medium.com/swlh/binary-exploitation-attacking-dynamic-linking-57d00ae56a83
https://medium.com/swlh/intro-to-reverse-engineering-45b38370384
https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9
https://blog.usejournal.com/binary-exploitation-buffer-overflows-a9dc63e8b546
https://blog.usejournal.com/binary-exploitation-buffer-overread-c8561e7c47f1
https://medium.com/swlh/binary-exploitation-format-string-vulnerabilities-70edd501c5be
https://medium.com/swlh/binary-exploitation-data-execution-prevention-cc47edf2033b
https://medium.com/swlh/binary-exploitation-attacking-dynamic-linking-57d00ae56a83
Medium
Intro to Reverse Engineering
Analyzing and Hacking Binaries with Ghidra.
Diving into PHP unserialize vulnerabilities:
https://medium.com/swlh/exploiting-php-deserialization-56d71f03282a
https://medium.com/swlh/php-type-juggling-vulnerabilities-3e28c4ed5c09
https://medium.com/swlh/diving-into-unserialize-3586c1ec97e
https://medium.com/@vickieli/diving-into-unserialize-pop-chains-35bc1141b69a
https://medium.com/swlh/diving-into-unserialize-more-than-rce-d48d371db7da
https://medium.com/swlh/diving-into-unserialize-magic-methods-386d41c1b16a
https://blog.usejournal.com/diving-into-unserialize-phar-deserialization-98b1254380e9
https://medium.com/swlh/exploiting-php-deserialization-56d71f03282a
https://medium.com/swlh/php-type-juggling-vulnerabilities-3e28c4ed5c09
https://medium.com/swlh/diving-into-unserialize-3586c1ec97e
https://medium.com/@vickieli/diving-into-unserialize-pop-chains-35bc1141b69a
https://medium.com/swlh/diving-into-unserialize-more-than-rce-d48d371db7da
https://medium.com/swlh/diving-into-unserialize-magic-methods-386d41c1b16a
https://blog.usejournal.com/diving-into-unserialize-phar-deserialization-98b1254380e9
Medium
Exploiting PHP deserialization
Intro to PHP object injection vulnerabilities