This is a pretty easy retired HackTheBox machine that you should try out! It has a straight forward exploitation path.
This a post regarding Inversion of Control, particularly Dependency Injection.
In this post I discuss some ideas I've had and captured from my little experience in this hard topic.
This is a somewhat easy/a bit intermediate machine perfect to practice a certain OWASP Top 10 vulnerability. Try it out yourself! Machine link: https://www.vulnhub.com/entry/temple-of-doom-1,243/
If you're into game hacking then you probably have already heard the terms "Internal" and "External" hacks.
In this post I will go over the differences of each with code examples and which to opt for when hacking.