Searching protocol for "gadget chain"
Map bug-to-bug relationships for chaining.
Exploit Java deserialization vulnerabilities.
Exploit PHP deserialization vulns.
Exploit deserialization and XXE flaws.
Secure deserialization, prevent RCE.
Plan and execute CTF exploit strategies.