My 4 part series after completing OSED training:
- First 2 parts are merely failed attempts.. Was fooling around with known vulnerable apps and trying to get it myself
- Last 2 parts are an intentionally vulnerable app made by one of the OSED student at that time.