This post discusses what an arbitrary overwrite (or write-what-where) vulnerability is and how it can be exploited.
Null page dereference vulnerabilities, what they are, how to exploit them and how they're mitigated.
Part 5 discusses a common vulnerability class called integer overflow.
Building up on part 3, this post shows how exploitation is done on a Windows 10 machine with SMEP enabled.
Demonstrates the exploit development phases of a stack buffer overflow in kernel on Windows 7 x86 and x64
Discusses payloads to be used in upcoming posts
Discusses configuring the target VMs, loading the vulnerable driver and configuring WinDBG.
Writeup for Don't net, kids!
Writeup for Buggy Bot!
Walkthroughs for Pwnable.kr challenge (flag)