I wrote a small, hands-on 'Arm Learning Path' on how to build a very basic exploit starting from a stack buffer overflow on AArch64, see https://learn.arm.com/learning-paths/servers-and-cloud-computing/exploiting-stack-buffer-overflow-aarch64/.
I'd like to hear what you think about it. It aims to help you understand a very basic exploitation technique, without having to know much about very low-level programming.
I'm hoping it will help to better understand other, more advanced, documents explaining exploits that (ab)use memory vulnerabilities, such as https://llsoftsec.github.io/llsoftsecbook/#memory-vulnerability-based-attacks.
Learn how to exploit stack buffer overflows on AArch64

This is an advanced topic for software developers interested in understanding how memory vulnerability-based exploits work on AArch64.