I wrote a small, hands-on 'Arm Learning Path' on how to build a very basic exploit starting from a stack buffer overflow on AArch64, see
https://learn.arm.com/learning-paths/servers-and-cloud-computing/exploiting-stack-buffer-overflow-aarch64/.
I'd like to hear what you think about it. It aims to help you understand a very basic exploitation technique, without having to know much about very low-level programming.
I'm hoping it will help to better understand other, more advanced, documents explaining exploits that (ab)use memory vulnerabilities, such as
https://llsoftsec.github.io/llsoftsecbook/#memory-vulnerability-based-attacks.