I share my structured notes here so someone might find it helpful.
A concise, hands-on walkthrough of stack buffer overflows, modern exploitation patterns, and the defenses that shape them.