I really like these super detailed exploit breakdowns, and how they touch on circumventing the mitigations (largely because I wish people would understand that mitigations are just that - they make it harder to exploit a bug, not impossible).<p>Obviously ASLR specifically is pretty weak these days, but the idea is the same (and also it’s still important - this is very much along the lines of “I have seatbelts why do I need airbags”