Exploit Development: Swimming In The (Kernel) Pool - Leveraging Pool Vulnerabilities From Low-Integrity Exploits, Part 1&2

https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-1/

https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-2/