From A Minor Bug To Zero Day - Exploit Development
While searching on Youtube related to buffer overflow vulnerabilities, I came across an excellent presentation by Math Ahroni on Defcon which explains the complete life cycle of the exploit development, from a simple bug to a Zero day, The presentation explains the whole process of exploit development from the process of fuzzing, location a bug, use of egg hunters etc.
The vulnerability explained in this presentation at Defcon is a HP NNM buffer overflow exploit, however it's not as easy as it looks at first, The author had to go in lots of pain and complications in order to make this exploit working.