A forum for reverse engineering, OS internals and malware analysis 

Discussion on reverse-engineering and debugging.
 #30211  by hyppocrite
 Fri Apr 07, 2017 6:13 am
There is a long list of literature on the subject, both online and in paper.

One of my favourite introductions to memory corruption including buffer overflows is the 2nd edition of "Art of exploitation".
However, this book takes a linux perspective on exploitation, if you would a more thorough analysis on exploitation on the Windows platform I would suggest the 2nd edition of the shellcoders handbook.