Footnotes
Introduction
0PoC||GTFO 14:06, page 66. Random NOPs in ARM.
1PoC||GTFO 15:02, page 152. Reversing Pier Solar.
2PoC||GTFO 15:08, page 308. Userland Networking in Masscan.
3PoC||GTFO 17:09, page 620. Infect to Protect.
4PoC||GTFO 15:09, page 332. Detecting MIPS16 Emulation.
5PoC||GTFO 15:05, page 182. RISC-V Shellcode.
6PoC||GTFO 16:11, page 486. Rescuing Orphans in Thumb2.
7PoC||GTFO 15:06, page 199. Cracking Gumball.
8PoC||GTFO 17:08, page 584. Murder on the USS Table.
9PoC||GTFO 18:07, page 717. Remotely Exploiting Tetrinet.
10PoC||GTFO 16:08, page 468. Naming Network Interfaces.
11PoC||GTFO 16:10, page 479. Stack Return Addresses from Canaries.
12PoC||GTFO 16:06, page 424. The Adventure of the Fragmented Chunks.
13PoC||GTFO 16:03, ...
Get PoC or GTFO, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.