Footnotes

Introduction

0PoC||GTFO 14:06, page 66. Random NOPs in ARM.

1PoC||GTFO 15:02, page 152. Reversing Pier Solar.

2PoC||GTFO 15:08, page 308. Userland Networking in Masscan.

3PoC||GTFO 17:09, page 620. Infect to Protect.

4PoC||GTFO 15:09, page 332. Detecting MIPS16 Emulation.

5PoC||GTFO 15:05, page 182. RISC-V Shellcode.

6PoC||GTFO 16:11, page 486. Rescuing Orphans in Thumb2.

7PoC||GTFO 15:06, page 199. Cracking Gumball.

8PoC||GTFO 17:08, page 584. Murder on the USS Table.

9PoC||GTFO 18:07, page 717. Remotely Exploiting Tetrinet.

10PoC||GTFO 16:08, page 468. Naming Network Interfaces.

11PoC||GTFO 16:10, page 479. Stack Return Addresses from Canaries.

12PoC||GTFO 16:06, page 424. The Adventure of the Fragmented Chunks.

13PoC||GTFO 16:03, ...

Get PoC or GTFO, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.