1. ARM. 2019. Procedure Call Standard for the Arm® 64-bit Architecture. https://developer.arm.com/documentation/102374/0100/Procedure-Call-Standard. Accessed: May 9, 2023.
2. Exercises for teaching reverse engineering
3. Niklas B. 2015. libc-database: a collection of libc versions and corresponding offsets to be used in exploit development. https://github.com/niklasb/libc-database. Accessed: May 9, 2023.
4. Benjamin Levy. Year. pwninit: A tool for automating starting binary exploit challenges. hhttps://github.com/io12/pwninit. Accessed: December 10, 2023.
5. Hacking Blind