Skip to content
Avatar

Achievements

Achievements

Organizations

@doar-e
Block or Report

Block or report 0vercl0k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0vercl0k/README.md

Hello, world 👋

If you made it all the way here, you might as well check out a few of my projects as well as where I blog 😊:

Browser exploitation

Windows related

  • wtf: A distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows,
  • windbg-scripts: A collection of JavaScript debugger extensions for WinDbg,
  • kdmp-parser: A Windows kernel dump C++ parser with Python 3 bindings,
  • 🔮 clairvoyance: Visualize the virtual address space of a Windows process on a Hilbert curve,
  • symbolizer: A fast execution trace symbolizer for Windows,
  • sic: Enumerate user mode shared memory mappings on Windows,
  • pywinhv: Toy Python bindings for the Microsoft Hypervisor Platform APIs,
  • lockmem: Lock every available memory regions of an arbitrary process into its working set,
  • CVE-2021-24086: PoC for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely,
  • CVE-2021-31166: PoC for CVE-2021-31166, a use-after-free in http.sys triggered remotely,
  • CVE-2021-28476: PoC for CVE-2021-28476, a guest-to-host "Hyper-V Remote Code Execution Vulnerability",
  • CVE-2021-32537: PoC for CVE-2021-32537, an out-of-bounds memory access that leads to pool corruption in the Windows kernel,
  • Modern Debugging with WinDbg Preview: Workshop that @hugsy and I ran during Defcon 27.

Misc

Popular repositories

  1. rp Public

    rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested on several OS: Debian / Windows 8.1 / Mac OSX Lion (10.7.3).…

    C++ 1k 200

  2. Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.

    Python 783 130

  3. wtf Public

    wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.

    C++ 733 51

  4. Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.

    JavaScript 595 83

  5. stuffz Public

    Basically a script thrift shop

    Python 550 129

  6. A repository to store Z3-python scripts you can use as examples, reminders, whatever.

    Python 232 28

226 contributions in the last year

Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Mon Wed Fri
Activity overview
Contributed to 0vercl0k/wtf, 0vercl0k/teesee-calc, 0vercl0k/clairvoyance and 5 other repositories

Contribution activity

November 2021

Created 1 commit in 1 repository
Opened 2 pull requests in 1 repository
Opened 1 issue in 1 repository
0vercl0k/wtf 1 open

Seeing something unexpected? Take a look at the GitHub profile guide.