Skip to content
Avatar

Achievements

Achievements

Organizations

@doar-e
Block or Report

Block or report 0vercl0k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0vercl0k/README.md

Hello, world 👋

If you made it all the way here, you might as well check out a few of my projects as well as where I blog 😊:

Browser exploitation

Windows related

  • wtf: A distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows,
  • windbg-scripts: A collection of JavaScript debugger extensions for WinDbg,
  • kdmp-parser: A Windows kernel dump C++ parser with Python 3 bindings,
  • 🔮 clairvoyance: Visualize the virtual address space of a Windows process on a Hilbert curve,
  • symbolizer: A fast execution trace symbolizer for Windows,
  • sic: Enumerate user mode shared memory mappings on Windows,
  • pywinhv: Toy Python bindings for the Microsoft Hypervisor Platform APIs,
  • lockmem: Lock every available memory regions of an arbitrary process into its working set,
  • CVE-2021-24086: PoC for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely,
  • CVE-2021-31166: PoC for CVE-2021-31166, a use-after-free in http.sys triggered remotely,
  • CVE-2021-28476: PoC for CVE-2021-28476, a guest-to-host "Hyper-V Remote Code Execution Vulnerability",
  • CVE-2021-32537: PoC for CVE-2021-32537, an out-of-bounds memory access that leads to pool corruption in the Windows kernel,
  • Modern Debugging with WinDbg Preview: Workshop that @hugsy and I ran during Defcon 27.

Misc

Popular repositories

  1. rp Public

    rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM binaries.

    C++ 1.2k 219

  2. Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.

    Python 804 131

  3. wtf Public

    wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.

    C++ 797 57

  4. Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.

    JavaScript 598 83

  5. stuffz Public

    Basically a script thrift shop

    C 553 131

  6. A repository to store Z3-python scripts you can use as examples, reminders, whatever.

    Python 237 29

230 contributions in the last year

Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Mon Wed Fri
Activity overview
Contributed to 0vercl0k/wtf, 0vercl0k/teesee-calc, doar-e/doar-e.github.io and 5 other repositories

Contribution activity

January 2022

Opened 2 pull requests in 2 repositories
0vercl0k/wtf 1 merged
0vercl0k/rp 1 merged

Created an issue in BeaEngine/beaengine that received 2 comments

Off-by-one access in fillRegister

Hello, The following bytes '\x44\x0f\xf8\x41\x8b' (disassembled as psubb mm0,mmword ptr [rcx-75h] by windbg) triggers an off-by-one in the Register…

2 comments
Opened 1 other issue in 1 repository
BeaEngine/beaengine 1 open

Seeing something unexpected? Take a look at the GitHub profile guide.