Skip to content
Avatar

Achievements

Achievements

Organizations

@doar-e
Block or Report

Block or report 0vercl0k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0vercl0k/README.md

Hello, world 👋

If you made it all the way here, you might as well check out some of my projects and where I blog 😊. Oh, and if you want to say hi, come hangout on the Diary of a reverse-engineer's discord: invite!

Windows related

  • wtf: A distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows,
  • windbg-scripts: A collection of JavaScript debugger extensions for WinDbg,
  • kdmp-parser / udmp-parser: C++ libraries to parse Windows kernel and usermode dumps,
  • 🔮 clairvoyance: Visualize the virtual address space of a Windows process on a Hilbert curve,
  • symbolizer: A fast execution trace symbolizer for Windows,
  • SiC: Enumerate user mode shared memory mappings on Windows,
  • CVE-2021-24086: PoC for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely,
  • CVE-2021-31166: PoC for CVE-2021-31166, a use-after-free in http.sys triggered remotely,
  • CVE-2021-28476: PoC for CVE-2021-28476, a guest-to-host "Hyper-V Remote Code Execution Vulnerability",
  • CVE-2021-32537: PoC for CVE-2021-32537, an out-of-bounds memory access that leads to pool corruption in the Windows kernel,
  • CVE-2022-28281: PoC for CVE-2022-28281, a Mozilla Firefox Out of bounds write,
  • Modern Debugging with WinDbg Preview: Workshop that @hugsy and I ran during Defcon 27.

Exploitation

  • Longue vue: Over-the-web remote compromise exploit chain for NETGEAR DGND3700v2 devices,
  • Zenith: Remote kernel exploit for the TP-Link AC1750 Smart Wi-Fi Router (Pwn2Own Austin 2021),
  • CVE-2019-11708: Full chain for CVE-2019-11708 & CVE-2019-9810,
  • CVE-2019-9810: RCE exploit for Firefox on Windows.

Misc

Popular repositories

  1. rp Public

    rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM binaries.

    C++ 1.3k 221

  2. wtf Public

    wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.

    C++ 874 67

  3. Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.

    Python 813 137

  4. Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.

    JavaScript 598 83

  5. stuffz Public

    Basically a script thrift shop

    C 561 133

  6. PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"

    Rich Text Format 266 58

266 contributions in the last year

May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr Mon Wed Fri
Activity overview
Contributed to 0vercl0k/wtf, 0vercl0k/rp, 0vercl0k/zenith and 5 other repositories

Contribution activity

April 2022

Created 1 repository
Reviewed 1 pull request in 1 repository
0vercl0k/wtf 1 pull request
5 contributions in private repositories Apr 23 – Apr 24

Seeing something unexpected? Take a look at the GitHub profile guide.