Skip to content
View 0xCZR1's full-sized avatar
🏴‍☠️
Strawhats
🏴‍☠️
Strawhats

Block or report 0xCZR1

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xCZR1/readme.md

0xCZR1

Penetration Tester | Security Researcher | Malware Development

About

Penetration tester specializing in IT systems with occasional red team engagements. Member of Zero Infinity Lab, an independent security research team.

Certifications & Achievements

  • HTB Certified Penetration Testing Specialist (CPTS)
  • Hack The Box Holo Rank (Top ~700)

Security Research

CVE Severity Product Description
CVE-2026-22783 High DFIR-IRIS Arbitrary File Deletion via Mass Assignment
CVE-2026-XXXXX TBD Under Embargo 8 additional vulnerabilities pending disclosure

Current Focus

  • Windows internals & NT API
  • Rust for offensive tooling
  • AV/EDR evasion research

Pinned Loading

  1. PoC-Cups-RCE-CVE-exploit-chain PoC-Cups-RCE-CVE-exploit-chain Public

    Python 4 1

  2. CVE-2019-0232-POC CVE-2019-0232-POC Public

    Forked from jaiguptanick/CVE-2019-0232

    Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)

    Python

  3. cve-2025-49144 cve-2025-49144 Public

    Notepad++ Privilege Escalation

  4. my_kit my_kit Public

    malware stuff

  5. 0xCZR1 0xCZR1 Public

    Profile