RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
https://github.com/DarkSpaceSecurity/RunAs-Stealer
https://github.com/DarkSpaceSecurity/RunAs-Stealer
GitHub
GitHub - DarkSpaceSecurity/RunAs-Stealer: RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW…
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging - DarkSpaceSecurity/RunAs-Stealer
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
https://github.com/BlackSnufkin/LitterBox
https://github.com/BlackSnufkin/LitterBox
GitHub
GitHub - BlackSnufkin/LitterBox: A secure sandbox environment for malware developers and red teamers to test payloads against detection…
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil...
KrbRelayEx-RPC is a tool similar to my KrbRelayEx designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets.
Listens for authenticated ISystemActivator requests and extracts the AP-REQ tickets
Extracts dynamic port bindings from EPMAPPER/OXID resolutions
Relay the AP-REQ to access SMB shares or HTTP ADCS (Active Directory Certificate Services) on behalf of the victim
Forwards the victim's requests dynamically and transparently to the real destination RPC/DCOM application so the victim is unaware that their requests are being intercepted and relayed
https://github.com/decoder-it/KrbRelayEx-RPC
Listens for authenticated ISystemActivator requests and extracts the AP-REQ tickets
Extracts dynamic port bindings from EPMAPPER/OXID resolutions
Relay the AP-REQ to access SMB shares or HTTP ADCS (Active Directory Certificate Services) on behalf of the victim
Forwards the victim's requests dynamically and transparently to the real destination RPC/DCOM application so the victim is unaware that their requests are being intercepted and relayed
https://github.com/decoder-it/KrbRelayEx-RPC
GitHub
GitHub - decoder-it/KrbRelayEx-RPC
Contribute to decoder-it/KrbRelayEx-RPC development by creating an account on GitHub.
CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
https://cti.monster/blog/2025/03/18/CVE-2025-24071.html
https://github.com/0x6rss/CVE-2025-24071_PoC
https://cti.monster/blog/2025/03/18/CVE-2025-24071.html
https://github.com/0x6rss/CVE-2025-24071_PoC
0x6rss
CVE-2025-24071: NTLM Hash Leak
Technical explanation of NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
Apache Tomcat (CVE-2025-24813)
https://github.com/iSee857/CVE-2025-24813-PoC/tree/main
https://github.com/iSee857/CVE-2025-24813-PoC/tree/main
GitHub
GitHub - iSee857/CVE-2025-24813-PoC: Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)
Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813). Contribute to iSee857/CVE-2025-24813-PoC development by creating an account on GitHub.
UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.
https://github.com/tclahr/uac
https://github.com/tclahr/uac
GitHub
GitHub - tclahr/uac: UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts…
UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of U...
Experience the next level of tunneling with the new Ligolo-ng GUI version, designed to make your operations more seamless and efficient:
✅ Automatic TUN Management – Streamline tunnel setup without manual configuration.
✅ Unlimited Concurrent Relays – Handle multiple relays simultaneously without limitations.
✅ SOCKS and HTTP Proxy Support – Flexible proxying options to adapt to various network conditions.
✅ Loopback Routing to Target Machine – Directly route to the target's loopback without needing port forwarding.
✅ Independent Listeners as Redirectors – Create separate, adaptable listeners for greater control.
✅ Dynamic mTLS-Enabled Agent Generation – Generate obfuscated agent binaries on the fly with mTLS support.
✅ Simplified Certificate Management – Easy-to-manage certificates for secure communication.
✅ Intuitive Terminal-Based GUI – Clean and user-friendly interface for better command and control.
https://github.com/ttpreport/ligolo-mp
✅ Automatic TUN Management – Streamline tunnel setup without manual configuration.
✅ Unlimited Concurrent Relays – Handle multiple relays simultaneously without limitations.
✅ SOCKS and HTTP Proxy Support – Flexible proxying options to adapt to various network conditions.
✅ Loopback Routing to Target Machine – Directly route to the target's loopback without needing port forwarding.
✅ Independent Listeners as Redirectors – Create separate, adaptable listeners for greater control.
✅ Dynamic mTLS-Enabled Agent Generation – Generate obfuscated agent binaries on the fly with mTLS support.
✅ Simplified Certificate Management – Easy-to-manage certificates for secure communication.
✅ Intuitive Terminal-Based GUI – Clean and user-friendly interface for better command and control.
https://github.com/ttpreport/ligolo-mp
ghidraMCP is an Model Context Protocol server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients.
https://github.com/LaurieWired/GhidraMCP
https://github.com/LaurieWired/GhidraMCP
IDA Pro MCP
https://github.com/mrexodia/ida-pro-mcp
sample crackme:
https://github.com/NoraCodes/crackmes
https://github.com/mrexodia/ida-pro-mcp
sample crackme:
https://github.com/NoraCodes/crackmes
GitHub
GitHub - mrexodia/ida-pro-mcp: AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP. - mrexodia/ida-pro-mcp
Forwarded from SoheilSec (Soheil)
RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS.
https://www.ibm.com/think/x-force/remotemonologue-weaponizing-dcom-ntlm-authentication-coercions#1
https://github.com/xforcered/RemoteMonologue
https://www.ibm.com/think/x-force/remotemonologue-weaponizing-dcom-ntlm-authentication-coercions#1
https://github.com/xforcered/RemoteMonologue
Ibm
RemoteMonologue: Weaponizing DCOM for NTLM authentication coercions | IBM
The IBM X-Force Red team covers the fundamentals of COM and DCOM, dives into the RunAs setting and why authentication coercions are impactful and introduces a new credential harvesting tool.
Impersonate Tokens using only NTAPI functions
https://github.com/ricardojoserf/NativeTokenImpersonate
https://github.com/ricardojoserf/NativeTokenImpersonate
GitHub
GitHub - ricardojoserf/NativeTokenImpersonate: Impersonate Tokens using only NTAPI functions
Impersonate Tokens using only NTAPI functions. Contribute to ricardojoserf/NativeTokenImpersonate development by creating an account on GitHub.
A new Mythic service container that allows you to auto-populate VECTR test cases based on your Mythic taskings for purple team.
https://github.com/MythicAgents/VECTR
https://github.com/MythicAgents/VECTR
GitHub
GitHub - MythicAgents/VECTR: A service container for interacting with SRA's VECTR
A service container for interacting with SRA's VECTR - MythicAgents/VECTR
BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language instead of complex Cypher queries.
https://github.com/MorDavid/BloodHound-MCP-AI
https://github.com/MorDavid/BloodHound-MCP-AI
GitHub
GitHub - MorDavid/BloodHound-MCP-AI: BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol…
BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language ins...
CVE-2025-21204 exploit simulation for non-admin users via junction-based path hijack.
https://cyberdom.blog/abusing-the-windows-update-stack-to-gain-system-access-cve-2025-21204/
https://raw.githubusercontent.com/eshlomo1/CloudSec/refs/heads/main/Attacking%20the%20Cloud/CVE-2025-21204/Exploit-CVE2025-UpdateStackLPE-NonAdmin.ps1
https://cyberdom.blog/abusing-the-windows-update-stack-to-gain-system-access-cve-2025-21204/
https://raw.githubusercontent.com/eshlomo1/CloudSec/refs/heads/main/Attacking%20the%20Cloud/CVE-2025-21204/Exploit-CVE2025-UpdateStackLPE-NonAdmin.ps1
CYBERDOM
Abusing the Windows Update Stack to Gain SYSTEM Access (CVE-2025-21204)
The CVE-2025-21204 is precisely that kind of vulnerability. It doesn't require a zero-day exploit or complex memory corruption chain. It doesn't need a phishing campaign or a dropped malware loader. All it takes is: A misused filesystem trust, a writable…