WinRM is protected against NTLMRelay as communications are encrypted.
https://sensepost.com/blog/2025/is-tls-more-secure-the-winrms-case./
https://sensepost.com/blog/2025/is-tls-more-secure-the-winrms-case./
Windows & Active Directory Exploitation Cheat Sheet and Command Reference
https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief.
It’s lightweight, fast, and helps turn raw recon into insights.
https://github.com/six2dez/reconftw_ai
It’s lightweight, fast, and helps turn raw recon into insights.
https://github.com/six2dez/reconftw_ai
GitHub
GitHub - six2dez/reconftw_ai: AI/LLM local model integration for analysis of reconftw results
AI/LLM local model integration for analysis of reconftw results - six2dez/reconftw_ai
GitHub - mbadanoiu/CVE-2025-31644: CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP
https://github.com/mbadanoiu/CVE-2025-31644
https://github.com/mbadanoiu/CVE-2025-31644
GitHub
GitHub - mbadanoiu/CVE-2025-31644: CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP
CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP - mbadanoiu/CVE-2025-31644
https://decoder.cloud/2025/04/24/from-ntlm-relay-to-kerberos-relay-everything-you-need-to-know/?s=35
Decoder's Blog
From NTLM relay to Kerberos relay: Everything you need to know
While I was reading Elad Shamir recent excellent post about NTLM relay attacks, I decided to contribute a companion piece that dives into the mechanics of Kerberos relays, offering an analysis and …