Search:

Last Week in Security (LWiS) - 2025-04-07

2 weeks worth of news, techniques, tools and exploits!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-03-24 to 2025-04-07.

News

Techniques and Write-ups

Tools and Exploits

  • Loki - 🧙‍♂️ Node JS C2 for backdooring vulnerable Electron applications.
  • GhidraMCP - MCP Server for Ghidra.
  • BloodHound-MCP-AI - BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language instead of complex Cypher queries.
  • roadrecon_mcp_server - Claude MCP server to perform analysis on ROADrecon data.
  • sharefiltrator - Tool for enumeration & bulk download of sensitive files found in SharePoint environments.
  • PatchGuardEncryptorDriver - An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.
  • blackcat - BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potential security holes.
  • AzureFunctionRedirector - Code and tutorial on using Azure Functions as your redirector. Careful, Microsoft has been known to close subscriptions if they detect nefarious use.
  • Inline-EA - Cobalt Strike BOF for evasive .NET assembly execution.
  • FrogPost - postMessage Security Testing Tool.
  • NativeNtdllRemap - Remap ntdll.dll using only NTAPI functions with a suspended process.
  • NativeTokenImpersonate - Impersonate Tokens using only NTAPI functions.
  • KeyJumper - This project demonstrates arbitrary kernel code execution on a Windows 11 system with kCET enabled, to create a keylogging tool by mapping kernel memory to userland. You can find a blogpost about it here for more information.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.