Search:

Last Week in Security (LWiS) - 2025-08-18

DEF CON releases, PDQ SmartDeploy creds (@unsigned_sh0rt), FortiSIEM root command injection (@SinSinology), a cat themed loader (@vxunderground), fine-tune LLMs for offsec (@kyleavery_), juicing NTDS.DIT (@MGrafnetter), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-08-04 to 2025-08-18.

News

Techniques and Write-ups

Tools and Exploits

  • hashcat v7.0.0 - Lots of updates including hash-mode autodetection, docker build support, Apple Metal GPU support, AMD HIP support, Argon2 and Summary algorithm support, and much more.
  • IRvana - Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution.
  • dump_kerberos_tickets - Dump Kerberos tickets.
  • nimpersonate - Impersonate Windows tokens in Nim.
  • Meow Meow Kitty Cat Meow Meow - A new project from @vxunderground. "Insert" will hide your payload in a BMP, "Pspsps" extracts payloads from BMPs, and "Loader" is a loader with dynamic syscall resolution that extracts a payload from a BMP and executes it in memory.
  • ludus_badblood - Outfits your ludus AD domain with BadBlood info.
  • rre-burp - Burp extension for Recursive Request Exploits (RRE) — DEF CON 2025.
  • Azure-AppHunter - Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privileges assigned to Service Principals.
  • turnt - A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.
  • oauthseeker - A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office365 users.
  • glato - GitLab Attack TOolkit. [Not to be confused with gato - GitHub Actions Pipeline Enumeration and Attack Tool.]
  • ChromeAlone - A tool to transform Chromium browsers into a C2 Implant.
  • janus-framework is a powerful Go library for chaining security tools together to create complex, reusable workflows that can run at scale. It provides a uniform interface for connecting disparate security tools, enabling automation of multi-step security processes.
  • gpoParser - gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory environment.
  • CVE-2025-50154 - POC for CVE-2025-50154, a zero day vulnerability on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch.
  • restless-guest - An offensive toolkit for restless guests #DEFCON33.
  • EntraGoat - A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.
  • RPC-Racer - Toolset to manipulate RPC clients by finding delayed services and masquerading as them.
  • Dispatch - Evasive Payload Delivery Server & C2 Redirector.
  • BamboozlEDR - A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.
  • JamfHound - JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by outputting data as JSON for ingestion into BloodHound.
  • NotSoSmartDeploy - POC to decrypt SmartDeploy encrypted credentials.
  • AzureStrike - An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations.
  • sauron - Fast context enumeration for newly obtained Active Directory credentials.
  • spearspray - Enhance Your Active Directory Password Spraying with User Intelligence.
  • GREtunnel-scanner - This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion.
  • C4 - Cross Compatible Command and Control.
  • defcon33_silence_kill_edr - DC33 workshop: "Putting EDRs in Their place"
  • WinRAR-CVE-2025-8088-PoC-RAR - WinRAR 0day CVE-2025-8088 PoC RAR Archive.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • thorium - A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.
  • VxLAN-Scanner - This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion.
  • Pantheon - Community Eventing and Scripting examples.
  • Certify 2.0 Certify has been updated to 2.0 and it includes a much needed update. Nearly twice the amount of ADCS tradecraft has been introduced since the initial release.
  • TameMyCerts - Policy Module for Microsoft Active Directory Certificate Services.
  • bloatware-pwn - LPE / RCE Exploits for various vulnerable "Bloatware" products.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.