Search:

Last Week in Security (LWiS) - 2025-10-20

WhatchGuard RCE (@_mccaulay), BadSuccessor BOF (@_logangoins), ClubWPT hack (@samwcyo), MDE cloud vulns (@p0w1_), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-10-06 to 2025-10-20.

News

Techniques and Write-ups

Tools and Exploits

  • Butler - GitHub Actions Oversight.
  • execute-assembly-pico - A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.
  • Crystal-Kit - This repo is a technical and social experiment to see if replacing Cobalt Strike's evasion primitives (Sleepmask/BeaconGate) with Crystal Palace PIC(O)s is feasible (or even desirable) for advanced evasion scenarios.
  • LibTP - Crystal Palace library for proxying Nt API calls via the Threadpool.
  • BadTakeover-BOF - Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover.
  • InlineExecuteEx - A BOF that's a BOF Loader.
  • PingOneHound - Six Degrees of Organization Admin. See PingOne Attack Paths for all the details.
  • DetonatorAgent - Detonate malware on VMs and get logs & detection status.
  • surveyor - Advanced Windows kernel analysis and system profiling tool. Provides comprehensive visibility into kernel callbacks, ETW sessions, driver analysis, and system state through both userland APIs and optional kernel driver integration.
  • krakenhashes - KrakenHashes is a distributed password cracking system designed for security professionals and red teams.
  • Singularity - Linux Kernel Rootkit for modern kernels (6x).
  • CVE-2025-24990_POC - Proof of Concept CVE-2025-24990 (Agere Systems's driver).
  • Aether - Self-mutating macOS implant.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.