Search:

Last Week in Security (LWiS) - 2026-01-05

Windows ARM64 internals (@33y0re), VEH^2 PoC (@0xfluxsec), macOS 26 TCC bypass (@patch1t), BOFs with Crystal Palace (@_RastaMouse), Flare-On 2025 write-ups (@washi_dev), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-12-15 to 2026-01-05.

News

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!
  • silph - Stealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall.
  • ludus_ghostwriter - An Ansible Role that installs Ghostwriter on a Linux-based host using ghostwriter-cli and Docker Compose.
  • ludus_scorch - An Ansible collection that installs System Center Orchestrator (SCORCH) deployments with optional configurations for security testing.
  • scorch - Offensive security toolkit for Microsoft System Center Orchestrator (SCORCH). Single binary, cross-platform, works from non-domain joined systems.
  • NeuroSploit - NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security operations. Leveraging the capabilities of large language models (LLMs). [Untested, appears vibe coded]
  • EDR-GhostLocker - AppLocker-Based EDR Neutralization.
  • mt7622-qemu-vm - QEMU emulation of MediaTek MT7622 PCI driver.
  • Rapid7 Velociraptor Directory Traversal Vulnerability - We discussed using Velociraptor as a red team tool in our iscariot-suite, but this exploit potentially allows the takeover of the Velociraptor server, which would then allow an attacker to use Velociraptor as a command and control service across your network.
  • crystal-palace-vsc - Language extension for Crystal Palace Specification files. On the VSCode Marketplace here: crystal-palace-vsc
  • Remote-BOF-Runner - Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal Palace.
  • Sliver v1.6.0 - The best Go C2 framework gets an update. The new memfd features and the total CLI rewrite look interesting.
  • Vectored-Exception-Handling-Squared - Vectored Exception Handling Squared.
  • FsquirtCPLPoC - PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin.
  • slack-udc2 - Cobalt Strike UDC2 implementation that provides an Slack C2 channel.
  • mongobleed - A proof-of-concept exploit for the MongoDB zlib decompression vulnerability that allows unauthenticated attackers to leak sensitive server memory.
  • Google-Hack-Search - Custom Google search engine dedicated to IT security & hacking stuff. Over 230 high-quality sources.
  • tailsnitch - A security auditor for Tailscale configurations. Scans your tailnet for misconfigurations, overly permissive access controls, and security best practice violations.
  • SessionView - A portable C# utility for enumerating local and remote windows sessions.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • Using TypeScript to Obtain One of the Rarest License Plates - Burp suite and the lack of rate limits combine for this niche "hack" (original definition).
  • Handy - A free, open source, and extensible speech-to-text application that works completely offline.
  • Krawl - Krawl is a lightweight cloud native deception server and anti-crawler that creates fake web applications with low-hanging vulnerabilities and realistic, randomly generated decoy data.
  • How Passkeys Work - Computerphile - A decent high level overview of passkeys you can send to your parents.
  • What I Seek Out of a Pentester - Good overview on how to set your self up for success when looking for jobs in offensive security. The base of knowledge is really important in order to make connections quickly.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.