Search:

Last Week in Security (LWiS) - 2026-02-09

"Negative-day" discovery (@spaceraccoonsec), Exploit gen with LLMs (@seanhn), Harmony LPE (@johnnyspandex + @buffaloverflow), NetSupport Manager RCE (@0xor_solo), Azure blob C2 (@KingOfTheNOPs + @senderend) and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-01-12 to 2026-02-09.

News

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!
  • ConfigManBearPig - PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph.
  • embbridge - ADB-like device bridge for embedded systems. Shell, file transfer, and firmware dumping for forensics and research.
  • uart-push - Like scp, but over UART serial connections.
  • TopazTerminator - Just another EDR killer.
  • lcre - Wrapper RE tool for CLI.
  • Erebus - Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It utilizes multiple techniques to equip the operator with the right tools, for the right job.
  • Google Groups Reconnaissance Tools - A suite of Go tools for discovering and analyzing publicly accessible Google Workspace groups. These tools help security professionals identify groups with overly permissive settings during authorized security assessments.
  • remnux-mcp-server - MCP server for using the REMnux malware analysis toolkit via AI assistants.
  • the-one-wsl-bof - One WSL BOF to rule them all.
  • AutoPtT - Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack, implemented in C++ and Python.
  • AddUser-SAMR - Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Python, Rust and Crystal.
  • DuplexSpyCS - A Remote Access Tool developed in C#, enabling complete control of a remote Windows machine, designed for legitimate remote administration and security testing of Windows systems.
  • fawkes - Fawkes is my attempt at a Mythic C2 Agent.
  • shannon - Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-aware XBOW Benchmark.
  • agscript_middleware - Run CobaltStrike aggressorscript over TCP.
  • BloodBash - A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for quick AD enumeration.
  • skills - Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows.
  • beignet - MacOS Shared Library to Shellcode Loader.
  • Cobaltstrike_BOFLoader - open source port/reimplementation of the Cobalt Strike BOF Loader as is.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • Antide's Law - "If it's unclear what a cyber-security company is doing, what they're doing is pretty clear (exploits/capabilities)."
  • What AI Security Research Looks Like When It Works - This is a marketing post, but the fact that curl accepted multiple vulnerabilities from their scanner instantly gives it credibility. Are we seeing AI powered automated vulnerability discovery that is better than any single human and scalable with money/chips/power instead of very hard to find talent? Probably very close. Are defenses at the same watershed moment? I haven't seen it. Should we be concerned about this imbalance? Yes.
  • Owning a $5M data center - Cool to see a company reject the cloud and build their own AI datacenter.
  • Incident Report: CVE-2024-YIKES - This feels too real.
  • HolyGrail - BYOVD hunter to help prioritize windows drivers worth manual analysis.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.