Search:

Last Week in Security (LWiS) - 2026-03-09

Ludus 2 (@badsectorlabs), new GOAD lab (@M4yFly), đŸȘ hack (@XeEaton), DPAPI + Nemesis (@harmj0y + @tifkin_), iOS exploit kit found (@Mandiant), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-03-02 to 2026-03-09.

News

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!
  • Dracarys - New GOAD lab from Mayfly!
  • sopa - A practical client for ADWS in Golang.
  • ludus-defender-lab - Ludus range configs and Ansible roles for a Windows security lab pre-staged for MDE and MDI, with a fully misconfigured ADCS installation for detection coverage testing.
  • vscode-frida - Unofficial frida extension for VSCode.
  • DLLHijackHunter - Automated DLL Hijacking Detection with Zero False Positives.
  • ludus_nginx_redirector - This role is designed for use in Ludus ranges to proxy C2 traffic with extensive customization options for routing, rate limiting, and operational security.
  • CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE - This repository contains a working proof-of-concept exploit for CVE-2026-20127, a critical pre-authentication vulnerability in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) that has been actively exploited in the wild since 2023.
  • Speakeasy v2.0.0b1 - The Windows malware emulation framework that executes binaries, drivers, and shellcode in a modeled Windows runtime instead of a full VM got a major update!
  • vulhunt - Vulnerability detection framework by Binarly's REsearch team
  • PrivHound - A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.
  • Maverick - Adaptix C2 agent using Crystal Palace PIC linker and PICO module system

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • enject - Hide .env secrets from prAIng eyes: secrets live in local encrypted stores (per project) and are injected directly into apps at runtime, never touching disk as plaintext.
  • eden - A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (Draugr)
  • unredact - Unredact uses computer vision, font-aware constraint solving, and LLM reasoning to figure out what text is hiding under those black bars. Upload a PDF, and it will detect redactions, calculate exactly which strings could fit based on pixel-width constraints, and let you visually verify guesses with a live overlay.
  • LTR101 - Getting into Industry in 2026 - Andy updates his "breaking into cybersecurity" post for 2026. Guess what made it in the Resources section this year? Ludus 😎.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.