CVE-2025-24071 is a critical vulnerability in Microsoft Windows File Explorer that allows attackers to capture NTLM hashed passwords without user interaction.
This vulnerability exploits the automatic processing of specially crafted .library-ms
files within compressed archives like RAR or ZIP.
The Proof of Concept (PoC) tool, CVE-2025-24071_PoC
, demonstrates how attackers can exploit this flaw using a simple Python script.
.library-ms
file containing a malicious SMB path. This file is then embedded within a RAR or ZIP archive..library-ms
file. This triggers an NTLM authentication handshake with an attacker-controlled SMB server, leaking the victim’s NTLMv2 hash without requiring any user interaction beyond extracting the file.python poc.py # Enter file name: your_file_name # Enter IP: attacker_IP
In summary, the CVE-2025-24071_PoC
tool highlights the severity of the NTLM hash leak vulnerability in Windows File Explorer, emphasizing the need for prompt patching and security updates to protect against such threats.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…