Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File | https://github.com/0x6rss/CVE-2025-24071_PoC | POC Details |
| 2 | metasploit module for the CVE-2025-24071 | https://github.com/FOLKS-iwd/CVE-2025-24071-msfvenom | POC Details |
| 3 | Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) | https://github.com/aleongx/CVE-2025-24071 | POC Details |
| 4 | Alternativa CVE-2025-24071_PoC | https://github.com/ctabango/CVE-2025-24071_PoCExtra | POC Details |
| 5 | Exploit CVE-2025-24071 | https://github.com/shacojx/CVE-2025-24071-Exploit | POC Details |
| 6 | Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) | https://github.com/ThemeHackers/CVE-2025-24071 | POC Details |
| 7 | None | https://github.com/rubbxalc/CVE-2025-24071 | POC Details |
| 8 | A PoC of CVE-2025-24071, A windows vulnerability that allow get NTMLv2 hashes | https://github.com/Marcejr117/CVE-2025-24071_PoC | POC Details |
| 9 | None | https://github.com/cesarbtakeda/Windows-Explorer-CVE-2025-24071 | POC Details |
| 10 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20%E6%96%87%E4%BB%B6%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E5%99%A8%E6%AC%BA%E9%AA%97%E6%BC%8F%E6%B4%9E%20CVE-2025-24071.md | POC Details |
| 11 | None | https://github.com/pswalia2u/CVE-2025-24071_POC | POC Details |
| 12 | Windows File Explorer Spoofing Vulnerability - CVE-2025-24071 | https://github.com/f4dee-backup/CVE-2025-24071 | POC Details |
| 13 | CVE-2025-24071 Proof Of Concept | https://github.com/LOOKY243/CVE-2025-24071-PoC | POC Details |
| 14 | Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using tar x from smbclient, the payload is extracted server-side without user interaction. Responder captures the NTLM hash once the target accesses the library. | https://github.com/ex-cal1bur/SMB_CVE-2025-24071 | POC Details |
| 15 | Security Vulnerability Report: CVE-2025-24071 - Windows File Explorer Spoofing Vulnerability | https://github.com/TH-SecForge/CVE-2025-24071 | POC Details |
| 16 | CVE-2025-24071 | https://github.com/B1ack4sh/Blackash-CVE-2025-24071 | POC Details |
| 17 | CVE-2025-24071: NTLMv2 Hash Disclosure via .library-ms File | https://github.com/DeshanFer94/CVE-2025-24071-POC-NTLMHashDisclosure- | POC Details |
| 18 | None | https://github.com/Royall-Researchers/CVE-2025-24071 | POC Details |
| 19 | Python script to execute CVE-2025-24071 | https://github.com/AC8999/CVE-2025-24071 | POC Details |
| 20 | CVE-2025-24071 | https://github.com/Ashwesker/Blackash-CVE-2025-24071 | POC Details |
| 21 | This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure. | https://github.com/Abdelrahman0Sayed/CVE-2025-24071 | POC Details |
| 22 | Hello friend. This is the Fsociety Exploit Framework for CVE-2025-24071. Generates malicious .library-ms files to steal NTLMv2 hashes. Includes a 'Living Terminal' Cinematic Mode, Deep Trace logging, and stealth evasion techniques. Join the revolution. #Hacking #Exploit #CVE-2025-24071 | https://github.com/fsoc-ghost-0x/Fsociety-CVE-2025-24071-NTLM-Coercion | POC Details |
| 23 | Exploit CVE-2025-24071 | https://github.com/ephunter/CVE-2025-24071-Exploit | POC Details |
| 24 | CVE-2025-24071 | https://github.com/Ashwesker/Ashwesker-CVE-2025-24071 | POC Details |
| 25 | CVE-2025-24071 | https://github.com/zbs54/Blackash-CVE-2025-24071 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-26645 | 8.8 HIGH | Remote Desktop Client Remote Code Execution Vulnerability |
| CVE-2025-24056 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-24051 | 8.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2025-24049 | 8.4 HIGH | Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability |
| CVE-2025-24084 | 8.4 HIGH | Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability |
| CVE-2025-24064 | 8.1 HIGH | Windows Domain Name Service Remote Code Execution Vulnerability |
| CVE-2025-24045 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2025-24035 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2025-24050 | 7.8 HIGH | Windows Hyper-V Elevation of Privilege Vulnerability |
| CVE-2025-24077 | 7.8 HIGH | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2025-24985 | 7.8 HIGH | Windows Fast FAT File System Driver Remote Code Execution Vulnerability |
| CVE-2025-24057 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2025-24061 | 7.8 HIGH | Windows Mark of the Web Security Feature Bypass Vulnerability |
| CVE-2025-24059 | 7.8 HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
| CVE-2025-24046 | 7.8 HIGH | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
| CVE-2025-24066 | 7.8 HIGH | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
| CVE-2025-24067 | 7.8 HIGH | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
| CVE-2025-24072 | 7.8 HIGH | Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability |
| CVE-2025-24075 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2025-24048 | 7.8 HIGH | Windows Hyper-V Elevation of Privilege Vulnerability |
Showing top 20 of 57 CVEs. View all on vendor page → →
No comments yet