Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File | https://github.com/0x6rss/CVE-2025-24071_PoC | POC Details |
| 2 | metasploit module for the CVE-2025-24071 | https://github.com/FOLKS-iwd/CVE-2025-24071-msfvenom | POC Details |
| 3 | Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) | https://github.com/aleongx/CVE-2025-24071 | POC Details |
| 4 | Alternativa CVE-2025-24071_PoC | https://github.com/ctabango/CVE-2025-24071_PoCExtra | POC Details |
| 5 | Exploit CVE-2025-24071 | https://github.com/shacojx/CVE-2025-24071-Exploit | POC Details |
| 6 | Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) | https://github.com/ThemeHackers/CVE-2025-24071 | POC Details |
| 7 | None | https://github.com/rubbxalc/CVE-2025-24071 | POC Details |
| 8 | A PoC of CVE-2025-24071, A windows vulnerability that allow get NTMLv2 hashes | https://github.com/Marcejr117/CVE-2025-24071_PoC | POC Details |
| 9 | None | https://github.com/cesarbtakeda/Windows-Explorer-CVE-2025-24071 | POC Details |
| 10 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20%E6%96%87%E4%BB%B6%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E5%99%A8%E6%AC%BA%E9%AA%97%E6%BC%8F%E6%B4%9E%20CVE-2025-24071.md | POC Details |
| 11 | None | https://github.com/pswalia2u/CVE-2025-24071_POC | POC Details |
| 12 | Windows File Explorer Spoofing Vulnerability - CVE-2025-24071 | https://github.com/f4dee-backup/CVE-2025-24071 | POC Details |
| 13 | CVE-2025-24071 Proof Of Concept | https://github.com/LOOKY243/CVE-2025-24071-PoC | POC Details |
| 14 | Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using tar x from smbclient, the payload is extracted server-side without user interaction. Responder captures the NTLM hash once the target accesses the library. | https://github.com/ex-cal1bur/SMB_CVE-2025-24071 | POC Details |
| 15 | Security Vulnerability Report: CVE-2025-24071 - Windows File Explorer Spoofing Vulnerability | https://github.com/TH-SecForge/CVE-2025-24071 | POC Details |
| 16 | CVE-2025-24071 | https://github.com/B1ack4sh/Blackash-CVE-2025-24071 | POC Details |
| 17 | CVE-2025-24071: NTLMv2 Hash Disclosure via .library-ms File | https://github.com/DeshanFer94/CVE-2025-24071-POC-NTLMHashDisclosure- | POC Details |
| 18 | None | https://github.com/Royall-Researchers/CVE-2025-24071 | POC Details |
| 19 | Python script to execute CVE-2025-24071 | https://github.com/AC8999/CVE-2025-24071 | POC Details |
| 20 | CVE-2025-24071 | https://github.com/Ashwesker/Blackash-CVE-2025-24071 | POC Details |
| 21 | This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure. | https://github.com/Abdelrahman0Sayed/CVE-2025-24071 | POC Details |
| 22 | Hello friend. This is the Fsociety Exploit Framework for CVE-2025-24071. Generates malicious .library-ms files to steal NTLMv2 hashes. Includes a 'Living Terminal' Cinematic Mode, Deep Trace logging, and stealth evasion techniques. Join the revolution. #Hacking #Exploit #CVE-2025-24071 | https://github.com/fsoc-ghost-0x/Fsociety-CVE-2025-24071-NTLM-Coercion | POC Details |
| 23 | Exploit CVE-2025-24071 | https://github.com/ephunter/CVE-2025-24071-Exploit | POC Details |
| 24 | CVE-2025-24071 | https://github.com/Ashwesker/Ashwesker-CVE-2025-24071 | POC Details |
| 25 | CVE-2025-24071 | https://github.com/zbs54/Blackash-CVE-2025-24071 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet