exploitdb
WORKING POC
by Daniel Miranda · pythonremotewindows
https://www.exploit-db.com/exploits/52325
This exploit generates a malicious .library-ms file that, when opened, forces Windows to connect to an attacker-controlled SMB share. It leverages CVE-2025-24071, a vulnerability in Windows Library files, to achieve remote code execution via SMB relay attacks.
Classification
Working Poc 90%
Target:
Microsoft Windows (versions affected by CVE-2025-24071)
No auth needed
Prerequisites:
Attacker-controlled SMB share · Victim interaction to open the .library-ms file
exploitdb
WORKING POC
by Mohammed Idrees Banyamer · pythonremotewindows
https://www.exploit-db.com/exploits/52310
This exploit generates a malicious .library-ms file pointing to an attacker-controlled SMB server, packages it into a ZIP archive, and leverages Windows File Explorer's automatic SMB authentication to leak NTLM hashes. No user interaction is required beyond extracting the ZIP.
Classification
Working Poc 100%
Target:
Windows File Explorer (Windows 10/11, all versions supporting .library-ms and SMB)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim must extract the ZIP file
nomisec
WORKING POC
396 stars
by 0x6rss · client-side
https://github.com/0x6rss/CVE-2025-24071_PoC
This PoC demonstrates CVE-2025-24071, an NTLM hash leak vulnerability triggered by extracting a .library-ms file from a ZIP archive. The exploit generates a malicious .library-ms file that forces Windows Explorer to initiate an SMB authentication request to an attacker-controlled IP.
Classification
Working Poc 95%
Target:
Microsoft Windows (specific versions not specified)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim extracts the malicious ZIP file
nomisec
WORKING POC
28 stars
by ThemeHackers · infoleak
https://github.com/ThemeHackers/CVE-2025-24071
This repository contains a PoC exploit for CVE-2025-24071, a Windows File Explorer spoofing vulnerability. The exploit generates a malicious `.library-ms` file that triggers an SMB authentication request, potentially exposing the user's NTLM hash.
Classification
Working Poc 90%
Target:
Windows File Explorer (multiple versions)
No auth needed
Prerequisites:
Target system must be running an affected version of Windows · User interaction required to decompress and open the malicious file
nomisec
WORKING POC
26 stars
by FOLKS-iwd · client-side
https://github.com/FOLKS-iwd/CVE-2025-24071-msfvenom
This Metasploit module exploits CVE-2025-24071 by generating a malicious .library-ms file embedded in a ZIP archive. When extracted, it triggers an SMB authentication request to an attacker-controlled server, leaking NTLM hashes.
Classification
Working Poc 95%
Target:
Windows Explorer (versions affected by CVE-2025-24071)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim must extract the malicious ZIP file
nomisec
WORKING POC
25 stars
by Marcejr117 · client-side
https://github.com/Marcejr117/CVE-2025-24071_PoC
This PoC exploits a vulnerability in Windows Explorer (CVE-2025-24071/CVE-2025-24054) by crafting a malicious `.library-ms` file embedded in a ZIP archive. When extracted, it triggers an SMB connection to an attacker-controlled IP, leaking NetNTLMv2 hashes.
Classification
Working Poc 95%
Target:
Microsoft Windows Explorer (specific version not specified)
No auth needed
Prerequisites:
Attacker-controlled SMB server (e.g., Responder) · Victim must extract the ZIP file
github
WORKING POC
21 stars
by helidem · pythonclient-side
https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC
This repository contains a functional PoC for CVE-2025-24071, which exploits an NTLM hash leak via .library-ms files on unpatched Windows systems. The exploit generates a malicious .library-ms file that triggers an SMB authentication request when previewed in Windows Explorer, leaking the NTLMv2 hash to an attacker-controlled server.
Classification
Working Poc 95%
Target:
Windows (unpatched as of March 2025 Patch Tuesday)
No auth needed
Prerequisites:
Attacker-controlled SMB server (e.g., Responder) · Victim interaction (previewing the .library-ms file)
nomisec
WORKING POC
4 stars
by TH-SecForge · client-side
https://github.com/TH-SecForge/CVE-2025-24071
This repository contains a proof-of-concept exploit for CVE-2025-24071, a Windows File Explorer spoofing vulnerability. The exploit generates a malicious `.library-ms` file that triggers an SMB authentication request, potentially exposing the user's NTLM hash.
Classification
Working Poc 95%
Target:
Windows File Explorer (multiple versions)
No auth needed
Prerequisites:
Target system must be running an affected version of Windows · Victim must decompress and open the malicious file
github
WORKING POC
3 stars
by basekilll · pythonpoc
https://github.com/basekilll/CVE-2025-24054_PoC
This PoC generates a malicious .library-ms file that references a remote SMB share, exploiting CVE-2025-24071 to trigger arbitrary file access or code execution when the file is opened. The script creates a ZIP archive containing the exploit file for delivery.
Classification
Working Poc 90%
Target:
Microsoft Windows (specific version not specified)
No auth needed
Prerequisites:
Attacker-controlled SMB share · Victim interaction to open the .library-ms file
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-24071
The repository contains functional exploit code for multiple CVEs, including authentication bypass vulnerabilities in TOTOLINK devices and a scanner for Fortinet SSL VPN (CVE-2024-21762). The PoCs demonstrate the vulnerabilities with clear technical details and functional code.
Classification
Working Poc 90%
Target:
TOTOLINK LR350, TOTOLINK T6, Fortinet SSL VPN
No auth needed
Prerequisites:
network access to the target device
nomisec
WORKING POC
2 stars
by fsoc-ghost-0x · client-side
https://github.com/fsoc-ghost-0x/Fsociety-CVE-2025-24071-NTLM-Coercion
This PoC exploits CVE-2025-24071 by generating a malicious '.library-ms' file embedded in a ZIP archive. When extracted by a Windows victim, it triggers an NTLM authentication request to an attacker-controlled SMB server via UNC path injection, leaking NTLMv2 hashes.
Classification
Working Poc 95%
Target:
Windows Library-MS (NTLM Coercion)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim interaction to extract ZIP
nomisec
WORKING POC
2 stars
by ctabango · infoleak
https://github.com/ctabango/CVE-2025-24071_PoCExtra
This PoC generates a malicious '.searchconnector-ms' file that triggers automatic SMB authentication to a specified IP when opened or stored on a Windows system, exploiting CVE-2025-24071. The script creates an XML-based file that forces the target system to attempt authentication with the attacker-controlled SMB share.
Classification
Working Poc 90%
Target:
Microsoft Windows (versions affected by CVE-2025-24071)
No auth needed
Prerequisites:
Attacker-controlled SMB share · Victim interaction to open/store the file
nomisec
WORKING POC
2 stars
by ex-cal1bur · client-side
https://github.com/ex-cal1bur/SMB_CVE-2025-24071
This PoC exploits CVE-2025-24071 by generating a malicious .library-ms file embedded in a .tar archive, which triggers NTLM hash leakage when extracted on a vulnerable Windows system via SMB. The attack leverages Responder to capture authentication attempts.
Classification
Working Poc 95%
Target:
Windows SMB (specific version not specified)
No auth needed
Prerequisites:
Responder running on attacker machine · SMB access to victim machine · Victim interaction to extract .tar file
nomisec
WORKING POC
2 stars
by LOOKY243 · client-side
https://github.com/LOOKY243/CVE-2025-24071-PoC
This PoC demonstrates CVE-2025-24071, a Windows File Explorer spoofing vulnerability that exposes NTLM hashes via malicious `.library-ms` files embedded in archives. The exploit generates a crafted `.library-ms` file pointing to an attacker-controlled SMB share, packages it into a ZIP, and triggers automatic SMB authentication upon extraction.
Classification
Working Poc 95%
Target:
Windows File Explorer (Windows 10, 11, Server 2012 R2-2025)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim interaction to extract archive
nomisec
WORKING POC
1 stars
by DeshanFer94 · client-side
https://github.com/DeshanFer94/CVE-2025-24071-POC-NTLMHashDisclosure-
This PoC exploits CVE-2025-24071 by generating a malicious .library-ms file embedded in a ZIP archive. When extracted on a vulnerable Windows system, it triggers an automatic SMB authentication request to an attacker-controlled server, leaking NTLM hashes.
Classification
Working Poc 100%
Target:
Windows File Explorer (Windows 10/11, especially 23H2)
No auth needed
Prerequisites:
Attacker-controlled SMB server (e.g., Responder) · Victim extracts the ZIP file
nomisec
WORKING POC
1 stars
by t0x1nsec · poc
https://github.com/t0x1nsec/Windows-Explorer-CVE-2025-24071
The repository contains a functional exploit for CVE-2025-24071, a Windows File Explorer spoofing vulnerability that leverages malicious `.library-ms` files in RAR/ZIP archives to trigger SMB authentication requests, potentially exposing NTLM hashes. The provided Python script automates the creation of such archives for exploitation.
Classification
Working Poc 90%
Target:
Windows File Explorer (multiple versions)
No auth needed
Prerequisites:
Ability to deliver a malicious RAR/ZIP file to the target · Target system must open the archive in File Explorer
nomisec
WORKING POC
1 stars
by cesarbtakeda · client-side
https://github.com/cesarbtakeda/Windows-Explorer-CVE-2025-24071
This repository contains a PoC for CVE-2025-24071, a Windows File Explorer spoofing vulnerability that exploits implicit trust in `.library-ms` files to trigger SMB authentication requests, potentially exposing NTLM hashes. The PoC includes a Python script to generate malicious ZIP/RAR files for exploitation.
Classification
Working Poc 90%
Target:
Windows File Explorer (multiple versions)
No auth needed
Prerequisites:
Victim must decompress a malicious ZIP/RAR file containing a crafted `.library-ms` file
nomisec
WORKING POC
1 stars
by rubbxalc · client-side
https://github.com/rubbxalc/CVE-2025-24071
This PoC demonstrates CVE-2025-24071, a vulnerability in Windows Explorer where extracting a ZIP containing a malicious `.library-ms` file triggers an automatic SMB connection to an attacker-controlled server, leaking netNTLMv2 credentials.
Classification
Working Poc 95%
Target:
Windows Explorer (specific version not specified)
No auth needed
Prerequisites:
Attacker-controlled SMB server (e.g., Responder) · Victim must extract the malicious ZIP file
gitlab
WORKING POC
by ThemeHackers · poc
https://gitlab.com/ThemeHackers/CVE-2025-24071
The repository contains a functional exploit for CVE-2025-24071, a Windows File Explorer spoofing vulnerability. The exploit generates a malicious `.library-ms` file that triggers an SMB authentication request, potentially exposing the user's NTLM hash when decompressed.
Classification
Working Poc 95%
Target:
Windows File Explorer (multiple versions)
No auth needed
Prerequisites:
Target system running an affected version of Windows · Ability to deliver a malicious ZIP/RAR file to the victim
nomisec
WORKING POC
by Abdelrahman0Sayed · infoleak
https://github.com/Abdelrahman0Sayed/CVE-2025-24071
This PoC exploits CVE-2025-24071, a vulnerability in Windows File Explorer that leaks NTLM hashes when a user extracts a crafted ZIP archive containing a malicious `.library-ms` file. The exploit generates a ZIP file that triggers an SMB authentication request to an attacker-controlled server upon extraction.
Classification
Working Poc 95%
Target:
Windows File Explorer (unspecified version)
No auth needed
Prerequisites:
Attacker-controlled SMB server (e.g., Responder or Impacket) · Victim must extract the crafted ZIP archive
github
STUB
by Wind010 · poc
https://github.com/Wind010/CVE-2025-24054_PoC
The repository contains only a README file with minimal information, mentioning CVE-2025-24054 and CVE-2025-24071 but no functional exploit code or technical details. It appears to be a placeholder without substantive content.
Target:
unspecified
No auth needed
nomisec
WORKING POC
by AC8999 · poc
https://github.com/AC8999/CVE-2025-24071
This PoC exploits CVE-2025-24071, a Windows File Explorer spoofing vulnerability, by generating a malicious `.library-ms` file that triggers NTLM hash leakage to an attacker-controlled SMB share. The script automates the creation of the malicious file, packages it in a ZIP, and uploads it to a target SMB share.
Classification
Working Poc 95%
Target:
Microsoft Windows File Explorer (unspecified version)
Auth required
Prerequisites:
Attacker-controlled SMB share · Valid credentials for target SMB share · Responder or similar tool for hash capture
nomisec
WORKING POC
by Royall-Researchers · client-side
https://github.com/Royall-Researchers/CVE-2025-24071
This PoC demonstrates an NTLM hash leak vulnerability in Windows Explorer by creating a malicious .library-ms file embedded in a ZIP archive. When extracted, the file triggers an SMB authentication request to an attacker-controlled IP, leaking NTLM hashes without user interaction.
Classification
Working Poc 90%
Target:
Windows Explorer (versions affected by CVE-2025-24054)
No auth needed
Prerequisites:
Attacker-controlled IP address · Victim must extract the ZIP archive
nomisec
WORKING POC
by f4dee-backup · client-side
https://github.com/f4dee-backup/CVE-2025-24071
This PoC exploits CVE-2025-24071, a Windows File Explorer spoofing vulnerability, by crafting a malicious .library-ms file embedded in a ZIP archive. When extracted, it triggers an SMB connection to leak NTLM hashes via a controlled SMB server.
Classification
Working Poc 95%
Target:
Windows File Explorer (multiple versions)
Auth required
Prerequisites:
SMB write access to a target share · Impacket's smbserver for payload delivery
nomisec
WORKING POC
by zbs54 · poc
https://github.com/zbs54/Blackash-CVE-2025-24071
This Metasploit module exploits CVE-2025-24071 by generating a malicious .library-ms file embedded in a ZIP archive. When extracted, it triggers an SMB request to an attacker-controlled server, leaking NTLM hashes.
Classification
Working Poc 95%
Target:
Windows Explorer (versions affected by CVE-2025-24071)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim extracts the malicious ZIP file
nomisec
WORKING POC
by pswalia2u · client-side
https://github.com/pswalia2u/CVE-2025-24071_POC
This Rust-based PoC demonstrates CVE-2025-24071 by generating a malicious .library-ms file that points to a network share, which can trigger NTLM authentication leaks when opened. The exploit leverages GitHub Actions for automated deployment.
Classification
Working Poc 95%
Target:
Windows Library (.library-ms) files
No auth needed
Prerequisites:
GitHub Actions environment · Network share access
nomisec
WORKING POC
by ephunter · poc
https://github.com/ephunter/CVE-2025-24071-Exploit
This PoC generates a malicious .library-ms file embedded in a ZIP archive to exploit CVE-2025-24071, which leaks NTLM hashes via SMB when the victim extracts and opens the file. The exploit requires an attacker-controlled SMB share to capture the hash.
Classification
Working Poc 90%
Target:
Windows (via .library-ms file handling)
No auth needed
Prerequisites:
Attacker-controlled SMB share (e.g., Responder) · Victim must extract and open the .library-ms file
patchapalooza
WORKING POC
by xigney · client-side
https://github.com/xigney/CVE-2025-24054_PoC
This PoC generates a malicious .library-ms file that exploits CVE-2025-24071 by embedding a UNC path to an attacker-controlled SMB share, likely triggering arbitrary code execution via Windows Library file handling. The script creates a ZIP archive containing the exploit file for delivery.
Classification
Working Poc 90%
Target:
Microsoft Windows (specific version unclear)
No auth needed
Prerequisites:
Attacker-controlled SMB share · Victim interaction to open the .library-ms file