Last Week in Security (LWiS) - 2026-03-30
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,找出主要信息。 文章标题提到了几个安全工具和技术,比如Ludus MCP/Skills、Grapefruit安全套件、Citrix NetScaler的两个帖子、BIOS绕过等。接下来是上周的安全新闻摘要,时间范围是2026年3月24日至30日。 新闻部分包括苹果发送安全警报、Cobalt Strike研究实验室的介绍、Wyden对NSA行动的批评、FBI局长的邮件泄露。技术方面有Citrix NetScaler的漏洞分析、BIOS安全功能禁用、Claude Code在安全代码审查中的应用以及音频隐写术在供应链攻击中的使用。 工具和漏洞部分提到了多个开源工具和补丁,如ludus-mcp、Grapefruit、emulat3等。还有新出现的技术和工具,如raptor将Claude Code用于安全代理。 总结时需要涵盖主要新闻事件和技术工具,同时保持简洁。确保不超过100字,并且直接描述内容。 </think> 这篇文章总结了2026年3月24日至30日的网络安全新闻和技术动态,包括苹果加强iOS安全警报、Cobalt Strike研究实验室发布新工具、FBI局长邮箱遭入侵等事件。同时介绍了Citrix NetScaler漏洞分析、BIOS安全绕过技术及Claude Code在安全审查中的应用等技术内容,并提到了多个开源安全工具和漏洞利用工具的更新。 2026-3-31 06:6:5 Author: blog.badsectorlabs.com(查看原文) 阅读量:23 收藏

🏟️❤️🤖 Ludus MCP/Skills (@badsectorlabs), Grapefruit 📱 security suite (@CodeColorist), 2 Citrix NetScaler posts (@AlizTheHax0r + @_mccaulay), 🔒 BIOS bypass (@craigsblackie), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-03-24 to 2026-03-30.

News

Techniques and Write-ups

Tools and Exploits

  • ludus-mcp - MCP server for managing Ludus cyber ranges.
  • ludus-skills - AI agent skills Ludus cyber ranges.
  • Open-source mobile security testing suite - The "Grapefruit" mobile testing tool is back!
  • emulat3 - Step through PE functions or shellcode instruction-by-instruction (amd64).
  • scion - Run multiple agents in parallel — each in its own container, with its own workspace, collaborating on your code or project files simultaneously.
  • 8FC8_Patcher - Patcher for Dell 8FC8 suffix UEFI written in Python.
  • red-run - Security assessment toolkit for Claude Code.
  • KrakenHashes v2.0.0 - RBAC, SSO, priority based scheduling, passkey support, and more in this big update of the distributed password cracking system.
  • BridgeHead - Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.
  • trustme - BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation.
  • NOFILTER-NFEXEC - Havoc C2 BOF — WFP kernel-space SYSTEM escalation + command execution with indirect syscalls, patchless AMSI/ETW bypass, and return address spoofing.
  • CustomLoadImage - Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer.
  • QuicFuscate - Efficiency-centric, anti-censorship QUIC/HTTP/3 VPN protocol with adaptive FEC and SIMD-accelerated AEAD.
  • homelable - Self-hosted homelab infrastructure visualizer — interactive network diagram with live status monitoring.
  • InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • raptor - Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we configure the agent for adversarial thinking, and perform research or attack/defense operations.
  • Don't Kill My Pretty RSS Feed - Pour one out for XSLT.
  • kernel-hack-drill - This is a playground for the Linux kernel exploitation experiments. Only basic methods. Just for fun.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.


文章来源: https://blog.badsectorlabs.com/last-week-in-security-lwis-2026-03-30.html
如有侵权请联系:admin#unsafe.sh