performing-lateral-movement-with-wmiexec

Fail

Audited by Socket on Apr 12, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

SUSPICIOUS/HIGH-RISK skill. The stated purpose is openly offensive and the actual footprint matches: remote execution, subnet-wide lateral movement, pass-the-hash, persistence, and credential harvesting. Tool references are partly legitimate and verifiable, so this is not confirmed malware, but it is a dangerous exploit-oriented AI skill with high operational and credential risk.

Confidence: 95%Severity: 93%
MalwareHIGH
references/workflows.md

This artifact is an explicit malicious lateral-movement playbook detailing credential theft (Mimikatz/LaZagne/SAM dumps), account enumeration, and iterative pivoting using WMIExec with operational fallbacks. It describes high-risk post-exploitation techniques intended to achieve remote code execution and domain compromise. Without clear authorized red-team context and controls, treat as malicious guidance and investigate any implementation or distribution.

Confidence: 88%Severity: 95%
Audit Metadata
Analyzed At
Apr 12, 2026, 06:05 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-lateral-movement-with-wmiexec%2F@1d2dbf4f7429ca40a3d287bf5c47df609ef844b2