windows-lateral-movement

Fail

Audited by Socket on Apr 9, 2026

2 alerts found:

Malwarex2
MalwareHIGH
SKILL.md

MALICIOUS: this skill’s stated purpose is offensive Windows lateral movement, and its actual footprint matches that malicious purpose across multiple dimensions. It teaches credential-enabled remote execution, pivoting, defense evasion, and transitive loading of more attack content; while most referenced tools are publicly known, the overall skill is incompatible with benign agent use.

Confidence: 96%Severity: 99%
MalwareHIGH
CREDENTIAL_DUMPING.md

The provided module content is an explicit, operational credential-dumping and secret-extraction playbook targeting Windows and Active Directory authentication material (LSASS, registry hives, DPAPI, cached creds, NTDS.dit), including local and remote extraction steps and references to evasion/bypass tactics. It contains no defensive purpose and is directly actionable for unauthorized credential theft, making it a critical supply-chain security concern.

Confidence: 94%Severity: 100%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:14 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Fwindows-lateral-movement%2F@57814ded6d3b1c3805287ab6202127db22902ff2