TaskHound is an open-source security tool designed to assist red teamers, penetration testers and security operations teams in identifying high-risk scheduled tasks on Windows systems. It focuses on tasks running under privileged or Tier-0 accounts (Domain Admins) or tasks using stored credentials, which can represent significant exploitation opportunities. TaskHound automates the auditing of the Windows Task Scheduler environment by scanning remote machines via SMB, retrieving task XML definitions and parsing them for risky attributes (For example tasks running as Administrator, tasks with stored clear text credentials). The tool supports integration with BloodHound (both the Community Edition and Legacy formats) to enrich scheduled task data with Active Directory attack path context. For example, it can map tasks to Tier 0 users and flag where tasks provide direct RunsAs relations that may facilitate escalation. Additional capabilities include, offline mode (processing previously collected XMLs without live network access), SID resolution via LDAP, password age comparison (relative to task creation date) to highlight stale credentials, and detection of whether Windows Credential Guard is enabled (which may affect ability to dump DPAPI protected task credentials). Because it uses standard SMB/RPC operations (via impacket under the hood), TaskHound emphasizes OPSEC considerations,especially in adversary simulation scenarios where noisy scanning may be detected.
A critical vulnerability in Apache Tika, tracked as CVE-2025-66516, allows attackers to compromise servers by uploading a specially crafted PDF file. The flaw impacts Apache Tika C...
Security researchers from SAFA uncovered four critical kernel heap overflow vulnerabilities in Avast Antivirus’s aswSnx.sys driver, tracked under CVE-2025-13032 and affecting ver...
Attackers with limited AWS permissions can still gain elevated access by manipulating boot-time or startup configurations on compute services such as EC2 and SageMaker. This issue,...