splunk / PPLinject
Inject unsigned DLL into Protected Process Light (PPL)
☆13Updated last year
Related projects ⓘ
Alternatives and complementary repositories for PPLinject
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆49Updated last year
- APC DLL Injector with NtQueueApcThread and wake up thread support☆44Updated 7 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆95Updated last year
- ☆98Updated 2 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆105Updated 2 years ago
- ☆67Updated last year
- ☆26Updated 2 months ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆26Updated 3 years ago
- ☆22Updated last year
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆20Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆87Updated 2 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Dynamically generated obfuscated jumps and/or function calls☆33Updated last year
- A ready-made template for a project based on libpeconv.☆41Updated last month
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆47Updated 2 months ago
- Command like tool to print mitigation flags for running processes in a memory dump☆44Updated 4 years ago
- Next gen process injection technique☆42Updated 4 years ago
- Detours implementation (x64/x86) which used only ntdll import☆88Updated 5 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆83Updated last year
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- Windows API Call Obfuscation☆93Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆100Updated last year
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆31Updated 2 years ago
- ☆17Updated 3 years ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- Finding Truth in the Shadows☆84Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆48Updated last year
- Minifilter Callback Patching Proof-of-Concept☆62Updated 2 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆29Updated 2 years ago
- research revolving the windows filtering platform callout mechanism☆21Updated 5 months ago