This is a proof-of-concept that shows how a technique such as Bring Your Own Vulnerable DLL (BYODLL) could be used to bypass LSA Protection, or more generally execute arbitrary code within Protected Processes on Windows.
For more information, please check out my blog post series entitled "Ghost in the PPL".
github.com
For more information, please check out my blog post series entitled "Ghost in the PPL".
GitHub - itm4n/PPLrevenant: Bypass LSA protection using the BYODLL technique
Bypass LSA protection using the BYODLL technique. Contribute to itm4n/PPLrevenant development by creating an account on GitHub.