- Bypassing LSA Protection in Userland https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/ 6 comments netsec
Linking pages
- GitHub - last-byte/RIPPL: RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows https://github.com/last-byte/RIPPL 2 comments
- GitHub - Spacial/awesome-csirt: Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities. https://github.com/Spacial/csirt 0 comments
- Bypassing PPL in Userland (again) – Sec Team Blog https://blog.scrt.ch/2023/03/17/bypassing-ppl-in-userland-again/ 0 comments
Linked pages
- Process Explorer - Sysinternals | Microsoft Learn https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer 49 comments
- Process Monitor - Sysinternals | Microsoft Learn https://docs.microsoft.com/en-us/sysinternals/downloads/procmon 14 comments
- Overview - Process Hacker https://processhacker.sourceforge.io/ 6 comments
- Do You Really Know About LSA Protection (RunAsPPL)? | itm4n's blog https://itm4n.github.io/lsass-runasppl/ 2 comments
- Microsoft Security Servicing Criteria for Windows https://www.microsoft.com/en-us/msrc/windows-security-servicing-criteria?rtc=1 0 comments
- WinObj - Sysinternals | Microsoft Learn https://docs.microsoft.com/en-gb/sysinternals/downloads/winobj 0 comments
Related searches:
Search whole site: site:blog.scrt.ch
Search title: Bypassing LSA Protection in Userland – Sec Team Blog
See how to search.