Peneter Tools – Telegram
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
https://github.com/reveng007/DarkWidow
With PPLDescribe, you can retrieve information about processes that are protected by PPL. The tool parses PS_PROTECTION, PS_PROTECTED_TYPE and PS_PROTECTED_SIGNER structures to retrieve the information
#Credential_access
https://github.com/MzHmO/PPLDescribe
Forwarded from SoheilSec (Soheil Hashemi)
Teler Real-time HTTP intrusion detection
https://github.com/kitabisa/teler
lateral movement noscript that leverages the CcmExec service to remotely hijack user sessions.

https://github.com/mandiant/CcmPwn