├── CreateProcessAsPPL.vcxproj.filters
├── README.md
├── CreateProcessAsPPL.sln
├── .gitattributes
├── CreateProcessAsPPL.vcxproj
├── .gitignore
└── CreateProcessAsPPL.cpp
/CreateProcessAsPPL.vcxproj.filters:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 | {4FC737F1-C7A5-4376-A066-2A32D752A2FF}
6 | cpp;c;cc;cxx;c++;cppm;ixx;def;odl;idl;hpj;bat;asm;asmx
7 |
8 |
9 | {93995380-89BD-4b04-88EB-625FBE52EBFB}
10 | h;hh;hpp;hxx;h++;hm;inl;inc;ipp;xsd
11 |
12 |
13 | {67DA6AB6-F800-4c08-8B7A-83BB121AAD01}
14 | rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms
15 |
16 |
17 |
18 |
19 | Source Files
20 |
21 |
22 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | ### CreateProcessAsPPL
2 |
3 | If you want to run a program with PPL protection enabled, then this tool will help you do that.
4 |
5 | ### Command Line Syntax
6 |
7 | **CreateProcessAsPPL.exe Mode:0-4 path_to_exe arg0 arg1 ...**
8 |
9 | **Mode:**
10 |
11 | * PROTECTION_LEVEL_WINTCB_LIGHT 0
12 | * PROTECTION_LEVEL_WINDOWS 1
13 | * PROTECTION_LEVEL_WINDOWS_LIGHT 2
14 | * PROTECTION_LEVEL_ANTIMALWARE_LIGHT 3
15 | * PROTECTION_LEVEL_LSA_LIGHT 4
16 |
17 | ## Links
18 |
19 | [An article about exploiting the PPL program to destroy Windows Defender](https://www.zerosalarium.com/2025/08/countering-edrs-with-backing-of-ppl-protection.html)
20 |
21 | [WSASS - Tool to dump the LSASS process on modern Windows 11](https://github.com/TwoSevenOneT/WSASS)
22 |
23 | [An article about exploiting WerFaultSecure.exe to dump LSASS](https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html)
24 |
25 | ## ☕ Like what I do? You can fuel my creativity with a coffee!
26 |
27 | [](https://buymeacoffee.com/twosevenonethree)
28 |
29 | ## Tools For Security Researcher and Hacker
30 |
31 | Essential tools that every security researcher and hacker should have in their toolkit:
32 |
33 | [Essential Tools For Security Researcher and Hacker](https://www.zerosalarium.com/p/essential-tools-for-security-researcher.html)
34 |
35 | ## READING
36 |
37 | Some books you should read to sharpen your cybersecurity skills, especially in offensive security:
38 |
39 | [Books on Programming and Cybersecurity recommended by Zero Salarium Researchers](https://www.zerosalarium.com/2025/10/books-on-programming-and-cybersecurity-recommended.html)
40 |
41 | ## Author:
42 |
43 | [Two Seven One Three](https://x.com/TwoSevenOneT)
44 |
--------------------------------------------------------------------------------
/CreateProcessAsPPL.sln:
--------------------------------------------------------------------------------
1 |
2 | Microsoft Visual Studio Solution File, Format Version 12.00
3 | # Visual Studio Version 17
4 | VisualStudioVersion = 17.13.35825.156 d17.13
5 | MinimumVisualStudioVersion = 10.0.40219.1
6 | Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "CreateProcessAsPPL", "CreateProcessAsPPL.vcxproj", "{4E850EA4-209F-44A7-9104-E4A34A00CB83}"
7 | EndProject
8 | Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "PPLSupportCheck", "..\PPLSupportCheck\PPLSupportCheck.vcxproj", "{62DB1282-7224-41F9-A328-5F52241D8E0D}"
9 | EndProject
10 | Global
11 | GlobalSection(SolutionConfigurationPlatforms) = preSolution
12 | Debug|x64 = Debug|x64
13 | Debug|x86 = Debug|x86
14 | Release|x64 = Release|x64
15 | Release|x86 = Release|x86
16 | EndGlobalSection
17 | GlobalSection(ProjectConfigurationPlatforms) = postSolution
18 | {4E850EA4-209F-44A7-9104-E4A34A00CB83}.Debug|x64.ActiveCfg = Debug|x64
19 | {4E850EA4-209F-44A7-9104-E4A34A00CB83}.Debug|x64.Build.0 = Debug|x64
20 | {4E850EA4-209F-44A7-9104-E4A34A00CB83}.Debug|x86.ActiveCfg = Debug|Win32
21 | {4E850EA4-209F-44A7-9104-E4A34A00CB83}.Debug|x86.Build.0 = Debug|Win32
22 | {4E850EA4-209F-44A7-9104-E4A34A00CB83}.Release|x64.ActiveCfg = Release|x64
23 | {4E850EA4-209F-44A7-9104-E4A34A00CB83}.Release|x64.Build.0 = Release|x64
24 | {4E850EA4-209F-44A7-9104-E4A34A00CB83}.Release|x86.ActiveCfg = Release|Win32
25 | {4E850EA4-209F-44A7-9104-E4A34A00CB83}.Release|x86.Build.0 = Release|Win32
26 | {62DB1282-7224-41F9-A328-5F52241D8E0D}.Debug|x64.ActiveCfg = Debug|x64
27 | {62DB1282-7224-41F9-A328-5F52241D8E0D}.Debug|x64.Build.0 = Debug|x64
28 | {62DB1282-7224-41F9-A328-5F52241D8E0D}.Debug|x86.ActiveCfg = Debug|Win32
29 | {62DB1282-7224-41F9-A328-5F52241D8E0D}.Debug|x86.Build.0 = Debug|Win32
30 | {62DB1282-7224-41F9-A328-5F52241D8E0D}.Release|x64.ActiveCfg = Release|x64
31 | {62DB1282-7224-41F9-A328-5F52241D8E0D}.Release|x64.Build.0 = Release|x64
32 | {62DB1282-7224-41F9-A328-5F52241D8E0D}.Release|x86.ActiveCfg = Release|Win32
33 | {62DB1282-7224-41F9-A328-5F52241D8E0D}.Release|x86.Build.0 = Release|Win32
34 | EndGlobalSection
35 | GlobalSection(SolutionProperties) = preSolution
36 | HideSolutionNode = FALSE
37 | EndGlobalSection
38 | GlobalSection(ExtensibilityGlobals) = postSolution
39 | SolutionGuid = {DA304F95-660D-4540-A20E-2244CD10F7F0}
40 | EndGlobalSection
41 | EndGlobal
42 |
--------------------------------------------------------------------------------
/.gitattributes:
--------------------------------------------------------------------------------
1 | ###############################################################################
2 | # Set default behavior to automatically normalize line endings.
3 | ###############################################################################
4 | * text=auto
5 |
6 | ###############################################################################
7 | # Set default behavior for command prompt diff.
8 | #
9 | # This is need for earlier builds of msysgit that does not have it on by
10 | # default for csharp files.
11 | # Note: This is only used by command line
12 | ###############################################################################
13 | #*.cs diff=csharp
14 |
15 | ###############################################################################
16 | # Set the merge driver for project and solution files
17 | #
18 | # Merging from the command prompt will add diff markers to the files if there
19 | # are conflicts (Merging from VS is not affected by the settings below, in VS
20 | # the diff markers are never inserted). Diff markers may cause the following
21 | # file extensions to fail to load in VS. An alternative would be to treat
22 | # these files as binary and thus will always conflict and require user
23 | # intervention with every merge. To do so, just uncomment the entries below
24 | ###############################################################################
25 | #*.sln merge=binary
26 | #*.csproj merge=binary
27 | #*.vbproj merge=binary
28 | #*.vcxproj merge=binary
29 | #*.vcproj merge=binary
30 | #*.dbproj merge=binary
31 | #*.fsproj merge=binary
32 | #*.lsproj merge=binary
33 | #*.wixproj merge=binary
34 | #*.modelproj merge=binary
35 | #*.sqlproj merge=binary
36 | #*.wwaproj merge=binary
37 |
38 | ###############################################################################
39 | # behavior for image files
40 | #
41 | # image files are treated as binary by default.
42 | ###############################################################################
43 | #*.jpg binary
44 | #*.png binary
45 | #*.gif binary
46 |
47 | ###############################################################################
48 | # diff behavior for common document formats
49 | #
50 | # Convert binary document formats to text before diffing them. This feature
51 | # is only available from the command line. Turn it on by uncommenting the
52 | # entries below.
53 | ###############################################################################
54 | #*.doc diff=astextplain
55 | #*.DOC diff=astextplain
56 | #*.docx diff=astextplain
57 | #*.DOCX diff=astextplain
58 | #*.dot diff=astextplain
59 | #*.DOT diff=astextplain
60 | #*.pdf diff=astextplain
61 | #*.PDF diff=astextplain
62 | #*.rtf diff=astextplain
63 | #*.RTF diff=astextplain
64 |
--------------------------------------------------------------------------------
/CreateProcessAsPPL.vcxproj:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 | Debug
6 | Win32
7 |
8 |
9 | Release
10 | Win32
11 |
12 |
13 | Debug
14 | x64
15 |
16 |
17 | Release
18 | x64
19 |
20 |
21 |
22 | 17.0
23 | Win32Proj
24 | {4e850ea4-209f-44a7-9104-e4a34a00cb83}
25 | CreateProcessAsPPL
26 | 10.0
27 |
28 |
29 |
30 | Application
31 | true
32 | v143
33 | Unicode
34 |
35 |
36 | Application
37 | false
38 | v143
39 | true
40 | Unicode
41 |
42 |
43 | Application
44 | true
45 | v143
46 | Unicode
47 |
48 |
49 | Application
50 | false
51 | v143
52 | true
53 | Unicode
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 | Level3
76 | true
77 | WIN32;_DEBUG;_CONSOLE;%(PreprocessorDefinitions)
78 | true
79 |
80 |
81 | Console
82 | true
83 |
84 |
85 |
86 |
87 | Level3
88 | true
89 | true
90 | true
91 | WIN32;NDEBUG;_CONSOLE;%(PreprocessorDefinitions)
92 | true
93 |
94 |
95 | Console
96 | true
97 | true
98 | true
99 |
100 |
101 |
102 |
103 | Level3
104 | true
105 | _DEBUG;_CONSOLE;%(PreprocessorDefinitions)
106 | true
107 |
108 |
109 | Console
110 | true
111 |
112 |
113 |
114 |
115 | Level3
116 | true
117 | true
118 | true
119 | NDEBUG;_CONSOLE;%(PreprocessorDefinitions)
120 | true
121 | MultiThreaded
122 |
123 |
124 | Console
125 | true
126 | true
127 | true
128 |
129 |
130 |
131 |
132 |
133 |
134 |
135 |
136 |
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 | ## Ignore Visual Studio temporary files, build results, and
2 | ## files generated by popular Visual Studio add-ons.
3 | ##
4 | ## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore
5 |
6 | # User-specific files
7 | *.rsuser
8 | *.suo
9 | *.user
10 | *.userosscache
11 | *.sln.docstates
12 |
13 | # User-specific files (MonoDevelop/Xamarin Studio)
14 | *.userprefs
15 |
16 | # Mono auto generated files
17 | mono_crash.*
18 |
19 | # Build results
20 | [Dd]ebug/
21 | [Dd]ebugPublic/
22 | [Rr]elease/
23 | [Rr]eleases/
24 | x64/
25 | x86/
26 | [Ww][Ii][Nn]32/
27 | [Aa][Rr][Mm]/
28 | [Aa][Rr][Mm]64/
29 | bld/
30 | [Bb]in/
31 | [Oo]bj/
32 | [Oo]ut/
33 | [Ll]og/
34 | [Ll]ogs/
35 |
36 | # Visual Studio 2015/2017 cache/options directory
37 | .vs/
38 | # Uncomment if you have tasks that create the project's static files in wwwroot
39 | #wwwroot/
40 |
41 | # Visual Studio 2017 auto generated files
42 | Generated\ Files/
43 |
44 | # MSTest test Results
45 | [Tt]est[Rr]esult*/
46 | [Bb]uild[Ll]og.*
47 |
48 | # NUnit
49 | *.VisualState.xml
50 | TestResult.xml
51 | nunit-*.xml
52 |
53 | # Build Results of an ATL Project
54 | [Dd]ebugPS/
55 | [Rr]eleasePS/
56 | dlldata.c
57 |
58 | # Benchmark Results
59 | BenchmarkDotNet.Artifacts/
60 |
61 | # .NET Core
62 | project.lock.json
63 | project.fragment.lock.json
64 | artifacts/
65 |
66 | # ASP.NET Scaffolding
67 | ScaffoldingReadMe.txt
68 |
69 | # StyleCop
70 | StyleCopReport.xml
71 |
72 | # Files built by Visual Studio
73 | *_i.c
74 | *_p.c
75 | *_h.h
76 | *.ilk
77 | *.meta
78 | *.obj
79 | *.iobj
80 | *.pch
81 | *.pdb
82 | *.ipdb
83 | *.pgc
84 | *.pgd
85 | *.rsp
86 | *.sbr
87 | *.tlb
88 | *.tli
89 | *.tlh
90 | *.tmp
91 | *.tmp_proj
92 | *_wpftmp.csproj
93 | *.log
94 | *.vspscc
95 | *.vssscc
96 | .builds
97 | *.pidb
98 | *.svclog
99 | *.scc
100 |
101 | # Chutzpah Test files
102 | _Chutzpah*
103 |
104 | # Visual C++ cache files
105 | ipch/
106 | *.aps
107 | *.ncb
108 | *.opendb
109 | *.opensdf
110 | *.sdf
111 | *.cachefile
112 | *.VC.db
113 | *.VC.VC.opendb
114 |
115 | # Visual Studio profiler
116 | *.psess
117 | *.vsp
118 | *.vspx
119 | *.sap
120 |
121 | # Visual Studio Trace Files
122 | *.e2e
123 |
124 | # TFS 2012 Local Workspace
125 | $tf/
126 |
127 | # Guidance Automation Toolkit
128 | *.gpState
129 |
130 | # ReSharper is a .NET coding add-in
131 | _ReSharper*/
132 | *.[Rr]e[Ss]harper
133 | *.DotSettings.user
134 |
135 | # TeamCity is a build add-in
136 | _TeamCity*
137 |
138 | # DotCover is a Code Coverage Tool
139 | *.dotCover
140 |
141 | # AxoCover is a Code Coverage Tool
142 | .axoCover/*
143 | !.axoCover/settings.json
144 |
145 | # Coverlet is a free, cross platform Code Coverage Tool
146 | coverage*.json
147 | coverage*.xml
148 | coverage*.info
149 |
150 | # Visual Studio code coverage results
151 | *.coverage
152 | *.coveragexml
153 |
154 | # NCrunch
155 | _NCrunch_*
156 | .*crunch*.local.xml
157 | nCrunchTemp_*
158 |
159 | # MightyMoose
160 | *.mm.*
161 | AutoTest.Net/
162 |
163 | # Web workbench (sass)
164 | .sass-cache/
165 |
166 | # Installshield output folder
167 | [Ee]xpress/
168 |
169 | # DocProject is a documentation generator add-in
170 | DocProject/buildhelp/
171 | DocProject/Help/*.HxT
172 | DocProject/Help/*.HxC
173 | DocProject/Help/*.hhc
174 | DocProject/Help/*.hhk
175 | DocProject/Help/*.hhp
176 | DocProject/Help/Html2
177 | DocProject/Help/html
178 |
179 | # Click-Once directory
180 | publish/
181 |
182 | # Publish Web Output
183 | *.[Pp]ublish.xml
184 | *.azurePubxml
185 | # Note: Comment the next line if you want to checkin your web deploy settings,
186 | # but database connection strings (with potential passwords) will be unencrypted
187 | *.pubxml
188 | *.publishproj
189 |
190 | # Microsoft Azure Web App publish settings. Comment the next line if you want to
191 | # checkin your Azure Web App publish settings, but sensitive information contained
192 | # in these scripts will be unencrypted
193 | PublishScripts/
194 |
195 | # NuGet Packages
196 | *.nupkg
197 | # NuGet Symbol Packages
198 | *.snupkg
199 | # The packages folder can be ignored because of Package Restore
200 | **/[Pp]ackages/*
201 | # except build/, which is used as an MSBuild target.
202 | !**/[Pp]ackages/build/
203 | # Uncomment if necessary however generally it will be regenerated when needed
204 | #!**/[Pp]ackages/repositories.config
205 | # NuGet v3's project.json files produces more ignorable files
206 | *.nuget.props
207 | *.nuget.targets
208 |
209 | # Microsoft Azure Build Output
210 | csx/
211 | *.build.csdef
212 |
213 | # Microsoft Azure Emulator
214 | ecf/
215 | rcf/
216 |
217 | # Windows Store app package directories and files
218 | AppPackages/
219 | BundleArtifacts/
220 | Package.StoreAssociation.xml
221 | _pkginfo.txt
222 | *.appx
223 | *.appxbundle
224 | *.appxupload
225 |
226 | # Visual Studio cache files
227 | # files ending in .cache can be ignored
228 | *.[Cc]ache
229 | # but keep track of directories ending in .cache
230 | !?*.[Cc]ache/
231 |
232 | # Others
233 | ClientBin/
234 | ~$*
235 | *~
236 | *.dbmdl
237 | *.dbproj.schemaview
238 | *.jfm
239 | *.pfx
240 | *.publishsettings
241 | orleans.codegen.cs
242 |
243 | # Including strong name files can present a security risk
244 | # (https://github.com/github/gitignore/pull/2483#issue-259490424)
245 | #*.snk
246 |
247 | # Since there are multiple workflows, uncomment next line to ignore bower_components
248 | # (https://github.com/github/gitignore/pull/1529#issuecomment-104372622)
249 | #bower_components/
250 |
251 | # RIA/Silverlight projects
252 | Generated_Code/
253 |
254 | # Backup & report files from converting an old project file
255 | # to a newer Visual Studio version. Backup files are not needed,
256 | # because we have git ;-)
257 | _UpgradeReport_Files/
258 | Backup*/
259 | UpgradeLog*.XML
260 | UpgradeLog*.htm
261 | ServiceFabricBackup/
262 | *.rptproj.bak
263 |
264 | # SQL Server files
265 | *.mdf
266 | *.ldf
267 | *.ndf
268 |
269 | # Business Intelligence projects
270 | *.rdl.data
271 | *.bim.layout
272 | *.bim_*.settings
273 | *.rptproj.rsuser
274 | *- [Bb]ackup.rdl
275 | *- [Bb]ackup ([0-9]).rdl
276 | *- [Bb]ackup ([0-9][0-9]).rdl
277 |
278 | # Microsoft Fakes
279 | FakesAssemblies/
280 |
281 | # GhostDoc plugin setting file
282 | *.GhostDoc.xml
283 |
284 | # Node.js Tools for Visual Studio
285 | .ntvs_analysis.dat
286 | node_modules/
287 |
288 | # Visual Studio 6 build log
289 | *.plg
290 |
291 | # Visual Studio 6 workspace options file
292 | *.opt
293 |
294 | # Visual Studio 6 auto-generated workspace file (contains which files were open etc.)
295 | *.vbw
296 |
297 | # Visual Studio LightSwitch build output
298 | **/*.HTMLClient/GeneratedArtifacts
299 | **/*.DesktopClient/GeneratedArtifacts
300 | **/*.DesktopClient/ModelManifest.xml
301 | **/*.Server/GeneratedArtifacts
302 | **/*.Server/ModelManifest.xml
303 | _Pvt_Extensions
304 |
305 | # Paket dependency manager
306 | .paket/paket.exe
307 | paket-files/
308 |
309 | # FAKE - F# Make
310 | .fake/
311 |
312 | # CodeRush personal settings
313 | .cr/personal
314 |
315 | # Python Tools for Visual Studio (PTVS)
316 | __pycache__/
317 | *.pyc
318 |
319 | # Cake - Uncomment if you are using it
320 | # tools/**
321 | # !tools/packages.config
322 |
323 | # Tabs Studio
324 | *.tss
325 |
326 | # Telerik's JustMock configuration file
327 | *.jmconfig
328 |
329 | # BizTalk build output
330 | *.btp.cs
331 | *.btm.cs
332 | *.odx.cs
333 | *.xsd.cs
334 |
335 | # OpenCover UI analysis results
336 | OpenCover/
337 |
338 | # Azure Stream Analytics local run output
339 | ASALocalRun/
340 |
341 | # MSBuild Binary and Structured Log
342 | *.binlog
343 |
344 | # NVidia Nsight GPU debugger configuration file
345 | *.nvuser
346 |
347 | # MFractors (Xamarin productivity tool) working folder
348 | .mfractor/
349 |
350 | # Local History for Visual Studio
351 | .localhistory/
352 |
353 | # BeatPulse healthcheck temp database
354 | healthchecksdb
355 |
356 | # Backup folder for Package Reference Convert tool in Visual Studio 2017
357 | MigrationBackup/
358 |
359 | # Ionide (cross platform F# VS Code tools) working folder
360 | .ionide/
361 |
362 | # Fody - auto-generated XML schema
363 | FodyWeavers.xsd
--------------------------------------------------------------------------------
/CreateProcessAsPPL.cpp:
--------------------------------------------------------------------------------
1 | #include
2 | #include
3 | #include
4 | #include
5 | #include
6 |
7 | #pragma comment(lib, "advapi32.lib")
8 |
9 | class PPLProcessCreator
10 | {
11 | private:
12 | HANDLE m_hProcess;
13 | HANDLE m_hThread;
14 |
15 | public:
16 | PPLProcessCreator() : m_hProcess(nullptr), m_hThread(nullptr) {}
17 | ~PPLProcessCreator()
18 | {
19 | if (m_hProcess) CloseHandle(m_hProcess);
20 | if (m_hThread) CloseHandle(m_hThread);
21 | }
22 |
23 | DWORD GetPPLProtectionLevel(DWORD processId)
24 | {
25 | DWORD protectionLevel = 0;
26 | HANDLE hProcess = OpenProcess(PROCESS_QUERY_LIMITED_INFORMATION, FALSE, processId);
27 |
28 | if (hProcess)
29 | {
30 | PROCESS_PROTECTION_LEVEL_INFORMATION protectionInfo;
31 | DWORD returnLength = 0;
32 |
33 | if (GetProcessInformation(hProcess, ProcessProtectionLevelInfo,
34 | &protectionInfo, sizeof(protectionInfo)))
35 | {
36 | protectionLevel = protectionInfo.ProtectionLevel;
37 | }
38 |
39 | CloseHandle(hProcess);
40 | }
41 |
42 | return protectionLevel;
43 | }
44 | std::wstring GetPPLProtectionLevelName(DWORD protectionLevel)
45 | {
46 | switch (protectionLevel)
47 | {
48 | case PROTECTION_LEVEL_WINTCB_LIGHT:
49 | return L"PROTECTION_LEVEL_WINTCB_LIGHT";
50 | case PROTECTION_LEVEL_WINDOWS:
51 | return L"PROTECTION_LEVEL_WINDOWS";
52 | case PROTECTION_LEVEL_WINDOWS_LIGHT:
53 | return L"PROTECTION_LEVEL_WINDOWS_LIGHT";
54 | case PROTECTION_LEVEL_ANTIMALWARE_LIGHT:
55 | return L"PROTECTION_LEVEL_ANTIMALWARE_LIGHT";
56 | case PROTECTION_LEVEL_LSA_LIGHT:
57 | return L"PROTECTION_LEVEL_LSA_LIGHT";
58 | default:
59 | return L"Unknown protection level";
60 | }
61 | }
62 | bool CreatePPLProcess(DWORD protectionLevel, const std::wstring& executablePath, const std::wstring& commandLine = L"")
63 | {
64 | SIZE_T size = 0;
65 | STARTUPINFOEXW siex = { 0 };
66 | siex.StartupInfo.cb = sizeof(siex);
67 | PROCESS_INFORMATION pi = { 0 };
68 | LPPROC_THREAD_ATTRIBUTE_LIST ptal = nullptr;
69 |
70 | // Initialize attribute list size
71 | if (!InitializeProcThreadAttributeList(nullptr, 1, 0, &size) && GetLastError() != ERROR_INSUFFICIENT_BUFFER)
72 | {
73 | std::wcerr << L"InitializeProcThreadAttributeList failed: " << GetLastError() << std::endl;
74 | return false;
75 | }
76 |
77 | // Allocate attribute list
78 | ptal = reinterpret_cast(HeapAlloc(GetProcessHeap(), 0, size));
79 | if (!ptal)
80 | {
81 | std::wcerr << L"HeapAlloc failed: " << GetLastError() << std::endl;
82 | return false;
83 | }
84 |
85 | // Initialize attribute list
86 | if (!InitializeProcThreadAttributeList(ptal, 1, 0, &size))
87 | {
88 | std::wcerr << L"InitializeProcThreadAttributeList failed: " << GetLastError() << std::endl;
89 | HeapFree(GetProcessHeap(), 0, ptal);
90 | return false;
91 | }
92 |
93 | // Set protection level
94 | //DWORD protectionLevel = PROTECTION_LEVEL_ANTIMALWARE_LIGHT;
95 | if (!UpdateProcThreadAttribute(ptal, 0, PROC_THREAD_ATTRIBUTE_PROTECTION_LEVEL, &protectionLevel, sizeof(protectionLevel), nullptr, nullptr))
96 | {
97 | std::wcerr << L"UpdateProcThreadAttribute failed: " << GetLastError() << std::endl;
98 | DeleteProcThreadAttributeList(ptal);
99 | HeapFree(GetProcessHeap(), 0, ptal);
100 | return false;
101 | }
102 |
103 | siex.lpAttributeList = ptal;
104 |
105 | // Prepare command line (CreateProcessW requires modifiable string)
106 | std::wstring fullCommandLine = L"\"" + executablePath + L"\"";
107 | if (!commandLine.empty()) {
108 | fullCommandLine += L" " + commandLine;
109 | }
110 |
111 | std::vector cmdLineBuffer(fullCommandLine.begin(), fullCommandLine.end());
112 | cmdLineBuffer.push_back(L'\0');
113 |
114 | // Create process with PPL protection
115 | if (!CreateProcessW(
116 | executablePath.c_str(), // Application name
117 | cmdLineBuffer.data(), // Command line
118 | nullptr, // Process security attributes
119 | nullptr, // Thread security attributes
120 | FALSE, // Inherit handles
121 | EXTENDED_STARTUPINFO_PRESENT | CREATE_PROTECTED_PROCESS,
122 | nullptr, // Environment
123 | nullptr, // Current directory
124 | &siex.StartupInfo, // Startup info
125 | &pi)) // Process information
126 | {
127 | std::wcerr << L"CreateProcessW failed: " << GetLastError() << std::endl;
128 | DeleteProcThreadAttributeList(ptal);
129 | HeapFree(GetProcessHeap(), 0, ptal);
130 | return false;
131 | }
132 |
133 | // Clean up attribute list
134 | DeleteProcThreadAttributeList(ptal);
135 | HeapFree(GetProcessHeap(), 0, ptal);
136 |
137 | m_hProcess = pi.hProcess;
138 | m_hThread = pi.hThread;
139 |
140 | std::wcout << L"Successfully created PPL process with PID: " << pi.dwProcessId << std::endl;
141 | std::wcerr << L"Protection level: " << GetPPLProtectionLevelName(GetPPLProtectionLevel(pi.dwProcessId)) << std::endl;
142 | return true;
143 | }
144 |
145 | bool WaitForProcess(DWORD timeout = INFINITE)
146 | {
147 | if (!m_hProcess) return false;
148 |
149 | DWORD result = WaitForSingleObject(m_hProcess, timeout);
150 | if (result == WAIT_OBJECT_0) {
151 | DWORD exitCode;
152 | if (GetExitCodeProcess(m_hProcess, &exitCode)) {
153 | std::wcout << L"Process exited with code: " << exitCode << std::endl;
154 | }
155 | return true;
156 | }
157 |
158 | return false;
159 | }
160 |
161 | HANDLE GetProcessHandle() const { return m_hProcess; }
162 | HANDLE GetThreadHandle() const { return m_hThread; }
163 | };
164 |
165 | // Function to check if we have sufficient privileges
166 | bool CheckPrivileges()
167 | {
168 | HANDLE hToken;
169 | if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &hToken))
170 | {
171 | return false;
172 | }
173 |
174 | TOKEN_ELEVATION elevation;
175 | DWORD dwSize;
176 | bool isElevated = false;
177 |
178 | if (GetTokenInformation(hToken, TokenElevation, &elevation, sizeof(elevation), &dwSize))
179 | {
180 | isElevated = elevation.TokenIsElevated;
181 | }
182 |
183 | CloseHandle(hToken);
184 | return isElevated;
185 | }
186 |
187 | int wmain(int argc, wchar_t* argv[])
188 | {
189 | std::wcout << L"\nPPL Process Creator" << std::endl;
190 | std::wcout << L"Two Seven One Three: x.com/TwoSevenOneT" << std::endl;
191 | std::wcout << L"==================================================" << std::endl << std::endl;
192 | //
193 |
194 | // Check if running with sufficient privileges
195 | if (!CheckPrivileges())
196 | {
197 | std::wcerr << L"Error: This program requires elevated privileges (Run as Administrator)" << std::endl;
198 | return 1;
199 | }
200 |
201 | if (argc < 3)
202 | {
203 | std::wcout << L"Usage: " << argv[0] << L"[mode:0-4] [command_line_args]" << std::endl << std::endl;
204 | std::wcout << L"Example: " << argv[0] << L" 1 \"C:\\Windows\\System32\\PPL.exe\"" << std::endl << std::endl;
205 | std::wcout << L"MODE: " << std::endl;
206 | std::wcout << L"PROTECTION_LEVEL_WINTCB_LIGHT 00000000" << std::endl;
207 | std::wcout << L"PROTECTION_LEVEL_WINDOWS 00000001" << std::endl;
208 | std::wcout << L"PROTECTION_LEVEL_WINDOWS_LIGHT 00000002" << std::endl;
209 | std::wcout << L"PROTECTION_LEVEL_ANTIMALWARE_LIGHT 00000003" << std::endl;
210 | std::wcout << L"PROTECTION_LEVEL_LSA_LIGHT 00000004" << std::endl;
211 | return 1;
212 | }
213 | //#define PROTECTION_LEVEL_WINTCB_LIGHT 0x00000000
214 | //#define PROTECTION_LEVEL_WINDOWS 0x00000001
215 | //#define PROTECTION_LEVEL_WINDOWS_LIGHT 0x00000002
216 | //#define PROTECTION_LEVEL_ANTIMALWARE_LIGHT 0x00000003
217 | //#define PROTECTION_LEVEL_LSA_LIGHT 0x00000004
218 | wchar_t* end;
219 | long value = wcstol(argv[1], &end, 10);
220 | DWORD protectionLevel = PROTECTION_LEVEL_ANTIMALWARE_LIGHT;
221 | switch (value)
222 | {
223 | case 0:
224 | {
225 | protectionLevel = PROTECTION_LEVEL_WINTCB_LIGHT;
226 | break;
227 | }
228 | case 1:
229 | {
230 | protectionLevel = PROTECTION_LEVEL_WINDOWS;
231 | break;
232 | }
233 | case 2:
234 | {
235 | protectionLevel = PROTECTION_LEVEL_WINDOWS_LIGHT;
236 | break;
237 | }
238 | case 4:
239 | {
240 | protectionLevel = PROTECTION_LEVEL_LSA_LIGHT;
241 | break;
242 | }
243 | default:
244 | break;
245 | }
246 |
247 | PPLProcessCreator creator;
248 | std::wstring executablePath = argv[2];
249 | std::wstring commandLine;
250 |
251 | // Build command line from remaining arguments
252 | for (int i = 3; i < argc; ++i)
253 | {
254 | if (!commandLine.empty())
255 | {
256 | commandLine += L" ";
257 | }
258 | commandLine += argv[i];
259 | }
260 |
261 | // Create the PPL process
262 | if (creator.CreatePPLProcess(protectionLevel, executablePath, commandLine))
263 | {
264 | std::wcout << L"Process created successfully. Waiting for completion..." << std::endl;
265 | creator.WaitForProcess();
266 | return 0;
267 | }
268 | else
269 | {
270 | std::wcerr << L"Failed to create PPL process." << std::endl;
271 | return 1;
272 | }
273 | }
274 |
--------------------------------------------------------------------------------