Windows PE (DLL / PPL)
The Windows PE (DLL / PPL) agent is a native Windows implant in Control Pack designed to operate as a DLL-based payload instead of a standalone executable.

It provides two operational modes:
DLL + PPL bypass implant
DLL library implant
Both options focus on executing code from inside an existing process context, rather than launching a separate EXE, helping reduce visibility and improve operational flexibility.
An optional UnHooker binary can also be included to reduce interference from user-mode monitoring.
Agent Types
When generating this agent, Control Pack provides two options under Agent type:
DLL library implant
This option generates a standard DLL-based implant that can be loaded into a process and executed as a library payload.
This mode is more suitable when:
A DLL-based implant is required
PPL-specific behavior is not necessary
A simpler in-process execution method is sufficient
It still avoids the need to run a visible standalone executable.
DLL + PPL bypass implant
This option generates a DLL implant designed to execute in a trusted process context and includes techniques intended to operate in environments where additional protections may be present (such as PPL-related constraints).
This mode is intended for scenarios where:
Higher trust execution context is desired
Additional protection mechanisms are expected
Stealth and stability are more important than simplicity
It is typically used in more advanced scenarios.
Optional UnHooker Binary
When enabled, the generated implant includes an additional component designed to remove user-mode API hooks that may be introduced by:
Security monitoring tools
Endpoint protection software
Instrumentation frameworks
This helps:
Reduce interference during execution
Improve stability
Avoid unexpected behavior caused by hooked APIs
The UnHooker is optional and can be enabled only when needed.
Execution Model
Both implant types follow the same general model:
The payload is delivered as a DLL, not an EXE
Execution occurs inside an existing process context
No standalone process needs to be created
Disk presence and visible artifacts are reduced compared to traditional executables
This makes these implants useful in environments where launching new binaries is undesirable.
Last updated
Was this helpful?