A lightweight native DLL mapping library that supports mapping directly from memory
Features
- Imports and delay imports are resolved
- Relocations are performed
- Image sections are mapped with the correct page protection
- Exception handlers are initialised
- A security cookie is generated and initialised
- DLL entry point and TLS callbacks are called
Getting started
The example below demonstrates a simple implementation of the library
var libraryMapper = new LibraryMapper(process, dllBytes);
// Map the DLL into the process
libraryMapper.MapLibrary();
// Unmap the DLL from the process
libraryMapper.UnmapLibrary();
Constructors
LibraryMapper(Process, Memory<byte>)
LibraryMapper(Process, string)
Properties
DllBaseAddress
Methods
MapLibrary()
UnmapLibrary()
Caveats
- Mapping requires the presence of a PDB for ntdll.dll, and, so, the library will automatically download the latest version of this PDB from the Microsoft symbol server and cache it in
%appdata%/Lunar/Dependencies
via KitPloit
Related posts
- Free Pentest Tools For Windows
- Hack Tools For Mac
- Hacking Tools 2019
- Hacking Tools Usb
- Hacker Tools For Ios
- Pentest Tools Find Subdomains
- Best Pentesting Tools 2018
- Hacker Tools Apk
- Hacking Tools Free Download
- Beginner Hacker Tools
- Hacker Tools For Mac
- Ethical Hacker Tools
- Pentest Reporting Tools
- World No 1 Hacker Software
- Hack Tools Github
- Hacking Tools Hardware
- Pentest Recon Tools
- Github Hacking Tools
- Hacker Tools Windows
- Hacking Tools For Windows Free Download
- Hacker Tools Free
- Hacking Tools Hardware
- Hack App
- Black Hat Hacker Tools
- Hack Tools For Games
- Best Hacking Tools 2020
- Hacking Tools Hardware
- Tools 4 Hack
No comments:
Post a Comment