Monday, 13 April 2020

Lunar - A Lightweight Native DLL Mapping Library That Supports Mapping Directly From Memory


A lightweight native DLL mapping library that supports mapping directly from memory

Features
  • Imports and delay imports are resolved
  • Relocations are performed
  • Image sections are mapped with the correct page protection
  • Exception handlers are initialised
  • A security cookie is generated and initialised
  • DLL entry point and TLS callbacks are called

Getting started
The example below demonstrates a simple implementation of the library
var libraryMapper = new LibraryMapper(process, dllBytes);

// Map the DLL into the process

libraryMapper.MapLibrary();

// Unmap the DLL from the process

libraryMapper.UnmapLibrary();

Constructors
LibraryMapper(Process, Memory<byte>)
Provides the functionality to map a DLL from memory into a remote process
LibraryMapper(Process, string)
Provides the functionality to map a DLL from disk into a remote process

Properties
DllBaseAddress
The base address of the DLL in the remote process after it has been mapped

Methods
MapLibrary()
Maps the DLL into the remote process
UnmapLibrary()
Unmaps the DLL from the remote process

Caveats
  • Mapping requires the presence of a PDB for ntdll.dll, and, so, the library will automatically download the latest version of this PDB from the Microsoft symbol server and cache it in %appdata%/Lunar/Dependencies




via KitPloitRelated articles
  1. Hacker Tools Linux
  2. Pentest Tools Bluekeep
  3. Nsa Hacker Tools
  4. Pentest Tools Framework
  5. Pentest Recon Tools
  6. Hack Tools Download
  7. Hacker Techniques Tools And Incident Handling
  8. Pentest Tools For Android
  9. Hacker Tools Free
  10. Hacker Tools 2019
  11. Tools 4 Hack
  12. Hack Website Online Tool
  13. Hack Tools Online
  14. Pentest Tools Github
  15. Hack Tools 2019
  16. Pentest Tools Free
  17. Nsa Hack Tools Download

No comments:

Post a Comment