Tuesday, April 14, 2020

Lunar - A Lightweight Native DLL Mapping Library That Supports Mapping Directly From Memory


A lightweight native DLL mapping library that supports mapping directly from memory

Features
  • Imports and delay imports are resolved
  • Relocations are performed
  • Image sections are mapped with the correct page protection
  • Exception handlers are initialised
  • A security cookie is generated and initialised
  • DLL entry point and TLS callbacks are called

Getting started
The example below demonstrates a simple implementation of the library
var libraryMapper = new LibraryMapper(process, dllBytes);

// Map the DLL into the process

libraryMapper.MapLibrary();

// Unmap the DLL from the process

libraryMapper.UnmapLibrary();

Constructors
LibraryMapper(Process, Memory<byte>)
Provides the functionality to map a DLL from memory into a remote process
LibraryMapper(Process, string)
Provides the functionality to map a DLL from disk into a remote process

Properties
DllBaseAddress
The base address of the DLL in the remote process after it has been mapped

Methods
MapLibrary()
Maps the DLL into the remote process
UnmapLibrary()
Unmaps the DLL from the remote process

Caveats
  • Mapping requires the presence of a PDB for ntdll.dll, and, so, the library will automatically download the latest version of this PDB from the Microsoft symbol server and cache it in %appdata%/Lunar/Dependencies




via KitPloit

More info


  1. Pentest Tools Open Source
  2. Pentest Recon Tools
  3. New Hack Tools
  4. Black Hat Hacker Tools
  5. Hacking Tools
  6. Best Pentesting Tools 2018
  7. Hacking Tools Usb
  8. Hacking Tools
  9. Hackers Toolbox
  10. Hacker Techniques Tools And Incident Handling
  11. Pentest Tools Subdomain
  12. Best Hacking Tools 2019
  13. Hacking Tools 2020
  14. Free Pentest Tools For Windows
  15. Wifi Hacker Tools For Windows
  16. Hacker Tools For Ios
  17. How To Hack

No comments: