A lightweight native DLL mapping library that supports mapping directly from memory
Features
- Imports and delay imports are resolved
- Relocations are performed
- Image sections are mapped with the correct page protection
- Exception handlers are initialised
- A security cookie is generated and initialised
- DLL entry point and TLS callbacks are called
Getting started
The example below demonstrates a simple implementation of the library
var libraryMapper = new LibraryMapper(process, dllBytes);
// Map the DLL into the process
libraryMapper.MapLibrary();
// Unmap the DLL from the process
libraryMapper.UnmapLibrary();Constructors
LibraryMapper(Process, Memory<byte>)LibraryMapper(Process, string)Properties
DllBaseAddressMethods
MapLibrary()UnmapLibrary()Caveats
- Mapping requires the presence of a PDB for ntdll.dll, and, so, the library will automatically download the latest version of this PDB from the Microsoft symbol server and cache it in
%appdata%/Lunar/Dependencies
via KitPloit
More info
- Hacker Search Tools
- Blackhat Hacker Tools
- Hacking Tools For Beginners
- Ethical Hacker Tools
- New Hacker Tools
- Hacking Tools For Pc
- Hacker Hardware Tools
- Best Pentesting Tools 2018
- Hacker Tools 2020
- World No 1 Hacker Software
- Pentest Tools For Windows
- Hacking Tools Windows
- Termux Hacking Tools 2019
- Termux Hacking Tools 2019
- Pentest Tools Website Vulnerability
- Hacking Tools Hardware
- Hacker Tools Mac
- Hack Tool Apk
- Pentest Tools For Mac
- Pentest Tools Kali Linux
- Pentest Tools Apk
- Free Pentest Tools For Windows
- Nsa Hack Tools Download
- Pentest Tools Website Vulnerability
- Hacking Tools 2020
- What Are Hacking Tools
- Game Hacking

No comments:
Post a Comment
Have something to say about one of the videos or blogs, well here is a chance to do that now!!! Yes, you can do it, you know you can!!!!!