OldSchoolHack

Registrieren / Anmelden Deutsch

Extreme Injector v2.1


icon Extreme Injector v2.1 #1

Anmeldungsdatum: Mai 2014

Beiträge: 411

Benutzer-Bewertung:

20 positiv
11 negativ
Kategorie: Tools
Entwickler: Master131

Beschreibung:
Features:
- Colourful and customizable GUI
- Process List
- Multi-DLL injection (with options to enable/disable DLLs to inject)
- Auto-Inject
- Stealth Inject
- Close on inject
- DLL Scrambling (scrambles DLLs on injection to make hacks harder to detect and make detected hacks work again)
- 'Un-inject' DLLs
- Mutiple injection methods (Standard, LdrLoadDll Stub, Thread Hijacking and Manual Map)
- Drag and drop support
- 64-bit injection support.

How to use:
- Download and extract the attachment
- Run Extreme Injector v2 by master131.exe
- (optional) Click Settings and then Start in Secure Mode to avoid Anti-Cheat detection of the injector itself.
- Type in a process name into the box (including the extension). If you want to target a specific process or select by window name, use the Select button.
- (Note) If you are injecting into Combat Arms, make sure to type in Engine.exe
- Add the DLLs you want by clicking on the Add DLL button. You can also drag and drop them into the DLL list.
- You can disable/enable which DLLs to inject so you can keep your favourite DLLs without needing to find them each time.
- Go into Settings and customise the settings to your liking. Everything should be straight forward.
- (Note) You do not need to use the "Scramble DLL" button under Tools unless you want to use a scrambled DLL with a seperate injector. The injector will automatically scramble the file before it is injected into the game.
- (Note) If you are injecting into Combat Arms, make sure to tick Auto-Inject and start the game.
- Click Inject and enjoy! (or wait for the process to start and let it auto-inject if you ticked auto-inject)

Please explain the Injection Methods!
This version of the injector introduces 2 new injection techniques.
- Standard - This is the injection technique used in nearly every injector out there. It uses CreateRemoteThread and LoadLibrary and is the most reliable injection technique.
- LdrLoadDll Stub - This is similar to the Standard injection technique except it goes 1 level deeper into LoadLibrary.
- Thread Hijacking - This was the "Alt" injection techinique seen in the previous version. It is pretty stable and is not used by many injectors.
- Manual Map - This is the most secure injection technique. So secure that even Windows won't even know about the injected DLL. This injection technique may have problems with hacks that are packed with a packer so try another method if this doesn't work.

Please explain the Scramble Options!
If you've used DLL Scrambler, you're probably familiar with these options.
- Scramble DLL - Tick this to enable/disable DLL Scrambling completely
- Scramble Header - This will scramble the area around the start of the file which should not impact the DLL at all
- Remove Debug Data - This will remove a string in the DLL (as well as 'Debug Data') which Anti-Cheat vendors *could* use as a signature.
- Append Random Data - This will add random data to the end of the file.
- Shift Section Code - This will shift or move some of the assembly code (and other data in the DLL) using a random offset. This is good if an anti-cheat tries to search for a specific signature at a specific offset.


Please explain the Post-Inject Options!
These post-inject techniques are often seen within hacks to try prevent detection from anti-cheats but this injector can do it externally if the hack doesn't do it already.
- Erase PE - This erases the PE headers at the start of the injected DLL, making it hard for anti-cheats to identify that a DLL exists at a specific location.
- Hide Module - This hides the DLL from the process' module list so if an anti-cheat were to search through a process' module list, it would not appear.

About the new 64-bit injection:
That's right, this new version of Extreme Injector supports 64-bit DLLs and 64-bit processes. On a 64-bit computer, the injector runs as a 64-bit process and on a 32-bit computer, it runs as a 32-bit process. That means you can inject 64-bit hacks into 64-bit processes (don't worry, you can still inject into 32-bit processes on a 64-bit OS). There's a problem though. There are probably zero 64-bit hacks out there and there are hardly any 64-bit games. This is just a feature I decided to add for the future. For example, the next version of the Frostbite engine (used by Battlefield) will force users to have a 64-bit OS. This may be useful if 64-bit hacks were to appear.

Known bugs/limitations:
- Thread Hijacking is not supported at all on XP 64-bit.
- 64-bit injection only supports Standard injection (if you choose another injection technique, it will automatically use the Standard one).

When using 'Start in Secure Mode'....
If your anti-virus detects a threat/virus when you click on it, please ignore it or temporarily disable your anti-virus, it's a false positive. I would never infect any users with anything. Note that you should NOT add an exclusion to the Temp folder as any REAL viruses that emerge there might get through.


Injection failed...?
Try using another injection method, some do not work with all hacks.

Requirements:
Um Links zu sehen, musst du dich registrieren

Screenshots:
https://www.oldschoolhack.me/hackdata/screenshot/thumb/eeda5d6fcfa11d2664b4ef58b84d2d2a.jpg https://www.oldschoolhack.me/hackdata/screenshot/thumb/cc8fbfe57b4dec75f51b8e9711158d3b.jpg

Download:
Extreme Injector v2.1

__________________

AIMBOT????

https://i.chzbgr.com/maxW500/4551215616/hA0AA39D4/

I DONT SEE ANY AIMBOT

http://data.sinhvienit.net/2011/T05/img/SinhVienIT.NET---aimboto.gif

JUST SKILLS MY FRIEND!!!
1 positiv
0 negativ
Dieser Beitrag wurde bewertet von:
Jame404NotFound (Fr 25. Dez 2015, 14:42)
icon #2

Anmeldungsdatum: Mai 2014

Beiträge: 411

Benutzer-Bewertung:

20 positiv
11 negativ
Kategorie: Tools
Entwickler: master131

Beschreibung:
http://i.imgur.com/s8HZ5F6.png

http://i.imgur.com/LrFDr0V.png

http://i.imgur.com/8DbWjPq.png

Features:
- Colourful and customizable GUI
- Process List
- Multi-DLL injection (with options to enable/disable DLLs to inject)
- Auto-Inject
- Stealth Inject
- Close on inject
- DLL Scrambling (scrambles DLLs on injection to make hacks harder to detect and make detected hacks work again)
- 'Un-inject' DLLs
- Mutiple injection methods (Standard, LdrLoadDll Stub, LdrpLoadDll Stub, Thread Hijacking and Manual Map)
- Drag and drop support
- 64-bit injection support
- Automatic Visual C++ depedency installer


How to use:
- Download and extract the attachment
- Run Extreme Injector v3.exe
- (optional) Click Settings and then Start in Secure Mode to avoid Anti-Cheat detection of the injector itself.
- Type in a process name into the box (including the extension). If you want to target a specific process or select by window name, use the Select button.
- (Note) If you are injecting into Combat Arms, make sure to type in Engine.exe
- Add the DLLs you want by clicking on the Add DLL button. You can also drag and drop them into the DLL list.
- You can disable/enable which DLLs to inject so you can keep your favourite DLLs without needing to find them each time.
- Go into Settings and customise the settings to your liking. Everything should be straight forward (do not mess around with Advanced settings unless you know what you are doing).
- (Note) If you are injecting into Combat Arms, make sure to tick Auto-Inject and start the game.
- Click Inject and enjoy! (or wait for the process to start and let it auto-inject if you ticked auto-inject)

Please explain the Injection Methods!
This version of the injector introduces 2 new injection techniques.
- Standard - This is the injection technique used in nearly every injector out there. It uses CreateRemoteThread and LoadLibrary and is the most reliable injection technique.
- LdrLoadDll Stub - This is similar to the Standard injection technique except it goes 1 level deeper into LoadLibrary.
- LdrpLoadDll Stub - This goes even another level deeper into LdrLoadDll. It may crash or cause errors on OSes newer than Windows 8.1 as it can change.
- Thread Hijacking - This is a pretty stable method of injection that takes over already executing code to inject your DLL and is not used by many injectors.
- Manual Map - This is the most secure injection technique. So secure that even Windows won't even know about the injected DLL. It may not work properly on OSes newer than Windows 8.1, you will be told what to do by the injector in that case.

Please explain the Scramble Options!
With the new version of Extreme Injector v3, there are way too many options to explain so I've created handy presets to make things easier:
None - As the name implies, this means that DLL scrambling is disabled completely.
Basic - This applies basic scrambling that should work with most DLLs.
Standard - This applies even more scrambling options that should work with most DLLs.
Extreme - Applies all scrambling options (the best/strongest preset) that could break some DLLs but should work with most.

Please explain the Post-Inject Options!
These post-inject techniques are often seen within hacks to try prevent detection from anti-cheats but this injector can do it externally if the hack doesn't do it already.
- Erase PE - This erases the PE headers at the start of the injected DLL, making it hard for anti-cheats to identify that a DLL exists at a specific location.
- Hide Module - This hides the DLL from the process' module list so if an anti-cheat were to search through a process' module list, it would not appear.

Warning: Most modern anti-cheats these days can still easily detect DLLs even with these options enabled. The most secure method would be using manual map.

Known bugs/limitations:
- Thread Hijacking is not supported at all on XP 64-bit.
- LdrpLoadDll has only been tested on XP, Vista, 7, 8 and 8.1. It will probably not work on anything newer than that.
- "Create new entrypoint" under scrambling advanced options does not support 64-bit DLLs.

When using 'Start in Secure Mode'....
If your anti-virus detects a threat/virus when you click on it, please ignore it or temporarily disable your anti-virus, it's a false positive. I would never infect any users with anything. Note that you should NOT add an exclusion to the Temp folder as any REAL viruses that emerge there might get through.

Injection failed...?
Try another injection method and see what happens. Feel free to take a screenshot or copy and paste the error message here so I can look into it. Make sure to mention what OS you are running.

What's the Visual C++ depedency installer?

If Extreme Injector detects that a hack you are adding requires MSVCR<version>.dll or MSVCP<version>.dll and you do not have it installed, it will offer to automatically download the correct version (x86 or x64) from the Microsoft website and install it for you. If it detects the hack you are adding requires MSVCR<version>D.dll or MSVCP<version>D.dll, it will automatically download the correct version (x86 ox x64) and save it to the correct folder (C:\Windows\system32 or C:\Windows\SysWOW64). This is all so people don't complain about non-working hacks and don't end up downloading and saving files to the wrong place.

http://i.imgur.com/xALfx1z.png

Requirements:
Um Links zu sehen, musst du dich registrieren

Um Links zu sehen, musst du dich registrieren
Credits:
DarthTon - Better manual map code (originally coded in C++, ported to C# by me, Um Links zu sehen, musst du dich registrieren).
Darawk - Thread hijacking code concept.

If your anti-virus detects this as a virus, ignore it or add an exclusion. It is not a virus, you can run it under a sandbox and log every single thing it does, it's harmless.

If you copied your settings.xml from a previous version, please double-check your scrambling options as it may appear as "Custom" because of the newly added options.


Screenshots:
https://www.oldschoolhack.me/hackdata/screenshot/thumb/36ee1d3bcefc04c56c157838a9c7b0ef.jpg https://www.oldschoolhack.me/hackdata/screenshot/thumb/212735552de1b425600f998066e8cc41.jpg https://www.oldschoolhack.me/hackdata/screenshot/thumb/b8aa47e6a5d2692c0cc8271c8247ec70.jpg

Download:
Extreme Injector v3.3

__________________

AIMBOT????

https://i.chzbgr.com/maxW500/4551215616/hA0AA39D4/

I DONT SEE ANY AIMBOT

http://data.sinhvienit.net/2011/T05/img/SinhVienIT.NET---aimboto.gif

JUST SKILLS MY FRIEND!!!
icon #3

Anmeldungsdatum: Apr 2015

Beiträge: 7

Moin,
wenn ich das Ding herunterlade, kommt bei mir die meldung, dass nicht genügend systemrecourcen verfügbar sind. 

Also ich downloade es und dann ist ein winrar ordner in meinem Downloads ordner. wenn ich die Extreme Injektor exe daraus auf den desktop ziehe, kommt da eine Textdatei mit der o.g. fehlermeldung herraus.

kann mir jmd helfen?
ps: bin ein kleiner noob haha
icon #4

Anmeldungsdatum: Apr 2015

Beiträge: 2

Ich hab das Problem, das er gar nicht erst startet

Problemsignatur:
  Problemereignisname:    APPCRASH
  Anwendungsname:    Extreme Injector v3.exe
  Anwendungsversion:    3.3.0.0
  Anwendungszeitstempel:    53a0b543
  Fehlermodulname:    clr.dll
  Fehlermodulversion:    4.0.30319.269
  Fehlermodulzeitstempel:    4ee9d6e1
icon #5

Anmeldungsdatum: Mai 2015

Beiträge: 6

Benutzer-Bewertung:

0 positiv
1 negativ
ich brauch eure hilfe bei mir öffnet er sich garnicht. es passiert 0
icon #6

Anmeldungsdatum: Jun 2015

Beiträge: 7

Benutzer-Bewertung:

0 positiv
1 negativ
Wieso stürzt das tool beim Injecten ab?
mfg

icon #7

Anmeldungsdatum: Jul 2015

Beiträge: 1

Totally safe... Um Links zu sehen, musst du dich registrieren
icon #8

Anmeldungsdatum: Jul 2015

Beiträge: 1

The injector don't even start up....
icon #9

Anmeldungsdatum: Aug 2007

Beiträge: 1957

Kategorie: Tools
Entwickler: master131

Beschreibung:
Features:
- Colourful and customizable GUI
- Process List
- Multi-DLL injection (with options to enable/disable DLLs to inject)
- Auto-Inject
- Stealth Inject
- Close on inject
- DLL Scrambling (scrambles DLLs on injection to make hacks harder to detect and make detected hacks work again)
- 'Un-inject' DLLs
- Mutiple injection methods (Standard, LdrLoadDll Stub, LdrpLoadDll Stub, Thread Hijacking and Manual Map)
- Drag and drop support
- 64-bit injection support
- Automatic Visual C++ depedency installer
- Execute exported functions after injection


How to use:
- Download and extract the attachment
- Run Extreme Injector v3.exe
- (optional) Click Settings and then Start in Secure Mode to avoid Anti-Cheat detection of the injector itself.
- Type in a process name into the box (including the extension). If you want to target a specific process or select by window name, use the Select button.
- (Note) If you are injecting into Combat Arms, make sure to type in Engine.exe
- Add the DLLs you want by clicking on the Add DLL button. You can also drag and drop them into the DLL list.
- You can disable/enable which DLLs to inject so you can keep your favourite DLLs without needing to find them each time.
- Go into Settings and customise the settings to your liking. Everything should be straight forward (do not mess around with Advanced settings unless you know what you are doing).
- (Note) If you are injecting into Combat Arms, make sure to tick Auto-Inject and start the game.
- Click Inject and enjoy! (or wait for the process to start and let it auto-inject if you ticked auto-inject)



Please explain the Injection Methods!
This version of the injector introduces 2 new injection techniques.
- Standard - This is the injection technique used in nearly every injector out there. It uses CreateRemoteThread and LoadLibrary and is the most reliable injection technique.
- LdrLoadDll Stub - This is similar to the Standard injection technique except it goes 1 level deeper into LoadLibrary.
- LdrpLoadDll Stub - This goes even another level deeper into LdrLoadDll. It may crash or cause errors on OSes newer than Windows 10 as it can change.
- Thread Hijacking - This is a pretty stable method of injection that takes over already executing code to inject your DLL and is not used by many injectors.
- Manual Map - This is the most secure injection technique. So secure that even Windows won't even know about the injected DLL. It may not work properly on OSes newer than Windows 10, you will be told what to do by the injector in that case.


Please explain the Scramble Options!
With the new version of Extreme Injector v3, there are way too many options to explain so I've created handy presets to make things easier:
None - As the name implies, this means that DLL scrambling is disabled completely.
Basic - This applies basic scrambling that should work with most DLLs.
Standard - This applies even more scrambling options that should work with most DLLs.
Extreme - Applies all scrambling options (the best/strongest preset) that could break some DLLs but should work with most.


Please explain the Post-Inject Options!
These post-inject techniques are often seen within hacks to try prevent detection from anti-cheats but this injector can do it externally if the hack doesn't do it already.
- Erase PE - This erases the PE headers at the start of the injected DLL, making it hard for anti-cheats to identify that a DLL exists at a specific location.
- Hide Module - This hides the DLL from the process' module list so if an anti-cheat were to search through a process' module list, it would not appear.

Warning: Most modern anti-cheats these days can still easily detect DLLs even with these options enabled. The most secure method would be using manual map.


Known bugs/limitations:
- Thread Hijacking is not supported at all on XP 64-bit.
- LdrpLoadDll has only been tested on XP, Vista, 7, 8, 8.1 and 10. It will probably not work on anything newer than that.
- "Create new entrypoint" under scrambling advanced options does not support 64-bit DLLs.


When using 'Start in Secure Mode'....
If your anti-virus detects a threat/virus when you click on it, please ignore it or temporarily disable your anti-virus, it's a false positive. I would never infect any users with anything. Note that you should NOT add an exclusion to the Temp folder as any REAL viruses that emerge there might get through.


Injection failed...?
Try another injection method and see what happens. Feel free to take a screenshot or copy and paste the error message here so I can look into it. Make sure to mention what OS you are running.


OMG, why is the injector connecting to the internet?
So people can stay up to date, I've added a simple update check which connects to my WP blog. It does not offer any direct links or download anything by itself, it only tells you to go to wherever you downloaded the injector or to visit my blog for more information.


Requirements:
.NET Framework 4

Changelog:
Changes since version 3.5/3.5.1/3.5.2 (31st July 2015):
- Fixed exception that occurs on DEP enabled processes on Windows 10.
- Fixed bug with GUI under Advanced Options for injection.
- The Disable SEH Validation option now actually does what it says.
- Fixed critical bug relating to code that resolves exports for Windows 10 modules.
- Fixed bug where exception would be thrown when no export function parameters were specified.
- Fixed manual map support for Windows 8.1 (broken in 3.4).

Changes since version 3.4 (29th July 2015):
- General stability fixes (crashes with 64-bit).
- Updated compatbility with Windows 8.1 and 10 (blame Microsoft and their compatibility "fixes").
- Secure Mode now closes previous instance.
- Fixed critical bug that would have prevented hacks using exception handlers (mainly packed/protected DLLs) from working in manual map mode.
- Added DirectX dependency detection.
- Added the ability to call exported functions after injection (use the ... button next to the listed DLL)
- Added a simple update notification.

Changes since version 3.3 (17th June 2014):
- Fixed bug where 1 CPU core was used because the injector was waiting for *itself* to close (no, it wasn't because of a RAT).
- Fixed bug where attempting to unload a module on a 64-bit process resulted in an exception.
- Fixed bug where the injector threw an exception from writing a scrambled DLL that was in use.
- Added support for LdrpLoadDll on Windows 8.1 Update 1 (64-bit).
- Added missing dependency required for ZIP extraction to work correctly (made the injector crash during Visual C++ Debug dependency installation).
- Added a threads list to the process information window.
- Added a new "Strip section characteristics" option to the Extreme preset of scrambling options.
- Added a new "Shift section memory" option to the Extreme preset of scrambling options, should *significantly* improve the ability for hacks to evade anti-cheat detection. This option is much more powerful on 32-bit DLLs, but is still somewhat effective on 64-bit DLLs.

Changes since version 3.2 (9th June 2014):
- Fixed bug where auto-inject did not seem to work
- Addressed possible crashing from messages failing to display during injection

Changes since version 3.1 (3rd June 2014):
- Fixed bug where a message box would appear randomly if a Visual C++ dependency was missing (leftover from testing code)
- Fixed bug where selecting "No" from the prompt under Advanced in Injection Method would untick the wrong box
- Injector now displays a message box saying that injection was successful

Changes since version 3.0 (31st May 2014):
- Complete rewrite from scratch (same and familiar look from previous versions)
- All injection techniques are now 100% compatible with 64-bit DLLs
- Drag-and-drop fixed when run as administrator on newer OSes
- Automatically elevates without asking if it knows you have administrator rights
- Better scaling on displays with a DPI higher than 96
- Added a Visual C++ Dependency Installer
- Manual map now supports DLLs that use SEH to work (better packer support, eg. Themida, Enigma, etc)
- New injection technique: LdrpLoadDll
- Better exception/error reporting
- New scrambling engine, more scrambling methods
- Removed "Append Random Data" as it just wasted disk space and is ineffective
- Improved detection of different OS versions
- Dynamic assembly code generation (powered by AsmJit)
- Seperate process, thread and window manager, does not rely on .NET Process class anymore
- "Start in Secure Mode" creates an even more "secure" instance of Extreme Injector

Screenshots:
https://www.oldschoolhack.me/hackdata/screenshot/thumb/e9390e57b3be962354e7df4d1435ac25.jpg https://www.oldschoolhack.me/hackdata/screenshot/thumb/6073c31970ed3be6d2aa9723c03a3c23.jpg

Download:
Extreme Injector v3.5.2
icon #10

Anmeldungsdatum: Nov 2013

Beiträge: 15

Benutzer-Bewertung:

2 positiv
0 negativ
eigentlich der beste injector auf dieser seite, weil der hier am wenigsten viren hat xD
icon #11

Anmeldungsdatum: Aug 2015

Beiträge: 3

Benutzer-Bewertung:

0 positiv
1 negativ
need help!!
I open and run as administrator and do nothing just is thinking a bit and not have antivirus and opens off what to do?

icon #12

Anmeldungsdatum: Jul 2015

Beiträge: 2

i have windows 10 and it doesnt work 
icon #13

Anmeldungsdatum: Aug 2015

Beiträge: 7

Ich wollte mir gerade den Extreme Injector hier herunterladen dann kam eine Meldung meines Antiviren Programmens (Norton) dass es ein Trojaner ist. Stimmt das oder ist mein Antivirus zu empfindlich?
icon #14

Anmeldungsdatum: Jul 2015

Beiträge: 12

Leute es ist kein trojaner xd
viren frei
icon #15

Anmeldungsdatum: Jul 2015

Beiträge: 171

Benutzer-Bewertung:

12 positiv
5 negativ
Best injector out there, thanks master131.
1 positiv
0 negativ
Dieser Beitrag wurde bewertet von:
X6VeNoM9X (Sa 5. Sep 2015, 22:39)
icon #16

Anmeldungsdatum: Okt 2015

Beiträge: 1

Does not Work on Windows 10

icon #17

Anmeldungsdatum: Okt 2015

Beiträge: 1

Infelizmente ele NÃO funciona no Windows 10  .
Alguma solução por favor.


Unfortunately it does NOT work on Windows 10 .
Any solution please .
icon #18

Anmeldungsdatum: Okt 2015

Beiträge: 2

hey chrome keeps on blocking it how do I stop it like I cant get it help??? [so this comment can be posted TROLOLOLOLOLOLOLOLOLOLOLLOLOLOLOLOLOLOLOLOLLLOLOLOLOLLOLOLOLOLOLOLLOLOLOLOLLOLOLOLLOLOLOLOLLOLOLOLOLLOLOLOLOLOLOLOLOLLOLOLOLOLOLOLOLOLLOLOLOLOLOLOLLOLOLOLOLOLOLOLOLOLOLOLOLLOLOLOLOLOLO] there
icon #19

Anmeldungsdatum: Okt 2015

Beiträge: 2

oh I figured it out
icon #20

Anmeldungsdatum: Okt 2015

Beiträge: 1

Please Master131 how i can fix this Um Links zu sehen, musst du dich registrieren ?