Jump to content
Logo
Your Metin2 zone for C++, Python, Lua.

Extreme Injector v3.7.3


GameCore

Recommended Posts

Colorful and fully customizable GUI

Process list

Multi-DLL injection (with the option to enable/disable different DLLs for injection)

Auto-Inject

Stealth Inject

Close on injection

DLL Scrambling (encrypts DLL files upon injection to make hacks harder to detect and makes detectable hacks potentially work again)

'Un-inject' DLLs (i.e., if you have injected DLLs, this will un-inject them)

Various injection methods (Standard, LdrLoadDll Stub, LdrpLoadDll Stub, Thread Hijacking, and Manual Map)

Support for 'Drag and Drop' method

Support for 64-bit injection

Automatic installation of Visual C++ dependencies

Execute exported functions after injection

How to use:

Download and extract the attachment

Run Extreme Injector v3.exe

(Optionally) Go to the Settings tab and then click Start in Secure Mode to prevent the injector from being detected by Anti-Cheat

Type the process name (including the extension, which in most cases will be .exe). If you want to target a specific process or choose by window name, use the Select button

(Note) If you are injecting into Combat Arms, make sure you have entered Engine.exe

Add your DLL files by clicking the Add DLL button. You can also drag and drop them

You can also enable/disable DLLs for injection, so you can keep your favorite DLLs in the program without having to find them again

Go to Settings and customize it to your own preferences. Everything should be straightforward (don't mess with anything in Advanced settings if you don't know what you're doing)

(Note) If you are injecting into Combat Arms, make sure Auto-Inject is checked and start the game

Click Inject and you're done! (unless you've checked the auto-inject option, then you have to wait until the process starts and then it will automatically inject)

Injection methods:

Standard: The most basic method used in every injector, utilizes CreateRemoteThread and LoadLibrary

LdrLoadDLL Stub: Similar to the standard method but goes one level lower in LoadLibrary

LdrpLoadDll Stub: Injection at an even lower level, may cause system crashes on systems higher than Windows 8.1 if their kernel is altered

Thread Hijacking: One of the more stable injection methods, it hijacks currently executing code to inject your DLL library, rarely used by other injectors

Manual Map: One of the safest techniques, so safe that even Windows won't know about the injected DLL, may not work correctly on Windows systems higher than 8.1, you will be informed if this is going to happen

Encryption methods:

None: No interaction with the DLL file

Basic: Basic encryption, should work with most DLL files

Standard: Applies a bit more encryption options, should still work with most DLL files

Extreme: Applies all possible encryption methods, may damage some DLL files

Post-injection options:

Erase PE: Removes the PE headers at the beginning of the DLL file, making it much harder to detect by Anti-Cheat at the indicated location

Hide Module: Hides the DLL from the process's module list

 

Download:

This is the hidden content, please

  • Like 1
Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Style Version: 0.1

The code was completely created from scratch and optimized.

The basic style on which it was created: Default

Created by: Grzyb.ovh

The style was to be simple to browse topics, devoid of graphics, uniform in color and definitely simple. ×

×
×
  • Create New...

Important Information

Do you like cookies? 🍪 We use cookies to provide the highest quality of service. Learn more