Code:
Version 1.9 (31st May 2012):
- Tweaked the Add DLL button to check valid DLLs more faster (and use less memory)
- Added a 'Start in Secure Mode' option in Settings that scrambles the injector itself to avoid Anti-Cheat detection.
Note: You don't need to tick anything, it automatically uses all the scrambling settings available to scramble the injector.
Version 1.8 (6th May 2012):
- Improved the Remove PDB Signature by making it erase ALL debug data and not just the path to the PDB file.
- Added a brand new injection method, you can use it by selecting 'Alt' next to 'Method' under 'Injection Options'.
- Fixed the Window List so it doesn't display windows from 64-bit processes.
- Slightly tweaked the standard injection method for processes that decide to load kernel32.dll in another location (this is pretty rare).
Most injectors assume that kernel32.dll is loaded at the same address in the target process and in the injector itself.
Version 1.7 (14th April 2012):
- Processes that are not accessible (eg. 64-bit processes) are no longer displayed in the process list.
- Tweaked the injecting method so that some processes can be injected into properly like Combat Arms.
- Fixed the process info window where access was denied.
- Refactored a large amount of code.
Version 1.6 (9th March 2012):
- Fixed the bug where the injector would crash/show an error whenever you try to inject with any scrambling options on.
(wonder why it took so long for someone to notice...)
Version 1.5 (27th February 2012):
- Fixed the bug where the 'Shift Assembly Code' box wouldn't gray out when 'Scramble DLL' was not checked.
- The injected DLL's checksum value is now automatically fixed when you scramble it if for some reason it is to be checked.
(perhaps a packer might use it for modification checks?)
- Fixed the bug where when the 'Shift Assembly Code' option was checked, any section name in the section table that was
8 letters long had the last character trimmed off.
Version 1.4 (26th February 2012):
- Added a 'Shift Assembly Code' option which shifts the assembly code (and other data) using a random offset to make it even MORE harder to detect DLLs.
- Fixed the About window (reported that it was v1.0 instead of the correct version)
Version 1.3 (4th February 2012):
- Minor fix with Process Information window.
- Added Unicode support (eg. those with East-Asian, Cryllic letters or other non-ASCII characters in their files paths)
- Fixed a bug where the injector would try overwriting a DLL (when it doesn't need to) when scrambling and stealth options were off.
- Fixed a bug where the injector would show an error if a process crashed when it was injected into.
Version 1.2 (18th January 2012):
- Minor fix with saving scrambled versions of files
- Minor fix with process name box
- Improved window list, now displays all windows instead of just the main ones of each process.
- Improved Scramble Header option
Version 1.1 (11th January 2012):
- Fixed a bug where when you scramble a DLL, it didn't convert the value into KBs and just left it as bytes