Page 1 of 2 12 LastLast
Results 1 to 15 of 22
  1. #1
    Neechan''s Avatar
    Join Date
    Aug 2010
    Gender
    male
    Location
    HI !
    Posts
    5,722
    Reputation
    122
    Thanks
    1,318

    READ BEFORE YOU POST A INJECTOR

    If u use this Source Code:
    Code:
    Public Class Form1
        Private TargetProcessHandle As Integer
        Private pfnStartAddr As Integer
        Private pszLibFileRemote As String
        Private TargetBufferSize As Integer
    
        Public Const PROCESS_VM_READ = &H10
        Public Const TH32CS_SNAPPROCESS = &H2
        Public Const MEM_COMMIT = 4096
        Public Const PAGE_READWRITE = 4
        Public Const PROCESS_CREATE_THREAD = (&H2)
        Public Const PROCESS_VM_OPERATION = (&H8)
        Public Const PROCESS_VM_WRITE = (&H20)
        Dim DLLFileName As String
        Public Declare Function ReadProcessMemory Lib "kernel32" ( _
        ByVal hProcess As Integer, _
        ByVal lpBaseAddress As Integer, _
        ByVal lpBuffer As String, _
        ByVal nSize As Integer, _
        ByRef lpNumberOfBytesWritten As Integer) As Integer
    
        Public Declare Function LoadLibrary Lib "kernel32" Alias "LoadLibraryA" ( _
        ByVal lpLibFileName As String) As Integer
    
        Public Declare Function VirtualAllocEx Lib "kernel32" ( _
        ByVal hProcess As Integer, _
        ByVal lpAddress As Integer, _
        ByVal dwSize As Integer, _
        ByVal flAllocationType As Integer, _
        ByVal flProtect As Integer) As Integer
    
        Public Declare Function WriteProcessMemory Lib "kernel32" ( _
        ByVal hProcess As Integer, _
        ByVal lpBaseAddress As Integer, _
        ByVal lpBuffer As String, _
        ByVal nSize As Integer, _
        ByRef lpNumberOfBytesWritten As Integer) As Integer
    
        Public Declare Function GetProcAddress Lib "kernel32" ( _
        ByVal hModule As Integer, ByVal lpProcName As String) As Integer
    
        Private Declare Function GetModuleHandle Lib "Kernel32" Alias "GetModuleHandleA" ( _
        ByVal lpModuleName As String) As Integer
    
        Public Declare Function CreateRemoteThread Lib "kernel32" ( _
        ByVal hProcess As Integer, _
        ByVal lpThreadAttributes As Integer, _
        ByVal dwStackSize As Integer, _
        ByVal lpStartAddress As Integer, _
        ByVal lpParameter As Integer, _
        ByVal dwCreationFlags As Integer, _
        ByRef lpThreadId As Integer) As Integer
    
        Public Declare Function OpenProcess Lib "kernel32" ( _
        ByVal dwDesiredAccess As Integer, _
        ByVal bInheritHandle As Integer, _
        ByVal dwProcessId As Integer) As Integer
    
        Private Declare Function FindWindow Lib "user32" Alias "FindWindowA" ( _
        ByVal lpClassName As String, _
        ByVal lpWindowName As String) As Integer
    
        Private Declare Function CloseHandle Lib "kernel32" Alias "CloseHandleA" ( _
        ByVal hObject As Integer) As Integer
        Dim ExeName As String = IO.Path.GetFileNameWithoutExtension(Application.ExecutablePath)
        Private Sub Inject()
            
            Timer1.Stop()
            Dim TargetProcess As Process() = Process.GetProcessesByName(TextBox1.Text)
            TargetProcessHandle = OpenProcess(PROCESS_CREATE_THREAD Or PROCESS_VM_OPERATION Or PROCESS_VM_WRITE, False, TargetProcess(0).Id)
            pszLibFileRemote = OpenFileDialog1.FileName
            pfnStartAddr = GetProcAddress(GetModuleHandle("Kernel32"), "LoadLibraryA")
            TargetBufferSize = 1 + Len(pszLibFileRemote)
            Dim Rtn As Integer
            Dim LoadLibParamAdr As Integer
            LoadLibParamAdr = VirtualAllocEx(TargetProcessHandle, 0, TargetBufferSize, MEM_COMMIT, PAGE_READWRITE)
            Rtn = WriteProcessMemory(TargetProcessHandle, LoadLibParamAdr, pszLibFileRemote, TargetBufferSize, 0)
            CreateRemoteThread(TargetProcessHandle, 0, 0, pfnStartAddr, LoadLibParamAdr, 0, 0)
            CloseHandle(TargetProcessHandle)
    1:      Me.Show()
        End Sub
    
    
    
        Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
            timer1.interval = 50
            timer1.start()
    
    
    
        End Sub
    
        Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer1.Tick
            If IO.File.Exists(OpenFileDialog1.FileName) Then
                Dim TargetProcess As Process() = Process.GetProcessesByName(TextBox1.Text)
                If TargetProcess.Length = 0 Then
    
                    Me.Label1.Text = ("Waiting for " + TextBox1.Text + ".exe...")
                Else
                    Timer1.Stop()
                    Me.Label1.Text = "Successfully Injected!"
                    Call Inject()
                    If CheckBox1.Checked = True Then
                        Me.Close()
                    Else
                    End If
                End If
            Else
            End If
    
        End Sub
    
    
        Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button3.Click
            For i As Integer = (Dlls.SelectedItems.Count - 1) To 0 Step -1
                Dlls.Items.Remove(Dlls.SelectedItems(i))
            Next
    
        End Sub
        Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click
            Dlls.Items.Clear()
    
        End Sub
    
        Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
            OpenFileDialog1.Filter = "DLL (*.dll) |*.dll|(*.*) |*.*"
            OpenFileDialog1.ShowDialog()
            Dim FileName As String
            FileName = OpenFileDialog1.FileName.Substring(OpenFileDialog1.FileName.LastIndexOf("\"))
            Dim DllFileName As String = FileName.Replace("\", "")
            Me.Dlls.Items.Add(DllFileName)
    
        End Sub
        
    Private Sub Button4_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button4.Click
            If IO.File.Exists(OpenFileDialog1.FileName) Then
                Dim TargetProcess As Process() = Process.GetProcessesByName(TextBox1.Text)
                If TargetProcess.Length = 0 Then
    
                    Me.Label1.Text = ("Waiting for " + TextBox1.Text + ".exe...")
                Else
                    Timer1.Stop()
                    Me.Label1.Text = "Successfully Injected!"
                    Call Inject()
                    If CheckBox1.Checked = True Then
                        Me.Close()
                    Else
                    End If
                End If
            Else
            End If
        End Sub
    
        Private Sub RadioButton1_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles RadioButton1.CheckedChanged
            Button4.Enabled = False
            Timer1.Enabled = True
        End Sub
    
        Private Sub RadioButton2_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles RadioButton2.CheckedChanged
            Button4.Enabled = True
            Timer1.Enabled = False
    Stop use this Code... Its detected

    This source code have false positiv Virus.

    U can still use this Code
    This haven't virus.


    So, the Minions can see, if the Injector detected or not.
    @Jigsaw
    kkbai.
    Last edited by Neechan'; 08-19-2011 at 10:06 AM.

  2. The Following 11 Users Say Thank You to Neechan' For This Useful Post:

    -iFaDy..* (04-01-2012),AnimeKick (08-25-2011),Boody_EGY (08-11-2012),DaRk (08-25-2011),degaldevilkiss (08-18-2012),look3006 (08-28-2012),neon565656 (07-04-2012),saidhamzat2 (08-14-2012),stelioss (05-05-2012),THEBOYZRULE (08-05-2012),ulti.koko (09-27-2012)

  3. #2
    Jigsaw's Avatar
    Join Date
    Jun 2010
    Gender
    male
    Location
    Moon
    Posts
    23,219
    Reputation
    852
    Thanks
    2,089
    Useful info is useful, please don't even try post any injectors with this source code, we will close it immediately.
    DEHUMANIZE YOURSELF
    AND FACE TO BLOODSHED

  4. The Following 2 Users Say Thank You to Jigsaw For This Useful Post:

    Neechan' (08-19-2011),stelioss (05-05-2012)

  5. #3
    Jacket's Avatar
    Join Date
    Nov 2009
    Gender
    male
    Location
    Insert location here.
    Posts
    8,852
    Reputation
    917
    Thanks
    1,305
    My Mood
    Brooding
    Your old source.
    I can tell by the 1: Me.show() line.


    Ex-Minion
    Ex-Mod
    8/17/11

     

    Greycloak
    Midcent
    MrAntagonist
    WomboCombo
    JakeyXD
    Wolfram


  6. #4
    Neechan''s Avatar
    Join Date
    Aug 2010
    Gender
    male
    Location
    HI !
    Posts
    5,722
    Reputation
    122
    Thanks
    1,318
    Quote Originally Posted by Midcent View Post
    Your old source.
    I can tell by the 1: Me.show() line.
    .

  7. #5
    [G]enesis's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Location
    Italy,Rome ............. Posts: 7,429
    Posts
    999
    Reputation
    -1
    Thanks
    344
    My Mood
    Happy
    Yes and many leechers released a reflected version with bad errors

  8. #6
    Maybe this world is another planet's Hell.
    MPGH Member
    Arii's Avatar
    Join Date
    Mar 2011
    Gender
    male
    Location
    In my cardbox
    Posts
    2,116
    Reputation
    120
    Thanks
    117
    My Mood
    Breezy
    was about to use it
    MPGH's Official Facebook, Twitter, and Youtube page!






     
    Swiftdude
    Hero
    Jigsaw
    Alen
    JigsawJr

     
    Scata




  9. #7
    Jigsaw's Avatar
    Join Date
    Jun 2010
    Gender
    male
    Location
    Moon
    Posts
    23,219
    Reputation
    852
    Thanks
    2,089
    Quote Originally Posted by Arii View Post
    was about to use it
    And have your "hard work" deleted.
    DEHUMANIZE YOURSELF
    AND FACE TO BLOODSHED

  10. The Following User Says Thank You to Jigsaw For This Useful Post:

    stelioss (04-30-2012)

  11. #8
    Jason's Avatar
    Join Date
    Apr 2010
    Gender
    male
    Location
    /dev/null
    Posts
    5,704
    Reputation
    918
    Thanks
    7,676
    My Mood
    Mellow
    Protip: Learn to code before you try to make an injector, no problems.

    Quote Originally Posted by Jeremy S. Anderson
    There are only two things to come out of Berkley, Unix and LSD,
    and I don’t think this is a coincidence
    You can win the rat race,
    But you're still nothing but a fucking RAT.


    ++Latest Projects++
    [Open Source] Injection Library
    Simple PE Cipher
    FilthyHooker - Simple Hooking Class
    CLR Injector - Inject .NET dlls with ease
    Simple Injection - An in-depth look
    MPGH's .NET SDK
    eJect - Simple Injector
    Basic PE Explorer (BETA)

  12. #9
    brokenarrow_vip's Avatar
    Join Date
    Nov 2010
    Gender
    male
    Location
    ghghd
    Posts
    17
    Reputation
    10
    Thanks
    1
    My Mood
    Brooding
    cool code, I'm gonna make it undetected
    ADVERTISEMENT IS NOT ALLOWED.

    -MPGH STAFF

  13. #10
    Jigsaw's Avatar
    Join Date
    Jun 2010
    Gender
    male
    Location
    Moon
    Posts
    23,219
    Reputation
    852
    Thanks
    2,089
    Hmm good luck...
    DEHUMANIZE YOURSELF
    AND FACE TO BLOODSHED

  14. #11
    stelioss's Avatar
    Join Date
    Feb 2011
    Gender
    male
    Location
    nicosia
    Posts
    131
    Reputation
    10
    Thanks
    453
    My Mood
    Aggressive
    can someone tell him how to make in undetected ?
    Made Video How To Make Injector ? Done [UnPatched]


    Made Injector? Done
    https://www.mpgh.net/forum/290-crossf...ion-7-1-a.html

    Make Hack? No Done
    if someone can help me pls add me on skype : treliaris97

    Help Pepleo ? Done

    My Team https://www.mpgh.net/forum/groups/1483-x-force.html


    Credits In All Injectors

    [Deniz617(Coder )
    stelioss (I Make The Forms And Codes)
    ClaimIT (Coder)
    I_WANT_AWM (He Make Forms)

  15. #12
    ..x_X_x..'s Avatar
    Join Date
    Dec 2011
    Gender
    male
    Location
    On The [[[MoOoN]]]
    Posts
    1,812
    Reputation
    49
    Thanks
    620
    My Mood
    Angelic
    Man i use this source but i Rewrite some thing in it and Changed some line and it's working undetected with false postive virus::::::

  16. #13
    ClaimIT's Avatar
    Join Date
    Apr 2012
    Gender
    male
    Location
    Russia
    Posts
    73
    Reputation
    -2
    Thanks
    161
    My Mood
    Blah
    Quote Originally Posted by stelioss View Post
    can someone tell him how to make in undetected ?
    Use The Tutorial He Have Provided, Its Useful and Undetected



    IDK What Is Up There Just Was In My Mind xD


  17. #14
    allyza's Avatar
    Join Date
    Feb 2012
    Gender
    male
    Posts
    59
    Reputation
    10
    Thanks
    1
    My Mood
    Cheerful
    to those who post injectors!! we thank u for hard working!kindly attached if there is requirment needed,it will help us before we dl thosed injector!

  18. #15
    HaxPro's Avatar
    Join Date
    Feb 2010
    Gender
    male
    Location
    Latvia
    Posts
    2,834
    Reputation
    98
    Thanks
    1,148
    Heh , always used Codemunkie's code..

Page 1 of 2 12 LastLast

Similar Threads

  1. [Info] Section Rules
    By Obama in forum Battlefield Heroes Hacks
    Replies: 1
    Last Post: 11-03-2013, 01:02 AM
  2. [Request] FORUM RULES-READ BEFORE YOU POST
    By Obama in forum Battlefield 2 Hacks & Cheats
    Replies: 3
    Last Post: 08-23-2010, 07:17 PM
  3. [Request] FORUM RULES-READ BEFORE YOU POST
    By Obama in forum CounterStrike (CS) 1.6 Hacks / Counter Strike: Source (CSS) Hacks
    Replies: 0
    Last Post: 12-02-2009, 08:49 PM
  4. FORUM RULES-READ BEFORE YOU POST
    By Obama in forum Call of Duty Modern Warfare Help
    Replies: 0
    Last Post: 12-02-2009, 02:02 PM
  5. [Info] FORUM RULES-READ BEFORE YOU POST
    By Obama in forum America's Army 3 Hacks
    Replies: 0
    Last Post: 12-02-2009, 01:38 PM