Register for your free account! | Forgot your password?

Go Back   elitepvpers > Shooter > WarRock > WarRock Hacks, Bots, Cheats & Exploits
You last visited: Today at 04:43

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



///New Warrock Injector by xXKonaXx(me)\\\\\

Discussion on ///New Warrock Injector by xXKonaXx(me)\\\\\ within the WarRock Hacks, Bots, Cheats & Exploits forum part of the WarRock category.

Closed Thread
 
Old   #1
 
r0ckst2r's Avatar
 
elite*gold: 0
Join Date: Mar 2010
Posts: 169
Received Thanks: 51
///New Warrock Injector by xXKonaXx(me)\\\\\

Habe ein neuen Update Injector für Warrock gemacht


Download:

VirusTotal:

Es gibt zwar schon sehr viele Injectoren aber besser zuviel als zu wenig
r0ckst2r is offline  
Thanks
2 Users
Old 10/16/2010, 17:27   #2
 
blackeagle321's Avatar
 
elite*gold: 34
Join Date: Jan 2009
Posts: 2,383
Received Thanks: 577
Gute Arbeit, wollt mal Fragen wie man Injektoren bastelt
blackeagle321 is offline  
Old 10/16/2010, 17:43   #3
 
r0ckst2r's Avatar
 
elite*gold: 0
Join Date: Mar 2010
Posts: 169
Received Thanks: 51
Also ich hab den Injector mit Visual Basic 2008 gebastelt
ich kann dir download und sourcecode für injector ja posten

Downloadlink für Visual Basic 08:

Source Code für Injector:
Option Strict On
Option Explicit On
Imports System.Runtime.InteropServices
Public Class Form1
Const MEM_COMMIT As Integer = &H1000
Const PAGE_READWRITE As Integer = &H4
Const PROCESS_CREATE_THREAD As Integer = &H2
Const PROCESS_VM_OPERATION As Integer = &H8
Const PROCESS_VM_READ As Integer = &H10
Const PROCESS_VM_WRITE As Integer = &H20
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function OpenProcess(ByVal dwDesiredAccess As UInteger, <MarshalAs(UnmanagedType.Bool)> _
ByVal bInheritHandle As Boolean, ByVal dwProcessId As Integer) As System.IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function WriteProcessMemory(ByVal hProcess As System.IntPtr, ByVal lpBaseAddress As System.IntPtr, _
ByVal lpBuffer As String, ByVal nSize As Int32, <Out()> ByRef lpNumberOfBytesWritten As Int32) As _
<MarshalAs(UnmanagedType.Bool)> Boolean
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function VirtualAllocEx(ByVal hProcess As IntPtr, ByVal lpAddress As Int32, _
ByVal dwSize As Int32, ByVal flAllocationType As UInteger, _
ByVal flProtect As UInteger) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function GetModuleHandle(ByVal lpModuleName As String) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function GetProcAddress(ByVal hModule As IntPtr, ByVal lpProcName As String) As UIntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function CreateRemoteThread(ByVal hProcess As IntPtr, ByVal lpThreadAttributes As Int32, _
ByVal dwStackSize As UInt32, ByVal lpStartAddress As UIntPtr, ByVal lpParameter As IntPtr, _
ByVal dwCreationFlags As UInt32, ByRef lpThreadId As Int32) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CharSet:=CharSet.Unicode, EntryPoint:="LoadLibraryA")> _
Public Shared Function LoadLibrary(ByVal lpFileName As String) As IntPtr
End Function
Friend WithEvents OZ As New Timer
Const TargetName As String = "WARROCK"
Dim ExeName As String = IO.Path.GetFileNameWithoutExtension(Application.ExecutablePath)
Private Sub InnjectionMethods_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
Me.TopMost = True
OZ.Interval = 25
If IO.File.Exists(Application.StartupPath & "\" + ExeName + ".dll") Then
Me.Label1.Text = "Wait for Warrock...!"
OZ.Start()
Else
Me.Label1.Text = "" + ExeName + ".dll wurde nicht gefunden!"
End If
End Sub
Private Sub OZs(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles OZ.Tick
Dim Target As Process() = Process.GetProcessesByName(TargetName)
If Target.Length <> 0 Then
Me.Label1.Text = "Warrock gefunden..."
OZ.Stop()
InjectToProcess()
End If
End Sub
Sub InjectToProcess()
Dim ExeName As String = IO.Path.GetFileNameWithoutExtension(Application.ExecutablePath)
Dim Target As Process() = Process.GetProcessesByName(TargetName)
Dim pHandle As IntPtr = OpenProcess(PROCESS_CREATE_THREAD Or PROCESS_VM_OPERATION Or PROCESS_VM_WRITE, False, Target(0).Id)
Dim pszLibFileRemote As String = Application.StartupPath & "\" + ExeName + ".dll"
Dim pfnStartAddr As UIntPtr = GetProcAddress(GetModuleHandle("Kernel32"), "LoadLibraryA")
Dim TargetBufferSize As Int32 = Int(1 + Len(pszLibFileRemote))
Dim LoadLibParamAdr As IntPtr = VirtualAllocEx(pHandle, 0, TargetBufferSize, MEM_COMMIT, PAGE_READWRITE)
Dim Rtn As Integer = CInt(WriteProcessMemory(pHandle, LoadLibParamAdr, pszLibFileRemote, TargetBufferSize, 0))
If Rtn <> 0 Then
Label1.Text = "...Injection Gelukt!"
Else
Label1.Text = "...Injection misgegaan!"
End If
CreateRemoteThread(pHandle, 0, 0, pfnStartAddr, LoadLibParamAdr, 0, 0)
Me.Close()
End Sub
End Class

einfach code kopieren und auf die Form1 doppelklicken alle wegmachen was da geschrieben is und den code dowrt einfach einfügen!
r0ckst2r is offline  
Thanks
1 User
Old 10/16/2010, 17:47   #4
 
blackeagle321's Avatar
 
elite*gold: 34
Join Date: Jan 2009
Posts: 2,383
Received Thanks: 577
Nein, Danke.
Ich kenn mich mit Visual Basic undso 0 aus, deshalb, nicht nötig

MfG,black.
blackeagle321 is offline  
Old 10/16/2010, 17:50   #5
 
r0ckst2r's Avatar
 
elite*gold: 0
Join Date: Mar 2010
Posts: 169
Received Thanks: 51
Na super ^^
alles editiert^^
r0ckst2r is offline  
Old 10/16/2010, 18:03   #6
 
elite*gold: 1
Join Date: Dec 2009
Posts: 478
Received Thanks: 74
gute arbeit
.Pumphut™ is offline  
Old 10/16/2010, 18:04   #7
 
kluster's Avatar
 
elite*gold: 0
Join Date: Aug 2010
Posts: 476
Received Thanks: 112
bei mir funktz dein code nicht why?
kluster is offline  
Old 10/16/2010, 18:06   #8
 
r0ckst2r's Avatar
 
elite*gold: 0
Join Date: Mar 2010
Posts: 169
Received Thanks: 51
Haste mit Visual Basic 08 gemacht?
r0ckst2r is offline  
Old 10/16/2010, 18:08   #9
 
HearTBeaTzZ™'s Avatar
 
elite*gold: 35
Join Date: May 2009
Posts: 938
Received Thanks: 1,022
was bringt eig der injektor?
HearTBeaTzZ™ is offline  
Old 10/16/2010, 18:10   #10
 
r0ckst2r's Avatar
 
elite*gold: 0
Join Date: Mar 2010
Posts: 169
Received Thanks: 51
er injectet Hack .dll xD was ein Injector eben tut^^
r0ckst2r is offline  
Old 10/16/2010, 18:29   #11


 
_Headsh0t_'s Avatar
 
elite*gold: 0
Join Date: Nov 2009
Posts: 13,884
Received Thanks: 9,861
Sammelthread nutzen

#closed
_Headsh0t_ is offline  
Closed Thread

Tags
hack, injector, kona


Similar Threads Similar Threads
[Injector] Warrock Injector by Golle
03/03/2010 - WarRock Hacks, Bots, Cheats & Exploits - 9 Replies
Injector by Golle361 Hey ihr Warrock Suchties bzw. die es noch werden wollen, ich habe mir mal einen Warrock Injector gebaut mit VB08, habe nicht lange gebraucht, Informationen: HauptSprache->English Tested On->XP, Vista, Windows7 dürfte so ziemlich bei jedem Laufen.



All times are GMT +2. The time now is 04:43.


Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2024 elitepvpers All Rights Reserved.