[Source] Item Creator

10/02/2016 10:31 hassanfankyz#46
Quote:
Originally Posted by vaynz View Post
There are many different ways of detecting this specific injector.

[Only registered and activated users can see links. Click Here To Register...]

Since all strings are not encrypted (in runtime ofc.) anti-cheats can easily detect it by scanning for these strings.
They probably do this by performing a binary search for the string in ASCII (multi-byte) and UNICODE (wide-char) character sets.
E.g. they scan for the window title, which doesn't even need a binary search, but just a simple call to FindWindow.
Okay, so they may scan the mapped executable for all strings concerning this specific injector.

To bypass that you can hex-edit the executable on disk and replace the strings with some random ones.
If they are encrypted on disk and then get decrypted in memory, you can assume it is using a packer/protector.
If that's the case you either need to somehow unpack it or search and edit the strings in memory.


Now, the second method of detecting:
They make unique code signatures of this injector and then scan for them in runtime.
If you have the source you could easily change some compiler settings and recompile.
Otherwise it will be really hard to bypass this, then I'd recommend to use another injector or bypass XC('s pattern scan) lul.


Third method:
There are anti-cheats that keep track of all opened handles relating to the protected client.
So, they may keep a white-list of opened handles.
Then it loops through the list of opened handles (probably via a driver) in a rather big time interval.
And if it has found that process `Injector.exe` is maintaining a handle to the client process,
it just crashes (or terminates which is easier to bypass) the client by executing an exception.


I hope I could help :)
+ I hope it is clear that you should not attempt to make it undetected but get another injector or code your own.
Thanks a lot
10/02/2016 12:15 DustinNeo#47
Quote:
Originally Posted by vaynz View Post
There are many different ways of detecting this specific injector.

[Only registered and activated users can see links. Click Here To Register...]

Since all strings are not encrypted (in runtime ofc.) anti-cheats can easily detect it by scanning for these strings.
They probably do this by performing a binary search for the string in ASCII (multi-byte) and UNICODE (wide-char) character sets.
E.g. they scan for the window title, which doesn't even need a binary search, but just a simple call to FindWindow.
Okay, so they may scan the mapped executable for all strings concerning this specific injector.

To bypass that you can hex-edit the executable on disk and replace the strings with some random ones.
If they are encrypted on disk and then get decrypted in memory, you can assume it is using a packer/protector.
If that's the case you either need to somehow unpack it or search and edit the strings in memory.


Now, the second method of detecting:
They make unique code signatures of this injector and then scan for them in runtime.
If you have the source you could easily change some compiler settings and recompile.
Otherwise it will be really hard to bypass this, then I'd recommend to use another injector or bypass XC('s pattern scan) lul.


Third method:
There are anti-cheats that keep track of all opened handles relating to the protected client.
So, they may keep a white-list of opened handles.
Then it loops through the list of opened handles (probably via a driver) in a rather big time interval.
And if it has found that process `Injector.exe` is maintaining a handle to the client process,
it just crashes (or terminates which is easier to bypass) the client by executing an exception.


I hope I could help :)
+ I hope it is clear that you should not attempt to make it undetected but get another injector or code your own.
Kannst mir vlt bei Skype weiterhelfen? add mal bitte djspace9
10/02/2016 12:23 kurdoka199#48
how use in game ya
10/02/2016 17:37 kaka2012#49
A video from the beginning till starting the game pls
10/02/2016 17:47 7tepe48#50
how use in game ya ??????
10/03/2016 14:21 DoNotCarII#51
ppl will start selling this one xd
10/03/2016 15:48 7tepe48#52
video game pleass ????
10/03/2016 15:57 tilouis123#53
i guess its sound like this
1-do copy paste(everything-maybe)
2-make it into a dll
3-use an undectectable injector(i recommend windows 10 grimmor injector)
10/03/2016 18:03 PremeSu#54
I see this but where's the actual download for the ItC itself cuz i searched the entire website couldn't find it
10/03/2016 18:51 ~kau~#55
HOW TO DOWNLOAD????????
10/03/2016 18:52 hassanfankyz#56
guys after all these things i done it now where i can putt AP.file
10/03/2016 19:02 Shiliwa#57
Where can we add items ?
10/03/2016 19:13 Ekko16#58
what i do with that??
10/03/2016 19:23 RingleRangleRob#59
Quote:
Originally Posted by ~kau~ View Post
HOW TO DOWNLOAD????????
Press thanks and sing the "my little purple black ding dong" song
10/03/2016 19:26 ~kau~#60
Quote:
Originally Posted by FazeDaFapper View Post
Press thanks and sing the "my little purple black ding dong" song
Dont get it... My LittlePony cant understand "my little purple black ding dong" song :( R.I.P.

HOW TO USE?