Features:
- Colourful and customizable GUI
- Process List
- Multi-DLL injection (with options to enable/disable DLLs to inject)
- Auto-Inject
- Stealth Inject
- Close on inject
- DLL Scrambling (scrambles DLLs on injection to make hacks harder to detect and make detected hacks work again)
- 'Un-inject' DLLs
- Alternate injection method (different from the traditional CreateRemoteThread method)
How to use:
- Download and extract the attachment
- Run Extreme Injector by master131.exe
- (optional) Click Settings and then Start in Secure Mode to avoid Anti-Cheat detection of the injector itself.
- Type in a process name into the box (including the extension). If you want to target a specific process or select by window name, use the Select button.
- (Note) If you are injecting into Combat Arms, make sure to type in Engine.exe
- Add the DLLs you want by clicking on the Add DLL button.
- You can disable/enable which DLLs to inject so you can keep your favourite DLLs without needing to find them each time.
- Go into Settings and customise the settings to your liking. Everything should be straight forward.
- (Note) If you are injecting into Combat Arms, make sure to tick Auto-Inject and start the game.
- Click Inject and enjoy! (or wait for the process to start and let it auto-inject if you ticked auto-inject)
Please explain the Scramble Options!
If you've used DLL Scrambler, you're probably familiar with these options.
- Scramble DLL - Tick this to enable/disable DLL Scrambling completely
- Scramble Header - This will scramble the area around the start of the file which should not impact the DLL at all
- Remove PDB Signature - This will remove a string in the DLL (as well as 'Debug Data') which Anti-Cheat vendors *could* use as a signature.
- Randomize Extra KBs - This will randomize the value of the 'Extra KBs' box automatically on inject for extra protection. Of course, you can enter in the value yourself if you want.
- Shift Assembly Code - This will shift or move some of the assembly code (and other data in the DLL) using a random offset. This is good if an anti-cheat tries to search for a specific signature at a specific offset which the extra KBs option can't prevent.
What can I do with the tools?
With the View Process Info button, it will bring you to a screen showing some basic information about the process you've chosen including process ID, thread count, module count and even the module list. You can select a module from the list and unload it (or 'un-inject' it) by clicking Unload Module.
You can also choose a DLL of your choice and choose where to save the scrambled version by click on Scramble DLL.
I accidently turned on auto-inject and now it injects and closes straight away!
Do not fret, just delete the process.ini file and everything should be ay okay.
Note when using the new 'Alt' injection method:
This new injection method relies on the process you are injecting into having an active main thread. If you inject into a process and nothing happens, you can normally 'wake up' the main thread by doing something simple like hovering your mouse over the process' window. This is pretty rare though, 95% of the time you guys will be injecting into games and the main thread will probably always be active.
When using 'Start in Secure Mode'....
If your anti-virus detects a threat/virus when you click on it, please ignore it or temporarily disable your anti-virus, it's a false positive. I would never infect any users with anything. Note that you should NOT add an exclusion to the Temp folder as any REAL viruses that emerge there might get through.
Requirements:
.NET Framework 3.5







