Try using another injection method, some do not work with all cheats.Ĭhanges since version 2.1 (20th October 2012): Note that you should NOT add an exclusion to the Temp folder as any REAL viruses that emerge there might get through. I would never infect any users with anything. If your anti-virus detects a threat/virus when you click on it, please ignore it or temporarily disable your anti-virus, it's a false positive. 64-bit injection only supports Standard injection (if you choose another injection technique, it will automatically use the Standard one). Thread Hijacking is not supported at all on XP 64-bit. This may be useful if 64-bit cheats were to appear. For example, the next version of the Frostbite engine (used by Battlefield) will force users to have a 64-bit OS. This is just a feature I decided to add for the future. There are probably zero 64-bit cheats out there and there are hardly any 64-bit games. That means you can inject 64-bit cheats into 64-bit processes (don't worry, you can still inject into 32-bit processes on a 64-bit OS). On a 64-bit computer, the injector runs as a 64-bit process and on a 32-bit computer, it runs as a 32-bit process. That's right, this new version of Extreme Injector supports 64-bit DLLs and 64-bit processes. Hide Module - This hides the DLL from the process' module list so if an anti-cheat were to search through a process' module list, it would not appear. Erase PE - This erases the PE headers at the start of the injected DLL, making it hard for anti-cheats to identify that a DLL exists at a specific location. These post-inject techniques are often seen within cheats to try prevent detection from anti-cheats but this injector can do it externally if the cheat doesn't do it already. This is good if an anti-cheat tries to search for a specific signature at a specific offset. #CROSSFIRE M4A1 XMAS SNOW CODE#Shift Section Code - This will shift or move some of the assembly code (and other data in the DLL) using a random offset. Append Random Data - This will add random data to the end of the file. Remove Debug Data - This will remove a string in the DLL (as well as 'Debug Data') which Anti-Cheat vendors *could* use as a signature. Scramble Header - This will scramble the area around the start of the file which should not impact the DLL at all Scramble DLL - Tick this to enable/disable DLL Scrambling completely If you've used DLL Scrambler, you're probably familiar with these options. This injection technique may have problems with cheats that are packed with a packer so try another method if this doesn't work. #CROSSFIRE M4A1 XMAS SNOW WINDOWS#So secure that even Windows won't even know about the injected DLL. #CROSSFIRE M4A1 XMAS SNOW MANUAL#Manual Map - This is the most secure injection technique. It is pretty stable and is not used by many injectors. Thread Hijacking - This was the "Alt" injection techinique seen in the previous version. LdrLoadDll Stub - This is similar to the Standard injection technique except it goes 1 level deeper into LoadLibrary. It uses CreateRemoteThread and LoadLibrary and is the most reliable injection technique. Standard - This is the injection technique used in nearly every injector out there. This version of the injector introduces 2 new injection techniques. Click Inject and enjoy! (or wait for the process to start and let it auto-inject if you ticked auto-inject) (Note) If you are injecting into Combat Arms, make sure to tick Auto-Inject and start the game. The injector will automatically scramble the file before it is injected into the game. (Note) You do not need to use the "Scramble DLL" button under Tools unless you want to use a scrambled DLL with a seperate injector. Go into Settings and customise the settings to your liking. You can disable/enable which DLLs to inject so you can keep your favourite DLLs without needing to find them each time. You can also drag and drop them into the DLL list. Add the DLLs you want by clicking on the Add DLL button. (Note) If you are injecting into Combat Arms, make sure to type in Engine.exe If you want to target a specific process or select by window name, use the Select button. Type in a process name into the box (including the extension). (optional) Click Settings and then Start in Secure Mode to avoid Anti-Cheat detection of the injector itself. Run Extreme Injector v2 by master131.exe Mutiple injection methods (Standard, LdrLoadDll Stub, Thread Hijacking and Manual Map) DLL Scrambling (scrambles DLLs on injection to make cheats harder to detect and make detected cheats work again) Multi-DLL injection (with options to enable/disable DLLs to inject)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |