Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mdilai/Shtreeba
VAC-proof 32bit DLL injector written in C++, using memory mapping and thread hijacking techniques
https://github.com/mdilai/Shtreeba
cpp dll dll-injection dll-injector-dll-injection hacking injection injector manual-map-dll mmap reverse-engineering shtreeba thread-hijacking
Last synced: 1 day ago
JSON representation
VAC-proof 32bit DLL injector written in C++, using memory mapping and thread hijacking techniques
- Host: GitHub
- URL: https://github.com/mdilai/Shtreeba
- Owner: mdilai
- License: lgpl-3.0
- Created: 2020-04-08T13:51:36.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2021-06-01T10:17:50.000Z (over 3 years ago)
- Last Synced: 2024-08-02T15:23:27.418Z (3 months ago)
- Topics: cpp, dll, dll-injection, dll-injector-dll-injection, hacking, injection, injector, manual-map-dll, mmap, reverse-engineering, shtreeba, thread-hijacking
- Language: C++
- Homepage:
- Size: 56.6 KB
- Stars: 296
- Watchers: 10
- Forks: 30
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
- License: COPYING.LESSER
Awesome Lists containing this project
README
# Shtreeba [![C++](https://img.shields.io/badge/language-C%2B%2B-%23f34b7d.svg?style=plastic)](https://en.wikipedia.org/wiki/C%2B%2B) [![Windows](https://img.shields.io/badge/platform-Windows-0078d7.svg)](https://en.wikipedia.org/wiki/Microsoft_Windows) [![x86](https://img.shields.io/badge/arch-x86-red.svg)](https://en.wikipedia.org/wiki/X86) [![License](https://img.shields.io/github/license/mdilai/Shtreeba.svg)](COPYING.LESSER) ![Windows](https://github.com/mdilai/Shtreeba/workflows/Windows/badge.svg?branch=master&event=push)
VAC-proof 32bit DLL injector written in C++, using memory mapping and thread hijacking techniques
## Features:
* **Library** - full-featured VAC-proof and VirusTotal-proof library for injecting third-party DLL's into 32-bit applications.
* **UI** - Simple interface for accessing Library as injector.## Getting started
### Prerequisites
Written using **Microsoft Visual Studio 2019**, work with older versions not guaranteed.
### Prebuilt release
Download [latest release](https://github.com/mdilai/Shtreeba/releases) and unpack to any desired location.### Compiling from source
Open **Shtreeba.sln** in Microsoft Visual Studio 2019.
Make sure build configuration is set to `Release | x86` and build the solution.If everything went right you will find `Shtreeba.exe` and `Shtreeba.dll` files in Release folder.
Copy both files to some location and run `Shtreeba.exe` to generate default config### Usage.
* Put your **DLL** to inject together with `Shtreeba.exe` and `Shtreeba.dll`
* Edit `Shtreeba.ini` to set **path** and **process name**
* Run `Shtreeba.exe` as **Administrator**### Configuration
Configuration file Shtreeba.ini will be automatically created after first run. Here is default sample config:
```
[Library]
DLL=Jweega.bin
ProcessName=csgo.exe
[UI]
Silent=0
CloseDelay=3000
```
* **DLL** - Absolute or relative path to DLL for injection. By default is `Jweega.bin` at current work directory
* **ProcessName** - Name of process for injection into. By default is `csgo.exe`
* **Silent** - Disable non-critical notifications. By default is `0`.
* **CloseDelay** - Interval in milliseconds for automatical closing of UI Messagebox after injecting (when `Silent=0`)## License
> Copyright (c) 2019-2021 Maksym Dilai
This project is licensed under the [LGPL-3.0 License](https://opensource.org/licenses/LGPL-3.0) - see the [COPYING.LESSER](COPYING.LESSER) file for details.
## See also
- [JweegaCSGO](https://github.com/mdilai/JweegaCSGO) - free and open source cheat for CS:GO based on [Osiris](https://github.com/danielkrupinski/Osiris)