Skip to content

Change the entry point of Windows PE file and inject a dynamic library, in order to crack software of fix games.

Notifications You must be signed in to change notification settings

a7031x/injector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

If you are not familiar with Windows PE, you can download the PE specification here.

This tool is like the way a virus infects a PE file. It expands the last section of the PE, then writes a snippet of code which loads an external DLL, then jumps back to the original entry point of the program.

What if the PE is encrypted and will check its integrity when it starts? Generally an encrypted PE file will only has a minimal set of API like GetModuleHandle or LoadLibrary.

This tool implement GetProcAddress manually as part of the injection code, so it won’t need this API be existent in the IAT. If either GetModuleHandle or LoadLibrary exists, it injects some code to load a dynamic library, which is named monitor.dll. The self-check problem is left to the dynamic library. Doing the hacking inside a dynamic library is easier than do it in the PE file.

I provided the monitor library project which hooks the NtCreateFile API and intercepts the path. If the program tries to open its process file, it is very likely that it will checks the file integrity. In this case the path will be replaced with the backup file path.

About

Change the entry point of Windows PE file and inject a dynamic library, in order to crack software of fix games.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •