İnjection Dll Thread2

Kurtbeyi

Misafir Editör
Katılım
5 Şub 2022
Mesajlar
1,980
Tepkime puanı
0
Puanları
36
Konum
istanbul
Cinsiyet
  1. Bay
Takım
Fenerbahçe
İnjection Dll Thread2

Kod:
#include <Windows.h>
#include <iostream>
#include <TlHelp32.h>
using namespace std;
bool InjectDLL(DWORD ProcessID);
char dll[] = "cod7.dll";
char ProcessName[]= "BlackOps.exe";
typedef HINSTANCE (*fpLoadLibrary)(char*);

int main()
{

DWORD processId = NULL;
PROCESSENTRY32 pe32 = {sizeof(PROCESSENTRY32)};
HANDLE hProcSnap;
while(!processId)
{
system("CLS");
cout <<"OYUN BEKLENIYOR" << ProcessName <<"..."<<endl;
cout<<"OYUNA GIRINIZ"<<endl;
hProcSnap = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS,0);



 if(Process32First(hProcSnap,&pe32))
  {

    do
    {
          if(!strcmp(pe32.szExeFile,ProcessName))
          {
              processId = pe32.th32ProcessID;
              break;
          }
    
       }
          while(Process32Next(hProcSnap,&pe32));
     }

  Sleep(1000);
}
while(!InjectDLL(processId))
{
system("CLS");
cout <<"Dll yok"<<endl;
Sleep(1000);
}
cout<<"Dll Basari ile Injeklendi"<<endl<<endl;
cout<<"5 saniye sonra kapanacaktir"<<endl;
CloseHandle(hProcSnap);
Sleep(5000);
return(0);
}
bool InjectDLL(DWORD ProcessID)
{
    HANDLE hProc;
    LP**** paramAddr;
    HINSTANCE hDll = LoadLibrary("KARNEL32");
    fpLoadLibrary LoadLibraryAddr = (fpLoadLibrary)GetProcAddress(hDll,"LoadLibraryA");
    hProc = OpenProcess(PROCESS_ALL_ACCESS,false,ProcessID);
    char dllPath[250] = "C:\cod7.dll";
    strcat(dllPath,dll);
    paramAddr =VirtualAllocEx(hProc,0,strlen(dllPath)+1,MEM_COMMIT,PAGE_READWRITE);
    bool memoryWritten = WriteProcessMemory(hProc,paramAddr,dllPath,strlen(dllPath)+1,NULL);
    CreateRemoteThread(hProc,0,0,(LPTHREAD_START_ROUTINE)LoadLibraryAddr,paramAddr,0,0);
    CloseHandle(hProc);
    return memoryWritten;

}
 
metal işleme
Üst