Skip to content

Commit

Permalink
update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
xddMthia committed Apr 23, 2023
1 parent 1ede60a commit c3f12f3
Showing 1 changed file with 6 additions and 26 deletions.
32 changes: 6 additions & 26 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,6 @@
# Shtreeba [![C++](https://img.shields.io/badge/language-C%2B%2B-%23f34b7d.svg?style=plastic)](https://en.wikipedia.org/wiki/C%2B%2B) [![Windows](https://img.shields.io/badge/platform-Windows-0078d7.svg)](https://en.wikipedia.org/wiki/Microsoft_Windows) [![x86](https://img.shields.io/badge/arch-x86-red.svg)](https://en.wikipedia.org/wiki/X86) [![License](https://img.shields.io/github/license/mdilai/Shtreeba.svg)](COPYING.LESSER) ![Windows](https://github.com/mdilai/Shtreeba/workflows/Windows/badge.svg?branch=master&event=push)

VAC-proof 32bit DLL injector written in C++, using memory mapping and thread hijacking techniques

## Features:
* **Library** - full-featured VAC-proof and VirusTotal-proof library for injecting third-party DLL's into 32-bit applications.
* **UI** - Simple interface for accessing Library as injector.
VAC-proof 32bit VAC Bypass DLL injector written in C++, using memory mapping and thread hijacking techniques

## Getting started

Expand All @@ -13,35 +9,19 @@ VAC-proof 32bit DLL injector written in C++, using memory mapping and thread hij
Written using **Microsoft Visual Studio 2019**, work with older versions not guaranteed.

### Prebuilt release
Download [latest release](https://github.com/mdilai/Shtreeba/releases) and unpack to any desired location.
Download [latest release](https://github.com/FrantisekSilhan/Shtreeba-VAC-Bypass/releases) and unpack to any desired location.

### Compiling from source

Open **Shtreeba.sln** in Microsoft Visual Studio 2019.
Open **Shtreeba.sln** in Microsoft Visual Studio 2022.
Make sure build configuration is set to `Release | x86` and build the solution.

If everything went right you will find `Shtreeba.exe` and `Shtreeba.dll` files in Release folder.
Copy both files to some location and run `Shtreeba.exe` to generate default config
If everything went right you will find `Shtreeba.exe` file in Release folder.

### Usage.
* Put your **DLL** to inject together with `Shtreeba.exe` and `Shtreeba.dll`
* Edit `Shtreeba.ini` to set **path** and **process name**
* Run `Shtreeba.exe` as **Administrator**

### Configuration
Configuration file Shtreeba.ini will be automatically created after first run. Here is default sample config:
```
[Library]
DLL=Jweega.bin
ProcessName=csgo.exe
[UI]
Silent=0
CloseDelay=3000
```
* **DLL** - Absolute or relative path to DLL for injection. By default is `Jweega.bin` at current work directory
* **ProcessName** - Name of process for injection into. By default is `csgo.exe`
* **Silent** - Disable non-critical notifications. By default is `0`.
* **CloseDelay** - Interval in milliseconds for automatical closing of UI Messagebox after injecting (when `Silent=0`)
* Select DLL
* Wait

## License

Expand Down

0 comments on commit c3f12f3

Please sign in to comment.