Skip to content

Advanced DLL injector for CS2 with integrated VAC bypass, developed for educational and research purposes only.

License

Notifications You must be signed in to change notification settings

codebrc/Unzotrope-Injector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Unzotrope Injector v1

Admin Mode Version Platform

An advanced DLL injection tool specifically designed for CS2 (Counter-Strike 2) with integrated VAC bypass capabilities.


Features

  • Advanced DLL Injection: Implements the LoadLibrary injection method with detailed memory allocation tracking
  • Integrated VAC Bypass: Built-in VAC bypass functionality that disables VAC protection
  • Admin Privilege Management: Automatic elevation to administrator privileges when required
  • Real-time Injection Logging: Detailed technical information during injection process
  • Interactive Console Menu: User-friendly interface with configurable settings
  • Command Line Support: Support for automated injection via command line parameters
  • Process Management: Advanced process finding and termination capabilities
  • Configuration Persistence: Saves settings between sessions
  • Drag & Drop Support: Simply drag a DLL file onto the executable and it will automatically prepare the injection for the default process (cs2.exe)

Technical Details

Injection Method

The injector uses the standard LoadLibraryA technique with the following process:

  1. Process Access: Opens the target process with PROCESS_ALL_ACCESS privileges
  2. Memory Allocation: Allocates memory in the target process using VirtualAllocEx
  3. Path Writing: Writes the full DLL path to the allocated memory using WriteProcessMemory
  4. Thread Creation: Creates a remote thread that executes LoadLibraryA with the DLL path address
  5. Cleanup: Properly releases allocated memory after successful injection

Memory Management

  • Allocation Type: MEM_COMMIT | MEM_RESERVE
  • Protection Flags: PAGE_EXECUTE_READWRITE for code injection, PAGE_READWRITE for path storage
  • Error Handling: Comprehensive exception handling with detailed error messages
  • Cleanup: Proper memory deallocation using VirtualFreeEx with MEM_RELEASE

VAC Bypass Implementation

The injector includes a sophisticated VAC bypass method which:

  1. Steam Process Termination: Safely terminates the Steam process
  2. Steam Restart: Automatically restarts Steam after termination
  3. Bypass Injection: Injects a specialized byte array into the Steam process memory
  4. VAC Disablement: Effectively disables VAC protection, allowing games to run without anti-cheat interference

This method allows CS2 and other VAC-secured games to run with VAC protection completely disabled.


Usage

Getting Help

Use the -h or --help command line parameter to display usage information:

unzotrope-injector.exe -h
unzotrope-injector.exe --help

This will show detailed information about command line parameters and usage examples.

Interactive Mode

Simply run the executable to enter the interactive menu mode:

  1. Set your target process (default: cs2.exe)
  2. Configure auto-start, auto-exit, and VAC bypass options
  3. Set a default DLL path for quick injection
  4. Inject DLLs with detailed technical feedback

Command Line Mode

unzotrope-injector.exe [dll_path] [process_name] [auto_bypass_vac] [show_details]

Parameters:

  • dll_path: Path to the DLL file to inject (required)
  • process_name: Target process name (default: cs2.exe)
  • auto_bypass_vac: true/false to auto bypass VAC (default: false) - Not recommended for command line use
  • show_details: true/false to show injection details (default: true)

Examples:

unzotrope-injector.exe mycheat.dll
unzotrope-injector.exe mycheat.dll cs2.exe false true

Important: The auto_bypass_vac parameter is not recommended for command line use due to the complexity of the VAC bypass process. It's better to use the interactive menu for VAC bypass operations.

Drag & Drop Support

To quickly inject a DLL without using the console or command line, simply drag and drop your DLL file onto the unzotrope-injector.exe.
The injector will automatically use the default target process (cs2.exe) and prepare the injection without requiring additional configuration.


Requirements

  • Windows 7 or newer
  • .NET Framework 4.7.2 or newer
  • Administrator privileges (automatic elevation)
  • Steam client installed

Security Notice

The VAC bypass functionality:

  • Terminates the Steam process
  • Injects custom byte code into the Steam process memory
  • Disables VAC protection mechanisms
  • May violate Steam's Terms of Service

Use this functionality at your own risk.


Credits

  • MarshallSCPT: Injector development and implementation
  • zyhp: Initial VAC bypass research

Disclaimer

This software is intended for educational and research purposes only. The authors are not responsible for any misuse of this software. Use at your own risk and in compliance with all applicable laws.


License

This project is provided for educational purposes only. All rights reserved by the respective authors.

Note: This software requires administrator privileges to function properly and will automatically restart with elevated permissions when needed.

About

Advanced DLL injector for CS2 with integrated VAC bypass, developed for educational and research purposes only.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages