NEW UPDATE COMING WHEN I AM DONE MOVING IN MY NEW HOUSE How To Use: Open CS:GO playerup The Cheat Arrow Keys To Use The Menu Profit $ Important: Pack The # Use Code Reflect To Change The Text In Console And Release The # For Money $$ (Made it Harder To Change WaterMark ) Yes, This # Does Include Spinbot If You Are Missing .dlls Just Go Download It From The Internet Water Mark Will Appear In Game Features: >AIMBOT >LEGITBOT >TRIGGERBOT >HVH >ANTI AIM >CLAN TAG CHANGER >BUNNYHOP >AUTO STRAFE >AUTO SHOOT >NO RECOIL >AIMBOT FOV >SKELETON >IS SCOPED >HEAD CROSS >HAS DEFUSE KIT >IS DEFUSING >HAS HELMET >AND MORE THAT I CANT BE BOTHERED TO WRITE Change Logs: >SPEC LIST (WORK IN PROCESS) >GOT RID OF ALMOST ALL FALSE POSITIVE >DIFFERENT SIG >MORE SECURE >MADE WATERMARK IMPOSSIBLE TO CHANGE IN CODE REFLECT COS OF THIS IDIOTS: Idiots Things To Do: >MORE ANTI AIMS >AUTO WALL (COMING SOON, ALR IN THE MAKING ) >CHAMS >SKIN CHANGER LEAVE A THANKS IF YOU ENJOYED Screenshot: More: More Screenshots Video [Thanks For The Video, Did Not Ask For It. Thanks For The FeedBack ;-) ]: Virus: Jotti Scan Virus Total Need A Injector? Make One Yourself! OR USE THE # INSIDE! Code: DWORD GetTargetThreadIDFromProcName(const char * ProcName) { PROCESSENTRY32 pe; HANDLE thSnapShot; BOOL retval, ProcFound = false; thSnapShot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); if (thSnapShot == INVALID_HANDLE_VALUE) { //MessageBox(NULL, "Error: Unable to create toolhelp snapshot!", "2MLoader", MB_OK); return false; } pe.dwSize = sizeof(PROCESSENTRY32); retval = Process32First(thSnapShot, &pe); while (retval) { if (strstr(pe.szExeFile, ProcName)) { return pe.th32ProcessID; } retval = Process32Next(thSnapShot, &pe); } return 0; } BOOL playerup(DWORD pID, const char * DLL_NAME) { HANDLE Proc; HMODULE hLib; char buf[50] = { 0 }; LPVOID RemoteString, LoadLibAddy; if (!pID) return false; Proc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pID); if (!Proc) { return false; } LoadLibAddy = (LPVOID)GetProcAddress(GetModuleHandle("kernel32.dll"), "LoadLibraryA"); // Allocate space in the process for our DLL RemoteString = (LPVOID)VirtualAllocEx(Proc, NULL, strlen(DLL_NAME), MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE); // Write the string name of our DLL in the memory allocated WriteProcessMemory(Proc, (LPVOID)RemoteString, DLL_NAME, strlen(DLL_NAME), NULL); // Load our DLL CreateRemoteThread(Proc, NULL, NULL, (LPTHREAD_START_ROUTINE)LoadLibAddy, (LPVOID)RemoteString, NULL, NULL); CloseHandle(Proc); return true; } Using The Function: Code: void InjectCrasher() { // Get the dll's full path name char buf[MAX_PATH] = { 0 }; GetFullPathName("Crash.dll", MAX_PATH, buf, NULL); // useless playerup(GetTargetThreadIDFromProcName(csgo.exe), "Crash.dll"); } Credits: CS:GO Internal Simple, Not My Injector (Name In The Title Of The Console), @certmemer INCLUDED A # OF A INJECTOR ( NOT MINE ) Downloadable Files http://www.playerup.com/forum/mpghv2/attach/zip.gif DoomWareInternal_mpgh.net.zip [Download and Thanks] (128.0 KB)