TEX Logo
TEX - Injector V3
Discord

Welcome to TEX - Injector V3

v3.0 Fully Standalone

Advanced DLL injection tool with 6 injection methods.

Program Screenshot

About TEX - Injector V3

TEX - Injector is a lightweight tool for injecting DLLs into processes you own - for testing, debugging, and development.

What's new in V3: All injection logic now runs in-process - no more separate Host.exe. This means a single ~150 MB standalone EXE with everything included.

Supports x64 and x86 (WoW64) targets. Choose from 6 different load methods depending on your needs.

Always abide by legal guidelines and use only on processes you own.

Kussi Schatzi A๐Ÿ’œ

6 Injection Methods

CreateRemoteThread

โœ… Stable

Classic approach via CreateRemoteThread + LoadLibraryW.

  • Widely compatible
  • Simple & reliable

NtCreateThreadEx

โœ… Stable

Lower-level kernel thread creation via ntdll. Bypasses some user-mode hooks.

  • Bypasses CreateRemoteThread hooks
  • More control

QueueUserAPC

โš ๏ธ Partial

Queues an APC to all target threads. Execution happens when the thread enters alertable state.

  • No new thread created
  • Depends on thread state

Reflective DLL

โš ๏ธ Partial

Loads a DLL entirely from memory - no disk writes in the target process.

  • No DLL written to disk
  • Manual PE parsing

Direct Syscall

๐Ÿ”ฌ Experimental

Calls NtCreateThreadEx via raw syscall (bypasses ntdll completely).

  • Bypasses API hooks
  • Version/OS dependent

Thread Hijack

๐Ÿ”ฌ Experimental

Suspends a target thread, redirects execution to load the DLL, then restores context.

  • No new threads
  • Requires careful state management

How To Use

GUI Mode (Portable):

  1. Double-click either tex-injector-x64.exe or tex-injector-x86.exe.
  2. Browse for your DLL, enter the target process name (e.g. notepad.exe), select an injection method, and click Inject.
  3. Check the status panel for the result. Some methods show "PartialSuccess" - the operation was queued/started but final execution depends on the target.

Launcher Mode (TEX-Injector.exe):

  1. Place TEX-Injector.exe next to the x64/ and x86/ folders.
  2. Run TEX-Injector.exe - it detects your OS architecture and launches the matching portable build.

Injection Method IDs (for developers):

0 = CreateRemoteThread   1 = NtCreateThreadEx   2 = QueueUserAPC
3 = ReflectiveDLL   4 = DirectSyscall   5 = ThreadHijack

๐Ÿ“œ Changelog

v3.0.0 - April 2026
  • NEW Standalone EXE - Host logic merged into App. No more TexLoader.Host.exe.
  • NEW 6 Injection Methods - CreateRemoteThread, NtCreateThreadEx, QueueUserAPC, ReflectiveDLL, DirectSyscall, ThreadHijack
  • NEW ProcessAnalytics.dll - injectable module for live process recon (8 analysis sections)
  • NEW ApiMonitor.dll - IAT-patching live tracker with color-coded FILE/REG/NET console
  • NEW TestInject.dll - minimal test DLL with AllocConsole for injection verification
  • NEW PartialSuccess result type - APC/Reflective/Hijack methods report queued/initiated status
  • BREAK Removed Standard Load (managed plugin loader) & Codex branding
  • FIX Architecture mismatch detection (x86โ†’x64 injection now properly blocked)
v2.x - 2025 / Early 2026
  • Original release with 3 injection methods (CreateRemoteThread, NtCreateThreadEx, APC)
  • Separate TexLoader.Host.exe process architecture
  • Managed plugin support via Standard Load
  • Architecture-aware launcher with x64/x86 detection
v1.x - 2024
  • Initial prototype with basic CreateRemoteThread injection
  • Command-line only interface
  • Simple DLL injector concept