EDK2
EFI
PE
UEFI
anti-cheats
- Hiding execution of unsigned code in system threads
- BattlEye client emulation
- Cracking BattlEye packet encryption
- Why anti-cheat software utilize kernel drivers
- How Escape from Tarkov ensures game integrity
- How anti-cheats detect system emulation
- CVEAC-2020: Bypassing EasyAntiCheat integrity checks
- BattlEye reverse engineer tracking
- Bypassing BattlEye from user-mode
- BattlEye communication hook
- BattlEye hypervisor detection
- BattlEye single stepping
- BattlEye stack walking
- BattlEye shellcode updates
- BattlEye anti-cheat: analysis and mitigation
anti-debug
automation
battleye
- BattlEye client emulation
- Cracking BattlEye packet encryption
- How Escape from Tarkov ensures game integrity
- How anti-cheats detect system emulation
- BattlEye reverse engineer tracking
- Bypassing BattlEye from user-mode
- BattlEye communication hook
- BattlEye hypervisor detection
- BattlEye single stepping
- BattlEye stack walking
- BattlEye shellcode updates
- BattlEye anti-cheat: analysis and mitigation
binary-exploitation
bootkit
bug bounty
burp-suite
cryptography
csgo
ctf
debugging
drm
dropbox
easy-anti-cheat
eft
exploit
fuzzing
game-exploitation
game-hacking
gatekeeper
guest
hypervisors
kernel
lifting
llvm
macos
memory-corruption
obfuscation
pwn
reverse-engineering
- How Runescape catches botters, and why they didn't catch me
- BattlEye client emulation
- Cracking BattlEye packet encryption
- Abusing DComposition to render on external windows
- Why anti-cheats block overclocking tools
- How Escape from Tarkov ensures game integrity
- How anti-cheats detect system emulation
- Kernel debugging in seconds with Vagrant
- BattlEye reverse engineer tracking
- Bypassing BattlEye from user-mode
- BattlEye communication hook
- BattlEye hypervisor detection
- BattlEye single stepping
- BattlEye stack walking
- BattlEye shellcode updates
- Bypassing kernel function pointer integrity checks
- Hooking the graphics kernel subsystem
- Exam surveillance - the return. (ExamCookie)
- The nadir of surveillance (Den Digitale Prøvevagt)
- BattlEye anti-cheat: analysis and mitigation
- Reverse engineering 'Black Desert Online' (2. Speed -> local entity)
- Reverse engineering 'Black Desert Online' (1. Preface)
security-bypass
source-engine
synthesis
tpm
visual-studio
vmprotect
windows
- RISC-Y Business: Raging against the reduced machine
- Abusing undocumented features to spoof PE section headers
- Bootkitting Windows Sandbox
- Windows 11: TPMs and Digital Sovereignty
- Preventing memory inspection on Windows
- BitLocker touch-device lockscreen bypass
- Process on a diet: anti-debug using job objects
- BitLocker Lockscreen bypass
- Hiding execution of unsigned code in system threads
- New year, new anti-debug: Don't Thread On Me
- Windows Telemetry service elevation of privilege
- Abusing DComposition to render on external windows
- Why anti-cheats block overclocking tools
- From directory deletion to SYSTEM shell
- Kernel debugging in seconds with Vagrant
- Bypassing kernel function pointer integrity checks
- Hooking the graphics kernel subsystem