gmh5225

anti-cheat-systems

2,672
368
# Install this skill:
npx skills add gmh5225/awesome-game-security --skill "anti-cheat-systems"

Install specific skill from multi-skill repository

# Description

Guide for understanding anti-cheat systems and bypass techniques. Use this skill when researching game protection systems (EAC, BattlEye, Vanguard), anti-cheat architecture, detection methods, or bypass strategies.

# SKILL.md


name: anti-cheat-systems
description: Guide for understanding anti-cheat systems and bypass techniques. Use this skill when researching game protection systems (EAC, BattlEye, Vanguard), anti-cheat architecture, detection methods, or bypass strategies.


Anti-Cheat Systems & Analysis

Overview

This skill covers anti-cheat systems used in games, their detection mechanisms, and research techniques. Understanding anti-cheat helps both defenders (game developers) and security researchers.

Major Anti-Cheat Systems

Easy Anti-Cheat (EAC)

  • Kernel-mode driver protection
  • Process integrity verification
  • Memory scanning
  • Used by: Fortnite, Apex Legends, Rust

BattlEye

  • Kernel driver with ring-0 access
  • Screenshot capture capability
  • Network traffic analysis
  • Used by: PUBG, Rainbow Six Siege, DayZ

Vanguard (Riot Games)

  • Always-on kernel driver
  • Boot-time initialization
  • Hypervisor detection
  • Used by: Valorant, League of Legends

Valve Anti-Cheat (VAC)

  • User-mode detection
  • Signature-based scanning
  • Delayed ban waves
  • Used by: CS2, Dota 2, TF2

Other Systems

  • PunkBuster: Legacy FPS anti-cheat
  • FairFight: Server-side statistical analysis
  • nProtect GameGuard: Korean anti-cheat solution
  • XIGNCODE3: Mobile game protection
  • ACE (Tencent): Chinese market protection

Detection Mechanisms

Memory Detection

- Signature scanning for known cheats
- Code integrity verification
- Injected module detection
- Memory modification monitoring

Process Detection

- Handle enumeration
- Thread context inspection
- Debug register monitoring
- Stack trace analysis

Kernel-Level Detection

- Driver verification
- Callback registration monitoring
- System call hooking detection
- PatchGuard integration

Behavioral Analysis

- Input pattern analysis
- Movement anomaly detection
- Statistical improbability flagging
- Network packet inspection

Anti-Cheat Architecture

User-Mode Components

  • Process scanner
  • Module verifier
  • Overlay detector
  • Screenshot capture

Kernel-Mode Components

  • Driver loader
  • Memory protection
  • System callback registration
  • Hypervisor detection

Server-Side Components

  • Statistical analysis
  • Replay verification
  • Report processing
  • Ban management

Research Techniques

Static Analysis

  1. Dump and analyze AC drivers
  2. Reverse engineer detection routines
  3. Identify signature patterns
  4. Map callback registrations

Dynamic Analysis

  1. Monitor system calls
  2. Track driver communications
  3. Analyze network traffic
  4. Debug with hypervisor tools

Bypass Categories

Memory Access

  • Physical memory read/write
  • DMA-based access
  • Hypervisor memory virtualization
  • Driver-based access

Code Execution

  • Manual mapping
  • Thread hijacking
  • APC injection
  • Kernel callbacks

Detection Evasion

  • Signature mutation
  • Timing attack mitigation
  • Stack spoofing
  • Module hiding

Security Features Interaction

Windows Security

  • Driver Signature Enforcement (DSE)
  • PatchGuard/Kernel Patch Protection
  • Hypervisor Code Integrity (HVCI)
  • Secure Boot

Virtualization

  • VT-x/AMD-V detection
  • Hypervisor presence checks
  • VM escape detection
  • Timing-based detection

Ethical Considerations

Research Guidelines

  • Focus on understanding, not exploitation
  • Report vulnerabilities responsibly
  • Respect Terms of Service implications
  • Consider impact on gaming communities
  • DMCA considerations
  • CFAA implications
  • Regional regulations
  • ToS enforcement

Resources Organization

Detection Research

- Anti-cheat driver analysis
- Detection routine documentation
- Callback enumeration tools

Bypass Research

- Memory access techniques
- Injection methods
- Evasion strategies

Tools

- Custom debuggers
- Driver loaders
- Analysis frameworks

Data Source

Important: This skill provides conceptual guidance and overview information. For detailed information including:
- Specific GitHub repository links
- Complete project lists with descriptions
- Up-to-date tools and resources
- Code examples and implementations

Please fetch the complete data from the main repository:

https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/README.md

The main README contains thousands of curated links organized by category. When users ask for specific tools, projects, or implementations, retrieve and reference the appropriate sections from this source.

# Supported AI Coding Agents

This skill is compatible with the SKILL.md standard and works with all major AI coding agents:

Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.