Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Does this bypass the anti-cheat? #23

Open
Glaiveisdad opened this issue Mar 31, 2022 · 5 comments
Open

Does this bypass the anti-cheat? #23

Glaiveisdad opened this issue Mar 31, 2022 · 5 comments

Comments

@Glaiveisdad
Copy link

title

@Xenia0
Copy link

Xenia0 commented Apr 3, 2022

write your own.

@KZDKM
Copy link

KZDKM commented Apr 13, 2022

Correct me if I'm wrong, but seeing how kvm dma works, You could kinda make it undetectable if you remove the guest part of this hack, so there would not be anything related to cheat running on the guest OS (where the anti-cheat has their eyes on).

You could use looking glass to display the graphical output on your host OS and write a overlay over the looking glass viewport to display ESP with the memory you are reading from the guest os.

But I dont know how you would retain the aimbot feature if you do it this way because it would be hard for you to detect input to activate the aimbot. One possible way of doing it is to do evdev passthrough so therefore the host could still read the input going to the guest operating system and find a way to monitor the input stream on host.

Do note that hypervisor is still a detection vector, despite that EAC is pretty forgiving on VMs.

@Kamineko1978
Copy link

We are looking for someone to set up. We will also prepare a reward.

@PaulDotSH
Copy link

Correct me if I'm wrong, but seeing how kvm dma works, You could kinda make it undetectable if you remove the guest part of this hack, so there would not be anything related to cheat running on the guest OS (where the anti-cheat has their eyes on).

You could use looking glass to display the graphical output on your host OS and write a overlay over the looking glass viewport to display ESP with the memory you are reading from the guest os.

But I dont know how you would retain the aimbot feature if you do it this way because it would be hard for you to detect input to activate the aimbot. One possible way of doing it is to do evdev passthrough so therefore the host could still read the input going to the guest operating system and find a way to monitor the input stream on host.

Do note that hypervisor is still a detection vector, despite that EAC is pretty forgiving on VMs.

Writing code that interacts with the X11 lib works too, I have a simple example of an overlay for X11 systems, it also does a passthrough of the clicks so this should mean that besides hypervisor (pretty small chance), and memory writing (even smaller chance) there are no detection vectors.

I didn't think about the host not being able to capture input, but there definitely should be a fix for this, in the "worst case", you could just capture input from the overlay and pass it to kvm/qemu manually.

@Quicals
Copy link

Quicals commented Oct 5, 2022

If anyone makes apex thingys dm me 6ix#4431

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants