As you may know battleye loads custom shellcodes for detecting some stuff.
Well this software is running those shellcodes and dumps every report that was sent.
- Iterating dir with previously dumped shellcodes and maps it to self mem.
- Passes 'hooked' GetProcAddress/GetModuleHandleA/send_report functions to shellcode.
- Reads report and prints info about it.
Imagine your p2c is detected in be-protected game, all you need to do is dump their shellcodes and check your cheat with this tool.
- Hookless
- Parses 9/10 reports(tested only on eft/r6 tho)
- Both .dll and .exe versions are available
- Decrypts encrypted reports from shellcodes
- Decrypts encrypted reports from BEClient2.dll
Hook GetProcAddress, get mbi of return address and check if it's not a legit module.
Any contributions you make are greatly appreciated.
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/AmazingFeature
) - Commit your Changes (
git commit -m 'Add some AmazingFeature'
) - Push to the Branch (
git push origin feature/AmazingFeature
) - Open a Pull Request