Skip to content
This repository has been archived by the owner on May 18, 2019. It is now read-only.

Inspired by Cheat Engine another reverse-engineering library

License

Notifications You must be signed in to change notification settings

ivanstepanovftw/reverse-engine

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Reverse Engine (pre-alpha)

Reverse Engine is an another reverse engineering tool inspired by Cheat Engine. You can also create trainers. Even with Python.

License

LGPLv3 This work is licensed under a GNU Lesser General Public License v3.

Contents

Features

  • Find and attach process by PID or title
  • Access target memory space, read and write any value
  • Value scanner
  • Watchpoints and Breakpoints
  • Pattern scanner
  • Resolve pointers
  • Pointer scanner
  • Memory view
  • Code injection
  • CLI support
  • GUI support
  • Python binding (pybind11)

Cheat example

Further information: Advanced C++ example of CS:GO trainer

Example is a bit out of date, you can check our testing suites. It is also have example of python executable

handler h("csgo_linux64");
h.update_regions();
region *client = h.get_region_by_name("client_client.so");
uintptr_t glow_pointer_call;
h.find_pattern(&glow_pointer_call,
               client,
               "\xE8\x00\x00\x00\x00\x48\x8b\x10\x48\xc1\xe3\x06\x44",
               "x????xxxxxxxx");
uintptr_t glow_call = h.get_call_address(glow_pointer_call);
uintptr_t glow_array_offset;
h.read(&glow_array_offset, glow_call+0x10, sizeof(uintptr_t));
// etc...

Contacts

About

Inspired by Cheat Engine another reverse-engineering library

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published