Hacker News
- How anti-cheats catch cheaters using memory heuristics https://vmcall.blog/battleye-stack-walking/ 140 comments
Lobsters
- BattlEye stack walking https://vmcall.blog/battleye-stack-walking/ 3 comments games , reversing , windows
- Bypassing kernel function pointer integrity checks https://vmcall.blog/nt/2019/11/06/kernel-code-alignment.html 2 comments reversing , security , windows
- How anti-cheats catch hackers using thread heuristics https://vmcall.blog/battleye-kernel-single-step/ 15 comments programming
- How anti cheats catch hackers intercepting communications https://vmcall.blog/battleye-communication-hook/ 5 comments linux_gaming
- How anti cheats catch hackers intercepting communications https://vmcall.blog/battleye-communication-hook/ 68 comments programming
- How anti-cheats catch virtual machine cheats https://vmcall.blog/battleye-hypervisor-detection/ 78 comments programming
- How anti-cheats catch hackers using thread heuristics https://vmcall.blog/battleye-kernel-single-step/ 99 comments programming
- Popular Anti Cheat Software BattlEye Analysis (2020) https://vmcall.blog/battleye-analysis-2020/ 7 comments programming
- How anti-cheats catch cheaters using memory heuristics https://vmcall.blog/battleye-stack-walking/ 293 comments programming
- Hooking the Windows graphics kernel subsystem https://vmcall.blog/nt/2019/10/18/kernel_gdi_hook.html 33 comments programming