UltimateAntiCheat icon indicating copy to clipboard operation
UltimateAntiCheat copied to clipboard

UltimateAntiCheat is a free & open source usermode anti-cheat system made to detect and prevent common attack vectors in game hacking

image

UltimateAntiCheat: An Educational Anti-Cheat built in C++ (x64)

Research project: make an anti-cheat system to detect and/or prevent things like memory editing, debugging, unsigned code/certs, injected modules, etc.

This project is meant to serve as an anti-cheat program for educational purposes and is not intended to be commercial software or overly complex to crack. This example includes basic but fundamental protections, and in a production scenario we would aim to have many more detection methods along with a sophisticated server-side design. We aim to cover all attack surfaces such that the attacker is not able to gain a foothold into our process without being detected. Any modification to a single aspect will lead to being detected: for example, if someone tries to debug our code from usermode, they will likely re-map and perform memory edits to try and disable debugger detection which leads to their memory edit or remapping being detected. UltimateAntiCheat runs in usermode and has no driver associated with it. It's recommended that if possible you run VMProtect or a similar program on the compiled binary for added security through obscurity.

If there is anything not working for you (throws exceptions, can't build, etc) please raise an issue and I will answer it ASAP. If you have code suggestions or techniques you'd like to see added, or want assistance with adding anti-cheat to your game, please send me an email. More techniques and better design will be added to the project time permitting. The file changelog.md contains a dated updates list.

Current Detections and protective features:

  • Detects unsigned Modules
  • Debugger detection (hardware, PEB, exceptions, kernelmode)
  • Integrity checks on program memory (.text section checks, WINAPI hook checks, IAT hook checks)
  • Remapping sections & re-re-mapping checks (anti-tamper)
  • TLS Callback (anti-DLL injection)
  • Parent process check
  • Blacklisted Processes checks & whitelisted loaded modules check
  • Loaded module name random renaming (process manipulation)
  • Exported function names random renaming (process manipulation, anti-injection)
  • Data/obfuscation class to help hide sensitive variables
  • Check for if Windows is in 'Test Signing mode'
  • TLS Callback spoofing (changing TLS callbacks @ runtime)
  • Encrypted Shellcode payload execution (requires a server to send data to this project)

Upcoming Features:

  • Client/Server architecture with heartbeat mechanism