home..

hacking with praydog

things I find interesting

UEVR: An Exploration of Advanced Game Hacking Techniques

July 3, 2023

  • Disclaimer: Most of what is talked about here is not new, and has been used in the security industry for a long time. This article is meant to show how these techniques can be used to locate functions, variables, and structure offsets within games, rather than identify malware.

Read more...

An Analysis of the Source 2 Engine: The Schema System

June 24, 2015

With the release of the Dota 2 Reborn Beta, users are able to try out the new Source 2 Engine. Just recently, Valve released the Mac and Linux clients for this beta.

Read more...

Bypassing the Forgelight Engine’s Anti-Data Tampering Code

March 8, 2015

Planetside 2 and H1Z1 generate hashes for specific intervals of data within some data structures. In H1Z1, a lot more areas have this type of data tampering protection enabled. If the stored hash is not equal to a recently generated hash, the game will force an exception and crash.

Read more...
© 2023 praydog   •  Theme  Moonwalk