BattlEye shellcodes tester
Go to file
Arsenii Esenin 11c21303a0 sig shell EP
now you don't need to cut your dumped shellcodes
2021-12-25 04:56:56 +01:00
be-shellcode-tester sig shell EP 2021-12-25 04:56:56 +01:00
.gitattributes Initial commit 2021-12-15 23:29:17 +01:00
.gitignore Initial commit 2021-12-15 23:29:17 +01:00
be-shellcode-tester.sln иду на блядки наводить порядки 2021-12-17 07:21:57 +01:00
readme.md add contributing msg to readme 2021-12-19 15:27:31 +01:00

be-shellcode-tester

What is this?

As you may know battleye loads custom shellcodes for detecting some stuff.
Well this software is running those shellcodes and dumps every report that was sent.

How's this works?

  • Iterating dir with previously dumped shellcodes and maps it to self mem.
  • Passes 'hooked' GetProcAddress/GetModuleHandleA/send_report functions to shellcode.
  • Reads report and prints info about it.

How's it useful for me?

Imagine your p2c is detected in be-protected game, all you need to do is dump their shellcodes and check your cheat with this tool.

Features:

  • Hookless
  • Parses 9/10 reports(tested only on eft/r6 tho)
  • Both .dll and .exe versions are available
  • Decrypts encrypted reports from shellcodes
  • Decrypts encrypted reports from BEClient2.dll

How can i dump shellcode from game?

Hook GetProcAddress, get mbi of return address and check if it's not a legit module.

Screenshot:

img

Contributing

Any contributions you make are greatly appreciated.

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

Credits:

@es3n1n
@user344