BattlEye shellcodes tester
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Arsenii Esenin 11c21303a0
sig shell EP
12 months ago
be-shellcode-tester sig shell EP 12 months ago
.gitattributes Initial commit 12 months ago
.gitignore Initial commit 12 months ago
be-shellcode-tester.sln иду на блядки наводить порядки 12 months ago add contributing msg to readme 12 months ago


What is this?

As you may know battleye loads custom shellcodes for detecting some stuff.
Well this software is running those shellcodes and dumps every report that was sent.

How's this works?

  • Iterating dir with previously dumped shellcodes and maps it to self mem.
  • Passes 'hooked' GetProcAddress/GetModuleHandleA/send_report functions to shellcode.
  • Reads report and prints info about it.

How's it useful for me?

Imagine your p2c is detected in be-protected game, all you need to do is dump their shellcodes and check your cheat with this tool.


  • Hookless
  • Parses 9/10 reports(tested only on eft/r6 tho)
  • Both .dll and .exe versions are available
  • Decrypts encrypted reports from shellcodes
  • Decrypts encrypted reports from BEClient2.dll

How can i dump shellcode from game?

Hook GetProcAddress, get mbi of return address and check if it's not a legit module.




Any contributions you make are greatly appreciated.

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request