How risky is writing memory for decryption purposes

07/03/2025 22:34 EternityWTF#1
We all know DMA cheats are designed to be safe, hence why most of them are read only. Now Bow R6 and jjboy/jjtom r6 are 2 dma cheats who write memory in order to decrypt. Is this true? Idk but ive seen some people mention it.

My question, how risky is this and could this be an actual detection vector?
Yes i know we are talking about battleeye. But im still interested in how secure this actually is.
Id preffer an answer from an actual dma dev and not just resellers who want to up there sales by spamming any threads and recommending there shit.
07/03/2025 22:56 zidxda#2
Whatever you do, it will stay as risky no matter what. It will somehow decrease the risk if it does encrypts memory during use and it avoids predicatable locations. other which will tell anything other than this are has no knowledge at all and just wannabe-devs lol
07/04/2025 02:28 Anunymous#3
Who said Bow and jjboy are writing to mem?
07/04/2025 11:23 EternityWTF#4
Quote:
Originally Posted by Anunymous View Post
Who said Bow and jjboy are writing to mem?
Seen multiple people in different discord say it
07/07/2025 13:30 Relentless#5
They’re not using shell code afaik
07/07/2025 15:00 x96dbg#6
100% shellcode why else search for a exec codecave?
[Only registered and activated users can see links. Click Here To Register...]