Senior C++ Reverse Engineer / Kernel Dev for Protected Memory Extraction (Ring-0 ...

03/06/2026 02:03 Govita#1
[Hiring] Senior C++ Reverse Engineer / Kernel Dev for Protected Memory Extraction (Ring-0 AC Bypass)

Project Overview:
I am looking for an experienced Reverse Engineer to develop a custom, lightweight C++ module capable of reading memory (RPM) from a highly protected process (Call of Duty: Warzone / Ricochet Anti-Cheat) and forwarding this data to a local Python backend via Named Pipes or local sockets.

The backend (Python) and frontend (React) are already 100% completed. I ONLY need the data extraction module.

Technical Requirements:

Target: Extract player list/lobby data during matchmaking and in-game.

Method: strictly ReadProcessMemory (RPM). No WriteProcessMemory (WPM), no memory modification, no internal hooks.

Bypass: Must handle Ring-0 protections (Ricochet). You must be able to handle CR3 / Directory Table Base (DTB) obfuscation and frequent offset updates.

Implementation: Custom Kernel Driver or highly stealthy advanced user-mode approach.

STRICTLY NO PASTING: I will not accept kdmapper, vulnerable Intel/Capcom drivers, or pasted public source code from UC/GitHub. The solution must be custom and undetected.

Communication: Must stream the extracted strings/structs continuously and cleanly to a local Python server via IPC (Named Pipes preferred).

The Scammer Filter (Non-Negotiable):
Do not contact me if you cannot prove your skills. Before any final agreement or milestone payment, I require a Live Screenshare on Discord. You must demonstrate your custom module successfully reading the target process memory on the latest game patch without causing a BSOD or a game crash.

Budget & Timeline:
Budget is flexible and highly negotiable for the right expert who can guarantee stealth, stability, and maintainability. Let's discuss your architecture first.
03/06/2026 11:16 EoNdev#2
Quote:
Originally Posted by Govita View Post
[Hiring] Senior C++ Reverse Engineer / Kernel Dev for Protected Memory Extraction (Ring-0 AC Bypass)

Project Overview:
I am looking for an experienced Reverse Engineer to develop a custom, lightweight C++ module capable of reading memory (RPM) from a highly protected process (Call of Duty: Warzone / Ricochet Anti-Cheat) and forwarding this data to a local Python backend via Named Pipes or local sockets.

The backend (Python) and frontend (React) are already 100% completed. I ONLY need the data extraction module.

Technical Requirements:

Target: Extract player list/lobby data during matchmaking and in-game.

Method: strictly ReadProcessMemory (RPM). No WriteProcessMemory (WPM), no memory modification, no internal hooks.

Bypass: Must handle Ring-0 protections (Ricochet). You must be able to handle CR3 / Directory Table Base (DTB) obfuscation and frequent offset updates.

Implementation: Custom Kernel Driver or highly stealthy advanced user-mode approach.

STRICTLY NO PASTING: I will not accept kdmapper, vulnerable Intel/Capcom drivers, or pasted public source code from UC/GitHub. The solution must be custom and undetected.

Communication: Must stream the extracted strings/structs continuously and cleanly to a local Python server via IPC (Named Pipes preferred).

The Scammer Filter (Non-Negotiable):
Do not contact me if you cannot prove your skills. Before any final agreement or milestone payment, I require a Live Screenshare on Discord. You must demonstrate your custom module successfully reading the target process memory on the latest game patch without causing a BSOD or a game crash.

Budget & Timeline:
Budget is flexible and highly negotiable for the right expert who can guarantee stealth, stability, and maintainability. Let's discuss your architecture first.
no one make it first and get payed after lol, you nobody here as rating
03/08/2026 20:40 Govita#3
Please learn to read instead of speaking without knowledge.