Full-Stack Cheat Framework Source

03/28/2026 14:52 maximymym#1
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]

Selling the complete source code of a production cheat platform.
10+ components, ~20,000 LOC of custom code (C++, C, Go, TypeScript).
Everything from kernel drivers to web dashboard — no third-party cheat dependencies.

Currently targets EFT (IL2CPP) and EFT Arena (Mono), but the framework is game-agnostic:
swap offsets and game logic → works for any Unity / BattlEye title.

━━━ Components ━━━

Code:
Component                    | Language  | LOC    | Description
----------------------------|-------------|--------|------------------------------------------
Internal Overlay (EFT)    | C++         | ~5,000 | DX11 Present hook, ImGui, ESP/Aimbot/Chams
Internal Overlay (Arena) | C++         | ~4,000 | Mono runtime, auto offset dump
Kernel Driver                  | C             | ~750   | RPM/WPM via MmCopyVirtualMemory + cleanup
BattlEye Bypass v5          | C             | ~350   | IAT hook on BEDaisy, report queue filtering
HWID Spoofer                 | C             | —      | Disk/NIC/SMBIOS/GPU kernel-mode spoof
Stage2 Orchestrator         | C++        | ~150   | Reflective load, watermark, code wipe
Loader (Stub)                  | C++ Win32 | ~5,000 | ImGui GUI, auth, AES decrypt, anti-debug x8
Backend API                    | Go           | ~3,000 | Fiber, 30+ endpoints, PostgreSQL, Redis
Web Dashboard                | Next.js    | —      | Registration, key activation, admin panel
Infrastructure                   | Docker     | —      | Compose, Caddy TLS, deploy scripts
━━━ Architecture Highlights ━━━

Crypto & Auth Pipeline:
  • Client → Server: key + HWID hash + nonce + timestamp
  • Server validates: rate limit → timestamp (±300s) → nonce replay (Redis) → key lookup → HWID bind
  • Server signs response with ECDSA P-256
  • Payload delivery: HKDF(IKM=hwid_hash, salt=session_key) → AES-256-GCM encryption
  • Client decrypts with same HKDF derivation, verifies ECDSA signature

Loader Protection Stack:
  • VMProtect 3.9 virtualization (post-build)
  • XorStr compile-time string encryption
  • 8 anti-debug checks (PEB, NtGlobalFlag, DebugPort, ProcessDebugObject, RDTSC timing, HW breakpoints)
  • Anti-VM (registry checks, disabled on bare-metal VBS)
  • Anti-dump (PAGE_NOACCESS on PE headers, SizeOfImage=0)

Driver Stealth:
  • MmUnloadedDrivers table cleanup
  • PiDDBCacheTable entry removal
  • IOCTL-based communication (no suspicious imports)
  • BE bypass: MDL-based IAT hook, deferred IoWorkItem callback removal

Session Management:
  • 30-min TTL extended by heartbeat pings, 8h absolute max
  • Per-session download limit (50 files)
  • HWID binding on first auth, mismatch = denied
  • HWID reset with 72h cooldown
  • Per-session watermark in Stage2 (traceable if leaked)

Deployment:
  • Docker Compose: Go API + Next.js + PostgreSQL 16 + Redis 7 + Caddy (auto-TLS)
  • One-command deploy: build → SCP → docker-compose up
  • 7 DB migrations, health checks, graceful shutdown

━━━ Overlay Features (EFT) ━━━
  • ESP: players (box, skeleton, HP, name, faction, distance), loot (prices), exfils, grenades
  • Silent Aim (PWA._shotDirection write — camera stays still)
  • Mouse Aimbot (FOV, smooth, bone selection)
  • NoRecoil / NoSway (PWA.Mask = 0)
  • G-Buffer Chams + Material Chams + Depth Wallhack
  • Minimap Radar
  • ImGui menu, 80+ settings, INI config persistence

━━━ What You Get ━━━
  • Full source code of all 10+ components
  • CMakeLists.txt build configs (MSVC 2022)
  • Go backend with all migrations
  • Docker Compose configs (dev + prod + VPS)
  • Architecture documentation
  • Working build from day one (bring your own signing cert for drivers)

━━━ Proof / Demo ━━━

Can't embed images due to forum restrictions.
DM me on Discord or Telegram — I'll send the full screenshot gallery and offer a live screenshare demo:
  • ESP + chams + radar running in-game
  • Loader auth flow (key → inject → active)
  • Admin panel with live sessions
  • Full source walkthrough in IDE (~20K LOC)

━━━ Price ━━━

DM for price. This is a one-time source code sale.
Payment: BTC / ETH / USDT. Forum middleman accepted.

━━━ Contact ━━━
  • Discord: maks9479
  • Telegram: @maximymym
  • ElitePvPers PM

I respond within 24 hours. Serious inquiries only.