Requirements:
- Extensive experience with Windows kernel development and reverse engineering.
- Strong knowledge of EAC/BE detection vectors and mitigation techniques.
- Proficiency in driver development, hypervisor-based solutions, and memory manipulation.
- Prior work on internal projects related to anti-cheat bypassing (preferred but not required).
- Ability to develop a secure, undetected, and long-term sustainable solution for internal use only.
- Familiarity with integrity checks, driver signing, and evasion strategies.
- Must provide proof of previous or current work demonstrating experience with anti-cheat bypasses or related security development.
Project Scope:
- Development of a low-level, stealthy spoofer to bypass hardware bans.
- Creation of an internal bypass that remains undetected across multiple updates.
- Security-focused design with minimal risk of detection or signature leaks.
- Implementation of custom hooking methods to avoid common detection techniques.
Serious inquiries only.
For inquiries, please contact us on Discord: syntax.win






