[Hiring] Senior C++ Reverse Engineer / Kernel Dev for Protected Memory Extraction (Ring-0 AC Bypass)
Project Overview:
I am looking for an experienced Reverse Engineer to develop a custom, lightweight C++ module capable of reading memory (RPM) from a highly protected process (Call of Duty: Warzone / Ricochet Anti-Cheat) and forwarding this data to a local Python backend via Named Pipes or local sockets.
The backend (Python) and frontend (React) are already 100% completed. I ONLY need the data extraction module.
Technical Requirements:
Target: Extract player list/lobby data during matchmaking and in-game.
Method: strictly ReadProcessMemory (RPM). No WriteProcessMemory (WPM), no memory modification, no internal hooks.
Bypass: Must handle Ring-0 protections (Ricochet). You must be able to handle CR3 / Directory Table Base (DTB) obfuscation and frequent offset updates.
Implementation: Custom Kernel Driver or highly stealthy advanced user-mode approach.
STRICTLY NO PASTING: I will not accept kdmapper, vulnerable Intel/Capcom drivers, or pasted public source code from UC/GitHub. The solution must be custom and undetected.
Communication: Must stream the extracted strings/structs continuously and cleanly to a local Python server via IPC (Named Pipes preferred).
The Scammer Filter (Non-Negotiable):
Do not contact me if you cannot prove your skills. Before any final agreement or milestone payment, I require a Live Screenshare on Discord. You must demonstrate your custom module successfully reading the target process memory on the latest game patch without causing a BSOD or a game crash.
Budget & Timeline:
Budget is flexible and highly negotiable for the right expert who can guarantee stealth, stability, and maintainability. Let's discuss your architecture first.






