Skip to content

noahware/darken-anticheat

Repository files navigation

Darken Anticheat

Open source anticheat for protecting your software against tampering and reverse engineering.

Current Features

  • Detects loaded dlls which are not digitally signed.
  • Detects loaded kernel modules which are not digitally signed.
  • Strips permissions of handles that are attempted to be opened to any of our protected processes.
  • Detects system threads which have a start address outside of any legitimate kernel module.
  • Detects system threads which are attached to any of our protected processes.
  • Detects process threads which have a start address outside of any legitimate module in the respective protected process.
  • Detects debugged attached via the PEB's BeingDebugged byte.
  • Force-triggering PatchGuard (KPP) checks to run (causes bugcheck to occur if there are any violations of PatchGuard's checks).
  • Causing bugcheck if PatchGuard (KPP) is disabled / has an invalid context.
  • Checking usage of reserved MSRs (model specific registers).
  • Sending non maskable interrupts and analyzing the rip to detect execution outside of valid kernel modules.
  • Resolving all driver imports manually.

Windows Versions Supported

I have tested the anticheat on Windows 10 22H2 and Windows 11 24H2, but I have implemented offsets for each build from Windows 10 1507 -> Windows 11 24H2, so the anticheat should in theory function for all the Windows 10 and Windows 11 versions currently released to the public.

Credits

Licensing

This project has been placed under the GNU General Public License, if there are any specific enquiries regarding usage, please contact the founder of the project noahware.

About

Kernel anticheat for protecting software.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published