Official site anti-cheat Ultra Core Protector

Home Download F.A.Q. Addons Monitor Forum Support Advertise English version site UCP Anti-Cheat  Russian version site UCP Anti-Cheat
Ultra Core Protector - is the client-server anti-cheat freeware, for server protection from unscrupulous players.

Abilities Supported games  
Half-Life
Condition Zero
Counter-Strike 1.6
Day of Defeat
Adrenaline Gamer
Team Fortress Classic
Counter-Strike Source
MU Online
Ragnarok Online
Half-Life 2 Deathmatch
Adrenaline Gamer 2
Team Fortress 2
Role of Polymorphic Engines against Anti-Cheats

Hello Unknowncheats Community !

This is going to be a long read so you can skip the first part. I’ll make a note of where the out of topic rambling stops..

I must begin by saying that somehow I got sucked into selling cs go cheats without having much knowledge, I got everything served to me on a silver platter. A private source code of a cheat that has not been detected for years and counting and access to a private polymorphic engine.

I didn’t like not knowing “the how” so I started learning computer science, assembly and c++ … I wanted to be able to do everything on my own from scratch, I wanted to understand the inner workings of what I was doing.

As soon as I started learning I realized how much I don’t know and how long it’s going to take me to ever to be able to do these things on my own.

I only say these things so you can understand where I’m coming from…

After selling the cheat for a while I “lost” access to the polymorphic engine, I’m too early in the game to even begin coding such a complicated beast.

END OF RAMBLING

So here I am asking… what does a polymorphic engine even do to stop a cheat from getting detected.

At least the one I was using was only meant to take the .exe or dll or whatever you had to offer and mess around with it for a while. Obviously this meant that it didn’t do anything to the actual source code, it just scrambled the compiled version.

I know when people talk about changing a “signature” of a publicly available cheat they have to go inside the source code and make the proper modifications. But can a software like this make them from the outside, enough so that the signature is significantly changed?

I don’t know if I should continue selling my cheat without being able to run it through an engine like this, I don’t want people to get detected.

But how would they even get detected unless someone sends the cheat to valve and if they send it when it’s “polymorphed” does it even matter since it would look that much different from the other versions you’ve “polymorphed”?

The main questions is what does a polymorphic engine really do to ensure the survivability of a cheat that’s being used by a large amount of people?

Menalix:

Well it mutates the code, which means different data in the binary and eventually it will break Valve’s signatures.

Scrambling a compiled binary is harder than doing it on source code level, but it is possible to do and can be just as secure, but you’re making the job harder for yourself as a coder, especially with a managed binary like there’s a lot you’ll have to alter in the managed file header aswell for the binary not get unable to execute.

It shouldn’t matter if anyone send valve a polymorphed cheat, if it does your polymorhic engine isn’t good enough.

It re-writes the code while achieving the same result, aka the binary will consist of different data.