An IDA Pro plugin that statically detects Anti-Cheat Artifacts in Windows binaries.
meant to help reverse engineers and security researchers quickly identify the presence of
commercial or custom anti-cheat mechanisms during analysis.
⚠️ This plugin is for reverse engineering and academic research only.
- 🔍 Static detection of Anti-Cheat Artifacts
- Known Anti-Cheat strings (EAC, BattlEye, Vanguard, FACEIT, XIGNCODE, etc.)
- Suspicious Windows APIs commonly used by Anti-Cheats
- Anti-debugging and Anti-VM related imports
- 🧠 Function-level scanning
- 📊 Interactive results view
- Clickable results that jump directly to the artifact in IDA
- 🧩 Extensible rule-based design
- Easy to add new signatures and heuristics
- ⚡ Built on the IDA SDK (C++)
The plugin analyzes the binary for common Anti-Cheat techniques, including:
Examples:
EasyAntiCheatBEServicevgk.sysFACEIT ACXIGNCODE
Examples:
NtQueryInformationProcessZwQuerySystemInformationIsDebuggerPresentCheckRemoteDebuggerPresentOutputDebugStringNtSetInformationThread
- Unusual driver-related strings
- Anti-debug patterns
- Process / thread inspection behavior
This is static analysis only, no runtime hooking or bypassing is done.
You can download the pre-built plugin from the releases page. Just place the plugin in the IDA Pro plugins directory.
- IDA Pro 9.0
- IDA SDK
- Windows SDK (10.0.26100.0)
- Visual Studio (MSVC)
- Clone the repository:
git clone https://github.com/not1cyyy/Anti-Cheat-Artifacts-Detector.git cd Anti-Cheat-Artifacts-Detector - Build the plugin:
mkdir build cd build cmake .. cmake --build .
- Open IDA Pro and load the binary you want to analyze.
- Go to the "Plugins" menu and select "Anti-Cheat Artifacts Detector".
- Choose if you want to scan the current function or all functions.
- The plugin will scan the binary and display the results in a chooser window.
- You can then double click on the results to jump to the artifact in IDA.
This project is licensed under the GNU General Public License v3.0.
Contributions are welcome! Please open an issue or submit a pull request.