awesome-game-security-overview
Awesome Game Security - Project Overview
Purpose
This is a curated collection of resources related to game security, covering both offensive (game hacking, cheating) and defensive (anti-cheat) aspects. The project serves as a comprehensive reference for security researchers, game developers, and enthusiasts, especially where Windows internals, driver trust, reverse engineering, DMA, and modern anti-cheat defenses intersect.
README Coverage
- Top-level engines and rendering:
Game Engine,Renderer,DirectX,OpenGL,Vulkan - Offensive research:
Cheat - Defensive research:
Anti Cheat - Platform hardening:
Windows Security Features - Platform-specific ecosystems:
Android Emulator,IOS Emulator,Windows Emulator,Linux Emulator - Supporting infrastructure:
Mathematics,3D Graphics,AI,Image Codec,Wavefront Obj,Task Scheduler,Game Network,PhysX SDK,Game Develop,Game Assets,Game Hot Patch,Game Testing,Game Tools,Game Manager,Game CI - Platform subsystems:
WSL,WSA - Console emulation:
Game Boy,Nintendo Switch,Xbox,PlayStation - Tips and tricks:
Some Tricks
Project Structure
More from gmh5225/awesome-game-security
reverse-engineering-tools
Guide for reverse engineering protected games and anti-cheat components across user mode, kernel mode, and hypervisor-aware environments. Use this skill when analyzing drivers, IOCTL protocols, callback registration, injected-code artifacts, integrity checks, protected binaries, or debugging security-sensitive game components.
163game-engine-resources
Guide for game-engine internals, source trees, plugins, and engine-specific security research. Use this skill when researching Unreal, Unity, Source, Godot, custom engines, engine detectors, engine explorers, or engine protection patterns relevant to modding, reverse engineering, and anti-cheat.
116game-hacking-techniques
Guide for game-hacking technique taxonomy and threat modeling relevant to game security. Use this skill when researching memory access, code injection, overlays, input simulation, engine-specific attack surfaces, or how modern anti-cheat systems constrain user-mode, kernel-mode, hypervisor, and DMA-based cheat implementations.
107anti-cheat-systems
Guide for modern game anti-cheat architecture, Windows kernel monitoring, and detection tradeoffs. Use this skill when analyzing EAC, BattlEye, Vanguard, FACEIT AC, kernel callbacks, handle protection, manual-map detection, boot-start drivers, BYOVD, DMA threats, or behavioral telemetry in game security research.
94mobile-security
Guide for Android and iOS game security, reversing, and anti-cheat-adjacent platform research. Use this skill when working with APK or IPA analysis, IL2CPP mobile titles, Frida, Zygisk or Magisk, jailbreak or root detection bypass, Android kernel modules, emulator detection, or mobile anti-cheat systems.
89windows-kernel-security
Guide for Windows kernel internals and security mechanisms used in game protection and low-level research. Use this skill when working with drivers, IRQL-sensitive callbacks, EPROCESS, ETHREAD, MMVAD internals, IOCTL paths, DSE, PatchGuard, HVCI, PiDDBCache, MmUnloadedDrivers, or kernel memory inspection.
84