This is an automated archive made by the Lemmit Bot.

The original was posted on /r/opensource by /u/am1goo on 2024-01-27 19:25:32.


In the company where I previously worked on the game, we had the headache - Chinese (faster than light) cheaters who re-pack *.apk with additional cheat manager (android overlay, additional in-app advertisement and etc) and about to publish it to tons of game stores. We have 10mln+ MAU and this issue is a huge problem.

So, I’ve trying to find out “broken” part of the game, but found nothing. All cheats are binary native code in few *.so libraries. As you can see, it’s a hardly to debug and reverse engineering.

But, long story short

Each re-packed *.apk file has bunch of abnormal files and executable code, so, if I think - if I can’t find the cheat code I can find the cheat preconditions, like additional packages, classes, libraries and others.

So, this is the reason that I have created toolkit called Bloodseeker

Btw, I’ve made it as open source, because it’s easy to repeat and hard to avoid

Surprise, in the 1st day after release 99% cheaters was banned and we received a lot of e-mail about “I don’t mind that my game has cheats, omg, I’s impossible, please un-ban me!”

Funny, but help us a lot and I love to share this toolkit with community.

Feel free to make give feedback to me, I mean, if it works to us, it could be works to yours!