Reverse-engineered the Windows kernel input stack to build an undetectable driver, eliminating anti-cheat bans for a commercial CS\:GO aimbot.
The client’s commercial CS\:GO aimbot moved the mouse via the user-mode mouse_event API—an approach now flagged by modern anti-cheat engines, resulting in mounting account bans and lost revenue.
I delivered a stealth kernel-mode driver & loader that injects mouse movement beneath anti-cheat detection:
| Component | Purpose | Key Tech |
|---|---|---|
| Driver Loader | Manually maps an unsigned driver outside the normal Windows driver chain | Capcom vulnerable driver exploit · Patchless NtLoadDriver bypass |
| Kernel Driver | Synthesizes mouse input via an undocumented win32k routine | WDK · C/C++ |
| User-Mode API | Exposes lightweight C interface for the existing aimbot | DLL export |
Evasion: manual mapping leaves no signed-driver trace; loader wipes vulnerable-driver history to stay invisible to anti-cheat forensic scans.
Reverse-engineered win32k & HID paths; discovered the undocumented input routine; implemented driver, loader, and user-mode API; documented integration steps for the client’s dev team.
| Challenge | Mitigation & Result |
|---|---|
| No documented kernel API for mouse injection | Located a hidden win32k function → precise, low-latency movement |
| Anti-cheat scans signed-driver chain | Manual mapping via vulnerable driver → driver absent from loaded-driver list |
| Residual artifacts from exploit driver | Cleared Capcom traces post-load → anti-cheat cannot correlate activity |
