Reverse Engine (pre-alpha)
Reverse Engine is an another reverse engineering tool inspired by Cheat Engine. You can also create trainers. Even with Python.
License This work is licensed under a GNU Lesser General Public License v3.
Contents
Features
- Find and attach process by PID or title
- Access target memory space, read and write any value
- Value scanner
- Watchpoints and Breakpoints
- Pattern scanner
- Resolve pointers
- Pointer scanner
- Memory view
- Code injection
- CLI support
- GUI support
- Python binding (pybind11)
Cheat example
Further information: Advanced C++ example of CS:GO trainer
our testing suites. It is also have example of python executable
Example is a bit out of date, you can checkhandler h("csgo_linux64");
h.update_regions();
region *client = h.get_region_by_name("client_client.so");
uintptr_t glow_pointer_call;
h.find_pattern(&glow_pointer_call,
client,
"\xE8\x00\x00\x00\x00\x48\x8b\x10\x48\xc1\xe3\x06\x44",
"x????xxxxxxxx");
uintptr_t glow_call = h.get_call_address(glow_pointer_call);
uintptr_t glow_array_offset;
h.read(&glow_array_offset, glow_call+0x10, sizeof(uintptr_t));
// etc...
Contacts
- Ivan Stepanov ivanstepanovftw@gmail.com
- Andrea Stacchiotti andreastacchiotti@gmail.com