RDTSC-KVM-Handler
kernel-rdtsc-patch
RDTSC-KVM-Handler | kernel-rdtsc-patch | |
---|---|---|
9 | 1 | |
196 | 5 | |
- | - | |
5.0 | 2.1 | |
9 months ago | about 1 year ago | |
C | Shell | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
RDTSC-KVM-Handler
- Handle RDTSC
- RDTSC kernel
-
Bungie couldn’t vault anymore content so now the Linux/Steam Deck community is getting vaulted
You really ought to look into "VM hardening". Granted, it is not as simple as a one-button click thing, but bypassing VM detection is quite well established nowadays. Here's one link to get you started: https://github.com/WCharacter/RDTSC-KVM-Handler
-
Call of Duty Adds Kernel Level Driver for Anti-Cheat
I don't see any practical way they can detect qemu that can't be patched.
Here's one patch that supposedly works with battleeye: https://github.com/WCharacter/RDTSC-KVM-Handler
The current situation is that they could probably use server-side heuristics to detect players behaving oddly, review the case, and ban according.
But also I wouldn't be surprised if there were already bots using machine learning to autoaim based on video signal out of the PC with aiming done as a "real" HID mouse.
If we can train a car to drive, we can certainly train a computer to find and click faces in cod.
-
stuck on "creating domain"
I applied this patch. I don't know with which games does it help. I wanted to check if it works with Valorant but i can confirm that it doesn't. I think it was made to help with games like Rainbow six. https://github.com/WCharacter/RDTSC-KVM-Handler
-
Manjaro custom kernel won't work
And I tried this vmx.c & svm.c from that github : RDTSC-KVM-Handler
-
Preventing RDTSC Exits?
I've used patches previously to bypass this check: WCharacter/RDTSC-KVM-Handler, however now Windows sees my CPU clock as 200Mhz. That isn't too bad, as it doesn't affect performance anyway.
-
The Current State of Anti Cheat Software and VMs?
patch kernel using this: https://github.com/WCharacter/RDTSC-KVM-Handler
-
I wrote a version of the KVM hiding kernel patch for Intel CPUs that offsets the TSC by the exit time
I recommend that you swap your kernel patch to my version, assuming the one you used was this. Mine will report more realistic values than that one.
kernel-rdtsc-patch
-
Handle RDTSC
github: kernel-rdtsc-patch
What are some alternatives?
pafish - Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
patch-rdtsc
cheat-engine - Cheat Engine. A development environment focused on modding