Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"Translation: How to Bypass Anti-Cheat Protection in Apps Using the KFD Vulnerability" #14

Open
qqwq122825 opened this issue Apr 18, 2024 · 0 comments

Comments

@qqwq122825
Copy link

"Hello, boss! I'd like to ask about the KFD vulnerability. Could you please advise on how to use the KFD vulnerability to access the physical address of an app's data and thereby bypass the app's anti-cheat protection? Normally, using the mach_vm_read_ API to access memory addresses would be detected."

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant