Anti-Cheat Bypass · Screen Capture Bypass · Stealth Networking · Network Evasion · Security Research
We're a security research team that builds tools for studying and defeating detection systems. We reverse-engineer anti-cheat engines, screen capture pipelines, and network inspection appliances — then publish the frameworks we develop so others can learn from and build on our work.
BypassCore has been active since 2017. Our open-source tools are used by security researchers, red teams, and privacy engineers worldwide.
| Project | Description | Language | Since |
|---|---|---|---|
| bypasscore-sdk | Core hooking engine, memory introspection, PE parsing, and binary analysis primitives — the foundation of everything we build | C++ | 2017 |
| cloakware | Process injection and memory cloaking research — classic injection, APC, thread hijacking, process hollowing, VEH guard pages, module stomping | C/C++ | 2018 |
| patchwork | Windows PatchGuard (KPP) analysis — context discovery, timer analysis, integrity check mapping, decryption routines, and kernel driver for live research | C/ASM | 2019 |
| sentinel | Anti-cheat evasion framework — process hiding, memory protection, driver-level stealth, and signature analysis for EAC, BattlEye, and Vanguard | C/C++ | 2019 |
| spectra | ETW bypass and telemetry evasion — provider enumeration, trace session manipulation, EtwEventWrite patching, and security product telemetry mapping | C++ | 2020 |
| phantom-screen | Screen capture bypass toolkit — GDI BitBlt hooking, DXGI bypass, Windows Graphics Capture evasion, DWM cloaking, and DirectX overlays | C++ | 2021 |
| ironveil | Casino and iGaming security audit framework — bot detection analysis, behavioral evasion, fingerprint spoofing, and platform integrity testing | Python | 2021 |
| ghostlink | Covert C2 communication framework — DNS tunneling, HTTPS beaconing, named pipes, ICMP channels, steganography, and encrypted multi-channel failover | C++ | 2022 |
| flag-secure-bypass | Android FLAG_SECURE screen capture bypass research — Xposed hooks, MediaProjection workarounds, SurfaceFlinger analysis, virtual display capture | Java | 2023 |
| netveil | Traffic obfuscation engine with pluggable transports — DPI evasion, HTTP mimicry, TLS fingerprint spoofing, and timing analysis resistance | Rust | 2023 |
| dpi-bench | DPI evasion testing and benchmarking toolkit — test fragmentation, desync, TTL, TLS spoofing against real censorship systems | Python | 2024 |
| sni-cloak | SNI/TLS ClientHello fragmentation and cloaking — bypass YouTube/Discord blocking without VPN, with built-in evasion profiles | Go | 2024 |
- Anti-Cheat Bypass — Kernel-level evasion research for EAC, BattlEye, Vanguard, FACEIT, and custom engines
- Screen Capture Bypass — Defeating screenshot detection, screen recording, and display monitoring at the graphics pipeline level
- DPI & Network Evasion — Protocol obfuscation, traffic shaping, and deep packet inspection bypass
- Stealth Networking — TCP connection hiding, covert channels, and traffic analysis resistance
- Hooking & Memory Research — Inline detours, IAT/VMT hooking, syscall hooks, and memory introspection
- ETW & Telemetry Evasion — Bypassing Event Tracing for Windows, disabling security product telemetry, and EDR evasion research
- Process Injection & Memory Cloaking — Advanced injection techniques, memory permission cycling, module stomping, and PE header wiping
- PatchGuard Research — Windows Kernel Patch Protection analysis, timer identification, context decryption, and integrity check mapping
- Covert Communications — C2 channel research with DNS tunneling, HTTPS beaconing, ICMP channels, and steganographic encoding
Building on our tools? Need custom research? Looking for enterprise support?
- Email: contact@bypasscore.com
- Telegram: @bypasscore
- Website: bypasscore.com
Help keep BypassCore open-source and independent.
| Network | Address |
|---|---|
| Polygon | 0xd0f38b51496bee61ea5e9e56e2c414b607ab011a |
| Ethereum | 0xd0f38b51496bee61ea5e9e56e2c414b607ab011a |
| BSC | 0xd0f38b51496bee61ea5e9e56e2c414b607ab011a |
| Arbitrum | 0xd0f38b51496bee61ea5e9e56e2c414b607ab011a |
| Optimism | 0xd0f38b51496bee61ea5e9e56e2c414b607ab011a |
| Avalanche | 0xd0f38b51496bee61ea5e9e56e2c414b607ab011a |
USDT / USDC / ETH / BNB accepted on all networks.
Built with precision by BypassCore Labs