Moar Game Hacking

Welcome back guys! This is another post for my recent game hacks, in an effort to better understand local memory manipulation and protections in games. I've recently encountered many games which invoke protections. One for example, won't let you open the game if you have Cheat Engine open. That game is Miscreated, check it out:
However it must do this by scanning the process name list and looking for Cheat Engine, because if you rename the process to something different you can still run both concurrently.
That said, the game will crash later if you attach Cheat Engine to the process, potentially another anti-cheat feature. Another game, BattleBlock Theater, uses a type of integrity check to make sure that you can't spend more gems than you could have at that point in the game, despite the size of your wallet. Despite being immature, it's exactly such checks that game makers can use to make sure their applications aren't being tampered with. In the following picture you can see the increased wallet, yet I couldn't buy new skins:

The following re just some fun game exploits. The first is VilleTown, this was a fun civ simulator where you have to build and maintain a society. Pumping your stats up here easily changing the entire scale of the game. Once you start this game it lays out he memory space for the variables as well, so you can change games and keep your hacks.



The next game was RuneStone, this one was a fun to hack as it allowed you to full explore these dungeons. This game would change it's memory layout for certain values between floors, meaning you had to automate some of these values between floors.



The final game is the epic Galak-Z. Being a Mono game you can also disassemble the source here and directly modify the functions, meaning I've been playing and hacking with this game for a while. In the video I have cash and missile hacks going, however the locked missile hacks noticeably effects the game play. That said, this game offers hours of opportunity, both in game play and hacking.