From 2b0bbe46789c2fac71cf841362eac77c64663437 Mon Sep 17 00:00:00 2001 From: xerox Date: Sat, 7 Mar 2020 21:10:11 -0800 Subject: [PATCH] Update README.md --- README.md | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 3707dbe..09bb943 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,11 @@ # amlegit -reverse engineering of amlegit/xcheats.cc this p2c sells an internal Apex cheat. Apex is protected by EAC and by the looks of this cheat/spoofer It doesnt even come +Reverse Engineering of amlegit/xcheats.cc this p2c sells an internal Apex cheat. Apex is protected by EAC and by the looks of this cheat/spoofer It doesnt even come remotely close to something that can evade a ban. -This cheat is a blatant paste of [kdmapper](url) and [hwid spoofer](https://github.com/btbd/hwid). +This cheat is a blatant paste of [kdmapper](url) and [hwid spoofer](https://github.com/btbd/hwid) using IOCTL hooking of a system driver. If you would like to read +more about this scam you can do so [here](url). + +# Overview + +As stated before this cheat uses an IOCTL hook to communicate between its usermode process and its manually mapped driver.