diff --git a/README.md b/README.md index 020a331..37449d8 100644 --- a/README.md +++ b/README.md @@ -28,4 +28,8 @@ be pointing at other processes page tables and thus other processes PFNs. This p return addresses on the stack which do not land inside of legit modules text sections. Simply APC's will catch this and BattlEye already does this. You can also construct a view of executable memory given the page tables of a process. If there is executable pages outside of a loaded modules .text sections -they can become apparent easily. Since the CPU is constantly executing the cheat it is unlikely that it will be paged to disk. \ No newline at end of file +they can become apparent easily. Since the CPU is constantly executing the cheat it is unlikely that it will be paged to disk. + +# Credit +[ChaosLeader](https://www.unknowncheats.me/forum/members/168188.html) - no_gui is a cleaned up version of this renderer +[JustasMasiulis](https://github.com/JustasMasiulis/lazy_importer) - no_import.h is lazy importer \ No newline at end of file