⚠️ The cheating you don’t hear about

Esports fraud, mapped by science.

E-doping is the technological arms race happening beneath every competitive match. This catalog exposes every known fraud technique — from aimbots to kernel exploits — organized by the layer of the stack it attacks and backed by peer-reviewed research.

Drill into the data

Find a fraud technique.

Search by name, filter by the technical layer it targets, or toggle between confirmed e-doping and adjacent misconduct.

Technical level

Game-Level

2 fraud cards in this group.

2
Technical level

Application-Level

11 fraud cards in this group.

11
Aimbots/Aimlock/Triggerbots

Software that automatically aims at targets, locks onto enemies, or fires weapons.

Application-Level Counted as e-doping
7 articles
Automated Input Generation (Macros)

Programs that perform complex sequences of actions automatically.

Application-Level Counted as e-doping
1 article
Computer Vision-Based Cheats

Using artificial intelligence or computer vision to identify and target opponents.

Application-Level Counted as e-doping
6 articles
Game Bots/Botting

Automated scripts or agents that perform gameplay actions for resource farming, experience gain, or other unfair advantages.

Application-Level Counted as e-doping
8 articles
Information Leakage

Exploiting the client to receive more game-state information than legitimately allowed.

Application-Level Counted as e-doping
1 article
Item Duplication

Creating unauthorized copies of in-game items or resources.

Application-Level Counted as e-doping
1 article
Map Hacking

Removing fog-of-war mechanics or revealing the full game map and enemy positions.

Application-Level Counted as e-doping
1 article
Memory Value Alteration

Directly changing values stored in game memory during runtime.

Application-Level Counted as e-doping
6 articles
Speed Hacks

Manipulating character movement speed or action execution rates.

Application-Level Counted as e-doping
1 article
Wallhacks & ESP Hacks

Rendering opponents visible through solid objects or displaying hidden game information via ESP-style overlays.

Application-Level Counted as e-doping
4 articles
Weapon Recoil Suppression

Scripts that automatically compensate for weapon recoil patterns.

Application-Level Counted as e-doping
0 articles
Technical level

Protocol-Level

4 fraud cards in this group.

4
Technical level

Infrastructure-Level

6 fraud cards in this group.

6