Esports fraud, mapped by science.
E-doping is the technological arms race happening beneath every competitive match. This catalog exposes every known fraud technique — from aimbots to kernel exploits — organized by the layer of the stack it attacks and backed by peer-reviewed research.
Find a fraud technique.
Search by name, filter by the technical layer it targets, or toggle between confirmed e-doping and adjacent misconduct.
Game-Level
0 fraud cards in this group.
Application-Level
13 fraud cards in this group.
Software that automatically aims at targets, locks onto enemies, or fires weapons.
Programs that perform complex sequences of actions automatically.
Using artificial intelligence or computer vision to identify and target opponents.
General research focused on identifying, detecting, or preventing cheating behaviors.
Automated scripts or agents that perform gameplay actions for resource farming, experience gain, or other unfair advantages.
Exploiting the client to receive more game-state information than legitimately allowed.
Creating unauthorized copies of in-game items or resources.
Removing fog-of-war mechanics or revealing the full game map and enemy positions.
Directly changing values stored in game memory during runtime.
Decompiling and analyzing game code to identify vulnerabilities and exploits.
Manipulating character movement speed or action execution rates.
Rendering opponents visible through solid objects or displaying hidden game information via ESP-style overlays.
Scripts that automatically compensate for weapon recoil patterns.
Protocol-Level
0 fraud cards in this group.
Infrastructure-Level
0 fraud cards in this group.