⚠️ The cheating you don’t hear about

Esports fraud, mapped by science.

E-doping is the technological arms race happening beneath every competitive match. This catalog exposes every known fraud technique — from aimbots to kernel exploits — organized by the layer of the stack it attacks and backed by peer-reviewed research.

Drill into the data

Find a fraud technique.

Search by name, filter by the technical layer it targets, or toggle between confirmed e-doping and adjacent misconduct.

Technical level

Game-Level

0 fraud cards in this group.

0
No fraud cards matched the current filters.
Technical level

Application-Level

13 fraud cards in this group.

13
Aimbots/Aimlock/Triggerbots

Software that automatically aims at targets, locks onto enemies, or fires weapons.

Application-Level Counted as e-doping
7 articles
Automated Input Generation (Macros)

Programs that perform complex sequences of actions automatically.

Application-Level Counted as e-doping
1 article
Computer Vision-Based Cheats

Using artificial intelligence or computer vision to identify and target opponents.

Application-Level Counted as e-doping
6 articles
Detection & Security Research

General research focused on identifying, detecting, or preventing cheating behaviors.

Application-Level Adjacent integrity issue
2 articles
Game Bots/Botting

Automated scripts or agents that perform gameplay actions for resource farming, experience gain, or other unfair advantages.

Application-Level Counted as e-doping
8 articles
Information Leakage

Exploiting the client to receive more game-state information than legitimately allowed.

Application-Level Counted as e-doping
1 article
Item Duplication

Creating unauthorized copies of in-game items or resources.

Application-Level Counted as e-doping
1 article
Map Hacking

Removing fog-of-war mechanics or revealing the full game map and enemy positions.

Application-Level Counted as e-doping
1 article
Memory Value Alteration

Directly changing values stored in game memory during runtime.

Application-Level Counted as e-doping
6 articles
Reverse-Engineering

Decompiling and analyzing game code to identify vulnerabilities and exploits.

Application-Level Adjacent integrity issue
1 article
Speed Hacks

Manipulating character movement speed or action execution rates.

Application-Level Counted as e-doping
1 article
Wallhacks & ESP Hacks

Rendering opponents visible through solid objects or displaying hidden game information via ESP-style overlays.

Application-Level Counted as e-doping
4 articles
Weapon Recoil Suppression

Scripts that automatically compensate for weapon recoil patterns.

Application-Level Counted as e-doping
0 articles
Technical level

Protocol-Level

0 fraud cards in this group.

0
No fraud cards matched the current filters.
Technical level

Infrastructure-Level

0 fraud cards in this group.

0
No fraud cards matched the current filters.