Esports fraud, mapped by science.
E-doping is the technological arms race happening beneath every competitive match. This catalog exposes every known fraud technique — from aimbots to kernel exploits — organized by the layer of the stack it attacks and backed by peer-reviewed research.
Find a fraud technique.
Search by name, filter by the technical layer it targets, or toggle between confirmed e-doping and adjacent misconduct.
Game-Level
0 fraud cards in this group.
Application-Level
0 fraud cards in this group.
Protocol-Level
0 fraud cards in this group.
Infrastructure-Level
6 fraud cards in this group.
Using modified console firmware to run unauthorized code or manipulate save data.
Using modified gaming peripherals or hardware devices with built-in scripts or automated functions.
Using manipulated virtual equipment or modified training devices for enhanced performance.
Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.
Counterfeiting or modifying data on physical game objects such as NFC devices or figures.
Falsifying rider or player physical metrics to gain favorable performance ratios in virtual sport contexts.