Esports fraud, mapped by science.
E-doping is the technological arms race happening beneath every competitive match. This catalog exposes every known fraud technique — from aimbots to kernel exploits — organized by the layer of the stack it attacks and backed by peer-reviewed research.
Find a fraud technique.
Search by name, filter by the technical layer it targets, or toggle between confirmed e-doping and adjacent misconduct.
Game-Level
0 fraud cards in this group.
Application-Level
0 fraud cards in this group.
Protocol-Level
4 fraud cards in this group.
Routing traffic through third-party services to assist with targeting or aiming.
Deliberately interrupting network connection to induce artificial lag advantages.
Cyberattacks designed to disrupt gameplay, degrade services, or compromise user accounts.
Modifying or intercepting data packets sent between client and server.
Infrastructure-Level
0 fraud cards in this group.