e-doping.info
Print summary
Filtered summary for
all records
.
Cheats: 31
Articles: 47
Evidence links: 0
Game-Level
Account Sharing & Identity Fraud
Unauthorized use of another player's account, identity substitution, or account-based fraud.
2 articles
Game-Level
Adjacent integrity issue
Boosting & Smurfing
Manipulating matchmaking ranks through skill deception, queue boosting, or false competitive representation.
2 articles
Game-Level
Adjacent integrity issue
Bug/Glitch Exploitation
Abusing software errors, glitches, or programming discrepancies for competitive advantage.
5 articles
Game-Level
Counted as e-doping
Collusion
Covert cooperation between opposing players to manipulate outcomes or competitive balance.
0 articles
Game-Level
Adjacent integrity issue
Infinite Combos
Using attack sequences that loop indefinitely without counterplay options.
1 article
Game-Level
Counted as e-doping
Match-Fixing & Illegal Gambling
Manipulating match outcomes for financial gain through betting markets, illegal gambling, or deliberate losing.
6 articles
Game-Level
Adjacent integrity issue
Pay-to-Win Mechanics
Gaining significant competitive advantage through in-game purchases or monetized advantages.
1 article
Game-Level
Adjacent integrity issue
Toxic Behavior (Griefing)
Disruptive actions including harassment, trolling, griefing, and discriminatory conduct.
1 article
Game-Level
Adjacent integrity issue
Application-Level
Aimbots/Aimlock/Triggerbots
Software that automatically aims at targets, locks onto enemies, or fires weapons.
7 articles
Application-Level
Counted as e-doping
Automated Input Generation (Macros)
Programs that perform complex sequences of actions automatically.
1 article
Application-Level
Counted as e-doping
Computer Vision-Based Cheats
Using artificial intelligence or computer vision to identify and target opponents.
6 articles
Application-Level
Counted as e-doping
Detection & Security Research
General research focused on identifying, detecting, or preventing cheating behaviors.
2 articles
Application-Level
Adjacent integrity issue
Game Bots/Botting
Automated scripts or agents that perform gameplay actions for resource farming, experience gain, or other unfair advantages.
8 articles
Application-Level
Counted as e-doping
Information Leakage
Exploiting the client to receive more game-state information than legitimately allowed.
1 article
Application-Level
Counted as e-doping
Item Duplication
Creating unauthorized copies of in-game items or resources.
1 article
Application-Level
Counted as e-doping
Map Hacking
Removing fog-of-war mechanics or revealing the full game map and enemy positions.
1 article
Application-Level
Counted as e-doping
Memory Value Alteration
Directly changing values stored in game memory during runtime.
6 articles
Application-Level
Counted as e-doping
Reverse-Engineering
Decompiling and analyzing game code to identify vulnerabilities and exploits.
1 article
Application-Level
Adjacent integrity issue
Speed Hacks
Manipulating character movement speed or action execution rates.
1 article
Application-Level
Counted as e-doping
Wallhacks & ESP Hacks
Rendering opponents visible through solid objects or displaying hidden game information via ESP-style overlays.
4 articles
Application-Level
Counted as e-doping
Weapon Recoil Suppression
Scripts that automatically compensate for weapon recoil patterns.
0 articles
Application-Level
Counted as e-doping
Protocol-Level
Aiming Proxies
Routing traffic through third-party services to assist with targeting or aiming.
0 articles
Protocol-Level
Counted as e-doping
Lag Switching
Deliberately interrupting network connection to induce artificial lag advantages.
2 articles
Protocol-Level
Counted as e-doping
Network Attacks (DDoS, etc.)
Cyberattacks designed to disrupt gameplay, degrade services, or compromise user accounts.
5 articles
Protocol-Level
Counted as e-doping
Packet Tampering/Interception
Modifying or intercepting data packets sent between client and server.
2 articles
Protocol-Level
Counted as e-doping
Infrastructure-Level
Custom Firmware (CFW) & Save File Manipulation
Using modified console firmware to run unauthorized code or manipulate save data.
4 articles
Infrastructure-Level
Counted as e-doping
Hardware Cheats/Hacking
Using modified gaming peripherals or hardware devices with built-in scripts or automated functions.
4 articles
Infrastructure-Level
Counted as e-doping
Mechanical/Robo-Doping
Using manipulated virtual equipment or modified training devices for enhanced performance.
1 article
Infrastructure-Level
Counted as e-doping
Mobile Device Exploits
Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.
1 article
Infrastructure-Level
Counted as e-doping
NFC/Object-Based Cheating
Counterfeiting or modifying data on physical game objects such as NFC devices or figures.
1 article
Infrastructure-Level
Counted as e-doping
Weight/Height Doping
Falsifying rider or player physical metrics to gain favorable performance ratios in virtual sport contexts.
2 articles
Infrastructure-Level
Counted as e-doping