🌐 OSI Layer View

Where in the stack does the cheat live?

The same fraud techniques, reorganized by the OSI layer they exploit — from aimbots running at Layer 7 right down to kernel and hardware cheats at Layers 1–2.

● OSI Layer 7 (Application)

Layer 7 (Application)

Cheats that operate entirely within the game software — aimbots, bots, wallhacks, macros, and memory tampering all live here.

21
Account Sharing & Identity Fraud

Unauthorized use of another player's account, identity substitution, or account-based fraud.

Game-Level 2 articles Adjacent issue
Aimbots/Aimlock/Triggerbots

Software that automatically aims at targets, locks onto enemies, or fires weapons.

Application-Level 7 articles E-doping
Automated Input Generation (Macros)

Programs that perform complex sequences of actions automatically.

Application-Level 1 article E-doping
Boosting & Smurfing

Manipulating matchmaking ranks through skill deception, queue boosting, or false competitive representation.

Game-Level 2 articles Adjacent issue
Bug/Glitch Exploitation

Abusing software errors, glitches, or programming discrepancies for competitive advantage.

Game-Level 5 articles E-doping
Collusion

Covert cooperation between opposing players to manipulate outcomes or competitive balance.

Game-Level 0 articles Adjacent issue
Computer Vision-Based Cheats

Using artificial intelligence or computer vision to identify and target opponents.

Application-Level 6 articles E-doping
Detection & Security Research

General research focused on identifying, detecting, or preventing cheating behaviors.

Application-Level 2 articles Adjacent issue
Game Bots/Botting

Automated scripts or agents that perform gameplay actions for resource farming, experience gain, or other unfair advantages.

Application-Level 8 articles E-doping
Infinite Combos

Using attack sequences that loop indefinitely without counterplay options.

Game-Level 1 article E-doping
Information Leakage

Exploiting the client to receive more game-state information than legitimately allowed.

Application-Level 1 article E-doping
Item Duplication

Creating unauthorized copies of in-game items or resources.

Application-Level 1 article E-doping
Map Hacking

Removing fog-of-war mechanics or revealing the full game map and enemy positions.

Application-Level 1 article E-doping
Match-Fixing & Illegal Gambling

Manipulating match outcomes for financial gain through betting markets, illegal gambling, or deliberate losing.

Game-Level 6 articles Adjacent issue
Memory Value Alteration

Directly changing values stored in game memory during runtime.

Application-Level 6 articles E-doping
Pay-to-Win Mechanics

Gaining significant competitive advantage through in-game purchases or monetized advantages.

Game-Level 1 article Adjacent issue
Reverse-Engineering

Decompiling and analyzing game code to identify vulnerabilities and exploits.

Application-Level 1 article Adjacent issue
Speed Hacks

Manipulating character movement speed or action execution rates.

Application-Level 1 article E-doping
Toxic Behavior (Griefing)

Disruptive actions including harassment, trolling, griefing, and discriminatory conduct.

Game-Level 1 article Adjacent issue
Wallhacks & ESP Hacks

Rendering opponents visible through solid objects or displaying hidden game information via ESP-style overlays.

Application-Level 4 articles E-doping
Weapon Recoil Suppression

Scripts that automatically compensate for weapon recoil patterns.

Application-Level 0 articles E-doping
● OSI Layers 3-4 (Network / Transport)

Layers 3-4 (Network / Transport)

Cheats that abuse the network connection itself — lag switching, DDoS attacks, and packet manipulation exploit the transport layer between client and server.

4
Aiming Proxies

Routing traffic through third-party services to assist with targeting or aiming.

Protocol-Level 0 articles E-doping
Lag Switching

Deliberately interrupting network connection to induce artificial lag advantages.

Protocol-Level 2 articles E-doping
Network Attacks (DDoS, etc.)

Cyberattacks designed to disrupt gameplay, degrade services, or compromise user accounts.

Protocol-Level 5 articles E-doping
Packet Tampering/Interception

Modifying or intercepting data packets sent between client and server.

Protocol-Level 2 articles E-doping
● OSI Layers 1-2 (Physical / Data Link)

Layers 1-2 (Physical / Data Link)

Cheats rooted in hardware, firmware, and physical devices — modified peripherals, custom firmware, and driver-level exploits that sit below the operating system.

6
Custom Firmware (CFW) & Save File Manipulation

Using modified console firmware to run unauthorized code or manipulate save data.

Infrastructure-Level 4 articles E-doping
Hardware Cheats/Hacking

Using modified gaming peripherals or hardware devices with built-in scripts or automated functions.

Infrastructure-Level 4 articles E-doping
Mechanical/Robo-Doping

Using manipulated virtual equipment or modified training devices for enhanced performance.

Infrastructure-Level 1 article E-doping
Mobile Device Exploits

Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.

Infrastructure-Level 1 article E-doping
NFC/Object-Based Cheating

Counterfeiting or modifying data on physical game objects such as NFC devices or figures.

Infrastructure-Level 1 article E-doping
Weight/Height Doping

Falsifying rider or player physical metrics to gain favorable performance ratios in virtual sport contexts.

Infrastructure-Level 2 articles E-doping