Home

This blog is about documenting any network vulnerabilities I’ve discovered in online games (mostly MMORPGs) throughout my years of searching, dating back to around 2010. More examples will be posted over time, and when possible, code samples or GitHub projects will be included to complement the post. In posts featuring older exploits, direct screenshots of the exploit are sometimes not available since some of them are 7-15 years old (back then I didn’t plan on saving any media for the purpose of posting it later on).

Other topics might also be explored, such as good vs. bad game security, reverse engineering the encryption methods found on different games, or different ways to emulate networking components.

Pages:

Posts:

Design a site like this with WordPress.com
Get started