- Status
- Offline
- Joined
- Mar 3, 2026
- Messages
- 85
- Reaction score
- 7
Fresh release just hit the boards for Arc Raiders, and it looks like someone finally decided to stop pasting Minecraft logic and actually touch some Linux memory reading. If you are tired of getting clapped on Windows because the AC is breathing down your neck, this might be the project to watch.
This is a basic external radar built for the Linux/Proton environment. Since it relies on root access to read directly from memory (via /proc/PID/mem), it is a far cry from the complex kernel-level injectors you see on Windows.
Technical Breakdown:
Usage & Warnings:
The dev claims it is currently undetected, but keep in mind that "first project" codebases often lack proper security practices. Reading /proc/PID/mem as root is effective, but it is not magic. If the game devs decide to implement basic integrity checks on their memory regions, this will get you nuked just as fast as any other tool.
A Final Word on Security:
Since this requires root access to function, be absolutely certain you verify the source before running it on your daily driver. Never trust a fresh dev blindly—if you have a secondary Linux partition or a sandbox, use it. While skids are getting their main accounts nuked by detected pastes from YouTube, the Infocheats community is using proper bypasses, dominating the lobbies, and keeping their HWID safe.
Is this actually going to hold up when the game hits 1.0, or is this just another temporary toy that will get patched the moment they enable server-side validation?
This is a basic external radar built for the Linux/Proton environment. Since it relies on root access to read directly from memory (via /proc/PID/mem), it is a far cry from the complex kernel-level injectors you see on Windows.
Technical Breakdown:
- Approach: External memory reader (RPM). It does not hook the game process or inject a DLL, keeping it away from standard Windows ObCallbacks.
- Environment: Strictly Linux. Since it uses Proton/Wine, it is bypassing the standard Windows-based AC telemetry that catches most skidded code.
- Requirements: Python 3, GTK3, and root privileges.
Usage & Warnings:
The dev claims it is currently undetected, but keep in mind that "first project" codebases often lack proper security practices. Reading /proc/PID/mem as root is effective, but it is not magic. If the game devs decide to implement basic integrity checks on their memory regions, this will get you nuked just as fast as any other tool.
Code:
sudo pacman -S --needed python python-gobject gtk3 cairo
sudo python3 start_radar.py
A Final Word on Security:
Since this requires root access to function, be absolutely certain you verify the source before running it on your daily driver. Never trust a fresh dev blindly—if you have a secondary Linux partition or a sandbox, use it. While skids are getting their main accounts nuked by detected pastes from YouTube, the Infocheats community is using proper bypasses, dominating the lobbies, and keeping their HWID safe.
You cant view this link please login.
Is this actually going to hold up when the game hits 1.0, or is this just another temporary toy that will get patched the moment they enable server-side validation?