Skip to content

morithegamer/GhostTrial

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

👻 GhostTrial – Anti-Cheat & Memory Scan Learning Tool

GhostTrial is a custom-built Python suite designed to analyze and learn from process memory in PvE games like The Outlast Trials, Toontown Rewritten, and Toontown Corporate Clash.
Built for educational and ethical research only, it helps users understand how memory is handled in client-side processes — with a spooky GUI twist. 💀🎮


🎯 Purpose

GhostTrial is not a cheat. It is a forensic research tool for studying memory in games without competitive ecosystems.

✅ Perfect For:

  • Reverse engineering learners 🧠
  • Game forensics hobbyists 🎮
  • Modding fans & PvE sandbox explorers
  • Speaking/presenting about how client-side values work

💼 Features

Module What it does
ghosttrial.py GUI dashboard with logs & scanner buttons
process_watcher.py Detects running EXEs (e.g., TOT, TTR, TTCC)
honeypot.py Trap dummy processes for fake RAT/cheat testing
memory_scanner.py Low-level memory scan engine using pymem
tot_module.py Scans for RIGs, Tokens, Stamps, Murkov Coins
ttr_module.py Scans for Laff, Gags, Beans in Toontown Rewritten
ttcc_module.py Scans for Kudos, Beans, XP in Corporate Clash

🖥️ How to Run

git clone https://github.com/yourusername/GhostTrial.git
cd GhostTrial
pip install -r requirements.txt
python ghosttrial.py
💡 Requires:

Python 3.8–3.11

pymem, customtkinter, psutil

🧪 Educational Memory Scan Examples
You can test scan values like 9999 Murkov Coins or 137 Laff — these are not hacks, they’re forensic targets.

Example: Scan for Outlast Trials Tokens
css
Copy
Edit
[TOT] Attached to Outlast Trials process successfully.
[TOT] Scanning for Tokens (999 test)...
[MEMORY] Found match at 0x1A883002
👻 Notes & Disclaimers
🛡️ GhostTrial does not modify memory, only reads it.

❗ Do not use this in online games with anti-cheat or multiplayer flags.

⚖️ Built strictly for learning how PvE progression systems store values.

📚 Built with ❤️ by Mori (aka @morithegamer) and GPT Dev Assistant.

📂 Project Layout
bash
Copy
Edit
GhostTrial/
├── ghosttrial.py              # GUI
├── core/
│   ├── process_watcher.py
│   ├── honeypot.py
│   └── memory_scanner.py
├── games/
│   ├── tot_module.py
│   ├── ttr_module.py
│   └── ttcc_module.py
├── README.md
└── requirements.txt

💙 Community Message
"This project is for testing, talking, and tinkering.
It exists to learn, not exploit.
If we can understand how PvE memory works — we can understand how to defend, balance, and fix games too."
— Mori & GPT

yaml
Copy
Edit

---

## ✅ What to Do Now:

1. ✅ Paste that into `GhostTrial/README.md`
2. 📦 Add a `requirements.txt` with:
pymem
customtkinter
psutil

yaml
Copy
Edit

3. 🐙 Upload it to GitHub and go public when ready!

About

A forensic anti-cheat research GUI for PvE games like TOT, TTR, and TTCC.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages