GhostTrial is a custom-built Python suite designed to analyze and learn from process memory in PvE games like The Outlast Trials, Toontown Rewritten, and Toontown Corporate Clash.
Built for educational and ethical research only, it helps users understand how memory is handled in client-side processes — with a spooky GUI twist. 💀🎮
GhostTrial is not a cheat. It is a forensic research tool for studying memory in games without competitive ecosystems.
- Reverse engineering learners 🧠
- Game forensics hobbyists 🎮
- Modding fans & PvE sandbox explorers
- Speaking/presenting about how client-side values work
Module | What it does |
---|---|
ghosttrial.py |
GUI dashboard with logs & scanner buttons |
process_watcher.py |
Detects running EXEs (e.g., TOT, TTR, TTCC) |
honeypot.py |
Trap dummy processes for fake RAT/cheat testing |
memory_scanner.py |
Low-level memory scan engine using pymem |
tot_module.py |
Scans for RIGs, Tokens, Stamps, Murkov Coins |
ttr_module.py |
Scans for Laff, Gags, Beans in Toontown Rewritten |
ttcc_module.py |
Scans for Kudos, Beans, XP in Corporate Clash |
git clone https://github.com/yourusername/GhostTrial.git
cd GhostTrial
pip install -r requirements.txt
python ghosttrial.py
💡 Requires:
Python 3.8–3.11
pymem, customtkinter, psutil
🧪 Educational Memory Scan Examples
You can test scan values like 9999 Murkov Coins or 137 Laff — these are not hacks, they’re forensic targets.
Example: Scan for Outlast Trials Tokens
css
Copy
Edit
[TOT] Attached to Outlast Trials process successfully.
[TOT] Scanning for Tokens (999 test)...
[MEMORY] Found match at 0x1A883002
👻 Notes & Disclaimers
🛡️ GhostTrial does not modify memory, only reads it.
❗ Do not use this in online games with anti-cheat or multiplayer flags.
⚖️ Built strictly for learning how PvE progression systems store values.
📚 Built with ❤️ by Mori (aka @morithegamer) and GPT Dev Assistant.
📂 Project Layout
bash
Copy
Edit
GhostTrial/
├── ghosttrial.py # GUI
├── core/
│ ├── process_watcher.py
│ ├── honeypot.py
│ └── memory_scanner.py
├── games/
│ ├── tot_module.py
│ ├── ttr_module.py
│ └── ttcc_module.py
├── README.md
└── requirements.txt
💙 Community Message
"This project is for testing, talking, and tinkering.
It exists to learn, not exploit.
If we can understand how PvE memory works — we can understand how to defend, balance, and fix games too."
— Mori & GPT
yaml
Copy
Edit
---
## ✅ What to Do Now:
1. ✅ Paste that into `GhostTrial/README.md`
2. 📦 Add a `requirements.txt` with:
pymem
customtkinter
psutil
yaml
Copy
Edit
3. 🐙 Upload it to GitHub and go public when ready!