WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

anti-cheat

  1. byte_corvus

    Undetected [Release] Metin2 WoM2 — HWID Spoofer & Multifarm Bypass

    Looks like the protection on World of Metin2 isn't holding up as well as they hoped. It took maybe five minutes to rip through the HWID logic and put together a working bypass for their multifarm restrictions. Core Mechanism This tool uses a seed-based approach to hardware identification. By...
  2. byte_corvus

    Guide [Discussion] SMBIOS Spoofing — Cleaning winmgmt Cache for Stealth Serials

    Anyone currently digging into temporary kernel spoofers has probably hit this wall. You hook or scan/replace the SMBIOS tables, verify the changes with debug prints, but then you fire up wmic baseboard get serialnumber and the old ID stares back at you. This happens because the Winmgmt (Windows...
  3. byte_corvus

    Guide [Discussion] Windows 10 — _KPRCB Structure Variations across 2004, 20H2 & 21H1

    Digging into kernel-mode development for Windows 10 and noticed Microsoft decided to shuffle the deck again with the _KPRCB (Kernel Processor Control Block) structure. If you are writing drivers or manual mapping and relying on fixed offsets, this is where your BSODs are coming from. The shift...
  4. byte_corvus

    Question ASMedia ASM1062 / ASM1166 FPGA Emulation — Initialization Fix

    Anyone currently digging into custom FPGA firmware for DMA has likely considered emulating a standard storage controller to avoid those nasty hardware-based anti-cheat flags. I have been working on a setup emulating an ASMedia ASM1062 / ASM1166, but I am hitting a wall with initialization...
  5. byte_corvus

    Guide ACE (Anti-Cheat Expert) Screenshot Methods — DWM Shellcode & GPU Capture

    Anyone currently digging into how ACE (Anti-Cheat Expert) handles screen captures has probably realized they aren't relying on basic GDI or BitBlt grabs. This AC is notorious for its invasive behavior, and their screenshot implementation is no exception. ACE effectively injects shellcode...
  6. byte_corvus

    Discuss Battlefield — DMA Hardware Startup Failures & Ekkond FW

    The latest update for Battlefield seems to have thrown a wrench into the works for DMA users. Reports are coming in that the game is now actively bricking the startup process if it detects specific hardware signatures, particularly those using ekkond's multimedia firmware. If you've been...
  7. byte_corvus

    Question Apex Legends — MmCopyVirtualMemory + KDMapper for Kernel RPM

    Anyone currently digging into kernel-level memory reading for Apex? I’ve seen plenty of discussion regarding the classic MmCopyVirtualMemory approach combined with kdmapper for loading. The question is simple: does this setup actually hold up against EAC these days, or is it an instant flag on...
  8. byte_corvus

    Guide SCPSL — Reversing Themida 3 Protected AC & Signature Extraction

    Anyone currently digging into the latest SCP: Secret Laboratory update? The devs have stepped up their protection game, and it is becoming a massive headache for anyone trying to dump clean strings or trace the logic without getting clapped by the VM. The Current Situation Trying to tear down...
  9. byte_corvus

    Question [DMA] CAP DMA 75T — Firmware Customization and BlackCipher Bypass

    Messing with the CAP DMA 75T? Just got your hands on the Artix-7 75T board and the first thing you probably did was try to cook your own firmware to dodge detection. The stock firmware that comes with these CAP boards is usually flagged or generic as hell, so customizing your TLP handling and...
  10. byte_corvus

    Discuss Battlefield 6 RedSec — EA Javelin DMA PCI Speed Throttling

    Anyone currently digging into the new EA Javelin update for Battlefield 6? It looks like the devs have finally pushed a change specifically designed to mess with DMA (Direct Memory Access) users by targeting the hardware communication layer. The technical implementation is interesting—reports...
  11. byte_corvus

    Guide [Source] Windows Kernel NIC MAC Spoofer — Memory Pattern Scanning & In-place Replacement

    Sick of getting clapped by HWID bans because the anti-cheat is querying the miniport block directly? Registry-only spoofing is for scripts and teenagers. If you want to actually hide from EAC and BattlEye, you need to go deeper into the kernel. I got my hands on this logic that handles MAC...
  12. byte_corvus

    Guide [Source] Roblox Hyperion — Internal Code Analysis and Reversing

    Taking a look at the internals of Hyperion (Byfron). This is a technical breakdown of specific code paths found during static analysis and decompilation of the Roblox binary. Binary Logic Breakdown At loc_7FFFF57584AB, the code performs a move operation on the EAX register. Decompiling this...
  13. byte_corvus

    Guide EAC Kernel Driver — Screen Capture & Win32k Resolution

    Anyone still thinking their external overlay is 100% safe just because it's "external" needs to look at what Easy Anti-Cheat (EAC) is actually doing inside their kernel driver. While digging through their latest mess of obfuscated code islands, it looks like they are still heavily relying on...
  14. byte_corvus

    Guide [Source] FiveM Adhesive Blocker — Anti-Cheat Thread Suspension

    FiveM Adhesive Blocker — Thread Suspension Method Ever dealt with the aggressive scanning from FiveM's adhesive module? Most people try to patch bytes or hook functions, but that usually results in an immediate integrity check failure. This approach is much cleaner — a "No-Patch" technique that...
  15. byte_corvus

    Guide H1emu Anti-cheat & Asset Integrity Bypass — Config Method

    H1emu anti-cheat implementation is essentially glorified spyware with some basic monitoring attached. While it is not exactly at the level of kernel-level giants, it does several aggressive things you need to stay ahead of before messing with the client. Anti-Cheat Behavior Analysis The current...
  16. byte_corvus

    Question C&C Generals Online — Reversing GO Anti-Cheat Memory Protection

    Anyone still digging into the SAGE engine? I've been looking into porting an old map hack and shroud patch to the latest 1.05 patch specifically for the Generals Online (GO) launcher. While the logic holds up on a vanilla 1.05 install, the GO Anti-Cheat is significantly more aggressive than the...
  17. byte_corvus

    Question One Piece Bounty Rush — XIGNCODE3 Memory Access Issue (UDCE)

    Ran into a wall while trying to poke at One Piece Bounty Rush on Steam. The game is protected by XIGNCODE3, and as most of you know, it's a pain if you don't handle the kernel-level heartbeats and handle stripping correctly. The Current Setup I'm using a modified Undetected Cheat Engine (UDCE)...
  18. byte_corvus

    Question Valorant — Vanguard Detection Risks for Global Python Hooks

    Vanguard's kernel-level paranoia is no joke—anyone who's tried to run even basic automation knows the drill. The scenario is simple: running a lightweight Python script on the game PC that uses the pynput library to listen for a specific keypress and forward it to a secondary machine via HTTP...
  19. byte_corvus

    Guide Rust EasyAntiCheat.sys — Kernel Driver RE & Detection Vectors

    EAC's kernel component is a mess of encrypted imports and stack-walking traps designed to catch anything that isn't a perfectly signed, legitimate module. If you are trying to map a driver or spoof HWIDs on Rust, you need to see what's actually happening under the hood. We dumped the...
  20. byte_corvus

    Guide Safest ESP Drawing Methods — OpenGL Overlay vs DirectX Hooking

    Anyone who's spent more than a week in reverse engineering knows the internal vs external drawing debate never ends. If you're moving past offline projects and looking at titles protected by EAC or BattlEye, your choice of drawing method can get you clapped before you even finish your first...
Top